SlideShare ist ein Scribd-Unternehmen logo
1 von 39
E-Business Law in Malaysia
   SME Workshop – IIUM/SME Corp

               Dr. Sonny Zulhuda
        Ahmad Ibrahim Kulliyyah of Laws
    International Islamic University Malaysia
Outline
•   What is e-Business?
•   Why e-Business?
•   Web-based Business
•   Consumer Issues
•   Identity Theft
•   What Law Says
•   Setting up Your e-Business




2012 (c) Sonny Zulhuda           2
What is E-Business?

• Electronic Business:
  Business/Commerce + Electronic
  Processing



• Electronic processing: use,
  storage, transmission or
  representation of electronic data,
  including text, sounds and visual
  images.



                          2012 (c) Sonny Zulhuda   3
What is E-Business?
• E-Business is not about a new type of business, but a new
  method of business

• So e-business is a new option for business people and
  enterprises to trade, market, sell and offer their old or
  existing products and services, e.g.:
    – Selling books online
    – Selling phones online


• With this new method, new products and services also
  emerge with the growth of innovation and technologies, e.g.:
    – Web design service
    – Selling ring tones for mobile phones


                               2012 (c) Sonny Zulhuda            4
„Business relationship‟
Include matters arising from all relationships of a commercial
nature, whether contractual or not.




                  EXPLOITATION       JOINT VENTURE
                                                          DISTRIBUTION
                 AGREEMENT OR          & OTHERS
                                                           AGREEMENT
                  CONCESSION




                                                                     COMMERCIAL
     INSURANCE
                                                                    REPRESENTATION
                                                                      OR AGENCY
                            COMMERCIAL RELATIONSHIP



                  INVESTMENT,
                   FINANCING,        CONSTRUCTION         FACTORING,
                    BANKING            OF WORKS            LEASING




                                 2012 (c) Sonny Zulhuda                              5
Why E-Business?

     Worldwide access and greater choice

     Enhanced competitiveness and quality of
      service

     Customization and personalized
      products

     Elimination of intermediaries

     Greater efficiency and lower costs

     New business opportunities and new
      products and services

   2012 (c) Sonny Zulhuda                   6
Facts and Figures




    2012 (c) Sonny Zulhuda   7
2012 (c) Sonny Zulhuda   8
Shapes of E-Commerce

                  E-GOVERNMENT




                       Government




               Individuals        Business


                                                E-BUSINESS
E-EVERYTHING                                 E-CORPORATIONS



                   2012 (c) Sonny Zulhuda                     9
Consumer Concerns

  • Concern over the Product/service: lack of
    information, safety, originality, legality, halal, etc.

  • Insecure payment methods

  • Loss of personal privacy – Risk of misuse of
    personal information, e.g. use of Cookies; opt-in
    or opt-out

  • Cyber crimes: Computer fraud, hacking, virus,
    phishing, etc.

  • Sharing of Liability  to avoid BLAME GAME!

         2012 (c) Sonny Zulhuda                         10
Types of E-Commerce Websites



                      • Informational
                      • Interactive
                      • Transactional




          2012 (c) Sonny Zulhuda        11
Consumers-friendly
Commercial Websites
• Information about business; e.g. information on the company
  including its legal name, its principal geographic address, a
  telephone number, an e-mail address for questions related to sales
  and service, credentials, etc.

• Information about goods and services, e.g. specifications, terms of
  use, sample pictures, etc.

• Information about transactions, e.g. costs, currency, payment
  process, delivery terms, warranties, confirmation process.

• Effective communication, e.g. language, timing, records
  maintenance.

(Guidelines by the OECD)
                           2012 (c) Sonny Zulhuda                       12
Some Practices of E-Business
• Online employment agency services
   – E.g. www.jobstreet.com

• Online bookshops
   – E.g. www.amazon.com

• Online auctions
   – E.g. www.lelong.com.my, www.e-bay.com

• Online banking
   – E.g. www.maybank2u.com.my

• Online travel services
   – E.g. www.airasia.com


                            2012 (c) Sonny Zulhuda   13
Online Employment Services




        2012 (c) Sonny Zulhuda   14
Online Bookshops




    2012 (c) Sonny Zulhuda   15
Online Auction




  2012 (c) Sonny Zulhuda   16
Online Banking




   2012 (c) Sonny Zulhuda   17
Online Travel Services




      2012 (c) Sonny Zulhuda   18
Identity Theft
What is Identity Theft?

• “Identity”
   – Ie. personal credentials (name, IC#, Passport#,
     address, contact#, medical records, financial records,
     credit worthiness, designation, brand name…)


• “Theft”?
   – It seeks to include any form of
     misappropriation/abuse, not specifically a stealing.
   – Thus may include fraud, trespass, impersonation, etc.

                      2012 (c) Sonny Zulhuda              20
Incidents of ID Theft

• In the US, nearly 10 million Americans fell
  victim of ID theft each year;

• In 2003, FTC reported that ID theft alone
  costs nearly US$48 billion as annual costs for
  the businesses and an additional 5 bil per
  year for consumers;

• In the UK, the ICO has reported over 277
  breaches of significant volume since the His
  Majesty Revenue & Customs (HMRC) breach
  in November 2007;

• MyCert of Malaysia reported in 2008 that
  Internet-related fraud dominates the security
  incidents attack.Zulhuda
        2012 (c) Sonny                          21
Top 5 ways youth‟s identities
 are stolen
                      Qwest Communications Teen Council Program

1. Posting their real name, address, date of birth and school
   on social networking sites;

2. Talking with strangers through their social networking
   page -- and in some cases meeting in person

3. Divulging social security numbers (like IC No.) on online
   job applications

4. Unable to recognize "phishing" emails

5. Storing personal information like their social security
   number and passwords in cell phones
                        2012 (c) Sonny Zulhuda                    22
Essential#1
Be moderate in your Social Networking




             2012 (c) Sonny Zulhuda     23
Do‟s dan Don‟ts of Social
Networking

            • Be Moderate
            • Define your „friends‟
            • Make use of privacy setting tools
            • Think twice or thrice before posting
            • Mind the existing rules: legal and
              ethical
            • Social networking or Social not-
              working?


                2012 (c) Sonny Zulhuda               24
Essential#2
Beware of PHISHING e-mails




        2012 (c) Sonny Zulhuda   25
Phishing  Fishing
 • Phishing identities can go through phone,
   sms, video or e-mails.

 • Phishing e-mails commonly involve the lure,
   the hook and the catch

    – The lure: a phisher who emails a large number
      of users with a message that appears to be
      from some legitimate institution.

    – The hook: a website that mimics the
      appearance of a legitimate target institution.

    – The catch: the making use of the collected
      information for fraud, forgery or theft.

       2012 (c) Sonny Zulhuda                      26
Some “Social Engineering” Methods
• Winning a prize, lottery, gift, year-end bonus, etc.;
• Business opportunities, investment, joint capital
  venture;
• Romantic engagement, date, social relationship;
• Security alert, password change, non-active online
  account;
• Administrative works, database upgrading, status
  update;
• Emergency nature, lost and found, criminal victims;
• Personal problems, health, sex drugs, etc.


                         2012 (c) Sonny Zulhuda           27
The Legal Framework




     2012 (c) Sonny Zulhuda   28
LEGAL FRAMEWORK FOR E-BUSINESS


• E-Commerce Act                                               • Computer
  2006                                                           Crimes Act 1997
• Evidence Act                                                 • Penal Code
  1950                                                         • Comm &
                                                                 Multimedia Act
                                                                 1998
                     Admissibility &
                                          Criminalisation of
                   Enforceability of E-
                                               Abuse
                      transaction




                    Data Privacy &          Consumer
                       Security              Protection


• Personal Data                                                 • Consumer
  Protection Act                                                  Protection Act
  2010                                                            1999
                                                                • Sale of Goods
                              2012 (c) Sonny Zulhuda              Act 1957         29
E-commerce is based on Contract

      Online banking
      Online book purchase
      Online movie ticketing
                                         Based on       What type of
      Online marketing                   contract law   contract??
      Online flight booking
      Online investment
      Online auction




                          2012 (c) Sonny Zulhuda                   30
E-transaction Law in Malaysia
• In 2006, Malaysian parliament passed the Electronic
  Commerce Act (ECA) 2006 that:

   – Provides for legal recognition of electronic messages in
     commercial transactions
   – Provides for the use of e-messages to fulfill legal requirements
   – Enables and facilitates commercial transactions through the use
     of electronic means


• This law adopted international guidelines by the
  UNCITRAL (a commission under the UN)


                          2012 (c) Sonny Zulhuda                    31
Legal issues addressed by
the ECA 2006

• The admissibility of electronic
  message
• The legality of paperless document
• The requirement of signature
• The originality of document
• Formation of e-contract: Offer and
  Acceptance




                     2012 (c) Sonny Zulhuda   32
Formation and validity of                        contracts
• In e-contract, an offer and the acceptance of an offer may
  be expressed by means of data messages.




                           2012 (c) Sonny Zulhuda               33
Non-applicability of ECA 2006

          •   Power of Attorney
          •   The creation of wills and codicils
          •   The creation of trusts
          •   Negotiable instruments




          2012 (c) Sonny Zulhuda                   34
How to start your own e-Business?

• Set up a website:
   –   Social networking page
   –   Free blog
   –   Paid blog
   –   Full website/portal


• Consider:
   –   Your need?
   –   Practicality& Affordability
   –   Risks
   –   Control
   –   Regulation
                           2012 (c) Sonny Zulhuda   35
Following up…
•   Introduce yourself
•   Introduce your products/services
•   Explain your terms and conditions
•   Introduce your business process
    –   Queries
    –   Purchasing order
    –   Transaction & payment
    –   Delivery
    –   After-sales?

                       2012 (c) Sonny Zulhuda   36
Exercise:
   Terms and Conditions of e-Business

• Visit the selected e-commerce website and assess their
  compliance to the legal rules and best practices that you
  know, in terms of:

   a)   Identity of the vendor and the products
   b)   Privacy and security
   c)   Consumer protection




                          2012 (c) Sonny Zulhuda          37
Exercise:
   Terms and Conditions of e-Business


• Choose from the following web:
   – www.mudah.my
   – www.lelong.com.my
   – www.myeg.com.my
   – www.airasia.com




                     2012 (c) Sonny Zulhuda   38
THE END




2012 (c) Sonny Zulhuda   39

Weitere ähnliche Inhalte

Was ist angesagt?

Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n itamitmitkar
 
contemporary application of information technology
contemporary application of information technologycontemporary application of information technology
contemporary application of information technologyPANKHURI JAIN
 
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
What Should The Public Sector Demand   Jerry Fishenden 15.05.2009What Should The Public Sector Demand   Jerry Fishenden 15.05.2009
What Should The Public Sector Demand Jerry Fishenden 15.05.2009Jerry Fishenden
 
Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVijayan Ganapathy
 
Introduction to electronic business electronic commerce
Introduction to electronic business electronic commerceIntroduction to electronic business electronic commerce
Introduction to electronic business electronic commerceOsama Yousaf
 
Legal aspects of e commerce
Legal aspects of e commerceLegal aspects of e commerce
Legal aspects of e commerceImmo Böhm
 
Who will own the internet of things june 29, 2015
Who will own the internet of things   june 29, 2015Who will own the internet of things   june 29, 2015
Who will own the internet of things june 29, 2015Blair Currie
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
Future of identity - growing demand
Future of identity - growing demandFuture of identity - growing demand
Future of identity - growing demandNewsquare
 
Digital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websitesDigital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websitesAlexandra MacLeod
 
See the outcomes of the last quarter of 2011 Online Dispute Resolution Pilot ...
See the outcomes of the last quarter of 2011 Online Dispute Resolution Pilot ...See the outcomes of the last quarter of 2011 Online Dispute Resolution Pilot ...
See the outcomes of the last quarter of 2011 Online Dispute Resolution Pilot ...eCommerce Institute
 
Business 2 Students: AI & de impact op de juridische wereld.
Business 2 Students: AI & de impact op de juridische wereld. Business 2 Students: AI & de impact op de juridische wereld.
Business 2 Students: AI & de impact op de juridische wereld. Matthias Dobbelaere-Welvaert
 
art - MM Transformer - CIO Council (09-16) v1
art - MM Transformer - CIO Council (09-16) v1art - MM Transformer - CIO Council (09-16) v1
art - MM Transformer - CIO Council (09-16) v1Marlon Moodley
 
Digital content and media - a legal update
Digital content and media - a legal updateDigital content and media - a legal update
Digital content and media - a legal updateBristol Media
 
Legal and regulatory environment e commerce
Legal and regulatory environment e commerceLegal and regulatory environment e commerce
Legal and regulatory environment e commerceDr Vijay Vishwakarma
 

Was ist angesagt? (20)

Better use of data
Better use of dataBetter use of data
Better use of data
 
Online marketing legal issues
Online marketing legal issuesOnline marketing legal issues
Online marketing legal issues
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
contemporary application of information technology
contemporary application of information technologycontemporary application of information technology
contemporary application of information technology
 
Wisekey kamp
Wisekey kampWisekey kamp
Wisekey kamp
 
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
What Should The Public Sector Demand   Jerry Fishenden 15.05.2009What Should The Public Sector Demand   Jerry Fishenden 15.05.2009
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
 
Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerce
 
Introduction to electronic business electronic commerce
Introduction to electronic business electronic commerceIntroduction to electronic business electronic commerce
Introduction to electronic business electronic commerce
 
Legal aspects of e commerce
Legal aspects of e commerceLegal aspects of e commerce
Legal aspects of e commerce
 
Who will own the internet of things june 29, 2015
Who will own the internet of things   june 29, 2015Who will own the internet of things   june 29, 2015
Who will own the internet of things june 29, 2015
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Future of identity - growing demand
Future of identity - growing demandFuture of identity - growing demand
Future of identity - growing demand
 
Digital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websitesDigital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websites
 
See the outcomes of the last quarter of 2011 Online Dispute Resolution Pilot ...
See the outcomes of the last quarter of 2011 Online Dispute Resolution Pilot ...See the outcomes of the last quarter of 2011 Online Dispute Resolution Pilot ...
See the outcomes of the last quarter of 2011 Online Dispute Resolution Pilot ...
 
Business 2 Students: AI & de impact op de juridische wereld.
Business 2 Students: AI & de impact op de juridische wereld. Business 2 Students: AI & de impact op de juridische wereld.
Business 2 Students: AI & de impact op de juridische wereld.
 
Electronic Business
Electronic BusinessElectronic Business
Electronic Business
 
art - MM Transformer - CIO Council (09-16) v1
art - MM Transformer - CIO Council (09-16) v1art - MM Transformer - CIO Council (09-16) v1
art - MM Transformer - CIO Council (09-16) v1
 
Digital content and media - a legal update
Digital content and media - a legal updateDigital content and media - a legal update
Digital content and media - a legal update
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
Legal and regulatory environment e commerce
Legal and regulatory environment e commerceLegal and regulatory environment e commerce
Legal and regulatory environment e commerce
 

Ähnlich wie E business sme workshop

Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsAccenture the Netherlands
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...Jonathan Care
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-lawMd Aktar
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
Digital Retail Experiences
Digital Retail ExperiencesDigital Retail Experiences
Digital Retail ExperiencesVinay Dixit
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...Monica Ioannidou Polemitis
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareNationalUnderwriter
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
ABN AMRO WTT
ABN AMRO WTTABN AMRO WTT
ABN AMRO WTTBob Nieme
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpii2011
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 

Ähnlich wie E business sme workshop (20)

E-Commerce & Digital Marketing -UNIT 1
E-Commerce & Digital Marketing -UNIT 1E-Commerce & Digital Marketing -UNIT 1
E-Commerce & Digital Marketing -UNIT 1
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Digital Retail Experiences
Digital Retail ExperiencesDigital Retail Experiences
Digital Retail Experiences
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...Creating value through innovation: Opportunities for micro and small business...
Creating value through innovation: Opportunities for micro and small business...
 
E commerce
E commerceE commerce
E commerce
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
ABN AMRO WTT
ABN AMRO WTTABN AMRO WTT
ABN AMRO WTT
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Group-01 .pptx
Group-01 .pptxGroup-01 .pptx
Group-01 .pptx
 

Kürzlich hochgeladen

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 

Kürzlich hochgeladen (20)

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 

E business sme workshop

  • 1. E-Business Law in Malaysia SME Workshop – IIUM/SME Corp Dr. Sonny Zulhuda Ahmad Ibrahim Kulliyyah of Laws International Islamic University Malaysia
  • 2. Outline • What is e-Business? • Why e-Business? • Web-based Business • Consumer Issues • Identity Theft • What Law Says • Setting up Your e-Business 2012 (c) Sonny Zulhuda 2
  • 3. What is E-Business? • Electronic Business: Business/Commerce + Electronic Processing • Electronic processing: use, storage, transmission or representation of electronic data, including text, sounds and visual images. 2012 (c) Sonny Zulhuda 3
  • 4. What is E-Business? • E-Business is not about a new type of business, but a new method of business • So e-business is a new option for business people and enterprises to trade, market, sell and offer their old or existing products and services, e.g.: – Selling books online – Selling phones online • With this new method, new products and services also emerge with the growth of innovation and technologies, e.g.: – Web design service – Selling ring tones for mobile phones 2012 (c) Sonny Zulhuda 4
  • 5. „Business relationship‟ Include matters arising from all relationships of a commercial nature, whether contractual or not. EXPLOITATION JOINT VENTURE DISTRIBUTION AGREEMENT OR & OTHERS AGREEMENT CONCESSION COMMERCIAL INSURANCE REPRESENTATION OR AGENCY COMMERCIAL RELATIONSHIP INVESTMENT, FINANCING, CONSTRUCTION FACTORING, BANKING OF WORKS LEASING 2012 (c) Sonny Zulhuda 5
  • 6. Why E-Business?  Worldwide access and greater choice  Enhanced competitiveness and quality of service  Customization and personalized products  Elimination of intermediaries  Greater efficiency and lower costs  New business opportunities and new products and services 2012 (c) Sonny Zulhuda 6
  • 7. Facts and Figures 2012 (c) Sonny Zulhuda 7
  • 8. 2012 (c) Sonny Zulhuda 8
  • 9. Shapes of E-Commerce E-GOVERNMENT Government Individuals Business E-BUSINESS E-EVERYTHING E-CORPORATIONS 2012 (c) Sonny Zulhuda 9
  • 10. Consumer Concerns • Concern over the Product/service: lack of information, safety, originality, legality, halal, etc. • Insecure payment methods • Loss of personal privacy – Risk of misuse of personal information, e.g. use of Cookies; opt-in or opt-out • Cyber crimes: Computer fraud, hacking, virus, phishing, etc. • Sharing of Liability  to avoid BLAME GAME! 2012 (c) Sonny Zulhuda 10
  • 11. Types of E-Commerce Websites • Informational • Interactive • Transactional 2012 (c) Sonny Zulhuda 11
  • 12. Consumers-friendly Commercial Websites • Information about business; e.g. information on the company including its legal name, its principal geographic address, a telephone number, an e-mail address for questions related to sales and service, credentials, etc. • Information about goods and services, e.g. specifications, terms of use, sample pictures, etc. • Information about transactions, e.g. costs, currency, payment process, delivery terms, warranties, confirmation process. • Effective communication, e.g. language, timing, records maintenance. (Guidelines by the OECD) 2012 (c) Sonny Zulhuda 12
  • 13. Some Practices of E-Business • Online employment agency services – E.g. www.jobstreet.com • Online bookshops – E.g. www.amazon.com • Online auctions – E.g. www.lelong.com.my, www.e-bay.com • Online banking – E.g. www.maybank2u.com.my • Online travel services – E.g. www.airasia.com 2012 (c) Sonny Zulhuda 13
  • 14. Online Employment Services 2012 (c) Sonny Zulhuda 14
  • 15. Online Bookshops 2012 (c) Sonny Zulhuda 15
  • 16. Online Auction 2012 (c) Sonny Zulhuda 16
  • 17. Online Banking 2012 (c) Sonny Zulhuda 17
  • 18. Online Travel Services 2012 (c) Sonny Zulhuda 18
  • 20. What is Identity Theft? • “Identity” – Ie. personal credentials (name, IC#, Passport#, address, contact#, medical records, financial records, credit worthiness, designation, brand name…) • “Theft”? – It seeks to include any form of misappropriation/abuse, not specifically a stealing. – Thus may include fraud, trespass, impersonation, etc. 2012 (c) Sonny Zulhuda 20
  • 21. Incidents of ID Theft • In the US, nearly 10 million Americans fell victim of ID theft each year; • In 2003, FTC reported that ID theft alone costs nearly US$48 billion as annual costs for the businesses and an additional 5 bil per year for consumers; • In the UK, the ICO has reported over 277 breaches of significant volume since the His Majesty Revenue & Customs (HMRC) breach in November 2007; • MyCert of Malaysia reported in 2008 that Internet-related fraud dominates the security incidents attack.Zulhuda 2012 (c) Sonny 21
  • 22. Top 5 ways youth‟s identities are stolen Qwest Communications Teen Council Program 1. Posting their real name, address, date of birth and school on social networking sites; 2. Talking with strangers through their social networking page -- and in some cases meeting in person 3. Divulging social security numbers (like IC No.) on online job applications 4. Unable to recognize "phishing" emails 5. Storing personal information like their social security number and passwords in cell phones 2012 (c) Sonny Zulhuda 22
  • 23. Essential#1 Be moderate in your Social Networking 2012 (c) Sonny Zulhuda 23
  • 24. Do‟s dan Don‟ts of Social Networking • Be Moderate • Define your „friends‟ • Make use of privacy setting tools • Think twice or thrice before posting • Mind the existing rules: legal and ethical • Social networking or Social not- working? 2012 (c) Sonny Zulhuda 24
  • 25. Essential#2 Beware of PHISHING e-mails 2012 (c) Sonny Zulhuda 25
  • 26. Phishing  Fishing • Phishing identities can go through phone, sms, video or e-mails. • Phishing e-mails commonly involve the lure, the hook and the catch – The lure: a phisher who emails a large number of users with a message that appears to be from some legitimate institution. – The hook: a website that mimics the appearance of a legitimate target institution. – The catch: the making use of the collected information for fraud, forgery or theft. 2012 (c) Sonny Zulhuda 26
  • 27. Some “Social Engineering” Methods • Winning a prize, lottery, gift, year-end bonus, etc.; • Business opportunities, investment, joint capital venture; • Romantic engagement, date, social relationship; • Security alert, password change, non-active online account; • Administrative works, database upgrading, status update; • Emergency nature, lost and found, criminal victims; • Personal problems, health, sex drugs, etc. 2012 (c) Sonny Zulhuda 27
  • 28. The Legal Framework 2012 (c) Sonny Zulhuda 28
  • 29. LEGAL FRAMEWORK FOR E-BUSINESS • E-Commerce Act • Computer 2006 Crimes Act 1997 • Evidence Act • Penal Code 1950 • Comm & Multimedia Act 1998 Admissibility & Criminalisation of Enforceability of E- Abuse transaction Data Privacy & Consumer Security Protection • Personal Data • Consumer Protection Act Protection Act 2010 1999 • Sale of Goods 2012 (c) Sonny Zulhuda Act 1957 29
  • 30. E-commerce is based on Contract Online banking Online book purchase Online movie ticketing Based on What type of Online marketing contract law contract?? Online flight booking Online investment Online auction 2012 (c) Sonny Zulhuda 30
  • 31. E-transaction Law in Malaysia • In 2006, Malaysian parliament passed the Electronic Commerce Act (ECA) 2006 that: – Provides for legal recognition of electronic messages in commercial transactions – Provides for the use of e-messages to fulfill legal requirements – Enables and facilitates commercial transactions through the use of electronic means • This law adopted international guidelines by the UNCITRAL (a commission under the UN) 2012 (c) Sonny Zulhuda 31
  • 32. Legal issues addressed by the ECA 2006 • The admissibility of electronic message • The legality of paperless document • The requirement of signature • The originality of document • Formation of e-contract: Offer and Acceptance 2012 (c) Sonny Zulhuda 32
  • 33. Formation and validity of contracts • In e-contract, an offer and the acceptance of an offer may be expressed by means of data messages. 2012 (c) Sonny Zulhuda 33
  • 34. Non-applicability of ECA 2006 • Power of Attorney • The creation of wills and codicils • The creation of trusts • Negotiable instruments 2012 (c) Sonny Zulhuda 34
  • 35. How to start your own e-Business? • Set up a website: – Social networking page – Free blog – Paid blog – Full website/portal • Consider: – Your need? – Practicality& Affordability – Risks – Control – Regulation 2012 (c) Sonny Zulhuda 35
  • 36. Following up… • Introduce yourself • Introduce your products/services • Explain your terms and conditions • Introduce your business process – Queries – Purchasing order – Transaction & payment – Delivery – After-sales? 2012 (c) Sonny Zulhuda 36
  • 37. Exercise: Terms and Conditions of e-Business • Visit the selected e-commerce website and assess their compliance to the legal rules and best practices that you know, in terms of: a) Identity of the vendor and the products b) Privacy and security c) Consumer protection 2012 (c) Sonny Zulhuda 37
  • 38. Exercise: Terms and Conditions of e-Business • Choose from the following web: – www.mudah.my – www.lelong.com.my – www.myeg.com.my – www.airasia.com 2012 (c) Sonny Zulhuda 38
  • 39. THE END 2012 (c) Sonny Zulhuda 39