Vous êtes sur la page 1sur 24

Cyberlaw

Introduction
1. Identify criminal and civil wrongs which occur in
cyberspace including identifying the laws that can be
used;
2. Discuss the laws that can be used for the wrongs
that occur in cyber space; and
3. Apply the relevant laws to solve given factual
situations or problems.

CHANGE YOUR EMAIL

Tutorial Times
Monday : 9-10am (BS4), 10-11am (BS4)
Friday : 11am-12pm
Will only be decided on Friday, 23 September 2015

Allocation of Marks
1. Continuous Assessment : 40%

Assignment : 25%
Tutorial : 15%

2. Final Examination : 60%

2 questions : 1 compulsory, choose 1 from 3


30 marks each

Assignment (25%)
Deadline : 15 May 2016
GROUP (3) assignment
Topic
Range of topics/theme will be given
Choose one

Group must be finalised on 11 March 2016


Register your group in Spectrum

Text Books
1. Abu Bakar Munir and Siti Hajar Mohd. Yasin, Personal
Data Protection in Malaysia: Law and Practice
(Malaysia: Sweet and Maxwell Asia, 2010) PDPA
2. Abu Bakar Munir and Siti Hajar Mohd Yasin,
Information and Communication Technology Law:
State, Internet and Information (Legal and
Regulatory Challenges) (Petaling Jaya : Sweet and
Maxwell Asia, 2009) INTERNATIONAL
3. Abu Bakar Munir, Cyberlaw : Policies and Challenges,
(Butterworths Asia, 1999)
4. Ding, Julian, E-Commerce Law & Practice, (Petaling
Jaya : Sweet & Maxwell Asia, 1999) BASIC

Introduction

Internet
What is the Internet?
Websites?
Cyberspace?
Are cyberlaws only applicable to issues arising from the
computer or can it be related to other mediums?

Law and Cyberspace


Cyber rights , Internet Ethics
Jurisdiction
Enforcement
Cyberlaws
The suitability of conventional laws

Malaysia
Ministry of Science, Technology and Innovation (MOSTI) :
<<http://www.mosti.gov.my/>
Commercial Crime Investigation Department :
<http://www.ccid.my>

Police Cyber Investigation Response Center (PCIRC)

Malaysia Computer Emergency Response Team :


<https://mycert.org.my>
Malaysian Network Information Centre (MYNIC) :
<http://www.mynic.net>
CyberSecurity Malaysia : <http://www.cybersecurity.my/>

Cyberlaws : Original
Digital Signature Act 1997 (Act 562)
Computer Crimes Act 1997 (Act 563)
Telemedicine Act 1997 (Act 564)
Communications and Multimedia Act 1998 (Act 588)
Malaysian Communications and Multimedia Commission
Act 1998 (Act 589)

New
Electronic Commerce Act 2006 (Act 658) Email
Electronic Government Activities Act 2007 (Act 680)
Gov Email
Personal Data Protection Act 2010 (Act 709)
Prevention of Terrorism Bill 2015

Amendments/Regulations/etc
Copyright (Amendment) Act 1997 (Act A994)
Digital Signature Regulations 1998
Evidence (Amendment) (No.2) Act 2012 (Act A1432)
Guilty until proven innocent if someone post seditious
remarks using your FB
Communications and Multimedia Content Code

Current normal legislation?


Sedition Act 1948 (Act 15)
Evidence Act 1950 (Act 56)
Trade Marks Act 1976 (Act 175)
Defamation Act 1957 (Act 286)
Copyright Act 1987 (Act 332)
Optical Disc Act 2000 (Act 606)
Security Offences (Special Measures) Act 2012 (Act 747)

Reference Materials
1. Digital Signature Act 1997 (Act 562)
2. Computer Crimes Act 1997 (Act 563)
3. Communications and Multimedia Act 1998 (Act 588)
4. Electronic Commerce Act 2006 (Act 658)
5. Electronic Government Activities Act 2007 (Act 680)
6. Personal Data Protection Act 2010 (Act 709)
7. Prevention of Terrorism Bill 2015 (POTA)
8. Consumer Protection (Electronic Trade
Transactions) Regulations 2012
9. Sedition (Amendment) Bill 2015
10. Communications and Multimedia Content Code

Statutes provided in Exam:


1. Computer Crimes Act 1997 (Act 563)
2. Consumer Protection Act 1999 (Act 599)
3. Personal Data Protection Act 2010 (Act 709)
4. Consumer Protection (Electronic Trade Regulations)
2012

Basic Outline
1. Introduction and Concepts
2. E-Commerce and the Law
3. Intellectual Property
4. Privacy and Personal Data Protection
5. Issues Relating to Personal Data
6. Computer Crimes

2. E-Commerce and the Law

Contract / Sales / etc

Licences

Method of payment

Taxes

Civil and Criminal Liabilities

Wrong description of goods


Restricted goods

Jurisdiction / Enforcement

3. Intellectual Property

Copyright , Trademark

Linking / Hyperlinking / Text

Photographs

Domain names

Cybersquatting

Cross-border transfer of intellectual property

4 & 5 : Privacy, Data Protection

Your right to privacy

Online / social media / etc

Protecting your data

Photoes
Information

Cookies / tracking

Identity Theft

Right to be forgotten

6. Computer Crimes

Hacking

Phising

Scams

Spam

Identity Theft

Pornography

Defamation / Sedition

Terrorism

END

Facebook
masdina@gmail.com

Vous aimerez peut-être aussi