refers to any laws relating to protecting the internet and

Upload: yusairri

Post on 30-May-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    1/16

    CYBER LAWCYBER LAW

    Refers to any laws relating toRefers to any laws relating to

    protecting the Internet and otherprotecting the Internet and other

    online communication andonline communication andtechnologies.technologies.

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    2/16

    Cyber LawCyber Law

    Security Of Government DataSecurity Of Government Data

    Intellectual Property RightsIntellectual Property Rights Privacy and confidentially of informationPrivacy and confidentially of information

    Legal Status Of Online TransactionsLegal Status Of Online Transactions

    Integrity And Security Of InformationIntegrity And Security Of Information

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    3/16

    In the recent years, many concerns and issuesIn the recent years, many concerns and issueswere raised on the integrity and security ofwere raised on the integrity and security ofinformation, legal status of online transaction,information, legal status of online transaction,privacy and confidentiality of information,privacy and confidentiality of information,

    intellectual property rights and security ofintellectual property rights and security ofgovernment data placed on the Internet.government data placed on the Internet.

    These concerns and issues clearly indicateThese concerns and issues clearly indicate

    why cyber laws are needed in online activitieswhy cyber laws are needed in online activities

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    4/16

    The Cyber Law Acts In MalaysiaThe Cyber Law Acts In Malaysia

    The Malaysian government has already passedThe Malaysian government has already passedseveral cyber laws to control and reduce theseveral cyber laws to control and reduce theinternet abuse.internet abuse.

    These cyber laws include :These cyber laws include : Digital Signature Act 1997Digital Signature Act 1997 Computer Crimes Act 1997Computer Crimes Act 1997

    Telemedicine Act 1997Telemedicine Act 1997 Communication And Multimedia Act 1998Communication And Multimedia Act 1998

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    5/16

    Beside these cyber laws, there are three otherBeside these cyber laws, there are three other

    cyber laws being drafted.cyber laws being drafted.

    Private Data Protection BillPrivate Data Protection Bill Electronic Government Activities BillElectronic Government Activities Bill

    Electronic Transaction BillElectronic Transaction Bill

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    6/16

    Digital Signature Act 1997Digital Signature Act 1997

    The digital signature act 1997 secures electronicThe digital signature act 1997 secures electroniccommunication especially on the internet.communication especially on the internet.

    Digital signature is an identity verification standardDigital signature is an identity verification standard

    that uses encryption technique to protect against e-that uses encryption technique to protect against e-mail forgery. The encrypted code consists of themail forgery. The encrypted code consists of theusers name and hash of all the parts of the message.users name and hash of all the parts of the message.

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    7/16

    Computer Crimes Act 1997Computer Crimes Act 1997

    The computer crime act 1997 gives protectionThe computer crime act 1997 gives protectionagainst the misuses of computers andagainst the misuses of computers andcomputer criminal activities such ascomputer criminal activities such as

    unauthorized use of programmes, illegalunauthorized use of programmes, illegaltransmission of data or messages overtransmission of data or messages overcomputers and hacking and cracking ofcomputers and hacking and cracking ofcomputer systems and networks.computer systems and networks.

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    8/16

    TELEMEDICINE ACT 1997TELEMEDICINE ACT 1997

    The telemedicine act 1997 ensures that onlyThe telemedicine act 1997 ensures that only

    qualified medical practitioners can practicequalified medical practitioners can practice

    telemedicine and that their patients rights andtelemedicine and that their patients rights and

    interests are protected.interests are protected.

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    9/16

    COMMUNICATION ANDCOMMUNICATION AND

    MULTIMEDIA ACT 1998MULTIMEDIA ACT 1998 The implementation of communication andThe implementation of communication and

    telecommunication act 1998 ensure that informationtelecommunication act 1998 ensure that information

    is secure, that network is reliable and the service isis secure, that network is reliable and the service is

    affordable all over Malaysia.affordable all over Malaysia.

    This Act also ensures high level of users confidenceThis Act also ensures high level of users confidence

    in the information and communication technologyin the information and communication technology

    industry.industry.

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    10/16

    COMPUTER CRIMESCOMPUTER CRIMES

    AA computer crimecomputer crime is defined as any criminalis defined as any criminal

    activity that is related to the use of computers.activity that is related to the use of computers.

    These activities include computer fraud,These activities include computer fraud,

    copyright infringement, computer theft andcopyright infringement, computer theft and

    computer attack.computer attack.

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    11/16

    COMPUTER FRAUDCOMPUTER FRAUD

    Computer fraudComputer fraud is defined as having an intention tois defined as having an intention totake advantage over or causing loss to other people,take advantage over or causing loss to other people,mainly on monetary basis through the use ofmainly on monetary basis through the use ofcomputers.computers.

    There are many forms of computer fraud whichThere are many forms of computer fraud whichinclude e-mail hoaxes, programme fraud, investmentinclude e-mail hoaxes, programme fraud, investmentschemes, sales promotions and claims of expertise onschemes, sales promotions and claims of expertise oncertain fields.certain fields.

    Students need to be aware of other computer fraudsStudents need to be aware of other computer fraudssuch as health frauds, scams and hacking. Studentssuch as health frauds, scams and hacking. Studentswill also most likely get false information whilewill also most likely get false information whileresearching information on the Internet.researching information on the Internet.

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    12/16

    COPYRIGHTCOPYRIGHT

    INFRINGEMENTINFRINGEMENT

    Copyright infringementCopyright infringement is defined as ais defined as aviolation of the rights secured by a copyright.violation of the rights secured by a copyright.

    Copyright infringement involves illegal copyCopyright infringement involves illegal copy

    or reproduction of copyrights material by theor reproduction of copyrights material by theblack market group. The open commercial saleblack market group. The open commercial sale

    of pirated item is also illegal.of pirated item is also illegal.

    With the current technology, the most perfectWith the current technology, the most perfectcopy of the original copy can be downloadedcopy of the original copy can be downloaded

    from the internet.from the internet.

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    13/16

    COMPUTER THEFTCOMPUTER THEFT

    Computer theftComputer theft is defined as the unauthorised use ofis defined as the unauthorised use of

    another persons property with the intention to denyanother persons property with the intention to deny

    the owner the rightful possession of that property orthe owner the rightful possession of that property orits use.its use.

    Examples of computer theft include:Examples of computer theft include:

    transfer of payments to the wrong accountstransfer of payments to the wrong accounts

    tap into data transmission lines on database at no costtap into data transmission lines on database at no cost

    divert goods to the wrong destinationdivert goods to the wrong destination

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    14/16

    COMPUTER ATTACKCOMPUTER ATTACK

    Computer attackComputer attackmay be defined as any activities taken tomay be defined as any activities taken todisrupt the equipment of computer systems, change processingdisrupt the equipment of computer systems, change processingcontrol or corrupt stored data.control or corrupt stored data.

    Computer attack can be in the forms of:Computer attack can be in the forms of:

    -physical attack that disrupt the computer facility or-physical attack that disrupt the computer facility oritsits transmission lines.transmission lines.

    -an electronic attack that uses the power of-an electronic attack that uses the power of

    electromagnetic energy to overload computerelectromagnetic energy to overload computer circuitry.circuitry.-a computer network attack that uses a malicious code-a computer network attack that uses a malicious codeto exploit a weakness in software, or in the computerto exploit a weakness in software, or in the computersecurity practices of a computer usersecurity practices of a computer user

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    15/16

    SUMMARYSUMMARY

    Cyber law is need to protect :Cyber law is need to protect :

    the integrity in security information.the integrity in security information. the legal status of online transactionsthe legal status of online transactions the privacy and confidentially of information.the privacy and confidentially of information.

    the intellectual property rights.the intellectual property rights.

  • 8/14/2019 Refers to Any Laws Relating to Protecting the Internet And

    16/16