SlideShare a Scribd company logo
1 of 7
CYBER LAW
FATIN AFIFAH BINTI ADENAN
2 AL-FARABI
What is Cyber Law?
› Cyber law is any law that applies to the internet
and internet-related technologies
› Cyber law provides legal protections to people
using the internet
› Cyber Law has also been referred to as the "law
of the internet."
Cyber Law Acts in Malaysia
› Digital signature Act 1997
› Telemedicine Act 1997
› Communication and Multimedia Act
1998
› Computer Crimes Act 1997
Needs of Cyber Law
● Intergrity and security of information
● Security of goverment data
● Intellectual property right
● Privacy and confidental of information
● Legal status of online transactions
Examples of Cyber Abuse on the
Users
› Flaming – flaming is a very hostile and rude type of
cyberbullying examples where the bully uses vulgar
and abusive language with the intention of starting a
fight with the victim.
› Password theft – some bullies will do everything
possible to gain the passwords of a teenager
illegally. After gaining these passwords, the bully
enters the victim’s sites and locks them out. In some
cases, the bully will use these sites to bully others.
› Cyber stalking – cyber stalking can be described as the
obsessive sending of messages to a person. This
eventually frightens and worries the person receiving these
messages, as they will begin to question their own safety
and well-being.
› Degradation/humiliation – bullies will use cyber bullying
to spread rumors and hearsay with the purpose of
damaging the victim’s reputation to ensure that they are
shunned.
› Impersonating – impersonation is the act of taking on a
false identity for the purpose of tormenting a person and
damaging their reputation. Impersonation can also be
acted out by pretending to be the victim by creating a false
identity or profile.
› Impersonating – impersonation is the act of taking
on a false identity for the purpose of tormenting a
person and damaging their reputation.
Impersonation can also be acted out by pretending
to be the victim by creating a false identity or profile.
› Website creation – bullies can create websites and
pages and fill them with insulting statements and
remarks for the sole purpose of tormenting and
humiliating a person.

More Related Content

What's hot

Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
Hasani Jaali
 
Mba seminar presentation
Mba seminar presentationMba seminar presentation
Mba seminar presentation
Tanveer Ahmed
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
Kudakwashe Shamu
 

What's hot (14)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
IT Digital Citizenship
IT Digital CitizenshipIT Digital Citizenship
IT Digital Citizenship
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Information Security: "Myths & Realities"
Information Security: "Myths & Realities"Information Security: "Myths & Realities"
Information Security: "Myths & Realities"
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Mba seminar presentation
Mba seminar presentationMba seminar presentation
Mba seminar presentation
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
 

Similar to Cyber law

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 

Similar to Cyber law (20)

E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber safety
Cyber  safetyCyber  safety
Cyber safety
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Cyber law

  • 1. CYBER LAW FATIN AFIFAH BINTI ADENAN 2 AL-FARABI
  • 2. What is Cyber Law? › Cyber law is any law that applies to the internet and internet-related technologies › Cyber law provides legal protections to people using the internet › Cyber Law has also been referred to as the "law of the internet."
  • 3. Cyber Law Acts in Malaysia › Digital signature Act 1997 › Telemedicine Act 1997 › Communication and Multimedia Act 1998 › Computer Crimes Act 1997
  • 4. Needs of Cyber Law ● Intergrity and security of information ● Security of goverment data ● Intellectual property right ● Privacy and confidental of information ● Legal status of online transactions
  • 5. Examples of Cyber Abuse on the Users › Flaming – flaming is a very hostile and rude type of cyberbullying examples where the bully uses vulgar and abusive language with the intention of starting a fight with the victim. › Password theft – some bullies will do everything possible to gain the passwords of a teenager illegally. After gaining these passwords, the bully enters the victim’s sites and locks them out. In some cases, the bully will use these sites to bully others.
  • 6. › Cyber stalking – cyber stalking can be described as the obsessive sending of messages to a person. This eventually frightens and worries the person receiving these messages, as they will begin to question their own safety and well-being. › Degradation/humiliation – bullies will use cyber bullying to spread rumors and hearsay with the purpose of damaging the victim’s reputation to ensure that they are shunned. › Impersonating – impersonation is the act of taking on a false identity for the purpose of tormenting a person and damaging their reputation. Impersonation can also be acted out by pretending to be the victim by creating a false identity or profile.
  • 7. › Impersonating – impersonation is the act of taking on a false identity for the purpose of tormenting a person and damaging their reputation. Impersonation can also be acted out by pretending to be the victim by creating a false identity or profile. › Website creation – bullies can create websites and pages and fill them with insulting statements and remarks for the sole purpose of tormenting and humiliating a person.