SlideShare a Scribd company logo
Prepared by : HANIN
   WAJIHAH BAHARUDIN
             
    INTAN NUR BALQIS
       AMIRUDIN :D
     Presentation ICT
 Impact of ICT on Society
   Malaysian Cyber Law
            and
Electronic Government Law
Meaning Of Cyber Law
Any laws relating to protecting the
Internet and other online
communication technologies
Needs For Cyber Law
Integrity and Security of Information
Security of Government Data
Intellectual Property Rights
Privacy and Confidentially of
Information
Legal Status of Online Transactions
DIGITAL SIGNATURE ACT 1997
     Why the Act exist:
- Transactions conducted via internet increasing.
- Identities and messages can falsified
- Need purchaser and seller identity for the integrity of messages.
- Removing doubt and possibility of fraud
     What the Act is about?
- Provides for regulation of public key infrastructure.
- Make digital signature legally valid and enforceable as traditional
  signature.
         COPYRIGHT (AMENDMENT) ACT 1997
     Why the Act exists:
- To protect expressions of thoughts and ideas from unauthorized
  copying alteration.
- Creative expression is being captured and
     What the Amended Act is about?
- Clear protection accorded to multimedia works.
- Transmissions of copyright works over the Internet clearly amount to
   infringement.
- Technological methods of ensuring works and authorship info are not
     altered or removed is protected.
TELEMEDICINE ACT 1997
  Why the Act exists:
- Healthcare systems and providers around the world are becoming
  interconnected.
- Unclear quality healthcare advice and consultation from specialist
  because doesn’t have truth value
- To regulate practice of teleconsultations in medical profession.
  What the Act is about?
- The Act provides that any registered doctor may practice
  “telemedicine” but other healthcare providers must first obtain a license
  to do so.
               COMPUTER CRIMES ACT 1997
  Why the Act exists:
- As computing becomes more central to people’s life and work,
  computers become both targets and tools of crime.
- To ensure misuse of computers is offense.
  What the Act is about?
- Offers to:* Enter or attempt into computers and computer systems
              without authorization.
            * Damage or alter data/information in computers or computer
              systems by planting viruses.
COMMUNICATIONS AND MULTIMEDIA ACT 1998
  Why the Act exist:
- Convergence of technologies is driving convergence of
  telecommunication, broadcasting, computing and content.
  What the Act is about?
- A restructuring of converged ICT industry.
- Create and define a new system of licenses
- Provide communication and multimedia services.
- Provide the existence of the Communication and Multimedia
  Commission.
          POLICY OBJECTIVES OF CMA
 To regulate for the long-term benefit of the end user.
 To promote consumer confidence in service delivery.
 To ensure equitable provision of affordable services.
 To create a robust applications environment for the end user.
WHY THE ELECTRONIC GOVERNMENT EXIST:
  Government is working on individual departmental projects
  rather than creating a general framework to take it forward
  There is strong belief in electronic government
  To control bloggers and prevent from spreading "disharmony,
  chaos, seditious material and lies" on websites
  Registering bloggers help prevent controversy in the
  government and help promote harmony in the country

WHAT THE ELECTRONIC GOVERNMENT IS ABOUT?
   Electronic government is already in many departments; in fact,
   ahead of most of Europe are in electronic governance
   Electronic government needs to be more central steering,
“The government isn't against it, but it certainly isn't championing
   it”.
   Ecommerce will radically reshape government over the next
   five years.
ELECTRONIC GOVERNMENT DATABASES
  American Government
Curriculum based reference database for government that includes
  daily UPI stories, annotated bibliographies, interactive topic
  exploration, and political commentary from Robert Novak and Bill
  Press.

  Facts on File
Collection of databases on history, geography, science, and health.
  Includes career and curriculum resources as well as personal and
  business forms.

  FirstSearch
Collection of fifteen databases including WorldCat, Medline,
  WilsonSelectPlus that provide both citations and full-text. WorldCat
  is the largest international database featuring more than 54 million
  items from the 50,000 plus OCLC member libraries.

  Edgar Database
Database of searchable SEC filings such as annual and quarterly
  reports. Search by company name, SIC code, etc. Obtain mutual
  fund prospectuses, as well as archived information.
INFORMATION TECHNOLOGY ACT 2000

Relate to electronic form which filing, issue, grant or payment
effected
Relate to manner and format which electronic records be filed,
issued and method of payment of fee
Relate to security procedure for purpose of creating secure
electronic record and secure digital signature
Relate to other standards observed by Controller of Certifying
Authorities
Relate to fee to be paid to Certifying Authority for issue of a Digital
Signature Certificate
Relate procedure for investigation of misbehavior or incapacity of
Presiding Officer
Relate to any other power of a civil court required to be prescribed
Relate to any other matter which is required to be, or may be,
prescribed.
Relate to maintenance of database containing disclosure record of
Certifying Authority
Relate to conditions and restrictions subject which Controller may
recognize any foreign
THE INDUCE ACT
Supported by Senate Judiciary Committee Chairman
Orrin Hatch, R-Utah

Make manufacturers of such software liable for
inducing people to commit copyright infringement

Consumer complained that the bill's language is too
broad and could apply liability to legitimate
technology

Represent sides to propose own compromise in
congressional session and are given tight deadline,
according to condition of anonymity

Necessary after a federal appeals court; manufacturer
of file-sharing software of liability committed by
customers was cleared
REFERENCES

  Teacher’s handouts
The Malaysian Cyber Laws
  Internet
*www.fountaindale.lib.il.us/information/databases/governmentDB
   .htm
*www.silicon.com/management/government/0,39024852,110027
   86,00.htm
*http://www.asianlaws.org/consultancy/setting_up.htm
*http://www.digitaljournal.com/article/66510/Malaysian_Gov_t_L
   ooking_to_Quiet_Bloggers
*http://www.asianlaws.org/cyberlaw/newsletter/issues/cl_nl_49.h
   tm
*www.jagat.com.my/Cyberlawseries/consultancy.htm
CONCLUSION
Future Cyber Laws must recognizes the people development
component-crucial for a K-Economy.
The existing Cyber Laws created the necessary impact… but
constant review is necessary.
Technology innovations
# Business innovations
# “Criminal” innovations
# Globalization
An exclusive legislative process may shorten review cycle.

Malaysian Government envisions to reinvent governance activities
through e-Government projects and applications.
Several test-beds are already in place to provide ICT which
enabled solutions such as e-judiciary, e-passport and tele-
healthcare. 
Such e-applications inevitably come with legal impediments that
would slow down the reinvention process unless they are properly
addressed and solved.

More Related Content

PPT
Presentation ICT3
PPT
Presentation ICT2
PPT
Presentation Ict
PPTX
PPT
24227541 cyber-law
PDF
E-Commerce Law Lobbying Lessons Learned
PPT
Cyber Law
PPT
ICT / IT Law (Cyberlaw)
Presentation ICT3
Presentation ICT2
Presentation Ict
24227541 cyber-law
E-Commerce Law Lobbying Lessons Learned
Cyber Law
ICT / IT Law (Cyberlaw)

What's hot (20)

PDF
Intellectual Property Law In Internet
PDF
Cyberlaws report
PDF
The Electronic Commerce Act and its Implementing Rules and Regulations
PPTX
Legal Issues in Online Environment
PPTX
PPTX
Internet
PPTX
E-commerce Law in the Philippines
PPTX
E-commerce regulation pria chetty
PPTX
Cyber law/Business law
PPT
Cyber Law
PPT
INDIAN CYBERLAW
PPTX
electronic commerce act 8792 (2000)
PDF
Cyber Law
PPTX
An Introduction to Cyber Law - I.T. Act 2000 (India)
PPTX
Cyber law final
PPTX
cyber law IT Act 2000
PPTX
Introduction to cyber law.
PPTX
Cyber law In India: its need & importance
PPT
Cyber law final
PPT
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Intellectual Property Law In Internet
Cyberlaws report
The Electronic Commerce Act and its Implementing Rules and Regulations
Legal Issues in Online Environment
Internet
E-commerce Law in the Philippines
E-commerce regulation pria chetty
Cyber law/Business law
Cyber Law
INDIAN CYBERLAW
electronic commerce act 8792 (2000)
Cyber Law
An Introduction to Cyber Law - I.T. Act 2000 (India)
Cyber law final
cyber law IT Act 2000
Introduction to cyber law.
Cyber law In India: its need & importance
Cyber law final
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Ad

Viewers also liked (8)

PPT
Ten Ways to Wealth
PDF
PPTX
Everything you ever wanted to know about lenox v5
PPT
Saurabhrecession
PPTX
Top 10 Strategies to Maximize LinkedIn for Entrepreneurs
PPTX
Seven50 polling results weeks 1-9
PPT
Compliance and FMV - Karen Lowney
PPTX
Summit 3 Opportunity FHEA Presentation
Ten Ways to Wealth
Everything you ever wanted to know about lenox v5
Saurabhrecession
Top 10 Strategies to Maximize LinkedIn for Entrepreneurs
Seven50 polling results weeks 1-9
Compliance and FMV - Karen Lowney
Summit 3 Opportunity FHEA Presentation
Ad

Similar to Presentation ict3992 (20)

PPTX
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
PPT
Introduction to cyber law.
PPT
Cyber-Crime-in- India at Present day and Laws
PPT
digital identity 2.0: how technology is transforming behaviours and raising c...
PPTX
Cyber law
PPTX
PDF
IT (4).pdf
PDF
State of Encryption in Kenya
PPTX
Unit 2 Regulation of Cyberspace
PDF
Cyber law-it-act-2000
DOCX
IT LAW PRESENATION
PPTX
cyber crime in india and law related to cyber crime
PPTX
Introduction to Cyber Crimes
PPTX
CYBER LAW AND ITS EVOLUTION (1)-1.111111
PDF
Advanced IT Governance
PPTX
COI/ IT LAWS AND PRACTICES Module 1.pptx
PPTX
introduction to cyber forensics, digital
PPTX
Cyber law
PPTX
14-Computer Privacy and Security Principles.pptx
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
Introduction to cyber law.
Cyber-Crime-in- India at Present day and Laws
digital identity 2.0: how technology is transforming behaviours and raising c...
Cyber law
IT (4).pdf
State of Encryption in Kenya
Unit 2 Regulation of Cyberspace
Cyber law-it-act-2000
IT LAW PRESENATION
cyber crime in india and law related to cyber crime
Introduction to Cyber Crimes
CYBER LAW AND ITS EVOLUTION (1)-1.111111
Advanced IT Governance
COI/ IT LAWS AND PRACTICES Module 1.pptx
introduction to cyber forensics, digital
Cyber law
14-Computer Privacy and Security Principles.pptx

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
Chapter 3 Spatial Domain Image Processing.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation_ Review paper, used for researhc scholars

Presentation ict3992

  • 1. Prepared by : HANIN WAJIHAH BAHARUDIN  INTAN NUR BALQIS AMIRUDIN :D Presentation ICT Impact of ICT on Society Malaysian Cyber Law and Electronic Government Law
  • 2. Meaning Of Cyber Law Any laws relating to protecting the Internet and other online communication technologies
  • 3. Needs For Cyber Law Integrity and Security of Information Security of Government Data Intellectual Property Rights Privacy and Confidentially of Information Legal Status of Online Transactions
  • 4. DIGITAL SIGNATURE ACT 1997 Why the Act exist: - Transactions conducted via internet increasing. - Identities and messages can falsified - Need purchaser and seller identity for the integrity of messages. - Removing doubt and possibility of fraud What the Act is about? - Provides for regulation of public key infrastructure. - Make digital signature legally valid and enforceable as traditional signature. COPYRIGHT (AMENDMENT) ACT 1997 Why the Act exists: - To protect expressions of thoughts and ideas from unauthorized copying alteration. - Creative expression is being captured and What the Amended Act is about? - Clear protection accorded to multimedia works. - Transmissions of copyright works over the Internet clearly amount to infringement. - Technological methods of ensuring works and authorship info are not altered or removed is protected.
  • 5. TELEMEDICINE ACT 1997 Why the Act exists: - Healthcare systems and providers around the world are becoming interconnected. - Unclear quality healthcare advice and consultation from specialist because doesn’t have truth value - To regulate practice of teleconsultations in medical profession. What the Act is about? - The Act provides that any registered doctor may practice “telemedicine” but other healthcare providers must first obtain a license to do so. COMPUTER CRIMES ACT 1997 Why the Act exists: - As computing becomes more central to people’s life and work, computers become both targets and tools of crime. - To ensure misuse of computers is offense. What the Act is about? - Offers to:* Enter or attempt into computers and computer systems without authorization. * Damage or alter data/information in computers or computer systems by planting viruses.
  • 6. COMMUNICATIONS AND MULTIMEDIA ACT 1998 Why the Act exist: - Convergence of technologies is driving convergence of telecommunication, broadcasting, computing and content. What the Act is about? - A restructuring of converged ICT industry. - Create and define a new system of licenses - Provide communication and multimedia services. - Provide the existence of the Communication and Multimedia Commission. POLICY OBJECTIVES OF CMA To regulate for the long-term benefit of the end user. To promote consumer confidence in service delivery. To ensure equitable provision of affordable services. To create a robust applications environment for the end user.
  • 7. WHY THE ELECTRONIC GOVERNMENT EXIST: Government is working on individual departmental projects rather than creating a general framework to take it forward There is strong belief in electronic government To control bloggers and prevent from spreading "disharmony, chaos, seditious material and lies" on websites Registering bloggers help prevent controversy in the government and help promote harmony in the country WHAT THE ELECTRONIC GOVERNMENT IS ABOUT? Electronic government is already in many departments; in fact, ahead of most of Europe are in electronic governance Electronic government needs to be more central steering, “The government isn't against it, but it certainly isn't championing it”. Ecommerce will radically reshape government over the next five years.
  • 8. ELECTRONIC GOVERNMENT DATABASES American Government Curriculum based reference database for government that includes daily UPI stories, annotated bibliographies, interactive topic exploration, and political commentary from Robert Novak and Bill Press. Facts on File Collection of databases on history, geography, science, and health. Includes career and curriculum resources as well as personal and business forms. FirstSearch Collection of fifteen databases including WorldCat, Medline, WilsonSelectPlus that provide both citations and full-text. WorldCat is the largest international database featuring more than 54 million items from the 50,000 plus OCLC member libraries. Edgar Database Database of searchable SEC filings such as annual and quarterly reports. Search by company name, SIC code, etc. Obtain mutual fund prospectuses, as well as archived information.
  • 9. INFORMATION TECHNOLOGY ACT 2000 Relate to electronic form which filing, issue, grant or payment effected Relate to manner and format which electronic records be filed, issued and method of payment of fee Relate to security procedure for purpose of creating secure electronic record and secure digital signature Relate to other standards observed by Controller of Certifying Authorities Relate to fee to be paid to Certifying Authority for issue of a Digital Signature Certificate Relate procedure for investigation of misbehavior or incapacity of Presiding Officer Relate to any other power of a civil court required to be prescribed Relate to any other matter which is required to be, or may be, prescribed. Relate to maintenance of database containing disclosure record of Certifying Authority Relate to conditions and restrictions subject which Controller may recognize any foreign
  • 10. THE INDUCE ACT Supported by Senate Judiciary Committee Chairman Orrin Hatch, R-Utah Make manufacturers of such software liable for inducing people to commit copyright infringement Consumer complained that the bill's language is too broad and could apply liability to legitimate technology Represent sides to propose own compromise in congressional session and are given tight deadline, according to condition of anonymity Necessary after a federal appeals court; manufacturer of file-sharing software of liability committed by customers was cleared
  • 11. REFERENCES Teacher’s handouts The Malaysian Cyber Laws Internet *www.fountaindale.lib.il.us/information/databases/governmentDB .htm *www.silicon.com/management/government/0,39024852,110027 86,00.htm *http://www.asianlaws.org/consultancy/setting_up.htm *http://www.digitaljournal.com/article/66510/Malaysian_Gov_t_L ooking_to_Quiet_Bloggers *http://www.asianlaws.org/cyberlaw/newsletter/issues/cl_nl_49.h tm *www.jagat.com.my/Cyberlawseries/consultancy.htm
  • 12. CONCLUSION Future Cyber Laws must recognizes the people development component-crucial for a K-Economy. The existing Cyber Laws created the necessary impact… but constant review is necessary. Technology innovations # Business innovations # “Criminal” innovations # Globalization An exclusive legislative process may shorten review cycle. Malaysian Government envisions to reinvent governance activities through e-Government projects and applications. Several test-beds are already in place to provide ICT which enabled solutions such as e-judiciary, e-passport and tele- healthcare.  Such e-applications inevitably come with legal impediments that would slow down the reinvention process unless they are properly addressed and solved.