Sie sind auf Seite 1von 4

SULIT NOVl2008lLCA4622

FINAL EXAMINATION
SEMESTER 1, ACADEMIC SESSION 200812009

DATE :NOVEMBER 2008 DURATION :3 HOURS

LCA 4622
CYBER LAW

INSTRUCTIONS TO CANDIDATES:

1. Answer FOUR (4) questions only.


2. Al1 answers must be written in English.
3. Al1 answers must be clearly written and readable.
4. Al1 answers must be written in the Answer Booklet provided.
5. Candidates are not allowed to bring any notes into the examination hall.
6. Candidates are not allowed to take question papers out of the exarnination hall.
7. Please complete your particulars in the Borang H and the Answer Booklet.

DO NOT OPEN THIS QUESTION BOOKLET UNTE YOU ARE TOLD TO DO SO


I
This question booklet has THREE (3) printed pages excluding this cover page

HAKCIPTA TERPELIHARA SULIT


SULIT NOVl2008LCA4622

Provide the first set of applicable legislations introduced by Parliament to carry


out the Information Technology and Cyber policies set out in the Seventh
Malaysia Plan?
(3 marks)

As part of its commitment to ensure the success of MSC Malaysia Status


companies, the Governrnent of Malaysia promised to fulfill its Bill of Guarantees.
Provide five of the Bill of Guarantees.
(5 marks)

What is the internet?


(1 mark)

What is cyberlaw?
(1 mark)

What is Netiquette?
(1 mark)

Why is netiquette applied in the internet?


(2 marks)

Why isn't there any single organization that owns the internet?
(1 mark)

How is internet regulated?


(1 mark)

Why is "incorporation by reference" important for e-commerce?


(3 marks)

What are the circurnstances in which "incorporation by reference'' is


regarded as essential?
(4 marks)

What are the required attributes of the electronic message in order to


satisfy the legal requirement of writing?
(2 marks)

What is the legal requirement imposed on the Certification Authorities?


Provide the relevant legal provision.
(2 marks)

1
HAKCIPTA TERPELIHARA SULIT
SULIT

Define "private key".


(2 marks)

What are the signatures which are not dealt with by the Digital Signature Act
1997?
(2 marks)

Why was the Communications and Multimedia Act 1998 enacted?


(4 marks)

Why was the Multimedia and Communications Commission Act 1998 enacted?

(2 marks)

What does the Communications and Multimedia Content Forum of Malaysia


(CMCF) do?

(3 marks)

What is the Content Code?

(3 marks)

What kind of content is a content applications service provider prohibited fiom


providing?

(3 marks)

a. What is trespass to chattels?

(3 marks)

b. Provide the basic element of trespass to chattels?

(2 marks)

c. How can trespass to chattels be committed according to the judgment in


Compuserve Inc v Cyber Promotions Inc F, Supp 1015, (SD Ohio 1997)?

(5 marks)

2
HAKCIPTA TERPELIHARA SULIT
SULIT NOV/2008/LCA4622

d. In order to succeed in a claim for trespass based on accessing computer systems,


what are the elements which must be established by the plaintiff!

(5 marks)

a. What does E-security refer to?

(5 marks)

b. Which agency is in charge of cyber security in Malaysia?

(1 mark)

What are the goals of E-security?

(1.5 marks)
Define a blog?

(2 marks)

Name two bloggers who had been sued for their defamatory blogs?

(1 marks)

What is Cybersquatting?
(1.5 marks)

In the event where a trademark is unlawfully used as a domain name, consumers


may be misled about the source of the product or the service offered on the
Intemet. Explain why?
(3 marks)

How does market manipulation occur over the Internet?


(5 marks)

The Computer Crimes Act 1997 was adapted from the Computer Misuse Act
1990 of the United Kingdom. Therefore there are provisions in the Computer
Crimes Act 1997 on certain offences which are inpari materia with the Computer
Misuse Act 1990 of the United Kingdom. State those offences.
(5 marks)

In the Data Protection Bill, the private sector is required to follow seven
principles in Safe Harbour. Provide five of the principles.

(5 marks)
3
HAKCIPTA TERPELIHARA SULIT

Das könnte Ihnen auch gefallen