refers to any laws relating to protecting the internet and
TRANSCRIPT
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
1/16
CYBER LAWCYBER LAW
Refers to any laws relating toRefers to any laws relating to
protecting the Internet and otherprotecting the Internet and other
online communication andonline communication andtechnologies.technologies.
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
2/16
Cyber LawCyber Law
Security Of Government DataSecurity Of Government Data
Intellectual Property RightsIntellectual Property Rights Privacy and confidentially of informationPrivacy and confidentially of information
Legal Status Of Online TransactionsLegal Status Of Online Transactions
Integrity And Security Of InformationIntegrity And Security Of Information
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
3/16
In the recent years, many concerns and issuesIn the recent years, many concerns and issueswere raised on the integrity and security ofwere raised on the integrity and security ofinformation, legal status of online transaction,information, legal status of online transaction,privacy and confidentiality of information,privacy and confidentiality of information,
intellectual property rights and security ofintellectual property rights and security ofgovernment data placed on the Internet.government data placed on the Internet.
These concerns and issues clearly indicateThese concerns and issues clearly indicate
why cyber laws are needed in online activitieswhy cyber laws are needed in online activities
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
4/16
The Cyber Law Acts In MalaysiaThe Cyber Law Acts In Malaysia
The Malaysian government has already passedThe Malaysian government has already passedseveral cyber laws to control and reduce theseveral cyber laws to control and reduce theinternet abuse.internet abuse.
These cyber laws include :These cyber laws include : Digital Signature Act 1997Digital Signature Act 1997 Computer Crimes Act 1997Computer Crimes Act 1997
Telemedicine Act 1997Telemedicine Act 1997 Communication And Multimedia Act 1998Communication And Multimedia Act 1998
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
5/16
Beside these cyber laws, there are three otherBeside these cyber laws, there are three other
cyber laws being drafted.cyber laws being drafted.
Private Data Protection BillPrivate Data Protection Bill Electronic Government Activities BillElectronic Government Activities Bill
Electronic Transaction BillElectronic Transaction Bill
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
6/16
Digital Signature Act 1997Digital Signature Act 1997
The digital signature act 1997 secures electronicThe digital signature act 1997 secures electroniccommunication especially on the internet.communication especially on the internet.
Digital signature is an identity verification standardDigital signature is an identity verification standard
that uses encryption technique to protect against e-that uses encryption technique to protect against e-mail forgery. The encrypted code consists of themail forgery. The encrypted code consists of theusers name and hash of all the parts of the message.users name and hash of all the parts of the message.
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
7/16
Computer Crimes Act 1997Computer Crimes Act 1997
The computer crime act 1997 gives protectionThe computer crime act 1997 gives protectionagainst the misuses of computers andagainst the misuses of computers andcomputer criminal activities such ascomputer criminal activities such as
unauthorized use of programmes, illegalunauthorized use of programmes, illegaltransmission of data or messages overtransmission of data or messages overcomputers and hacking and cracking ofcomputers and hacking and cracking ofcomputer systems and networks.computer systems and networks.
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
8/16
TELEMEDICINE ACT 1997TELEMEDICINE ACT 1997
The telemedicine act 1997 ensures that onlyThe telemedicine act 1997 ensures that only
qualified medical practitioners can practicequalified medical practitioners can practice
telemedicine and that their patients rights andtelemedicine and that their patients rights and
interests are protected.interests are protected.
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
9/16
COMMUNICATION ANDCOMMUNICATION AND
MULTIMEDIA ACT 1998MULTIMEDIA ACT 1998 The implementation of communication andThe implementation of communication and
telecommunication act 1998 ensure that informationtelecommunication act 1998 ensure that information
is secure, that network is reliable and the service isis secure, that network is reliable and the service is
affordable all over Malaysia.affordable all over Malaysia.
This Act also ensures high level of users confidenceThis Act also ensures high level of users confidence
in the information and communication technologyin the information and communication technology
industry.industry.
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
10/16
COMPUTER CRIMESCOMPUTER CRIMES
AA computer crimecomputer crime is defined as any criminalis defined as any criminal
activity that is related to the use of computers.activity that is related to the use of computers.
These activities include computer fraud,These activities include computer fraud,
copyright infringement, computer theft andcopyright infringement, computer theft and
computer attack.computer attack.
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
11/16
COMPUTER FRAUDCOMPUTER FRAUD
Computer fraudComputer fraud is defined as having an intention tois defined as having an intention totake advantage over or causing loss to other people,take advantage over or causing loss to other people,mainly on monetary basis through the use ofmainly on monetary basis through the use ofcomputers.computers.
There are many forms of computer fraud whichThere are many forms of computer fraud whichinclude e-mail hoaxes, programme fraud, investmentinclude e-mail hoaxes, programme fraud, investmentschemes, sales promotions and claims of expertise onschemes, sales promotions and claims of expertise oncertain fields.certain fields.
Students need to be aware of other computer fraudsStudents need to be aware of other computer fraudssuch as health frauds, scams and hacking. Studentssuch as health frauds, scams and hacking. Studentswill also most likely get false information whilewill also most likely get false information whileresearching information on the Internet.researching information on the Internet.
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
12/16
COPYRIGHTCOPYRIGHT
INFRINGEMENTINFRINGEMENT
Copyright infringementCopyright infringement is defined as ais defined as aviolation of the rights secured by a copyright.violation of the rights secured by a copyright.
Copyright infringement involves illegal copyCopyright infringement involves illegal copy
or reproduction of copyrights material by theor reproduction of copyrights material by theblack market group. The open commercial saleblack market group. The open commercial sale
of pirated item is also illegal.of pirated item is also illegal.
With the current technology, the most perfectWith the current technology, the most perfectcopy of the original copy can be downloadedcopy of the original copy can be downloaded
from the internet.from the internet.
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
13/16
COMPUTER THEFTCOMPUTER THEFT
Computer theftComputer theft is defined as the unauthorised use ofis defined as the unauthorised use of
another persons property with the intention to denyanother persons property with the intention to deny
the owner the rightful possession of that property orthe owner the rightful possession of that property orits use.its use.
Examples of computer theft include:Examples of computer theft include:
transfer of payments to the wrong accountstransfer of payments to the wrong accounts
tap into data transmission lines on database at no costtap into data transmission lines on database at no cost
divert goods to the wrong destinationdivert goods to the wrong destination
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
14/16
COMPUTER ATTACKCOMPUTER ATTACK
Computer attackComputer attackmay be defined as any activities taken tomay be defined as any activities taken todisrupt the equipment of computer systems, change processingdisrupt the equipment of computer systems, change processingcontrol or corrupt stored data.control or corrupt stored data.
Computer attack can be in the forms of:Computer attack can be in the forms of:
-physical attack that disrupt the computer facility or-physical attack that disrupt the computer facility oritsits transmission lines.transmission lines.
-an electronic attack that uses the power of-an electronic attack that uses the power of
electromagnetic energy to overload computerelectromagnetic energy to overload computer circuitry.circuitry.-a computer network attack that uses a malicious code-a computer network attack that uses a malicious codeto exploit a weakness in software, or in the computerto exploit a weakness in software, or in the computersecurity practices of a computer usersecurity practices of a computer user
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
15/16
SUMMARYSUMMARY
Cyber law is need to protect :Cyber law is need to protect :
the integrity in security information.the integrity in security information. the legal status of online transactionsthe legal status of online transactions the privacy and confidentially of information.the privacy and confidentially of information.
the intellectual property rights.the intellectual property rights.
-
8/14/2019 Refers to Any Laws Relating to Protecting the Internet And
16/16