1. E-Commerce Integration and
Implementation Issues
Khairiyah Salleh
Nur’Aina Daud
Nurul Izzah Othman
Noor Yahya Sulaiman
Date: 19 May 2012
2. Introduction
Malaysian government believes that ICT is a strategic driver to support and contribute
directly to the growth of Malaysian economy. For the purpose of deploy resources to
develop knowledge base economy and to enter the digital age with more strategic way,
Malaysian government announced the plan called 8th Malaysian plan.
During the Malaysian plan some of the initiatives were deployed to build vital ICT
infrastructure for public sector as well as private sector. This plan has been focused to
increase the usage of computerization and IT infrastructure in many governmental agencies.
Malaysia would like to promote and facilitate the wider adoption and usage of ICT in
everyday life, such as E-Commerce, industry, education and health. The motive of this plan is
to shift from a knowledge base economy to a competitive knowledge based economy.
Commercial activities on the internet are rapidly increasing all over the world. E-Commerce
becomes a strong and easy way of rapid business.
3. Opportunities in
Implementation E-Commerce
Opportunities
To gain competitive advantages over other organization.
Open up new distribution channel and increase sales.
Support buy and sell product on Internet from any place to anywhere all
over the world without traditional intermediaries. Example Amazon, E
Bay.
Process and transaction can be done rapidly at reasonable cost.
Cost saving for the organization and their customer.
E-Commerce appears to be generating a significant amount of new
economic activities.
Customer are able to choose and discriminate among alternative
product and services.
4. CISCO (CISCO CONNECTION ONLINE)
Full implementation online (24 hours a day, 7 days a week)
Increase efficiencies in order taking.
Reduced customer service calls
Lower distribution cost of software upgrades.
5. Issue and Challenges of Global Implementation
E-Commerce (Economic Factors)
Cost Justification
High cost of implementation.
Mistake due to the lack of experience inflate the cost.
Justification of cost not on tangibles factors.
Justification of cost always based on intangibles factors such as improved the
customer service, increase the value f advertisement and gain competitive
advantages.
Number of sellers and buyers.
Number of people connected to the Internet.
E-Commerce project are viable to the developed country which majority of
resident have high income or salary.
6. Issue and Challenges of Global Implementation
E-Commerce (Economic Factors)
Issue on Internet and Telecommunication Infrastructure
Digital divide between the developed world and most developing countries.
Accessibility to the Internet is still expensive.
Global infrastructure of the web is unevenly developed.
Skill Shortage and lack of trained personal.
The dynamism of the technology and emerging skill such as XML, ASP and PHP
programming.
Need to hire the additional foreign workers form abroad.
7. Issue and Challenges of Global Implementation
E-Commerce (Technical Factors)
Security Issues
Consumers are distrustful about the safety of information.
Incident on unsophisticated hackers can steal information easily.
Many company are not pay enough intention on security.
Reduce the consumer confidence.
Reliability Issues.
Network Infrastructure and application systems must be continuously upgraded,
fine tuned and maintained regularly.
Vulnerable of sites to denial of services attack.
Vulnerable to the virus spread.
Reduce the consumer confidence .
8. Issue and Challenges of Global Implementation
E-Commerce (Social Factors)
Privacy and Security Issues
Customer are reluctant to buy online, reluctant to disclose the confidential data
such as home address, identification number and credit card number.
Companies did not give guarantees on security of information.
Cultural Diversity.
Ability of customization the interface for individual and group needs.
Customization process is expensive.
Translation of language from English into local languages.
9. Issue and Challenges of Global Implementation
E-Commerce (Social Factors)
Lack of Trust Issues
Customer trust is important such as friends recommendation, previous
experience, or through transparent legislative infrastructure.
Company also need to well established the “brand identity” of company.
Absence of “Touch and Feel” functions.
Most of business working around on this limitation.
Customer only buy a reasonable price on E-Commerce website.
Customer did not buy a high price product online. Therefore, web site still in used
for customer for conduct research on product and making comparison on price
offered.
10. Issue and Challenges of Global Implementation
E-Commerce (Legal Factors)
Protection of Intellectual Property Right Issues
Digital media are compact, easily stored, easily to being replication, transmission
and alteration.
Internet was designed to be open and transmit information freely around the
world.
Different country have different attitudes towards intellectual property rights.
New laws should be design and inadequate action should be impose to protect
the original copyrighted contribution.
Taxation Issues.
Collecting the Internet sales taxes are rather complicated.
Different country or nation have different tax structure.
11. Issue and Challenges of Global Implementation
E-Commerce (Legal Factors)
Product Sale that are restricted or illegal by another country
Companies should more careful and fully obey the rules and laws of other
country.
Example such as selling the wine, weapons, restricted chemical items or online
gambling.
Legal Validity of the Electronic Transaction.
Traditional business are based on face to face meeting, paper documentation
and “wet signature” as verifier.
Electronic documents must be customize and should have the same legal validity
standard as written signature.
12. Critical Success Factors for
E-Commerce Implementation
Success factors have been used to identify information needs, to list and describe
elements critical to program and system success, and to help define and focus
management’s responsibilities and efforts.
Griffin and Kenneth [8] write “Success factors are the limited number of areas in
which results, if they are satisfactory, will ensure successful competitive
performance for the organization. They are the few key areas where things must go
right for the business to flourish. If results in these areas are not adequate, the
organization’s efforts for the period will be less than desired.”
According to Rockart [16], “the success factors are areas of activity that should
receive constant and careful attention from management. The current status of
performance in each area should be continually measured, and that information
should be made available.”
13. Critical Success Factors for
E-Commerce Implementation
Policy factors.
Organization factors.
Human resources management factors.
Business factors.
Customer relationship management factors.
Technology factors.
Security factors.
Environment factors.
14. Critical Success Factors for E-Commerce Implementation
(Approach of Using an E-Business)
Phase 1: Identify the business opportunity.
Identify the kinds of technology and business partners
Phase 2: Select the technology infrastructure.
A tool that can enable web applications would require network
bandwidth, computer security, and applications to make electronic business
a reality.
Phase 3: Implement the electronic business solution.
This phase involves complex technology and organization issues. It is important to
make sure that a solution is tightly integrated with other systems and operations.
The implementation also needs to have the partners, customers, suppliers, and
employees built into it.
15. Critical Success Factors for E-Commerce Implementation
(Three Area That Affect the Implementation of E-Business
by Newton S, 1999)
1. Business Trends
• Enterprise Collaboration
• Customer Relationship Management (CRM)
• Identifying Return on Investment
2. Organization Trends
• Specialization
• Skill Management
• Process Visibility
• The Learning Organization
3. Technological Trends
• Managing Security and Standards.
Enterprise Integration
• Technology Convergence
16. Critical Success Factors for E-Commerce Implementation
(Three Area That Affect the Implementation of E-Business
by Carton S, 2000)
Carton [3] claims that to make business-to-consumer electronic commerce
successful, special attention must be paid to privacy and loyalty of
customer; the organization should ensure the following:
• Build Trust - to build customer loyalty, an organization must first build
trust. The organization should be open, honest, clear, and concise in
terms of letting the customer know what it will do or will not do.
• Provide Added Value - The organization should provide added value, which
actually makes the customer’s life more interesting.
• Give Customers a Choice - The organizations should make sure that the
customers are given enough choices and are allowed to make decisions
themselves.
17. Critical Success Factors for E-Commerce Implementation
(Three Area That Affect the Implementation of E-Business
by Newton)
Transaction Software -The transaction and payment software must
perform correct calculations, especially with respect to taxes and
shipping costs.
Site Maintenance - The organizations should have enough trained
programmers to maintain the web site.
Security - Details regarding personal information and data regarding
electronic money transactions must be highly secure.
18. Critical Success Factors for E-Commerce Implementation
(Three Area That Affect the Implementation of E-Business
by Newton)
Chan and Swatman [5] studied the key factors involved in
implementation of business-to-business electronic commerce in BHP
(Broken Hill Proprietary Company Limited) Steel and present several
factors influencing its implementation.
1. Internal Factors
Commitment
Trading Partner Participation
Pro-active Approach
Business Value
Training and Educational Program
2. External Factors
Rapid Changes in Technology.
Complexity and Compatibility of Technology and Process
25. Key e-Commerce Players in Malaysia
Blooming.com.my, a florist delivery service, has already been engaged in e-
Commerce activities since they first reached Malaysian shores in the mid
1990’s for example.
MPH, a popular Malaysian bookstore, has also been doing great on the e-
Commerce front since 2004.
Lelong.com.my, a Malaysian homegrown e-Bay, was established in 1999
and for the first five years did not charge any fees for its services, instead
relying on its own investments and advertisement sales to stay afloat.
AirAsia, one of the most successful Malaysian e-Commerce examples
26. Appendix
Source from: Malaysia
Department of
Statistics
30. Opportunities of E-Commerce in
Malaysia
Opportunities
Development of information and communication technologies
New technologies are providing easy and fast online transactions which are
enhancing consumers to go online and take the advantages of E-Commerce.
Geographical position
The business are no longer in local but also in global areas.
Foreign investment
It helps in promoting business and introduces new technologies which are effecting
on the growth of E-Commerce. Malaysia is enjoying fruitful foreign investment in the
region.
31. Opportunities of E-Commerce in
Malaysia (cont…)
Stability of policy and regulatory
Government is willing to develop and introduce E-Commerce with new
technologies. There is continuity in policies, strategies implementation
and strategies formulation which are enhancing the effectiveness of
online trading.
Government created institutions that help industries and people to adopt E-
Commerce
These organizations have also announced some plan and strategies to
improve E-Commerce in Malaysia. Government bodies have announced
and built ministry of multimedia and communication for the improvement
of information and communication technologies, information technology
infrastructure to create knowledge based economy. Government has built
an organization for small businesses which called Small and Medium
Industries Development Corporation (SMIDEC).
33. E-readiness
A country’s e-readiness is essentially a measure of its e-business
environment, a collection of factors that indicate how amenable
market is to Internet-based opportunities. E-readiness is not
simply a matter of the number of computer servers, websites and mobile
phones in the country, but also things such as its citizen’s ability to utilise
technology skilfully, the transparency of its business and legal systems, and the
extent to which governments encourage the use of digital technologies.
Malaysia ranked 34th among 70 countries (Economist Intelligence Unit).
The lacks of understanding about new technologies are affecting E-Commerce.
The awareness and knowledge about information and communication
technologies are still in the formative phases. Some new technologies are still
new for buyers. As a result buyers are still reluctant to implement these
technologies.
34. Cyber Crime
Cyber crimes emerge as a threat to E-Commerce in
current scenario. The advancement of technological
capabilities and its usage for crimes like hacking
information of credit cards and other important
information became a major threat for online
businesses. The hacker could hack the credit card
details and users hindered to give this kind of
information.
37. Security Issues
Security is one of the most addressed issues in implementing e-
commerce whether it is safe to conduct on-line transactions
As business move towards adapting on-line trading, issues of on-
line transaction security become more important.
The major threats to business are information losses, theft of
data, infection with a computer virus, and manipulation of their
internal systems or software applications.
Based on survey on Malaysian companies’ interest in e-business,
70 % believed that security was the most important barrier to
ecommerce development.
38. Types of Attack
Non Technical Technical
Attack Attack
Deception or persuasion to An attack perpetrated
trick people into revealing using software and system
sensitive information knowledge
Social engineering is a type
of non technical attack that Denial of service attack,
uses some trick users into Malicious Code: Viruses,
revealing sensitive Worms, and Trojan Horse
information
39. Identity Theft
Identity theft is possible with the help of digital information
technologies (Caeton, 2007) and by the nature of modern payment
systems.
Identity theft involves acquiring enough data about another
individual to counterfeit this link, enabling the thief to acquire
goods while attributing the charge to another person’s account
(Anderson et al, 2008).
In addition, identity theft is the taking of a victim’s identity to obtain
credit or credit cards from banks and retailers, steal money from the
victim’s existing accounts, apply for loans, establish accounts with
utility companies, rent an apartment, file bankruptcy, or obtain a
job using the victim’s name (identity theft, 2010). In short, identity
theft occurs when someone appropriates your personal information
without your knowledge to establish a parallel identity.
41. Virus, Worm, and Trojan Horse
Referred to as malware , it is classified by how it
propagates.
A virus is a piece of software code that inserts itself into a
host, including operating system. In order to propagate, its
requires its host program be run to activate it.
Worm is a software program that runs independently,
consuming resources of its host and able to propagate a
complete working version itself.
Trojan horse is a program that appears to have useful
function but it contains a hidden function that presents a
security risk.
42. Denial of Sevice
An attack on a website in which attacker uses
specialized software to send a flood of data packets
to target computer with the aim of overloading its
resources.
44. Privacy Issues
Privacy is the right to be left alone and the right to be
free of unreasonable personal intrusion.
There are a number of opportunities to collect
information about individuals
45. Ways of Gathering Information of An
Individual
Reading an individual’s blogs, or newsgroup postings.
Looking up in an individual’s name and identity in internet.
Reading an individual’s email, IM or text massages.
Monitoring and conducting observation on employees.
Wiretapping wire-line and wireless communication lines.
Complete registration form online.
Record individual’s action using cookies as they navigate
the website.
Using spy ware, keystroke loggers, and similar methods.
46. Website Registration
A study by TNS and TTRUSTe (2004) user doubt to give personal
information to online businesses.
Among the 1068 participants, 71% dislike registering at websites
they visit, 15 % refuse to register at all while 43% do not trust
companies not to share their personal information.
All B2C, marketing Websites and social network ask visitor to fill
up registration form (ex: win a prize or some of item exchange).
The site may use it to improve customer service or sometimes
they may sell the information to other company.
47. Cookies
Website gather information about an individual by using
cookies.
Cookies enable sites to keep track of users without having
constantly ask the user to identify themselves.
Originally, cookies were designed to help with personalization
and market research. However cookies can invade an individual’s
privacy.
Cookies enable user’s information such as preferences, interests
and surfing patterns to be collected.
User can disable the cookies, but the problem is that the user
will have to keep reentering information or may be blocked from
viewing certain pages.
48. Spyware
Spyware is defined as unwanted software programs designed to
steal information or confidential information.
Spyware may enter the user’s computer as a virus or a result of
the user’s clicking an option in deceptive pop up window.
Spyware tracks user’s web surfing habit and scan computer hard
drives for sensitive files and send the result to hackers and
spammers.
Therefore, spyware is a violation of computer’s user privacy.
For example: Keystroke Logger run in the background of the
user’s computer and record every keystroke that user makes.
Hacker can steal the user’s password, account number, etc
49. Privacy Protection
There are several laws and regulations that governed
e-commerce activities.
Some countries have enacted comprehensive laws on
e-commerce while some others are still in the process
of enacting laws.
Some e-commerce laws were developed and
reviewed in order to keep up with the changes in
technology.
50. Privacy Protection In Malaysia
In Malaysia, the right of privacy is not as a fundamental right under
the Federal Constitution.
However, with the development of e-commerce a new law was
passed in January 2010 which is known as a Personal Data
Protection Act 2010 (PDPA).
This Act seeks to regulate the processing of personal data of
individuals who involved in commercial transactions by data users.
It also protect to the individual’s personal data and safeguarding
the interests of the individual.
This Act defines the meaning of ‘personal data’ and ‘sensitive
personal data’.
It also outlines the data protection principles and the exemptions,
right of data subject including right to access personal data, to
correct it, to prevent its processing for unlawful purposes and what
amount to criminal offences under the Act.
(Mohamed, 2011)
51. Legal Remedies for Invasion of
Privacy in E-Commerce
In Malaysia, claim for remedies for cases of breach of online privacy are
forwarded to Financial Mediation Bureau (FMB) .
This FMB is an alternative to courts or arbitration which in charge of
settling disputes between individuals or corporations and the financial
services providers who are under the supervision of Bank Negara
Malaysia or ‘National bank’ and a member of the bureau.
It was reported that the FMB is handling 3000 cases in October 2011
since there are increasing numb
The protection on violation of personal privacy in Malaysia is limited to
informational privacy only.
(Mohamed, 2011)
53. Domain Name
Domain Name
A company that commences e-commerce activities would at first
have to get its domain name registered. While registering domain
names, if the company chooses a domain name that is similar to
some domain name or some existing trademark of a third party, the
company could be held liable for cybersquatting.
Since registration of domain names is simple and inexpensive,
cybersquatters often register hundreds of such famous names as
their domain names such as www.sony.net andwww.petronas.net.
In Malaysia, cybersquatting issue is addressed by .my DOMAIN
REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and
the complaints must be made according to the rule given by .my
Domain Registry.
54. Domain Name
The Complaint must:-
(i) provide the name, postal address, telephone and facsimile numbers and electronic-mail address of
the Complainant and/or its authorised representative(s) in a separate document;
(ii) provide the name of the Registrant and any other relevant information (including the Registrant's
postal address, telephone and facsimile numbers and electronic-mail address), which will be able to
assist the Provider in sending the Complaint to the Registrant; and
(iii) specify the Domain Name which is complained of;
(iv) state the grounds on which it is made, specifically, as to why the Domain Name should be
considered as being a Sensitive Name or otherwise falling within any one or more of the categories
detailed in Paragraph 5 of the SNDRP;
(v) identify any legal proceedings which involve the Domain Name that may have been commenced or
terminated by the Complainant; and
(vi) end the Complaint with the statement and the signature of the Complainant:-
55. Domain Name
•In Sime Darby Berhad Malaysia v. Mr. Sim e-
Darby (2002) over a domain name
‘simedarby.com’ by respondent in Canada,
the matter went to WIPO Arbitration and
Mediation Center, which heard in
accordance with the Policy and Rules of the
Uniform Domain Name Dispute Resolution
Policy (UDRP).
•The decision of Panel was to transfer the
impugned domain name to the complainant,
because, among other things, the domain
name registered by the Respondent is
identical or confusingly similar to the “Sime
Darby” trade mark in which the Complainant
has rights.
56. Domain Name
•In a local case of Petroliam Nasional Bhd & Ors v Khoo Nee Kiong (2003)
Malaysian court decided, among other things, that cyber squatting may be
regarded as ‘passing off’. The first plaintiff in that case was a well-known
national petroleum corporation. The second plaintiff was one of the
marketing arms of the first plaintiff and the third plaintiff was in the business
of processing and transmitting natural gas and it conducted its gas business
under the trade name ‘Petronas Gas’. The defendant was an individual
carrying out trading operations as a registered sole proprietor under the
trade/business name ‘Araneum Consulting Services’ and was in no way
associated with the plaintiffs.
•It was held that by registering the said domain names which contained the
word ‘Petronas’, there was a serious issue to be tried in that the defendant
was making a false representation to persons who may have consulted the
register that the registrant, ‘Araneum Consulting Services’ was connected or
associated with the name registered and thus the owner of the goodwill in
the name ‘Petronas’.
•The court maintained that by registering the said domain names, the
defendant had eroded the exclusive goodwill in the name ‘Petronas’ which
had cause damage to the plaintiffs.
57. Jurisdiction
In addition to the nature of corporate structure, decisions will also have to be taken
with respect to the jurisdiction in which the corporate structure should be situated, as
it will determine the extent of any liability that may arise against the website.
According to the traditional rules of private international law, the jurisdiction of a
nation only extends to individuals who are within the country or to the transactions
and events that occur within the natural borders of the nation.
However, in e-commerce transactions, if a business derives customers from a
particular country as a result of their website, it may be required to defend any
litigation that may result in that country.
As a result, any content placed on a website should be reviewed for compliance with
the laws of any jurisdiction where an organisation wishes to market, promote or sell
its products or services as it may run the risk of being sued in any jurisdiction where
the goods are bought or where the services are availed of.
58. Jurisdiction
For example, XYZ, a company in London, having its server in USA, may sell
its products to customers in India or other countries. In such a situation, if
you receive defective goods or if you regret having made the purchase, the
question would arise as to which jurisdiction can you sue the company or
claim damages or withdrawal respectively. The company, on the other hand,
might find itself confronted with foreign laws, which he may not be aware
of.
For example, the US courts have in numerous cases have held a company in
X state
liable in Y state on the basis that the website could be accessed in Y state.
59. Jurisdiction
Existing System New System
Jurisdiction of dispute Jurisdiction of dispute
Malaysian Court Local or foreign court?
Choice of law Choice of law
MALAYSIA Malaysian Law foreign or local?
LEGAL
SYSTEM Evidence
Evidence Act
electronic document
REFJA (Reciprocal
REFJA is not enforceable in
Enforcements of foreign
some major trading partners
Judgement Act)
The nature of E-Commerce causes existing laws not able to cover the
resolution process especially in cross border issues
60. Advertisement
Advertisement
Many websites advertise goods or services to customers. The traditional
laws of advertising, which apply to ordinary sales, are enacted in the interest
of all consumers to prevent deceptive and unfair acts or practices. These
laws would also be applicable to advertising or marketing on the Internet.
The websites may be subject to any liability that may arise due to false
designations, origin, misleading description of fact that are likely to cause
confusion or misrepresent the nature, characteristics, quality or geographic
origin of the goods or services that are offered for sale in an
advertisement. In addition to advertising laws, depending on the kind of
business, the websites would also have to comply with the laws of
applicable to such a business.
61. Advertisement
Advertisement
An advertisement may be exposed to liability under the consumer
protection laws since it may be subject to different interpretations by the
consumer in different jurisdictions.
Certain websites simply display advertisements or banners of other
companies. In such a case, would the owner of the website be subject to
liability for misleading or fraudulent advertisements that are displayed on its
website?
The website should contain appropriate disclaimers disclaiming any such
liability. Most countries have stringent laws with respect to spamming.
Website owners must ensure that they use legal methods of advertisements
and that the method used does not amount to spamming.
65. Electronic Payment Issues
Electronic Payment
The instrumental growth in e-commerce activities has
necessitated the evolution of electronic payment mechanisms.
In addition to normal currencies, e-financial instruments / digital
currencies such as cyber cash and e-cash can be used for the
purchase of current as well as capital assets over the Internet
and for carrying on other commercial activities.
Before regulating the use of such financial instruments, it would
be essential to identify the issues that these instruments pose.
66. Electronic Payment
a. Secure Credit Card Transactions:
An e-commerce website that accepts online credit card
payments must ensure that it has adequate security measures to
safeguard confidential customer data that is provided on the
site. In the event that credit card numbers are leaked on the
Internet, the website could be held liable for damages caused to
the consumers.
67. Electronic Payment
b. Recognition of digital currencies:
To be effective, existing laws would need to recognise the payment of
digital currencies, as enforceable consideration against obligations
undertaken by the other parties. Further, the extent to which these digital
currencies are “valid tender” would also need to be examined.
c. Determining the relevant jurisdiction:
This would mean determining the relevant law that parties will be governed
by in respect of electronic transactions (whether by the contract, or in its
absence, by general principles of law). This may create problems, especially
when the laws in Country A, where the company is registered permit
electronic payment contracts, whereas the laws in Country B, where the
consumer is located, do not regulate electronic payment contracts.
68. Electronic Payment
d. Risk of Regulatory Change:
The regulatory environment for electronic payment is likely
to change with technological innovations in modes of
payment. Therefore, any form of legislation made in this
regard should be technologically neutral.
e. Transaction risks:
These include the liability for security failures in the system
of transaction and the relevant standard of care for system
security.
69. Electronic Payment
f. Consumer-
oriented risks:
These include risks
concerning
privacy, consumer
protection, money
laundering, tax
avoidance, online
fraud and crime.
There are many opportunities for E-Commerce to grow in Malaysia. The political willingness is boostingpolicies towards the selected goals. Development of information and communication technologies is alsopushing E-Commerce towards the attractive pace. New technologies are providing easy and fast onlinetransactions which are enhancing consumers to go online and take the advantages of E-Commerce. Geographicalposition also helps to promote businesses around the globe. It can boost E-Commerce in Malaysia. Foreigninvestment is the key opportunity for E-Commerce in Malaysia. It helps in promoting business and introducesnew technologies which are effecting on the growth of E-Commerce. Malaysia is enjoying fruitful foreigninvestment in the region. Stability of policies and regulatory reforms are also affecting on E-Commerce growth.Government is willing to develop and introduce E-Commerce with new technologies. This is the maindeterminants in the strength. Malaysia is enjoying political stability since independence. One party is still rulingover Malaysia from the independence. Due to one party government there is continuity in policies, strategiesimplementation and strategies formulation which are enhancing the effectiveness of online trading. Governmentstability and efforts are the key elements to create institutions. Malaysian government has created someinstitutions that help industries and people to adopt E-Commerce. These institutions have built up legalregulations, technological infrastructure and economic support to develop E-Commerce in the country. Theseorganizations have also announced some plan and strategies to improve E-Commerce in Malaysia. Governmentbodies have announced and built ministry of multimedia and communication for the improvement of informationand communication technologies, information technology infrastructure create knowledge based economy.Government has built an organization for small businesses which called Small and Medium IndustriesDevelopment Corporation (SMIDEC). SMIDEC is sole organization to enhance the capabilities of small andmedium enterprises (SME) and assist them to join the global competition in trading. Government announced 8thand 9thMalaysia plan to develop knowledge based economy. Government also announced multimedia supercorridor and some other schemes to develop businesses in Malaysia and get global attraction. Government isencouraging both public and private sector to contribute their efforts towards the growth of E-Commerce.Government also announced digital signature act to secure business transactions and create trust of consumers.
Among Asian countries, Malaysia is behind Hong Kong (2nd in the World), Singapore (6th), South Korea (15th), Japan (18th) and Taiwan (19th) which are economically more superior than Malaysia. However, Malaysia is ahead of Thailand, India, Philippines, China, Sri Lanka, Pakistan, Vietnam and Indonesia. The digital divide between Malaysia and Singapore is too wide and there are still a lot of catchup to do.
Cybersquatting is those practices including deliberate bad faith registration as domain name of well-known trademarks in the hope of being able to sell the domain to the owners of those marks (or rivals owners) or simply to take unfair advantage of the reputation attached to those names or marks. Thus it involves the use of domain name by a person with neither trademark registration nor any inherent rights to the name.Cybersquatters exploit the first-come, first-served nature of the domain name registration system to register names of trademarks, famous people, or businesses which they have no connection. Since registration of domain names is simple and inexpensive, cybersquatters often register hundreds of such famous names as their domain names such as www.sony.net andwww.petronas.net. Certainly, this kind of actions will incite those with legal rights on that names to bring a claim of trade mark infringement.Globally, this cybersquatting issue is addressed by an international arbitration processes administered by international agency such as ICANN and WIPO Arbitration and Mediation Center.But , in Malaysia, cybersquatting issue is addressed by .my DOMAIN REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and the complaints must be made according to the rule given by .my Domain Registry.In Sime Darby Berhad Malaysia v. Mr. Sim e-Darby (2002) over a domain name ‘simedarby.com’ by respondent in Canada, the matter went to WIPO Arbitration and Mediation Center, which heard in accordance with the Policy and Rules ofthe Uniform Domain Name Dispute Resolution Policy (UDRP). The decision of Panel was to transfer the impugned domain name to the complainant, because, among other things, the domain name registered by the Respondent is identical or confusingly similar to the “Sime Darby” trade mark in which the Complainant has rights.This problem is equally supposed to have been settled in Malaysia. In a local case of Petroliam NasionalBhd & Ors v Khoo Nee Kiong (2003) Malaysian court decided, among other things, that cyber squatting may be regarded as ‘passing off’. The first plaintiff in that case was a well-known national petroleum corporation. The second plaintiff was one of the marketing arms of the first plaintiff and the third plaintiff was in the business of processing and transmitting natural gas and it conducted its gas business under the trade name ‘Petronas Gas’. The defendant was an individual carrying out trading operations as a registered sole proprietor under the trade/business name ‘Araneum Consulting Services’ and was in no way associated with the plaintiffs.It was held that by registering the said domain names which contained the word ‘Petronas’, there was a serious issue to be tried in that the defendant was making a false representation to persons who may have consulted the register that the registrant, ‘Araneum Consulting Services’ was connected or associated with the name registered and thus the owner of the goodwill in the name ‘Petronas’.The court maintained that by registering the said domain names, the defendant had eroded the exclusive goodwill in the name ‘Petronas’ which had cause damage to the plaintiffs. The said domain names were instruments of fraud and any realistic use of them as domain names would result in passing off. This would cause irreparable injury and damage to the plaintiffs and by virtue of this, the balance of convenience tilted in favour of the plaintiffs.In the circumstances, the plaintiffs had shown that there was a threat of passing off and trademark infringement on the defendant’s part which was likely to cause confusion in the minds of consumers of the plaintiffs’ products, thereby resulting in irreparable injury and damage to the plaintiffs’ trade, business and goodwill. Therefore, as the plaintiffs had provided an undertaking as to damages, the interim injunction sought for ought to be granted.
Cybersquatting is those practices including deliberate bad faith registration as domain name of well-known trademarks in the hope of being able to sell the domain to the owners of those marks (or rivals owners) or simply to take unfair advantage of the reputation attached to those names or marks. Thus it involves the use of domain name by a person with neither trademark registration nor any inherent rights to the name.Cybersquatters exploit the first-come, first-served nature of the domain name registration system to register names of trademarks, famous people, or businesses which they have no connection. Since registration of domain names is simple and inexpensive, cybersquatters often register hundreds of such famous names as their domain names such as www.sony.net andwww.petronas.net. Certainly, this kind of actions will incite those with legal rights on that names to bring a claim of trade mark infringement.Globally, this cybersquatting issue is addressed by an international arbitration processes administered by international agency such as ICANN and WIPO Arbitration and Mediation Center.But , in Malaysia, cybersquatting issue is addressed by .my DOMAIN REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and the complaints must be made according to the rule given by .my Domain Registry.In Sime Darby Berhad Malaysia v. Mr. Sim e-Darby (2002) over a domain name ‘simedarby.com’ by respondent in Canada, the matter went to WIPO Arbitration and Mediation Center, which heard in accordance with the Policy and Rules ofthe Uniform Domain Name Dispute Resolution Policy (UDRP). The decision of Panel was to transfer the impugned domain name to the complainant, because, among other things, the domain name registered by the Respondent is identical or confusingly similar to the “Sime Darby” trade mark in which the Complainant has rights.This problem is equally supposed to have been settled in Malaysia. In a local case of Petroliam NasionalBhd & Ors v Khoo Nee Kiong (2003) Malaysian court decided, among other things, that cyber squatting may be regarded as ‘passing off’. The first plaintiff in that case was a well-known national petroleum corporation. The second plaintiff was one of the marketing arms of the first plaintiff and the third plaintiff was in the business of processing and transmitting natural gas and it conducted its gas business under the trade name ‘Petronas Gas’. The defendant was an individual carrying out trading operations as a registered sole proprietor under the trade/business name ‘Araneum Consulting Services’ and was in no way associated with the plaintiffs.It was held that by registering the said domain names which contained the word ‘Petronas’, there was a serious issue to be tried in that the defendant was making a false representation to persons who may have consulted the register that the registrant, ‘Araneum Consulting Services’ was connected or associated with the name registered and thus the owner of the goodwill in the name ‘Petronas’.The court maintained that by registering the said domain names, the defendant had eroded the exclusive goodwill in the name ‘Petronas’ which had cause damage to the plaintiffs. The said domain names were instruments of fraud and any realistic use of them as domain names would result in passing off. This would cause irreparable injury and damage to the plaintiffs and by virtue of this, the balance of convenience tilted in favour of the plaintiffs.In the circumstances, the plaintiffs had shown that there was a threat of passing off and trademark infringement on the defendant’s part which was likely to cause confusion in the minds of consumers of the plaintiffs’ products, thereby resulting in irreparable injury and damage to the plaintiffs’ trade, business and goodwill. Therefore, as the plaintiffs had provided an undertaking as to damages, the interim injunction sought for ought to be granted.
Cybersquatting is those practices including deliberate bad faith registration as domain name of well-known trademarks in the hope of being able to sell the domain to the owners of those marks (or rivals owners) or simply to take unfair advantage of the reputation attached to those names or marks. Thus it involves the use of domain name by a person with neither trademark registration nor any inherent rights to the name.Cybersquatters exploit the first-come, first-served nature of the domain name registration system to register names of trademarks, famous people, or businesses which they have no connection. Since registration of domain names is simple and inexpensive, cybersquatters often register hundreds of such famous names as their domain names such as www.sony.net andwww.petronas.net. Certainly, this kind of actions will incite those with legal rights on that names to bring a claim of trade mark infringement.Globally, this cybersquatting issue is addressed by an international arbitration processes administered by international agency such as ICANN and WIPO Arbitration and Mediation Center.But , in Malaysia, cybersquatting issue is addressed by .my DOMAIN REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and the complaints must be made according to the rule given by .my Domain Registry.In Sime Darby Berhad Malaysia v. Mr. Sim e-Darby (2002) over a domain name ‘simedarby.com’ by respondent in Canada, the matter went to WIPO Arbitration and Mediation Center, which heard in accordance with the Policy and Rules ofthe Uniform Domain Name Dispute Resolution Policy (UDRP). The decision of Panel was to transfer the impugned domain name to the complainant, because, among other things, the domain name registered by the Respondent is identical or confusingly similar to the “Sime Darby” trade mark in which the Complainant has rights.This problem is equally supposed to have been settled in Malaysia. In a local case of Petroliam NasionalBhd & Ors v Khoo Nee Kiong (2003) Malaysian court decided, among other things, that cyber squatting may be regarded as ‘passing off’. The first plaintiff in that case was a well-known national petroleum corporation. The second plaintiff was one of the marketing arms of the first plaintiff and the third plaintiff was in the business of processing and transmitting natural gas and it conducted its gas business under the trade name ‘Petronas Gas’. The defendant was an individual carrying out trading operations as a registered sole proprietor under the trade/business name ‘Araneum Consulting Services’ and was in no way associated with the plaintiffs.It was held that by registering the said domain names which contained the word ‘Petronas’, there was a serious issue to be tried in that the defendant was making a false representation to persons who may have consulted the register that the registrant, ‘Araneum Consulting Services’ was connected or associated with the name registered and thus the owner of the goodwill in the name ‘Petronas’.The court maintained that by registering the said domain names, the defendant had eroded the exclusive goodwill in the name ‘Petronas’ which had cause damage to the plaintiffs. The said domain names were instruments of fraud and any realistic use of them as domain names would result in passing off. This would cause irreparable injury and damage to the plaintiffs and by virtue of this, the balance of convenience tilted in favour of the plaintiffs.In the circumstances, the plaintiffs had shown that there was a threat of passing off and trademark infringement on the defendant’s part which was likely to cause confusion in the minds of consumers of the plaintiffs’ products, thereby resulting in irreparable injury and damage to the plaintiffs’ trade, business and goodwill. Therefore, as the plaintiffs had provided an undertaking as to damages, the interim injunction sought for ought to be granted.
Cybersquatting is those practices including deliberate bad faith registration as domain name of well-known trademarks in the hope of being able to sell the domain to the owners of those marks (or rivals owners) or simply to take unfair advantage of the reputation attached to those names or marks. Thus it involves the use of domain name by a person with neither trademark registration nor any inherent rights to the name.Cybersquatters exploit the first-come, first-served nature of the domain name registration system to register names of trademarks, famous people, or businesses which they have no connection. Since registration of domain names is simple and inexpensive, cybersquatters often register hundreds of such famous names as their domain names such as www.sony.net andwww.petronas.net. Certainly, this kind of actions will incite those with legal rights on that names to bring a claim of trade mark infringement.Globally, this cybersquatting issue is addressed by an international arbitration processes administered by international agency such as ICANN and WIPO Arbitration and Mediation Center.But , in Malaysia, cybersquatting issue is addressed by .my DOMAIN REGISTRY’s Sensitive Name Dispute Resolution Policy (SNDRP) and the complaints must be made according to the rule given by .my Domain Registry.In Sime Darby Berhad Malaysia v. Mr. Sim e-Darby (2002) over a domain name ‘simedarby.com’ by respondent in Canada, the matter went to WIPO Arbitration and Mediation Center, which heard in accordance with the Policy and Rules ofthe Uniform Domain Name Dispute Resolution Policy (UDRP). The decision of Panel was to transfer the impugned domain name to the complainant, because, among other things, the domain name registered by the Respondent is identical or confusingly similar to the “Sime Darby” trade mark in which the Complainant has rights.This problem is equally supposed to have been settled in Malaysia. In a local case of Petroliam NasionalBhd & Ors v Khoo Nee Kiong (2003) Malaysian court decided, among other things, that cyber squatting may be regarded as ‘passing off’. The first plaintiff in that case was a well-known national petroleum corporation. The second plaintiff was one of the marketing arms of the first plaintiff and the third plaintiff was in the business of processing and transmitting natural gas and it conducted its gas business under the trade name ‘Petronas Gas’. The defendant was an individual carrying out trading operations as a registered sole proprietor under the trade/business name ‘Araneum Consulting Services’ and was in no way associated with the plaintiffs.It was held that by registering the said domain names which contained the word ‘Petronas’, there was a serious issue to be tried in that the defendant was making a false representation to persons who may have consulted the register that the registrant, ‘Araneum Consulting Services’ was connected or associated with the name registered and thus the owner of the goodwill in the name ‘Petronas’.The court maintained that by registering the said domain names, the defendant had eroded the exclusive goodwill in the name ‘Petronas’ which had cause damage to the plaintiffs. The said domain names were instruments of fraud and any realistic use of them as domain names would result in passing off. This would cause irreparable injury and damage to the plaintiffs and by virtue of this, the balance of convenience tilted in favour of the plaintiffs.In the circumstances, the plaintiffs had shown that there was a threat of passing off and trademark infringement on the defendant’s part which was likely to cause confusion in the minds of consumers of the plaintiffs’ products, thereby resulting in irreparable injury and damage to the plaintiffs’ trade, business and goodwill. Therefore, as the plaintiffs had provided an undertaking as to damages, the interim injunction sought for ought to be granted.
Against the host company, may be by way of a civil law suit, criminal prosecution or an action by regulators. The US courts have developed the “minimum contacts” theory whereby the courts may exercise personal jurisdiction over persons who have sufficient minimum contacts with the forum state.These "minimum contacts" may consist of physical presence, financial gain, stream of commerce, and election of the appropriate court via contract.Various courts have held that statements purposely directed at the forum may create sufficient contacts for jurisdiction.This would mean that even if you are not physically present in a nation, you can be sued in that foreign court as long as your website has minimum contacts with that nation. Therefore, a company should insert appropriate choice of law and choice of forum clauses in its online contract, which should specify the jurisdiction to which the parties to the contract would be subject to. Such clauses have been held by courts to be binding upon the parties
As such, a single transaction may involve the laws of at least three jurisdictions:•the laws of the state/nation in which the user resides,•the laws of the state/nation that apply where the server hosting the transaction is located, and•the laws of the state/nation which apply to the person or business with whom the transaction takes place. So a user in one of the Malaysia conducting a transaction with another user in United States through a server in Canada could theoretically be subject to the laws of all three countries as they relate to the transaction at hand.
Mudah.my:Term & Conditions of UseRESPONSIBILITIES OF THE USERThe User is personally responsible for his/her use of the Site and/or Services.The User uses the Site and/or the Services at his/her own risk.The User shall use the Services in accordance with any law at the time being in force in Malaysia.The User shall not list and/or advertise on the Site and/or advertise for sale on the Site any item which:-(a)infringes the intellectual property rights of any third party including copyright, patent, trade mark, trade name, designs, trade secret, confidential information, know-how, goodwill, rights of privacy or publicity or other proprietary rights or rights of publicity or privacy of any third party;(b)otherwise causes legally-recognized harm including but not limited to a product that contains a defamatory statement; or(c)violates, or is illegal under any applicable law, statute, ordinance or regulation.The User shall not provide and/or cause to be provided information which:-(a)is false, inaccurate or misleading;(b)involves the sale of counterfeit or stolen items, or any other fraudulent act;(c)infringes the intellectual property rights including copyright, patent, trade mark, trade name, designs, trade secret, confidential information, know-how, goodwill, rights of privacy or publicity of other any other third party;(d)violates or breaches any law;(e)is defamatory;(f)contains pornographic or obscene materials.(g)contains any computer viruses and/or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or personal information;(h)creates liability for the Company or causes the Company to lose, in whole or in part, the services of its Internet Service Providers or other suppliers;(i)introduces, spreads or is intended to introduce and/or spread contents or propaganda of racist nature."Information" referred to hereinabove includes but is not limited to any information provided by the User to the Company or to other Users in any public message area (such as community forums, photo area and feedback area) or through email.The Company reserves the right to remove any items that it deems in violation of the above, at its sole discretion.The User shall comply with the Company's Advertising & Listing Rules and Procedures.The User is solely responsible for the accuracy of the said Information.
JOHOR BAHRU: Seorangkakitanganswasta yang membelitigatelefonbimbitdenganharga RM3,250 secaradalamtalianterkejutapabilahanyamenerimalesungbatuberharga RM14.50, sehariselepasmelunaskanpembayaran.Lebihmenyakitkanhati, tulisan RM14.50 berkenaanmasihadapadalesungbatuberkenaandanmangsa, MohdHazirulHisham, 30, tergamamketikamenerimanya.“Sayamembuatpembelianituselepasmelayarisatulaman web dantertarikdengantawarantelefonbimbit Samsung Galaxy S bernilai RM1,100 seunitberbandinghargapasaransemasaiaitu RM1,900.“Sayamembelitigatelefonbimbitberkenaansecaratalianpada 6 Disemberlaludanmembuatbayarankeakaunseoranglelakibernama Lim Tham Kim,” katanya, semalam.MenurutHazirul, diakemudianmenerima SMS daripadakakitangansebuahsyarikatmenjualperalatankomunikasi yang menawarkanbaranganpercumaataudiskaun RM50.Hazirulmemilihtawarandiskaunberkenaandanseharikemudian, diamenerimabungkusanbarangandibeli.“Sayagembirakeranatelefonbimbitberkenaantibatepatpadamasanya, tetapiterkejutapabilamendapatikotakbungkusanberkenaancumamengandungilesungbatu.“Sayamenghubunginombortelefonterterasepertidalam SMS diterimaseharisebelumitu, tetapiindividuterbabitengganmenjawabpanggilansaya,” katanya.HazirulkemudianmelakukanpemeriksaandiSuruhanjaya Syarikat Malaysia (SSM) danmendapatisyarikatterbabittidakwujud.“Sayayakindenganpembelianmenerusidalamtaliankeranapernahmembeli beg tangandantidaktimbulmasalahsepertiini,” katanya yang membawaperkaraterbabitke Tribunal TuntutanPengguna Malaysia (TT PM).Sementaraitu, Presiden TTPM, Quaik Chong Yu menegaskanpenuntutperlumemfailkankeshanyaterhadapsatupihaksajakeranapastitimbulmasalahpadaperingkatpenguatkuasaanjikaperintahdikeluarkan.“Pihakpenuntutperlupilihsatupihakuntukfailkantuntutankeranainvoisdikeluarkansyarikatmanakalawangbayarandimasukkankeakaunperibadi Lim, merekaakansalingmenolak,” katanya.Hazirulbersetujumenggugurkantuntutankeatassyarikatberkenaandanmeneruskantuntutanterhadap Lim atasalasanlelakiitumenerimawangterbabit.Quaikmengarahkan Lim mengembalikan RM3,250 kepadaHaziruldalamtempoh 14 hariselepasperintahdikeluarkanmanakalatuntutanterhadapsyarikatdigugurkan.“Lesungtu pula bolehdisimpandirumah,” katanya.Wakilpihakpenentangiaitu Lim dansyarikatterbabittidakhadirpadaperbicaraan.
JOHOR BAHRU: “Sayaterkejutselepasmembukakotakdikirimapabilamendapatiiahanyamengandungiberus cat terpakai, komikberbahasaCinasertatelefonmainandanbukannyaiPhone 4s yang menjadiidaman,” kataFaizalHussin, 41, dari Taman Impian Jaya disini, semalam.Faizal yang jugapengurussebuahsyarikatswastadisekitarbandarrayainiberkata, diakerugian RM1,750 selepasdiperdayasindiketpenjualantelefonbimbitterbabit yang beroperasimenerusilaman web.Mengimbaukejadian, Faizalberkata, ketikamelayari portal pengiklanansindiketterbabitpada 3 Januarilalu, diatertarikdenganiPhone 4s yang ditawarkanpadaharga RM1,750 seunitoleh Jay One Communication and Services memandangkanharganyalebihmurahberbandinghargapasaraniaitusekitar RM2,400. “Sayamenghubunginomborterterauntukmembuatpertanyaanberkaitantelefonbimbitberkenaansebelumdimintamemasukkanbayarankeakaun bank terteranama Yow Wei Xian.“Telefonbimbitberkenaan pula dijanjikandalamtempohduaharimenerusiPoslaju. Kirimanitutibaduaharikemudianiaitupada 5 Januarilalu, namunsayaterkejutmendapatiiahanyaberus cat terpakai, komiksertatelefonmainan,” katanya.Faizalmendedahkanperkaraitupadaprosiding Tribunal TuntutanPengguna Malaysia (TTPM), semalam.Menyambungketerangannya, Faizalberkata, diaberusahamengesanalamatsyarikatterbabitberdasarkannomborakaun bank penerimabayaranberkenaaniaitudi Muar.“Sayakepremisitudanmendapatiiarumah yang disewabeberapalelakiMelayu. “Pada 10 Januarilalu, sayaterkejutapabilamembacalaporanHarian Metro yang mendedahkanseorangbekaspegawai bank menerimalesungbatuselepasmembayar RM3,250 untukmembelitiga unit telefonpintardaripadasyarikatsama,” katanya.Faizalmemfailkantuntutanberkenaankepada TTPM denganharapanmendapatpembelaansewajarnyadanmenamakan Jay One Communication and Services danpenamaakaun, Yow dalamtuntutannyabagimendapatkangantirugiberikutanpenipuanitu.Presiden TTPM, MaznahHaronkemudianmemerintahkanpenentangkeduaiaitu Yow selakupemegangakaun yang menerimawangpembeliantelefonbimbitterbabitmengembalikan RM1,750 kepadamangsadalamtempoh 14 hari.Tuntutan yang difailkanterhadap Jay One Communication and Services pula dibatalkan. Ketikaprosiding, Jay One Communication and Services dan Yow tidakhadiruntukmengemukakanhujahbagimengetepikantuntutandifailkanterhadapmereka.MaznahturutmenasihatkanFaizalsupayamembuatlaporan polis berkaitankesituselainlebihpekadantidakmudahterpedayadenganbarangan yang ditawarkanpadahargamurahterutamaketikaberurusanmenerusi Internet.