SlideShare a Scribd company logo
1 of 12
Prepared by : HANIN
   WAJIHAH BAHARUDIN
             
    INTAN NUR BALQIS
       AMIRUDIN :D
     Presentation ICT
 Impact of ICT on Society
   Malaysian Cyber Law
            and
Electronic Government Law
Meaning Of Cyber Law
Any laws relating to protecting the
Internet and other online
communication technologies
Needs For Cyber Law
Integrity and Security of Information
Security of Government Data
Intellectual Property Rights
Privacy and Confidentially of
Information
Legal Status of Online Transactions
DIGITAL SIGNATURE ACT 1997
     Why the Act exist:
- Transactions conducted via internet increasing.
- Identities and messages can falsified
- Need purchaser and seller identity for the integrity of messages.
- Removing doubt and possibility of fraud
     What the Act is about?
- Provides for regulation of public key infrastructure.
- Make digital signature legally valid and enforceable as traditional
  signature.
         COPYRIGHT (AMENDMENT) ACT 1997
     Why the Act exists:
- To protect expressions of thoughts and ideas from unauthorized
  copying alteration.
- Creative expression is being captured and
     What the Amended Act is about?
- Clear protection accorded to multimedia works.
- Transmissions of copyright works over the Internet clearly amount to
   infringement.
- Technological methods of ensuring works and authorship info are not
     altered or removed is protected.
TELEMEDICINE ACT 1997
  Why the Act exists:
- Healthcare systems and providers around the world are becoming
  interconnected.
- Unclear quality healthcare advice and consultation from specialist
  because doesn’t have truth value
- To regulate practice of teleconsultations in medical profession.
  What the Act is about?
- The Act provides that any registered doctor may practice
  “telemedicine” but other healthcare providers must first obtain a license
  to do so.
               COMPUTER CRIMES ACT 1997
  Why the Act exists:
- As computing becomes more central to people’s life and work,
  computers become both targets and tools of crime.
- To ensure misuse of computers is offense.
  What the Act is about?
- Offers to:* Enter or attempt into computers and computer systems
              without authorization.
            * Damage or alter data/information in computers or computer
              systems by planting viruses.
COMMUNICATIONS AND MULTIMEDIA ACT 1998
  Why the Act exist:
- Convergence of technologies is driving convergence of
  telecommunication, broadcasting, computing and content.
  What the Act is about?
- A restructuring of converged ICT industry.
- Create and define a new system of licenses
- Provide communication and multimedia services.
- Provide the existence of the Communication and Multimedia
  Commission.
          POLICY OBJECTIVES OF CMA
 To regulate for the long-term benefit of the end user.
 To promote consumer confidence in service delivery.
 To ensure equitable provision of affordable services.
 To create a robust applications environment for the end user.
WHY THE ELECTRONIC GOVERNMENT EXIST:
  Government is working on individual departmental projects
  rather than creating a general framework to take it forward
  There is strong belief in electronic government
  To control bloggers and prevent from spreading "disharmony,
  chaos, seditious material and lies" on websites
  Registering bloggers help prevent controversy in the
  government and help promote harmony in the country

WHAT THE ELECTRONIC GOVERNMENT IS ABOUT?
   Electronic government is already in many departments; in fact,
   ahead of most of Europe are in electronic governance
   Electronic government needs to be more central steering,
“The government isn't against it, but it certainly isn't championing
   it”.
   Ecommerce will radically reshape government over the next
   five years.
ELECTRONIC GOVERNMENT DATABASES
  American Government
Curriculum based reference database for government that includes
  daily UPI stories, annotated bibliographies, interactive topic
  exploration, and political commentary from Robert Novak and Bill
  Press.

  Facts on File
Collection of databases on history, geography, science, and health.
  Includes career and curriculum resources as well as personal and
  business forms.

  FirstSearch
Collection of fifteen databases including WorldCat, Medline,
  WilsonSelectPlus that provide both citations and full-text. WorldCat
  is the largest international database featuring more than 54 million
  items from the 50,000 plus OCLC member libraries.

  Edgar Database
Database of searchable SEC filings such as annual and quarterly
  reports. Search by company name, SIC code, etc. Obtain mutual
  fund prospectuses, as well as archived information.
INFORMATION TECHNOLOGY ACT 2000

Relate to electronic form which filing, issue, grant or payment
effected
Relate to manner and format which electronic records be filed,
issued and method of payment of fee
Relate to security procedure for purpose of creating secure
electronic record and secure digital signature
Relate to other standards observed by Controller of Certifying
Authorities
Relate to fee to be paid to Certifying Authority for issue of a Digital
Signature Certificate
Relate procedure for investigation of misbehavior or incapacity of
Presiding Officer
Relate to any other power of a civil court required to be prescribed
Relate to any other matter which is required to be, or may be,
prescribed.
Relate to maintenance of database containing disclosure record of
Certifying Authority
Relate to conditions and restrictions subject which Controller may
recognize any foreign
THE INDUCE ACT
Supported by Senate Judiciary Committee Chairman
Orrin Hatch, R-Utah

Make manufacturers of such software liable for
inducing people to commit copyright infringement

Consumer complained that the bill's language is too
broad and could apply liability to legitimate
technology

Represent sides to propose own compromise in
congressional session and are given tight deadline,
according to condition of anonymity

Necessary after a federal appeals court; manufacturer
of file-sharing software of liability committed by
customers was cleared
REFERENCES

  Teacher’s handouts
The Malaysian Cyber Laws
  Internet
*www.fountaindale.lib.il.us/information/databases/governmentDB
   .htm
*www.silicon.com/management/government/0,39024852,110027
   86,00.htm
*http://www.asianlaws.org/consultancy/setting_up.htm
*http://www.digitaljournal.com/article/66510/Malaysian_Gov_t_L
   ooking_to_Quiet_Bloggers
*http://www.asianlaws.org/cyberlaw/newsletter/issues/cl_nl_49.h
   tm
*www.jagat.com.my/Cyberlawseries/consultancy.htm
CONCLUSION
Future Cyber Laws must recognizes the people development
component-crucial for a K-Economy.
The existing Cyber Laws created the necessary impact… but
constant review is necessary.
Technology innovations
# Business innovations
# “Criminal” innovations
# Globalization
An exclusive legislative process may shorten review cycle.

Malaysian Government envisions to reinvent governance activities
through e-Government projects and applications.
Several test-beds are already in place to provide ICT which
enabled solutions such as e-judiciary, e-passport and tele-
healthcare. 
Such e-applications inevitably come with legal impediments that
would slow down the reinvention process unless they are properly
addressed and solved.

More Related Content

What's hot

Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internetguesta5c32a
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsJanette Toral
 
Internet
InternetInternet
InternetJodip
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the PhilippinesRaiaR
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 

What's hot (20)

Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and Regulations
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
Cyber law
Cyber lawCyber law
Cyber law
 
Internet
InternetInternet
Internet
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 

Viewers also liked

Everything you ever wanted to know about lenox v5
Everything you ever wanted to know about lenox v5Everything you ever wanted to know about lenox v5
Everything you ever wanted to know about lenox v5channinggibson
 
Saurabhrecession
SaurabhrecessionSaurabhrecession
Saurabhrecessionzofishan
 
Top 10 Strategies to Maximize LinkedIn for Entrepreneurs
Top 10 Strategies to Maximize LinkedIn for EntrepreneursTop 10 Strategies to Maximize LinkedIn for Entrepreneurs
Top 10 Strategies to Maximize LinkedIn for EntrepreneursRoar Media
 
Seven50 polling results weeks 1-9
Seven50  polling results weeks 1-9 Seven50  polling results weeks 1-9
Seven50 polling results weeks 1-9 Roar Media
 
Compliance and FMV - Karen Lowney
Compliance and FMV - Karen LowneyCompliance and FMV - Karen Lowney
Compliance and FMV - Karen LowneyTTC, llc
 
Summit 3 Opportunity FHEA Presentation
Summit 3 Opportunity FHEA Presentation Summit 3 Opportunity FHEA Presentation
Summit 3 Opportunity FHEA Presentation Roar Media
 

Viewers also liked (8)

Ten Ways to Wealth
Ten Ways to WealthTen Ways to Wealth
Ten Ways to Wealth
 
Maps
MapsMaps
Maps
 
Everything you ever wanted to know about lenox v5
Everything you ever wanted to know about lenox v5Everything you ever wanted to know about lenox v5
Everything you ever wanted to know about lenox v5
 
Saurabhrecession
SaurabhrecessionSaurabhrecession
Saurabhrecession
 
Top 10 Strategies to Maximize LinkedIn for Entrepreneurs
Top 10 Strategies to Maximize LinkedIn for EntrepreneursTop 10 Strategies to Maximize LinkedIn for Entrepreneurs
Top 10 Strategies to Maximize LinkedIn for Entrepreneurs
 
Seven50 polling results weeks 1-9
Seven50  polling results weeks 1-9 Seven50  polling results weeks 1-9
Seven50 polling results weeks 1-9
 
Compliance and FMV - Karen Lowney
Compliance and FMV - Karen LowneyCompliance and FMV - Karen Lowney
Compliance and FMV - Karen Lowney
 
Summit 3 Opportunity FHEA Presentation
Summit 3 Opportunity FHEA Presentation Summit 3 Opportunity FHEA Presentation
Summit 3 Opportunity FHEA Presentation
 

Similar to Impact of ICT Laws on Society and E-Government in Malaysia

digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesMartyn Taylor
 

Similar to Impact of ICT Laws on Society and E-Government in Malaysia (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber law
Cyber lawCyber law
Cyber law
 
It act 2000
It act 2000It act 2000
It act 2000
 
Brief kif0809
Brief kif0809Brief kif0809
Brief kif0809
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Impact of ICT Laws on Society and E-Government in Malaysia

  • 1. Prepared by : HANIN WAJIHAH BAHARUDIN  INTAN NUR BALQIS AMIRUDIN :D Presentation ICT Impact of ICT on Society Malaysian Cyber Law and Electronic Government Law
  • 2. Meaning Of Cyber Law Any laws relating to protecting the Internet and other online communication technologies
  • 3. Needs For Cyber Law Integrity and Security of Information Security of Government Data Intellectual Property Rights Privacy and Confidentially of Information Legal Status of Online Transactions
  • 4. DIGITAL SIGNATURE ACT 1997 Why the Act exist: - Transactions conducted via internet increasing. - Identities and messages can falsified - Need purchaser and seller identity for the integrity of messages. - Removing doubt and possibility of fraud What the Act is about? - Provides for regulation of public key infrastructure. - Make digital signature legally valid and enforceable as traditional signature. COPYRIGHT (AMENDMENT) ACT 1997 Why the Act exists: - To protect expressions of thoughts and ideas from unauthorized copying alteration. - Creative expression is being captured and What the Amended Act is about? - Clear protection accorded to multimedia works. - Transmissions of copyright works over the Internet clearly amount to infringement. - Technological methods of ensuring works and authorship info are not altered or removed is protected.
  • 5. TELEMEDICINE ACT 1997 Why the Act exists: - Healthcare systems and providers around the world are becoming interconnected. - Unclear quality healthcare advice and consultation from specialist because doesn’t have truth value - To regulate practice of teleconsultations in medical profession. What the Act is about? - The Act provides that any registered doctor may practice “telemedicine” but other healthcare providers must first obtain a license to do so. COMPUTER CRIMES ACT 1997 Why the Act exists: - As computing becomes more central to people’s life and work, computers become both targets and tools of crime. - To ensure misuse of computers is offense. What the Act is about? - Offers to:* Enter or attempt into computers and computer systems without authorization. * Damage or alter data/information in computers or computer systems by planting viruses.
  • 6. COMMUNICATIONS AND MULTIMEDIA ACT 1998 Why the Act exist: - Convergence of technologies is driving convergence of telecommunication, broadcasting, computing and content. What the Act is about? - A restructuring of converged ICT industry. - Create and define a new system of licenses - Provide communication and multimedia services. - Provide the existence of the Communication and Multimedia Commission. POLICY OBJECTIVES OF CMA To regulate for the long-term benefit of the end user. To promote consumer confidence in service delivery. To ensure equitable provision of affordable services. To create a robust applications environment for the end user.
  • 7. WHY THE ELECTRONIC GOVERNMENT EXIST: Government is working on individual departmental projects rather than creating a general framework to take it forward There is strong belief in electronic government To control bloggers and prevent from spreading "disharmony, chaos, seditious material and lies" on websites Registering bloggers help prevent controversy in the government and help promote harmony in the country WHAT THE ELECTRONIC GOVERNMENT IS ABOUT? Electronic government is already in many departments; in fact, ahead of most of Europe are in electronic governance Electronic government needs to be more central steering, “The government isn't against it, but it certainly isn't championing it”. Ecommerce will radically reshape government over the next five years.
  • 8. ELECTRONIC GOVERNMENT DATABASES American Government Curriculum based reference database for government that includes daily UPI stories, annotated bibliographies, interactive topic exploration, and political commentary from Robert Novak and Bill Press. Facts on File Collection of databases on history, geography, science, and health. Includes career and curriculum resources as well as personal and business forms. FirstSearch Collection of fifteen databases including WorldCat, Medline, WilsonSelectPlus that provide both citations and full-text. WorldCat is the largest international database featuring more than 54 million items from the 50,000 plus OCLC member libraries. Edgar Database Database of searchable SEC filings such as annual and quarterly reports. Search by company name, SIC code, etc. Obtain mutual fund prospectuses, as well as archived information.
  • 9. INFORMATION TECHNOLOGY ACT 2000 Relate to electronic form which filing, issue, grant or payment effected Relate to manner and format which electronic records be filed, issued and method of payment of fee Relate to security procedure for purpose of creating secure electronic record and secure digital signature Relate to other standards observed by Controller of Certifying Authorities Relate to fee to be paid to Certifying Authority for issue of a Digital Signature Certificate Relate procedure for investigation of misbehavior or incapacity of Presiding Officer Relate to any other power of a civil court required to be prescribed Relate to any other matter which is required to be, or may be, prescribed. Relate to maintenance of database containing disclosure record of Certifying Authority Relate to conditions and restrictions subject which Controller may recognize any foreign
  • 10. THE INDUCE ACT Supported by Senate Judiciary Committee Chairman Orrin Hatch, R-Utah Make manufacturers of such software liable for inducing people to commit copyright infringement Consumer complained that the bill's language is too broad and could apply liability to legitimate technology Represent sides to propose own compromise in congressional session and are given tight deadline, according to condition of anonymity Necessary after a federal appeals court; manufacturer of file-sharing software of liability committed by customers was cleared
  • 11. REFERENCES Teacher’s handouts The Malaysian Cyber Laws Internet *www.fountaindale.lib.il.us/information/databases/governmentDB .htm *www.silicon.com/management/government/0,39024852,110027 86,00.htm *http://www.asianlaws.org/consultancy/setting_up.htm *http://www.digitaljournal.com/article/66510/Malaysian_Gov_t_L ooking_to_Quiet_Bloggers *http://www.asianlaws.org/cyberlaw/newsletter/issues/cl_nl_49.h tm *www.jagat.com.my/Cyberlawseries/consultancy.htm
  • 12. CONCLUSION Future Cyber Laws must recognizes the people development component-crucial for a K-Economy. The existing Cyber Laws created the necessary impact… but constant review is necessary. Technology innovations # Business innovations # “Criminal” innovations # Globalization An exclusive legislative process may shorten review cycle. Malaysian Government envisions to reinvent governance activities through e-Government projects and applications. Several test-beds are already in place to provide ICT which enabled solutions such as e-judiciary, e-passport and tele- healthcare.  Such e-applications inevitably come with legal impediments that would slow down the reinvention process unless they are properly addressed and solved.