This document is a learning module on cyber law from the Ministry of Education Malaysia. It discusses the need for cyber law to protect internet users and communications. Specifically, it outlines (a) learning outcomes on describing the need for cyber law, (b) knowledge on internet communication forms, and (c) a module summary on understanding cyber law's importance. The module contains activities for discussing reasons cyber law is needed, like protecting privacy, security, and intellectual property rights online. It also describes Malaysia's existing cyber laws and those being drafted.
In this topic we discuss detail about what is law.what is cyber law.and what reasons behind this to ask cyber law and some punishment against cyber crime.
In this topic we discuss detail about what is law.what is cyber law.and what reasons behind this to ask cyber law and some punishment against cyber crime.
This slide is a guide to the Cyber Law regime in India. It covers up the IT Act 200 in a simple childish approach.
Shankey Gupta
Advocate
Cyber Law & Forensic Consultant.
www.shivamgupta.com
This slide is a guide to the Cyber Law regime in India. It covers up the IT Act 200 in a simple childish approach.
Shankey Gupta
Advocate
Cyber Law & Forensic Consultant.
www.shivamgupta.com
Data Protection: balancing convenience, privacy and securityEthical Sector
Myanmar Government’s policy and plans on data protection, transfer and storage
Presentation at Myanmar Digital Rights Forum 2019
Read more: https://www.myanmar-responsiblebusiness.org/news/digital-rights-forum-2019-report.html
CYBER POLICY & CYBER LAWS , DEFINITION,, VARIOUS TYPES OF CYBER CRIME , SECTIONS, OFFENCES UNDER OTHER LEGISLATION, NATIONAL CYBER SECURITY POLICY, CYBER CRIME SCENARIO IN INDIA IT ACT.
Cyber Security is a crucial and rising part of concern in the present age with a rapid increase in the graph of digitization. And with an increase in the activities in cyberspace, there is also an increase in the cyber-crimes. Handling the huge volumes of data with security has become an inevitable need of the hour. Antivirus software, Firewalls, and other technological solutions help to secure this data but are not sufficient enough to prevent the cybercrooks from destructing the network and stealing confidential information. This paper mainly focuses on the issues and challenges faced by cybersecurity. It also discusses the risks, cybersecurity techniques to curb cyber-crime, cyber ethics, and cyber trends.
What is Cyber Security, principles of cyber security, need for cyber security, what is cyber attack, types of cyber attack, elements of cyber security, tools for cyber security ,cyber security laws in India, case studies related to cyber security, conclusion
1. KEMENTERIAN PELAJARAN MALAYSIA
Self Access Learning Module
ICT Literacy for
Secondary School
Programme
NETWORKS AND THE INTERNET
Cyber Law
PUSAT PERKEMBANGAN KURIKULUM
KEMENTERIAN PELAJARAN MALAYSIA
2. ICTL for Secondary School - Networks and The Internet Module
MODULE 4
Cyber Law
Curriculum Development Centre
Ministry of Education Malaysia
2
3. ICTL for Secondary School - Networks and The Internet Module
1. Name of Module : Cyber Law
2. Learning Outcomes : The students should be able to:
a. describe the need for cyber law
3. Knowledge and Skills :
a. Internet.
b. various forms of communication on the internet.
4. Module Summary : At the end of the module, the student is able to
a. describe the need to understand cyber law.
This module contains two activities:
Activity : Discussion on the reasons needed for cyber law.
3
4. ICTL for Secondary School - Networks and The Internet Module
Activity : Discussion On Reasons For The Need Of Cyber Law
What is Cyber Law?
Cyber law refers to any laws relating to protecting the Internet and other online
communication technologies.
The Cyber Law Acts In Malaysia
The Malaysian Government has already passed several cyber laws to control and reduce
Internet abuse.
These cyber laws include:
• Digital Signature Act 1997
• Computer Crimes Act 1997
• Telemedicine Act 1997
• Communications and Multimedia Act 1998
Beside these cyber laws, there are three other cyber laws being drafted.
• Private Data Protection Bill
• Electronic Government Activities Bill
• Electronic Transactions Bill
Digital Signature Act 1997
Digital Signature is an identity verification standard that uses
encryption techniques to protect against e-mail forgery. The
encrypted code consists of the user’s name and a hash of all the
parts of the message.
By attaching the digital signature, one can ensure that nobody can
eavesdrop, intercept or temper with transmitted data.
Computer Crimes Act 1997
Gives protection against the misuse of computers and computer
criminal activities such as unauthorised use of programmes, illegal
transmission of data or messages over computers, hacking and
cracking of computer systems and networks.
Users can protect their rights to privacy and build trust in the
computer system.
The government can have control at a certain level over cyberspace to reduce cyber crime
activities.
4
5. ICTL for Secondary School - Networks and The Internet Module
Telemedicine Act 1997
The Telemedicine Act 1997 ensures that only qualified medical
practitioners can practice telemedicine and that their patient's rights
and interests are protected.
This act provides future development and delivery of healthcare in
Malaysia.
Communications And Multimedia Act 1998
The implementation of Communication and Telecommunication Act
1998 ensures that information is secure, the network is reliable and
affordable all over Malaysia.
Needs for Cyber Law
Integrity and Security Security of
of Information Government Data
CYBER LAW
Legal Status of Online Intellectual Property
Transactions Rights
Privacy and Confidentially
of Information
Examples of Cyber abuse on the users
• sending a computer virus via e-mail
• hacking into your school’s database to change your examination
results.
• selling pirated software in a night market
5
6. ICTL for Secondary School - Networks and The Internet Module
Worksheet :
Write a short essay on the need of cyber law
6
7. ICTL for Secondary School - Networks and The Internet Module
Reference
Cashman, S. (2006) Discovering Computers 2006. USA : Thomson Course Technology.
Ibrahim Ahmad, Mohd Hafiz et al (2007) Information and Communication Technology (ICT)
Based on SPM Syllabus. Selangor: Venton Publishing (M) Sdn Bhd.
CD courseware ICT, Pusat Perkembangan Kurikulum. KPM
http://www.wikipedia.org
http://images.search.yahoo.com
http://www.google.com.my
7