Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


THE CYBER LAW ACTS IN MALAYSIA



The Malaysian Government has already passed several cyber laws to control and reduce the Internet abuse.

 

These cyber laws include:

 

· Digital Signature Act 1997

· Computer Crimes Act 1997

· Telemedicine Act 1997

· Communications and Multimedia Act 1998

 

Beside these cyber laws, there are three other cyber laws being drafted. 

 

· Private Data Protection Bill

· Electronic Government Activities Bill

· Electronic Transactions Bill 

 

DIGITAL SIGNATURE ACT 1997

The Digital Signature Act 1997 secures electronic communications especially on the Internet.

 

Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message.

 

By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data.

 

COMPUTER CRIMES ACT 1997

The Computer Crimes Act 1997 gives protection against the misuses of computers and computer criminal activities such as unauthorised use of

programmes, illegal transmission of data or messages over computers and hacking and cracking of computer systems and networks.

 

By implementing the Computer Crimes Act 1997, users can protect their rights to privacy and build trust in the computer system. At the same time, the government can have control at a certain level over cyberspace to reduce cyber crime activities.

 

TELEMEDICINE ACT 1997

The Telemedicine Act 1997 ensures that only qualified medical practitioners can practice telemedicine and that their patient's rights and interests are protected.

 

These act provides the future development and delivery of healthcare in Malaysia.

 

COMMUNICATIONS AND MULTIMEDIA ACT 1998

The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and the service is affordable all over Malaysia.

 

This Act also ensures high level of user's confidence in the information and communication technology industry.

 

LESSON 15

COMPUTER CRIMES



COMPUTER CRIMES

A computer crime is defined as any criminal activity that is related to the use of computers. These activities include computer fraud, copyright infringement, computer theft and computer attack.

COMPUTER FRAUD

Computer fraud is defined as having an intention to take advantage over or causing loss to other people, mainly on monetary basis through the use of computers.

 

There are many forms of computer fraud which include e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of expertise on certain fields.

Students need to be aware of other computer frauds such as health frauds, scams and hacking. Students will also most likely get false information while researching information on the Internet.

 

COPYRIGHT INFRINGEMENT

Copyright infringement is defined as a violation of the rights secured by a copyright. Copyright infringement involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal.

 

With the current technology, the most perfect copy of the original copy can be downloaded from the internet.

 

COMPUTER THEFT

Computer theft is defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use.

 

Examples of computer theft include:

 

· transfer of payments to the wrong accounts

· tap into data transmission lines on database at no cost

· divert goods to the wrong destination

 

COMPUTER ATTACK

Computer attack may be defined as any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data.

 

Computer attack can be in the forms of:

 

· physical attack that disrupt the computer facility or its transmission lines.

· an electronic attack that uses the power of electromagnetic energy to overload computer circuitry.

· a computer network attack that uses a malicious code to exploit a weakness in software, or in the computer security practices of a computer user

 


Поделиться:



Последнее изменение этой страницы: 2019-04-10; Просмотров: 209; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.014 с.)
Главная | Случайная страница | Обратная связь