Malaysian Cyber Law: By: Yiogaan.V 4 SC 6 941204-08-6155

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 11

MALAYSIAN CYBER LAW

By : Yiogaan.V
4 SC 6
941204-08-6155
IMPACT OF MALAYSIAN CYBER
LAW ON THE SOCIETY
 The cases of copyright infringement have reduced.
 The computer user can use computer safely and more
efficiently.
 The people who break the cyber law will be punished
according to the law.
Definition of Cyber Law
 Cyberlaw refers to anyting law relating to protecting the
Internet and other online communication technologoes.
Content of Malaysian Cyber Law

Computer Crimes
Act 1997

Telimedicine Malaysian Digital Signature


Actl 1997 Cyber Law Act 1997

Communication and Multimedia


Act 1998
The Laws in Detail
1. Digital Signature Act 1997
– secures electronic communication especially on the internet .

- an identity verification standard that uses encryption technique


to protect forgery
2. Computer Crimes Act 1997
- gives protection against the misuses of computer
- Ex :- unauthorized use of programmes
- illegal transmisson of data or
message
- hacking and cracking of computer
system
3. Telemedicine Act 1997
- Ensures that only qualified medical practitioners can practice
telemedicine and that their patients’ rights and interests are
protected
4. Communication and Multimedia Act 1998
- Ensures that information in secure, that network is reliable
and the sevices is affordable throughout Malaysia.
- Ensures also high level of user’ confidence in the information
and communication technology industry.
Conclusion
Cyber law is need to protect:

 The integrity in security information


 The legal status of online transaction
 The private and confidentially of information
 The intellectual property right
REFERENCE
 WWW.YAHOO.COM
 WWW.WIKIPIDEA.COM
Thank You…………………

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy