SlideShare una empresa de Scribd logo
1 de 7
THE MALAYSIAN CYBERLAWS 03032007 Prepared by : Norhasimah Mohamed – Head of Information & Communication Technology Panel, SMK Sungai Pusu, Gombak  2007
The Malaysian CyberLaws ,[object Object],[object Object],[object Object],[object Object],[object Object]
1. Digital Signature Act 1997 ,[object Object],[object Object],[object Object]
Cont…  Digital Signature Act 1997 ,[object Object],[object Object],[object Object],[object Object]
2. Computer Crimes Act 1997 ,[object Object],[object Object],[object Object]
3. Telemedicine Act 1997 ,[object Object],[object Object]
4. Communications and Multimedia Act 1998 ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
sheryl90
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 

La actualidad más candente (20)

Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
What about GDPR?
What about GDPR?What about GDPR?
What about GDPR?
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 

Destacado

Consumer Behaviour - Malaysian Consumer Protection Acts
Consumer Behaviour - Malaysian Consumer Protection ActsConsumer Behaviour - Malaysian Consumer Protection Acts
Consumer Behaviour - Malaysian Consumer Protection Acts
annesunita
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
safa
 
Legal Framework of Internet Banking
Legal Framework of Internet BankingLegal Framework of Internet Banking
Legal Framework of Internet Banking
Mahyuddin Khalid
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

Destacado (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Property rights protection in ASEAN 6, 2015
Property rights protection in ASEAN 6, 2015Property rights protection in ASEAN 6, 2015
Property rights protection in ASEAN 6, 2015
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Consumer Behaviour - Malaysian Consumer Protection Acts
Consumer Behaviour - Malaysian Consumer Protection ActsConsumer Behaviour - Malaysian Consumer Protection Acts
Consumer Behaviour - Malaysian Consumer Protection Acts
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
MCMC Overview of Malaysian Communication and Broadcast Industry 2012
MCMC Overview of Malaysian Communication and Broadcast Industry 2012MCMC Overview of Malaysian Communication and Broadcast Industry 2012
MCMC Overview of Malaysian Communication and Broadcast Industry 2012
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
Blogging & Law
Blogging & LawBlogging & Law
Blogging & Law
 
Undang-undang siber
Undang-undang siberUndang-undang siber
Undang-undang siber
 
Legal Framework of Internet Banking
Legal Framework of Internet BankingLegal Framework of Internet Banking
Legal Framework of Internet Banking
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
( malaysia ) Company Law
( malaysia ) Company Law ( malaysia ) Company Law
( malaysia ) Company Law
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Fundraising for For-Profits
Fundraising for For-ProfitsFundraising for For-Profits
Fundraising for For-Profits
 
Create folder in start Menu in Windows 7
Create folder in start Menu in Windows 7Create folder in start Menu in Windows 7
Create folder in start Menu in Windows 7
 

Similar a La1 Malaysia Cyber Laws

Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idham
buu
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
Md Aktar
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
Asish Verma
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 

Similar a La1 Malaysia Cyber Laws (20)

Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber law
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Module Cyber Law
Module Cyber LawModule Cyber Law
Module Cyber Law
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idham
 
Lecture7
Lecture7Lecture7
Lecture7
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
data privacy in digital technology .pptx
data privacy in digital technology  .pptxdata privacy in digital technology  .pptx
data privacy in digital technology .pptx
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 

Más de Cma Mohd

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2
Cma Mohd
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1
Cma Mohd
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688
Cma Mohd
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program Phases
Cma Mohd
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 Basicelement
Cma Mohd
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl Translator
Cma Mohd
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL Approach
Cma Mohd
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming Languages
Cma Mohd
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5
Cma Mohd
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring tools
Cma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
Cma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
Cma Mohd
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 Mediumnetwork
Cma Mohd
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 Hardware
Cma Mohd
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless Transmission
Cma Mohd
 

Más de Cma Mohd (20)

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1
 
La5 Quiz
La5 QuizLa5 Quiz
La5 Quiz
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program Phases
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 Basicelement
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl Translator
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL Approach
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming Languages
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5
 
Basic Programming Concept
Basic Programming ConceptBasic Programming Concept
Basic Programming Concept
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring tools
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 Mediumnetwork
 
Nos
NosNos
Nos
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 Hardware
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless Transmission
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

La1 Malaysia Cyber Laws

  • 1. THE MALAYSIAN CYBERLAWS 03032007 Prepared by : Norhasimah Mohamed – Head of Information & Communication Technology Panel, SMK Sungai Pusu, Gombak 2007
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.