33853666 Malaysian Cyber Law Electronic Government Law

Embed Size (px)

Citation preview

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    1/15

    IMPACT OF ICT ON SOCIETY:IMPACT OF ICT ON SOCIETY:Malaysian Cyber Law, ElectronicMalaysian Cyber Law, Electronic

    Government Law.Government Law.

    Presented by:Presented by:

    Ferellica Anne M.Ferellica Anne M.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    2/15

    DIGITAL SIGNATURE ACT 1997.DIGITAL SIGNATURE ACT 1997.

    Why the ACT exist?Why the ACT exist?

    Transactions conducted via internet increasing.Transactions conducted via internet increasing.

    Identities and messages can falsified.Identities and messages can falsified.

    Need purchaser and seller identity for the integrity ofNeed purchaser and seller identity for the integrity of

    messages.messages.

    Removing doubt and possibility of fraud.Removing doubt and possibility of fraud.

    What the ACT is about?What the ACT is about? Provides for regulation of public key infrastructure.Provides for regulation of public key infrastructure.

    Make digital signature legally valid and enforceable asMake digital signature legally valid and enforceable as

    traditional signature.traditional signature.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    3/15

    COPYRIGHT (AMENDMENT) ACT 1997.COPYRIGHT (AMENDMENT) ACT 1997.

    Why the ACT exist?Why the ACT exist?

    To protect expressions of thoughts and ideas fromTo protect expressions of thoughts and ideas from

    unauthorized copying alteration.unauthorized copying alteration.

    Creative expressions is being captured.Creative expressions is being captured.

    What the AMENDMENT ACT about?What the AMENDMENT ACT about?

    Clear protection accorded to multimedia works.Clear protection accorded to multimedia works.

    Transmissions of copyright works over the Internet clearlyTransmissions of copyright works over the Internet clearlyamount to infringement.amount to infringement.

    Technological methods of ensuring works and authorship infoTechnological methods of ensuring works and authorship info

    are not altered or removed is protected.are not altered or removed is protected.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    4/15

    TELEMEDICINE ACT 1997.TELEMEDICINE ACT 1997.

    Why the ACT exist?Why the ACT exist?

    Healthcare systems and providers around the world areHealthcare systems and providers around the world arebecoming interconnected.becoming interconnected.

    Unclear quality healthcare advice and consultation fromUnclear quality healthcare advice and consultation from

    specialist because doesnt have truth value.specialist because doesnt have truth value.

    To regulate practice of teleTo regulate practice of tele--consultation in medical profession.consultation in medical profession.

    What the ACT is about?What the ACT is about? The ACT provides that any registered doctor may practiceThe ACT provides that any registered doctor may practice

    telemedicine but other healthcare providers must first obtaintelemedicine but other healthcare providers must first obtain

    a license to do so.a license to do so.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    5/15

    COMPUTER CRIMES ACT 1997.COMPUTER CRIMES ACT 1997.

    Why the ACT exist?Why the ACT exist?

    As computing becomes more central to peoples life andAs computing becomes more central to peoples life and

    work, computers become both targets and tool of crime.work, computers become both targets and tool of crime.

    To ensure misuse of computer is offense.To ensure misuse of computer is offense.

    What the ACT is about?What the ACT is about?

    Offers to:Offers to:--

    Enter or attempt into computers and computer systems withoutEnter or attempt into computers and computer systems withoutauthorization.authorization.

    Damage or alter data/information in computers or computerDamage or alter data/information in computers or computer

    system by planting viruses.system by planting viruses.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    6/15

    COMMUNICATIONS AND MULTIMEDIA ACT 1998.COMMUNICATIONS AND MULTIMEDIA ACT 1998.

    Why the ACT exist?Why the ACT exist?

    Convergence of technologies is driving convergence ofConvergence of technologies is driving convergence oftelecommunication, broadcasting, computing, and content.telecommunication, broadcasting, computing, and content.

    What the ACT is about?What the ACT is about?

    A restructuring of converged ICT industry.A restructuring of converged ICT industry.

    Create and define a new system of licenses.Create and define a new system of licenses.

    Provide communication and multimedia services.Provide communication and multimedia services.

    Provide the existence of the Communication and MultimediaProvide the existence of the Communication and Multimedia

    Commission.Commission.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    7/15

    POLICY OBJECTIVES OF CMA.POLICY OBJECTIVES OF CMA.

    To regulate for the longTo regulate for the long--term benefit of the end user.term benefit of the end user.

    To promote consumer confidence in service delivery.To promote consumer confidence in service delivery. To ensure equitable provision of affordable services.To ensure equitable provision of affordable services.

    To create a robust applications environment for theTo create a robust applications environment for the

    end user.end user.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    8/15

    Why the Electronic Government exist?Why the Electronic Government exist?

    Government is working on individual departmental projectsGovernment is working on individual departmental projects

    rather than creating a general framework to take it forward.rather than creating a general framework to take it forward.

    There is strong belief in electronic government.There is strong belief in electronic government.

    To control bloggers and prevent from spreadingTo control bloggers and prevent from spreading

    disharmony, chaos, seditious material and lies on websites.disharmony, chaos, seditious material and lies on websites.

    Registering bloggers help prevent controversy in theRegistering bloggers help prevent controversy in the

    government and help promote harmony in the country.government and help promote harmony in the country.

    What the Electronic Government is about?What the Electronic Government is about?

    Electronic government is already in many departments; inElectronic government is already in many departments; in

    fact, ahead of most of Europe are in electronic governance.fact, ahead of most of Europe are in electronic governance.

    Electronic Government needs to be more central steering.Electronic Government needs to be more central steering.

    The government isnt against it, but it certainly isntThe government isnt against it, but it certainly isntchampioning it. Ecommerce will radically reshapechampioning it. Ecommerce will radically reshape

    government over the next five years.government over the next five years.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    9/15

    ELECTRONIC GOVERNMENT DATABASES.ELECTRONIC GOVERNMENT DATABASES.

    American Government Curriculum based referenceAmerican Government Curriculum based reference

    database for government that includes daily UPIdatabase for government that includes daily UPI

    stories, annotated bibliographies, interactive topicstories, annotated bibliographies, interactive topic

    exploration, and political commentary from Robertexploration, and political commentary from Robert

    Novak and Bill Press.Novak and Bill Press.

    Facts of File Collection of databases on history,Facts of File Collection of databases on history,

    geography, science, and health.Includes career andgeography, science, and health.Includes career andcurriculum resources as well as personal andcurriculum resources as well as personal and

    business forms.business forms.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    10/15

    First Search Collection of fifteen databases includingFirst Search Collection of fifteen databases includingWorldCat, Medline, WilsonSelectPlus that provideWorldCat, Medline, WilsonSelectPlus that provideboth citations and fullboth citations and full--text. WorldCat is the largesttext. WorldCat is the largest

    international database featuring more than 54 millioninternational database featuring more than 54 millionitems from the 50,000 plus OCLC member libraries.items from the 50,000 plus OCLC member libraries.EdgarDatabase Database of searchable SEC filingsEdgarDatabase Database of searchable SEC filingssuch as annual and quarterly reports. Search bysuch as annual and quarterly reports. Search bycompany name, SIC code, etc. Obtain mutual fundcompany name, SIC code, etc. Obtain mutual fund

    prospectuses, as well as archived information.prospectuses, as well as archived information.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    11/15

    INFORMATION TECHNOLOGY ACT 2000.INFORMATION TECHNOLOGY ACT 2000.

    Relate to electronic form which filing effected.Relate to electronic form which filing effected.

    Relate to manner and format which electronicRelate to manner and format which electronic issue,issue,grant or payment issued and method of payment ofgrant or payment issued and method of payment of

    fee.fee.

    Relate to securityRelate to security records be filed, electronic recordrecords be filed, electronic record

    and secure digitaland secure digital,,procedure for purpose of creatingprocedure for purpose of creating

    secure, and signature.secure, and signature.

    Relate to other standards observed by Controller ofRelate to other standards observed by Controller of

    Certifying Authorities Relate to fee to be paid toCertifying Authorities Relate to fee to be paid to

    Certifying Authority for issue of a SignatureCertifying Authority for issue of a Signature

    Certificate.Certificate. Relate procedure for investigation ofRelate procedure for investigation ofDigitalDigital

    Presiding Officer.Presiding Officer.

    Relate to any other power of aRelate to any other power of a misbehavior ormisbehavior or

    incapacity.incapacity.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    12/15

    Relate to any other matter which isRelate to any other matter which is civil court requiredcivil court required

    to be prescribed.to be prescribed.

    Relate to maintenance of databaseRelate to maintenance of database required to be, orrequired to be, or

    may be Certifying Authority.may be Certifying Authority.

    Relate to conditions andRelate to conditions and containing disclosure recordcontaining disclosure record

    of recognize any foreignof recognize any foreign restrictions subject whichrestrictions subject which

    Controller may.Controller may.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    13/15

    THE INDUCE ACT.THE INDUCE ACT.

    Supported by Senate Judiciary Committee ChairmanSupported by Senate Judiciary Committee Chairman

    Orrin Hatch, ROrrin Hatch, R--Utah.Utah. Make manufacturers of such software liable forMake manufacturers of such software liable for

    inducing people to commit copyright infringement.inducing people to commit copyright infringement.

    Consumer complained that the bill's language is tooConsumer complained that the bill's language is too

    broad and could apply liability to legitimate technology.broad and could apply liability to legitimate technology.

    Represent sides to propose own compromise inRepresent sides to propose own compromise in

    congressional session and are given tight deadline,congressional session and are given tight deadline,

    according to condition of anonymity.according to condition of anonymity.

    Necessary after a federal appeals court; manufacturerNecessary after a federal appeals court; manufacturer

    of fileof file--sharing software of liability committed bysharing software of liability committed bycustomers was cleared.customers was cleared.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    14/15

    CONCLUSIONSCONCLUSIONS

    Future Cyber Laws must recognizes the peopleFuture Cyber Laws must recognizes the peopledevelopment componentdevelopment component--crucial for a Kcrucial for a K--Economy. TheEconomy. Theexisting Cyber Laws created the necessary impact butexisting Cyber Laws created the necessary impact butconstant review is necessary. Technology innovations,constant review is necessary. Technology innovations,

    business innovations, criminal innovations, andbusiness innovations, criminal innovations, andglobalization. An exclusive legislative process mayglobalization. An exclusive legislative process mayshorten review cycle. Malaysian Government envisions toshorten review cycle. Malaysian Government envisions toreinvent governance activities through ereinvent governance activities through e--GovernmentGovernmentprojects and applications. Several testprojects and applications. Several test--beds are already inbeds are already in

    place to provide ICT which enabled solutions such as eplace to provide ICT which enabled solutions such as e--judiciary, ejudiciary, e--passport and telepassport and tele-- healthcare. Such ehealthcare. Such e--applications inevitably come with legal impediments thatapplications inevitably come with legal impediments thatwould slow down the reinvention process unless they arewould slow down the reinvention process unless they areproperly addressed and solved.properly addressed and solved.

  • 7/27/2019 33853666 Malaysian Cyber Law Electronic Government Law

    15/15

    REFERENCESREFERENCES

    http://www.fountaindale.lib.il.us/information/databases/gohttp://www.fountaindale.lib.il.us/information/databases/go

    vernmentDB.htmvernmentDB.htm

    http://www.silicon.com/management/government.htmhttp://www.silicon.com/management/government.htm

    http://www.asianlaws.org/consultancy/setting_up.htmhttp://www.asianlaws.org/consultancy/setting_up.htm http://www.digitaljournal.com/article/66510/Malaysian_Ghttp://www.digitaljournal.com/article/66510/Malaysian_G

    overnment_Looking_to_Quiet_Bloggersovernment_Looking_to_Quiet_Bloggers

    http://www.asianlaws.org/cyberlaw/newsletter/issues/cl_http://www.asianlaws.org/cyberlaw/newsletter/issues/cl_

    nl_49.htmnl_49.htm http://www.jagat.com.my/Cyberlawseries/consultancy.hthttp://www.jagat.com.my/Cyberlawseries/consultancy.ht

    mm