Sie sind auf Seite 1von 9

MALAYSIA CYBER LAW,

ELECTRONIC GOVERNMENT
LAW
By
Liew Kean Wei
Lee Wen Xuan
Ng Kwan Hou
Chan Wai Kit

CONTENT
1.

Introduction of Cyber Law Acts in Malaysia

2.

Introduction of Electronic Government Law

3.

The content of Cyber Law Acts in Malaysia

4.

The content of Government Law

5.

Conclusion

6.

Sources of reference

Introduction of Cyber Law Acts in


Malaysia
Just like other countries, Malaysia also is also involved in evolution of
technology. Internet has become a necessities for everybody in business,
communicate socializing and many more. Despite being a positive tool for users,
there are some of irresponsible people that are using internet in negative way
such as online fraud, identity theft, virus attack and hacking. Therefore,
Malaysian government has already taking a big step to overcome these
problems by introducing a few acts of law that can be used for cyber crimes.

Introduction of Electronic
Government Law
Government is working on individual departmental projects
rather than creating a general framework to take it forward. To
controls bloggers and prevent from spreading disharmony, chaos,
seditious material and lies. Ecommerce will radically reshape
government over the next five years.

The content of Cyber Law Acts in


Malaysia

Computer Crimes Act 1997

The main reason for enforcing this act is to ensure that misuse of computer
can be overcome.

Copyright Act (Amendment)1997

It will be protecting the copyright works from unauthorized copying and/or


alteration.

Digital Signature Act 1997

This act has been enforced to help preventing on-line transaction fraud. It
will provide both licensing and regulation of Certification Authorities (CA).

Personal Data Protection Act 2010

Is an act to regulate the processing of personal data in commercial


transactions.

The content of Electronic


Government Law

INFORMATION TECHNOLOGY ACT 2000

1.

Relate to electronic form which filing, issue, grant or payment


effected.

2.

Relate to manner and format which electronic records be filed,


issued and method of payment of fee.

3.

Relate to security procedure for purpose of creating secure


electronic record and secure digital signature.

Conclusion
In conclusion, we as one community
of Malaysia should team up to create
a healthy computer society, so that
computers are used to contribute to a
better life and to prevent any crime

Sources of reference

http://malaysiancyberwarriors.blogspot.my/2013/03/introduction-o
f-cyber-law-acts-in.html

http://www.asianlaws.org/consultancy/setting_u p.htm

http://www.slideshare.net/alinLOLITH/malaysian-cyber-law-and-el
ectronic-government-law

http://en.wikipedia.org/wiki/Cyber_law

https://en.wikipedia.org/wiki/E-government

THE END

Das könnte Ihnen auch gefallen