SlideShare ist ein Scribd-Unternehmen logo
1 von 7
THE MALAYSIAN CYBERLAWS 03032007 Prepared by : Norhasimah Mohamed – Head of Information & Communication Technology Panel, SMK Sungai Pusu, Gombak  2007
The Malaysian CyberLaws ,[object Object],[object Object],[object Object],[object Object],[object Object]
1. Digital Signature Act 1997 ,[object Object],[object Object],[object Object]
Cont…  Digital Signature Act 1997 ,[object Object],[object Object],[object Object],[object Object]
2. Computer Crimes Act 1997 ,[object Object],[object Object],[object Object]
3. Telemedicine Act 1997 ,[object Object],[object Object]
4. Communications and Multimedia Act 1998 ,[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Andere mochten auch

Consumer Behaviour - Malaysian Consumer Protection Acts
Consumer Behaviour - Malaysian Consumer Protection ActsConsumer Behaviour - Malaysian Consumer Protection Acts
Consumer Behaviour - Malaysian Consumer Protection Acts
annesunita
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
safa
 
Legal Framework of Internet Banking
Legal Framework of Internet BankingLegal Framework of Internet Banking
Legal Framework of Internet Banking
Mahyuddin Khalid
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

Andere mochten auch (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Property rights protection in ASEAN 6, 2015
Property rights protection in ASEAN 6, 2015Property rights protection in ASEAN 6, 2015
Property rights protection in ASEAN 6, 2015
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Consumer Behaviour - Malaysian Consumer Protection Acts
Consumer Behaviour - Malaysian Consumer Protection ActsConsumer Behaviour - Malaysian Consumer Protection Acts
Consumer Behaviour - Malaysian Consumer Protection Acts
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
MCMC Overview of Malaysian Communication and Broadcast Industry 2012
MCMC Overview of Malaysian Communication and Broadcast Industry 2012MCMC Overview of Malaysian Communication and Broadcast Industry 2012
MCMC Overview of Malaysian Communication and Broadcast Industry 2012
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
Blogging & Law
Blogging & LawBlogging & Law
Blogging & Law
 
Undang-undang siber
Undang-undang siberUndang-undang siber
Undang-undang siber
 
Legal Framework of Internet Banking
Legal Framework of Internet BankingLegal Framework of Internet Banking
Legal Framework of Internet Banking
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
( malaysia ) Company Law
( malaysia ) Company Law ( malaysia ) Company Law
( malaysia ) Company Law
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Fundraising for For-Profits
Fundraising for For-ProfitsFundraising for For-Profits
Fundraising for For-Profits
 

Ähnlich wie La1 Malaysia Cyber Laws

Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
sheryl90
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idham
buu
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
Asish Verma
 

Ähnlich wie La1 Malaysia Cyber Laws (20)

Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber law
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Module Cyber Law
Module Cyber LawModule Cyber Law
Module Cyber Law
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idham
 
Lecture7
Lecture7Lecture7
Lecture7
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
data privacy in digital technology .pptx
data privacy in digital technology  .pptxdata privacy in digital technology  .pptx
data privacy in digital technology .pptx
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 

Mehr von Cma Mohd

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2
Cma Mohd
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1
Cma Mohd
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688
Cma Mohd
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program Phases
Cma Mohd
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 Basicelement
Cma Mohd
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl Translator
Cma Mohd
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL Approach
Cma Mohd
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming Languages
Cma Mohd
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5
Cma Mohd
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring tools
Cma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
Cma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
Cma Mohd
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 Mediumnetwork
Cma Mohd
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 Hardware
Cma Mohd
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless Transmission
Cma Mohd
 

Mehr von Cma Mohd (20)

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1
 
La5 Quiz
La5 QuizLa5 Quiz
La5 Quiz
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program Phases
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 Basicelement
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl Translator
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL Approach
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming Languages
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5
 
Basic Programming Concept
Basic Programming ConceptBasic Programming Concept
Basic Programming Concept
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring tools
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 Mediumnetwork
 
Nos
NosNos
Nos
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 Hardware
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless Transmission
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

La1 Malaysia Cyber Laws

  • 1. THE MALAYSIAN CYBERLAWS 03032007 Prepared by : Norhasimah Mohamed – Head of Information & Communication Technology Panel, SMK Sungai Pusu, Gombak 2007
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.