Professional Documents
Culture Documents
Short Notes Cyber Law
Short Notes Cyber Law
Short Notes Cyber Law
This act addresses offenses related to computer systems and data, such as hacking,
• Define cyber law
unauthorized access, and computer-related fraud.
Cyber law is a set of rules and regulations that govern online activities and interactions. It
includes laws related to the internet, computers, and information technology. c. Telemedicine Act 1997
An act to provide for the regulation and control of the practice of telemedicine; and
• Explain the need for cyber law
for matters connected therewith.
The need for cyber law arises from the increasing use of technology and the internet, The Telemedicine Act 1997 is intended to provide a framework to enable licensed
which brings new types of crimes and legal issues. Cyber law helps protect people's rights medical practitioners to practice medicine using audio, visual and data
and privacy online, and it also sets guidelines for online behavior and transactions. communications.
• Differentiate between conventional and conversional in cyber law This act regulates the practice of telemedicine and sets standards for the delivery of
medical services using information and communication technologies.
Conventional law refers to traditional laws that apply to offline activities, while cyber law
specifically deals with legal issues related to the internet and digital technology. d. Communications and Multimedia Act 1998
Conventional laws are those laws which are come out of agreement among different This act regulates the communications and multimedia industry in Malaysia, covering
nations on specific issue which can be environment, terrorism or even cyber crime. areas such as broadcasting, telecommunications, and online content.
CHAPTER 4
The process of digital signing requires that the signature generated by both the fixed b. Patent
message and the private key can then be authenticated by its accompanied public Grants exclusive rights to inventors for their inventions, preventing others from
key. Using these cryptographic algorithms, the user’s signature cannot be replicated making, using, or selling the invention without permission.
without having access to their private key.
c. Trade marks
By applying asymmetric cryptography methods, the digital signature process works to Protects symbols, names, and slogans used to identify and distinguish goods or
prevent several common attacks where the attacker attempts to gain access through services in the marketplace.
the following attack methods:
Roles of Digital Intellectual property protection in Malaysia.
Key-only — Attacker has access to the public key a. Copyright Act
Known message — Attacker has access to valid signatures for known messages, but Protects the rights of creators of original works in the digital environment,
not those that they have chosen such as online content and digital media.
Adaptive chosen message — Attacker gains access to signatures on various messages
that they have chosen. literary works;
musical works;
• Examine the safety in a digital signature and handwritten artistic works;
Digital signatures are generally considered more secure than handwritten films;
signatures because they are difficult to forge and can provide evidence of b. Patents Act
tampering. Regulates the granting and protection of patents for digital inventions and
Handwritten signatures can be easily copied or imitated, while digital signatures technological innovations.
use complex encryption to ensure authenticity.
c. Trademark Act
• Explain legal effect in Electronic and Digital Signatures
Governs the registration and protection of trademarks in the digital sphere, • Discuss the use of the following laws for data protection and control:
safeguarding brands and their digital presence.
a. Personal Data Protection Act 2000
Regulates the processing of personal data in commercial transactions, providing
Identify the areas of Digital Intellectual Properties related:
individuals with rights over their personal information and imposing obligations on
a. Copyright law: relating to computer software, source code, websites,
data users.
cell phone content
b. Communication and Multimedia Act 1998
b. Trademark law with relation to domain names, meta tags, mirroring,
Addresses various aspects of communication and multimedia activities, including
framing, linking etc.
provisions related to the protection of personal data in the context of
c. Patent law in relation to computer hardware and software
telecommunications and digital media.
• Explain the technologies for Digital Intellectual Property Protection
• Identify the methods to ensure privacy and data security
a. Encryption
Encryption: Protects data by converting it into a code that can only be accessed by
Involves encoding digital information to make it secure and only accessible to
authorized parties.
authorized users, preventing unauthorized access or theft of intellectual
property
Access Control: Limits who can access certain data or systems, often through the use of
b. Watermarking
passwords, biometrics, or other authentication methods.
Embeds digital markers or identifiers into content, such as images or videos, to
indicate ownership and deter unauthorized use or distribution
Regular Audits and Monitoring: Involves routinely checking and analyzing systems and
c. Web monitoring
data to identify and address potential security issues.
Involves the use of software tools to monitor online platforms and websites for
unauthorized use or distribution of digital intellectual property, allowing for timely
Employee Training: Educates staff on best practices for handling sensitive data and
enforcement of rights and protection of content.
recognizing potential security threats.
CHAPTER 5 : PROTECTION, PRIVACY AND CRIMES • Identify Cyber Security Controlling Bodies in Malaysia
a. Communications and Multimedia Act 1998:
Describe privacy and data protection
Regulates the communications and multimedia industry in Malaysia.
Privacy refers to the right of individuals to control their personal information and how it is Covers areas such as broadcasting, telecommunications, and online content.
used. Aims to ensure fair competition and protect the interests of consumers and
industry players in the communications and multimedia sector.
Data protection involves safeguarding personal data from unauthorized access, use, or
b. National Cyber Security Agency (NACSA):
disclosure.
Responsible for coordinating and overseeing national cyber security efforts.
• Explain the purpose of data protection and privacy in: Develops strategies and policies to enhance the country's cyber security posture.
Collaborates with various stakeholders to address cyber threats and incidents.
a. Collection Data
c. CyberSecurity Malaysia:
Ensures that personal data is obtained lawfully and fairly, with the consent of the
Serves as the national cyber security specialist agency.
individuals involved.
Provides cyber security emergency response, digital forensics, and cyber security
b. Storing Data
capacity building.
Aims to secure personal data from unauthorized access or loss, maintaining its
Offers guidance and support to government and industry in enhancing cyber security
confidentiality and integrity.
resilience.
c. Transmitting
d. Personal Data Protection Act 2009:
Seeks to protect personal data during its transmission, preventing interception or
Regulates the processing of personal data in commercial transactions.
unauthorized access.
Provides individuals with rights over their personal information and imposes
obligations on data users.
Aims to safeguard the privacy of individuals and ensure the proper handling of
personal data.
e. Computer Crimes Act 1997:
Addresses offenses related to computer systems and data, such as hacking,
unauthorized access, and computer-related fraud.
Provides legal measures to combat cyber crimes and protect the integrity of
computer systems and data.
Aims to deter and penalize cyber criminal activities.
Setting Standards: Establishing guidelines and standards for cyber security practices
and infrastructure.
Awareness and Education: Educating the public and organizations about cyber
security risks and best practices.