SlideShare una empresa de Scribd logo
1 de 24
Types of Law
applicable in
Malaysia
PREPARED BY MISS SHERYL
Need for Cyber Law
Tackling Cyber Crimes
Intellectual property rights and copyrights protection act
Source of Laws in Malaysia
The source of the Malaysian Law mean the legal rules that make the laws in Malaysia.
It can be classified into written and unwritten law.
Written law includes:
Federal Constitution.
State Constitution.
Unwritten law includes:
English law.
Islamic law.
Source of Laws in Malaysia
The Malaysian Government has enacted several set of regulations.
This is to deal with the problems and crimes related to networked information devices and
technologies.
Providing an inclusive framework of societal and commerce-enabling laws.
Started early (1997).
Source of Cyber Laws in Malaysia. Cont..
It have to cover aspects regarding security of information and network reliability.
Various topics had been covered by the regulations such as:
Intellectual property.
Freedom of expression.
Copyright.
Privacy.
Source of Cyber Laws in Malaysia. Cont..
The source of cyber law in Malaysian can be classified into written and unwritten law.
Written law includes:
Constitution.
Legislation.
Subsidiary legislation.
Unwritten law includes:
Foreign law.
Judicial precedent .
Types of Law applicable in Malaysia
1) Communication and Multimedia Laws
2) Computer Crime Act 1997
3) Copyrights Law
4) Digital Signature Act 1997
5) Telemedicine Act 1997
Communication and Multimedia Laws
Endorsed in April 1999.
The Communication and Multimedia Act 1998 creates a new system of licenses and defines the roles
and responsibilities of those providing communication and multimedia services.
The implementation of Communication and Multimedia Act 1998 ensures that information is secure,
the network is safe, reliable and the service is affordable all over Malaysia.
In Malaysia, you can use this Act for any cases regarding your internet service provider and see
whether they got accuses of part of this law.
This Act also ensures high level of user’s confidence in the information and communication
technology industry.
Computer Crime Act 1997
Protection against the misuses of computers and computer criminal activities are ensured by the
Act.
Example of crimes:
• Unauthorized use of programs
• Illegal transmission of data or messages over computers
• Hacking or cracking of computer systems and networks.
Computer crimes are banned by this law. Those who disobey this law can be charged.
Computer Crime Act 1997
By implementing the Computer Crimes Act 1997, computer users can now protect their rights to
privacy and build trust in the computer system.
This Act also enable the government to track the illegal activities, thus reducing the cyber crimes
cases.
Copyrights Law
Brought into force in April 1999.
The Copyright (Amendment) Act amends the Copyright Act 1987 to extend copyright law to the new
and converged multimedia environment.
It serves to protect the expression of thought and creative ideas from unauthorized copying or
alteration.
Copyrights Law
Copyright, a form of intellectual property law, protects original works of authorship including
literary, dramatic, musical and artistic works, such as poetry, novels, movies, songs, computer
software and architecture.
Copyright does not protect facts, ideas, systems, or methods of operation, although it may protect
the way these things are expressed.
Copyright laws grant exclusive rights to the creator of an original piece of work.
Usually, these rights are extended for a limited time.
What are the Rights Granted by Copyright Law
Technically, it is “the right to copy” your work.
But also give the copyrights holder the right:
To be credited for the work
To determine who may adapt the work to other forms
To decide who may perform the work
To decide who may financially benefit form it.
How long does a Copyright last?
For works created after January 1, 1978, copyright protection lasts for the life of the author plus an
additional 70 years.
For an anonymous work, a pseudonymous work, or a work made for hire, the copyright endures for
a term of 95 years from the year of its first publication or a term of 120 years from the years of its
creation, whichever expires first
Copyright Infringement
If you use a copyrighted work without authorization, the owner may be entitled to bring an
infringement action against you.
Anyone found to have infringed a copyrighted work may be liable for statutory damages up to
$30,000 for each work infringed and, if willful infringement is proven by the copyright owner, that
amount may be increased up to $150,000 for each work I fringed
In addition, an infringer of a work may also be liable for the ottorney’s fees incurred by the copyright owner to
enforce his or her rights.
Digital Signature Act 1997
Enforced on October 1998
Secures electronic communications especially on the Internet
Digital Signature is an identity verification standard using encryption techniques to protect against e-
mail forgery.
The encrypted code consists of the user’s name and a hash of all the parts of the message.
By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper
with the transmitted data.
By doing so, a more secure and safe electronic communication could be done.
Why the Act Exists?
Transaction conducted via internet increasing
Identities and message can be falsified
Need purchaser and identify for the integrity on message
Removing doubt and possibility of fraud
What the Act is about?
Provides for regulations of public key infrastructure
Make digital signature legally valid and as traditional signature
Telemedicine Act 1997
One of the legislative initiatives by Malaysia to ensure that the law is keeping pace with the
development of electronic medicine and telemedicine.
An Act to prewide for the regulation and control of the practice of telemedicine; and for matters
connected therewith.
First enforce in Mac 1997
To provide medical services from remote locations using electronic medical data and prescription
standards, with knowledge that their treatment will be covered under insurans programs.
Why the Act Exists?
Healthcare system and provide around the world are becoming interconnected.
Unclear quality healthcare advice and consultation from specialist because does not have true value
To regulate practice of teleconsultation in medical profession
What the Act is about?
Provides that any registered doctor may practice “telemedicine”, but other healthcare provides must
first obtain a license to do so.
Interpretation of this Act
Telemedicine as define as the practice of medicine using audio, visio and data communication
It show that telemedicine must include all these types of communication in order to use this act
Requires fully registered medical practitioners to obtain a certificate to practice telemedicine
Valid for three years from Malaysian Medical Council
Punishment of the Act
Medical practitioners does not have fully registered licence
RM500,000 (US$125,000) and or imprisonment up to 5 years.
Does not have written consent of the patient
Fine up to RM100,000 (US$25,000) and or imprisonment up to 2 years.

Más contenido relacionado

La actualidad más candente

Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System AdministrationLisa Dowdell, MSISTM
 
Involving computers (Laws and bills)
Involving computers (Laws and bills)Involving computers (Laws and bills)
Involving computers (Laws and bills)Sharwin Calimlim
 
Lab 5--Cybersquatting
Lab 5--CybersquattingLab 5--Cybersquatting
Lab 5--Cybersquattingaah3420
 
Special courts note - JURISDICTION THE COURT FOR CHILDREN, NATIVE COURT and etc
Special courts note - JURISDICTION THE COURT FOR CHILDREN, NATIVE COURT and etcSpecial courts note - JURISDICTION THE COURT FOR CHILDREN, NATIVE COURT and etc
Special courts note - JURISDICTION THE COURT FOR CHILDREN, NATIVE COURT and etcFAROUQ
 
Digital law
Digital lawDigital law
Digital lawzrh48
 
7.9 ANCAMAN JENAYAH SIBER DLM KEPESATAN TEKNOLOGI MAKLUMAT{PENGAJIAN AM STPM ...
7.9 ANCAMAN JENAYAH SIBER DLM KEPESATAN TEKNOLOGI MAKLUMAT{PENGAJIAN AM STPM ...7.9 ANCAMAN JENAYAH SIBER DLM KEPESATAN TEKNOLOGI MAKLUMAT{PENGAJIAN AM STPM ...
7.9 ANCAMAN JENAYAH SIBER DLM KEPESATAN TEKNOLOGI MAKLUMAT{PENGAJIAN AM STPM ...Nurul Atikah
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Nota Kontrak - Terma vs Representasi
Nota Kontrak - Terma vs RepresentasiNota Kontrak - Terma vs Representasi
Nota Kontrak - Terma vs Representasisurrenderyourthrone
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Land Law 1 HISTORICAL BACKGROUND OF LAND LAW IN MALAYSIA
Land Law 1 HISTORICAL BACKGROUND OF LAND LAW IN MALAYSIALand Law 1 HISTORICAL BACKGROUND OF LAND LAW IN MALAYSIA
Land Law 1 HISTORICAL BACKGROUND OF LAND LAW IN MALAYSIAxareejx
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
LAND LAW - Tanah Rizab Melayu
LAND LAW - Tanah Rizab MelayuLAND LAW - Tanah Rizab Melayu
LAND LAW - Tanah Rizab MelayuAmirulAfiq30
 
Bahasa seni kssr tahun 3
Bahasa seni kssr tahun 3Bahasa seni kssr tahun 3
Bahasa seni kssr tahun 3Shuain Dul
 
Ch 7: Programming for Security Professionals
Ch 7: Programming for Security ProfessionalsCh 7: Programming for Security Professionals
Ch 7: Programming for Security ProfessionalsSam Bowne
 
LAND LAW - Pengambilan Tanah
LAND LAW - Pengambilan TanahLAND LAW - Pengambilan Tanah
LAND LAW - Pengambilan TanahAmirulAfiq30
 

La actualidad más candente (20)

Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
Involving computers (Laws and bills)
Involving computers (Laws and bills)Involving computers (Laws and bills)
Involving computers (Laws and bills)
 
Cyber law
Cyber lawCyber law
Cyber law
 
7copyright (1)
7copyright (1)7copyright (1)
7copyright (1)
 
Lab 5--Cybersquatting
Lab 5--CybersquattingLab 5--Cybersquatting
Lab 5--Cybersquatting
 
Special courts note - JURISDICTION THE COURT FOR CHILDREN, NATIVE COURT and etc
Special courts note - JURISDICTION THE COURT FOR CHILDREN, NATIVE COURT and etcSpecial courts note - JURISDICTION THE COURT FOR CHILDREN, NATIVE COURT and etc
Special courts note - JURISDICTION THE COURT FOR CHILDREN, NATIVE COURT and etc
 
Slot 8: Perisian Pengendali, Aplikasi, Utiliti
Slot 8: Perisian Pengendali, Aplikasi, Utiliti Slot 8: Perisian Pengendali, Aplikasi, Utiliti
Slot 8: Perisian Pengendali, Aplikasi, Utiliti
 
Digital law
Digital lawDigital law
Digital law
 
7.9 ANCAMAN JENAYAH SIBER DLM KEPESATAN TEKNOLOGI MAKLUMAT{PENGAJIAN AM STPM ...
7.9 ANCAMAN JENAYAH SIBER DLM KEPESATAN TEKNOLOGI MAKLUMAT{PENGAJIAN AM STPM ...7.9 ANCAMAN JENAYAH SIBER DLM KEPESATAN TEKNOLOGI MAKLUMAT{PENGAJIAN AM STPM ...
7.9 ANCAMAN JENAYAH SIBER DLM KEPESATAN TEKNOLOGI MAKLUMAT{PENGAJIAN AM STPM ...
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Customary law 2
Customary law 2Customary law 2
Customary law 2
 
Nota Kontrak - Terma vs Representasi
Nota Kontrak - Terma vs RepresentasiNota Kontrak - Terma vs Representasi
Nota Kontrak - Terma vs Representasi
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Isu perundangan
Isu perundanganIsu perundangan
Isu perundangan
 
Land Law 1 HISTORICAL BACKGROUND OF LAND LAW IN MALAYSIA
Land Law 1 HISTORICAL BACKGROUND OF LAND LAW IN MALAYSIALand Law 1 HISTORICAL BACKGROUND OF LAND LAW IN MALAYSIA
Land Law 1 HISTORICAL BACKGROUND OF LAND LAW IN MALAYSIA
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
LAND LAW - Tanah Rizab Melayu
LAND LAW - Tanah Rizab MelayuLAND LAW - Tanah Rizab Melayu
LAND LAW - Tanah Rizab Melayu
 
Bahasa seni kssr tahun 3
Bahasa seni kssr tahun 3Bahasa seni kssr tahun 3
Bahasa seni kssr tahun 3
 
Ch 7: Programming for Security Professionals
Ch 7: Programming for Security ProfessionalsCh 7: Programming for Security Professionals
Ch 7: Programming for Security Professionals
 
LAND LAW - Pengambilan Tanah
LAND LAW - Pengambilan TanahLAND LAW - Pengambilan Tanah
LAND LAW - Pengambilan Tanah
 

Similar a Chapter 2 Types of Law applicable in Malaysia.pptx

Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idhambuu
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internetguesta5c32a
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxEdFeranil
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2lees_ush
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in Indiashamvisingh
 

Similar a Chapter 2 Types of Law applicable in Malaysia.pptx (20)

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
cle ppt.pptx
cle ppt.pptxcle ppt.pptx
cle ppt.pptx
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idham
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 

Más de sheryl90

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).pptsheryl90
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxsheryl90
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.pptsheryl90
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.pptsheryl90
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptsheryl90
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptxsheryl90
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptsheryl90
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptxsheryl90
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.pptsheryl90
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfsheryl90
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.pptsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptsheryl90
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.pptsheryl90
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdfsheryl90
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.pptsheryl90
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.pptsheryl90
 

Más de sheryl90 (19)

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).ppt
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.ppt
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.ppt
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptx
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.ppt
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.ppt
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.ppt
 
ch03.ppt
ch03.pptch03.ppt
ch03.ppt
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.ppt
 

Último

week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...MerlizValdezGeronimo
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 

Último (20)

week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
IPCRF/RPMS 2024 Classroom Observation tool is your access to the new performa...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 

Chapter 2 Types of Law applicable in Malaysia.pptx

  • 1. Types of Law applicable in Malaysia PREPARED BY MISS SHERYL
  • 2. Need for Cyber Law Tackling Cyber Crimes Intellectual property rights and copyrights protection act
  • 3. Source of Laws in Malaysia The source of the Malaysian Law mean the legal rules that make the laws in Malaysia. It can be classified into written and unwritten law. Written law includes: Federal Constitution. State Constitution. Unwritten law includes: English law. Islamic law.
  • 4. Source of Laws in Malaysia The Malaysian Government has enacted several set of regulations. This is to deal with the problems and crimes related to networked information devices and technologies. Providing an inclusive framework of societal and commerce-enabling laws. Started early (1997).
  • 5. Source of Cyber Laws in Malaysia. Cont.. It have to cover aspects regarding security of information and network reliability. Various topics had been covered by the regulations such as: Intellectual property. Freedom of expression. Copyright. Privacy.
  • 6. Source of Cyber Laws in Malaysia. Cont.. The source of cyber law in Malaysian can be classified into written and unwritten law. Written law includes: Constitution. Legislation. Subsidiary legislation. Unwritten law includes: Foreign law. Judicial precedent .
  • 7.
  • 8. Types of Law applicable in Malaysia 1) Communication and Multimedia Laws 2) Computer Crime Act 1997 3) Copyrights Law 4) Digital Signature Act 1997 5) Telemedicine Act 1997
  • 9. Communication and Multimedia Laws Endorsed in April 1999. The Communication and Multimedia Act 1998 creates a new system of licenses and defines the roles and responsibilities of those providing communication and multimedia services. The implementation of Communication and Multimedia Act 1998 ensures that information is secure, the network is safe, reliable and the service is affordable all over Malaysia. In Malaysia, you can use this Act for any cases regarding your internet service provider and see whether they got accuses of part of this law. This Act also ensures high level of user’s confidence in the information and communication technology industry.
  • 10. Computer Crime Act 1997 Protection against the misuses of computers and computer criminal activities are ensured by the Act. Example of crimes: • Unauthorized use of programs • Illegal transmission of data or messages over computers • Hacking or cracking of computer systems and networks. Computer crimes are banned by this law. Those who disobey this law can be charged.
  • 11. Computer Crime Act 1997 By implementing the Computer Crimes Act 1997, computer users can now protect their rights to privacy and build trust in the computer system. This Act also enable the government to track the illegal activities, thus reducing the cyber crimes cases.
  • 12. Copyrights Law Brought into force in April 1999. The Copyright (Amendment) Act amends the Copyright Act 1987 to extend copyright law to the new and converged multimedia environment. It serves to protect the expression of thought and creative ideas from unauthorized copying or alteration.
  • 13. Copyrights Law Copyright, a form of intellectual property law, protects original works of authorship including literary, dramatic, musical and artistic works, such as poetry, novels, movies, songs, computer software and architecture. Copyright does not protect facts, ideas, systems, or methods of operation, although it may protect the way these things are expressed. Copyright laws grant exclusive rights to the creator of an original piece of work. Usually, these rights are extended for a limited time.
  • 14. What are the Rights Granted by Copyright Law Technically, it is “the right to copy” your work. But also give the copyrights holder the right: To be credited for the work To determine who may adapt the work to other forms To decide who may perform the work To decide who may financially benefit form it.
  • 15. How long does a Copyright last? For works created after January 1, 1978, copyright protection lasts for the life of the author plus an additional 70 years. For an anonymous work, a pseudonymous work, or a work made for hire, the copyright endures for a term of 95 years from the year of its first publication or a term of 120 years from the years of its creation, whichever expires first
  • 16. Copyright Infringement If you use a copyrighted work without authorization, the owner may be entitled to bring an infringement action against you. Anyone found to have infringed a copyrighted work may be liable for statutory damages up to $30,000 for each work infringed and, if willful infringement is proven by the copyright owner, that amount may be increased up to $150,000 for each work I fringed In addition, an infringer of a work may also be liable for the ottorney’s fees incurred by the copyright owner to enforce his or her rights.
  • 17. Digital Signature Act 1997 Enforced on October 1998 Secures electronic communications especially on the Internet Digital Signature is an identity verification standard using encryption techniques to protect against e- mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message. By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with the transmitted data. By doing so, a more secure and safe electronic communication could be done.
  • 18. Why the Act Exists? Transaction conducted via internet increasing Identities and message can be falsified Need purchaser and identify for the integrity on message Removing doubt and possibility of fraud
  • 19. What the Act is about? Provides for regulations of public key infrastructure Make digital signature legally valid and as traditional signature
  • 20. Telemedicine Act 1997 One of the legislative initiatives by Malaysia to ensure that the law is keeping pace with the development of electronic medicine and telemedicine. An Act to prewide for the regulation and control of the practice of telemedicine; and for matters connected therewith. First enforce in Mac 1997 To provide medical services from remote locations using electronic medical data and prescription standards, with knowledge that their treatment will be covered under insurans programs.
  • 21. Why the Act Exists? Healthcare system and provide around the world are becoming interconnected. Unclear quality healthcare advice and consultation from specialist because does not have true value To regulate practice of teleconsultation in medical profession
  • 22. What the Act is about? Provides that any registered doctor may practice “telemedicine”, but other healthcare provides must first obtain a license to do so.
  • 23. Interpretation of this Act Telemedicine as define as the practice of medicine using audio, visio and data communication It show that telemedicine must include all these types of communication in order to use this act Requires fully registered medical practitioners to obtain a certificate to practice telemedicine Valid for three years from Malaysian Medical Council
  • 24. Punishment of the Act Medical practitioners does not have fully registered licence RM500,000 (US$125,000) and or imprisonment up to 5 years. Does not have written consent of the patient Fine up to RM100,000 (US$25,000) and or imprisonment up to 2 years.