SlideShare a Scribd company logo
There is no god but Allah, and Muhammad
is the messenger of Allah.
ELECTRONIC SURVEILLANCE AND
PRIVACY CONCERN IN MALAYSIA: A
QUEST FOR CONSENSUS
Md. Zubair Kasem Khan
LL.B (Hons.), MCL.
INTERNATIONAL ISLAMIC UNIVERSITY
MALAYSIA (IIUM).
E- Surveillance, Right to Privacy, Security
With the proliferation of digital technologies at the hands of individuals and the state, the tension
between security and privacy today has further escalated. The immense development of the
information and communications technologies is seen as important tool to help ensure national
security by way of electronic surveillance.
Electronic
Surveillance
Right to Privacy National
Security
What is Electronic Surveillance
‘Electronicsurveillance’connotesanykindofsecretorcloseobservationoverparticularlocation
oraperson,anditcouldbeconductedbyseveralelectronicformssuchasradiosurveillance,
radarsurveillance,Infraredsurveillance,visualsurveillance,aerialsurveillanceandultraviolet
surveillance
Electronic Tracking Devices to
monitor his specific physical
locations and whereabouts.
By way of tracing his Cellular
Phone-calls.
Installation of Video Cameras
by way of photographs,
detectives, robots
‘X-radiation’ that can be used to
peep inside containers or human
bodies without having direct
physical intervention.
Notion of Privacy
The abstraction on “privacy” decidedly becomes tricky for anyone simply
to understand what it is meant by and how far it covers.
According to Bloustein (1964 A.D.) & Khan
(2003 A.D.)- “Privacy is linked with human
personality in a way that, ‘autonomy, dignity and
integrity’ of an individual are depended,
influenced and protected by privacy”.
Westin (1967 A.D.) highlighted privacy as - human desire to expose
themselves, their attitudes and believes to others freely.
‘Privacy’ According to Scholars’ Perception
Privacy as the Form of Right to be Alone : by Warren
and Brandeis.
Privacy as the Form of Secrecy : by Richard Posner.
Privacy as a Form of Control over Personal
Information : by Charles Fried and Jerry Kang.
Privacy as an Aspect of Human Dignity : by L. Prosser
and E.J. Bloustein.
Privacy as the Form of Limited Access : by Gavison.
Connotation of National Security
“… one purpose, and one purpose
only, the Defence of the Realm.…”
[Lord Denning, 1963]
“…the words 'in the interests of
national security' are not capable of
legal or precise definition. The
circumstances are infinite in which
the national security may be
imperiled, not only by spies in
espionage but in all sorts of indefinite
ways….”[Hanks, Peter, 1988]
“…Security is a slippery concept. Its
meanings are multiple and without
clarity about which meaning is
intended (or understood); exactly what
is being provided and consumed, sold
and bought, promised or sought
remains. obscure….” [Lucia Zedner,
2003]
security as a form of assurance tallies
strongly with the proliferation of
community safety policies and private
security firms. What they sell is … a
form of assurance…Westec: ‘We are
not a security guard company: We sell
a concept of security”
E-Surveillance vis-à-vis Privacy Rights:
Chapter Malaysia.
Primary Legislations For Domestic Security
The Security Offences (Special
Measures) Act (“SOSMA”) 2012.
The Prevention of Crime
(Amendment and
Extension) Act (“PCA”) 2013.
Sec. 4(1)
Police
Can
Arrest
&
Detain
Without
Warrant
Sec. 4(6); 7(1 &
4): Attach
Electronic
Monitoring
Device For
Surveillance Of
The Suspected
Criminals.
Sec. 6 (1, 2 & 3):
Power To Intercept
Communication
Transmitted
Through Post,
Message Or
Telephonic
Conversation .
Sec. 7(1)(b) & 7A
(1): Electronic
Monitoring
Device Shall
Attached With
Released
Suspected
Criminals Body
Sec. 7B &
7C:
Establishmen
t Of A
Prevention
Of Crime
Board
Headed By
Chairman.
Sec. 4(10) Of The SOSMA 2012 : E-
Surveillance Shall Have Effect
Notwithstanding Anything Inconsistent
With Art. 5, 9 & Sec. 117 Of FCM &
CrPC.
Sec. 5(3) Of The SOSMA: Delay Of
Notifications Shall Have Effect
Notwithstanding Anything Inconsistent
With Art. 5 Of FCM.
Sec. 6(6) Of The SOSMA: The
Power Of The Police Officer Or
Public Prosecutor To Intercept
Communications Shall Have Effect
Notwithstanding Anything
Inconsistent With Art. 5 Of FCM .
Sec. 7(9) Of The SOSMA: Special
Procedures Relating To Electronic
Monitoring Device Shall Have Effect
Notwithstanding Anything
Inconsistent With Art. 9 Of FCM.
Violation of Constitutional Rights.
Before 2006:
Ignorance Of Privacy Rights In
Malaysia.
After 2006 and onwards:
Recognition 0f Privacy Rights In
Malaysia.
CONSENSUS BETWEEN E-SURVEILLANCE AND PRIVACY
RIGHT: VISUALIZING FUTURE DIRECTION
Firstly, Unnecessary Collection Of Information Over An
Individual By The Security Agency Or By Any Other Public Or
Private Authority Can Contravene Individual’s Privacy Right.
Secondly, Under S. 4(6&7) Of The Security Offences (Special
Measures) Act 2012, Any Possible Health-related Effect Needs To
Be Considered And Mitigated While attaching Electronic Device.
Thirdly, Under S. 7 And Schedule II Of The SOSMA 2012, The
Investigating Officers Are Given Unlimited Power To Track,
Monitor And Retain The Suspected Criminals’ Movement. There
Should Be A Clear Guideline On How These Will Be Monitored
So That The Purpose Of Putting This Electronic Device Could Be
Achieved Without Violating The Privacy Right.
Fourthly, By Virtue Of S. 4(9) Of The SOSMA 2012, It Is Noted
That There Is No Such Provision To Ensure The Confidentiality
Of This Personal Report. Some Certainty In This Aspect Is
Warranted Because The Officer Deals With Data In Electronic
Form, Which Is More Prone To Leak, Disclosure Or Security
Threats.
Last But Not Least, It Is Observed That There Is No Provision
That Confers A Suspected Crime Offender To Appeal Or Contest
The Ruling To Wear this Electronic Monitoring Device Or
Otherwise To Ask The Reason Why He Needs To Wear Such
Device.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.

More Related Content

What's hot

MPU21032 PERANAN SELAT MELAKA SEBAGAI GELANGGANG KEPELBAGAIAN
MPU21032 PERANAN SELAT MELAKA SEBAGAI GELANGGANG KEPELBAGAIANMPU21032 PERANAN SELAT MELAKA SEBAGAI GELANGGANG KEPELBAGAIAN
MPU21032 PERANAN SELAT MELAKA SEBAGAI GELANGGANG KEPELBAGAIAN
ahmadghazali20
 
LAND LAW - Pendaftaran Urusniaga
LAND LAW - Pendaftaran UrusniagaLAND LAW - Pendaftaran Urusniaga
LAND LAW - Pendaftaran Urusniaga
AmirulAfiq30
 
Sources of law - customary law part 2
Sources of law  - customary law part 2Sources of law  - customary law part 2
Sources of law - customary law part 2
xareejx
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Amaie Idarus
 
MALAYSIAN LEGAL SYSTEM Sources of law – subsidiary legislation
MALAYSIAN LEGAL SYSTEM Sources of law – subsidiary legislationMALAYSIAN LEGAL SYSTEM Sources of law – subsidiary legislation
MALAYSIAN LEGAL SYSTEM Sources of law – subsidiary legislation
xareejx
 
Tajuk 8 Penyahjajahan Dekolonisasi
Tajuk 8 Penyahjajahan DekolonisasiTajuk 8 Penyahjajahan Dekolonisasi
Tajuk 8 Penyahjajahan Dekolonisasi
Mahyuddin Khalid
 
Hubungan Etnik 2011 - Islam & Hubungan Etnik
Hubungan Etnik 2011 - Islam & Hubungan EtnikHubungan Etnik 2011 - Islam & Hubungan Etnik
Hubungan Etnik 2011 - Islam & Hubungan EtnikMahyuddin Khalid
 
Tort - Kacau ganggu (Nuisance)
Tort - Kacau ganggu (Nuisance)Tort - Kacau ganggu (Nuisance)
Tort - Kacau ganggu (Nuisance)
surrenderyourthrone
 
Topik 3 etika dlm masyarakat kepelbagaian
Topik 3 etika dlm masyarakat kepelbagaianTopik 3 etika dlm masyarakat kepelbagaian
Topik 3 etika dlm masyarakat kepelbagaian
SharifahNurAbu
 
Bab 2 potret hubungan etnik
Bab 2  potret hubungan etnikBab 2  potret hubungan etnik
Bab 2 potret hubungan etnik
INSTAQLIM
 
Bab 4 perlembagaan persekutuan
Bab 4 perlembagaan persekutuanBab 4 perlembagaan persekutuan
Bab 4 perlembagaan persekutuanINSTAQLIM
 
UiTM - Case Study Report (ENT300)
UiTM - Case Study Report (ENT300)UiTM - Case Study Report (ENT300)
UiTM - Case Study Report (ENT300)
UMAIRAH KHAIRI
 
Kerajaan Negeri Selangor v Sagong Tasi & Ors [2005] 6 MLJ 289
Kerajaan Negeri Selangor v Sagong Tasi & Ors [2005] 6 MLJ 289Kerajaan Negeri Selangor v Sagong Tasi & Ors [2005] 6 MLJ 289
Kerajaan Negeri Selangor v Sagong Tasi & Ors [2005] 6 MLJ 289
surrenderyourthrone
 
MALAYSIAN LEGAL SYSTEM Sources of law -- customary law
MALAYSIAN LEGAL SYSTEM Sources of law -- customary lawMALAYSIAN LEGAL SYSTEM Sources of law -- customary law
MALAYSIAN LEGAL SYSTEM Sources of law -- customary law
xareejx
 
lab report structure deflection of cantilever
lab report structure deflection of cantileverlab report structure deflection of cantilever
lab report structure deflection of cantilever
YASMINE HASLAN
 
Example Business Plan Presentation - Steamboat Leleh
Example Business Plan Presentation - Steamboat Leleh Example Business Plan Presentation - Steamboat Leleh
Example Business Plan Presentation - Steamboat Leleh
normaisarah71
 
JENIS PEMILIKAN PERNIAGAAN
JENIS PEMILIKAN PERNIAGAANJENIS PEMILIKAN PERNIAGAAN
JENIS PEMILIKAN PERNIAGAANZAFANA
 
Malaysian legal system
Malaysian legal systemMalaysian legal system
Malaysian legal system
نور الفاتحة
 
DPB2012 Lecture 6 - Social Media Marketing for Entrepreneurs
DPB2012 Lecture 6 - Social Media Marketing for EntrepreneursDPB2012 Lecture 6 - Social Media Marketing for Entrepreneurs
DPB2012 Lecture 6 - Social Media Marketing for Entrepreneurs
MOHD ZAINI ZAINUDIN
 
Soalan dan Jawapan - Hubungan Etnik (Kuiz/Past Year) 2
Soalan dan Jawapan - Hubungan Etnik (Kuiz/Past Year) 2Soalan dan Jawapan - Hubungan Etnik (Kuiz/Past Year) 2
Soalan dan Jawapan - Hubungan Etnik (Kuiz/Past Year) 2
surrenderyourthrone
 

What's hot (20)

MPU21032 PERANAN SELAT MELAKA SEBAGAI GELANGGANG KEPELBAGAIAN
MPU21032 PERANAN SELAT MELAKA SEBAGAI GELANGGANG KEPELBAGAIANMPU21032 PERANAN SELAT MELAKA SEBAGAI GELANGGANG KEPELBAGAIAN
MPU21032 PERANAN SELAT MELAKA SEBAGAI GELANGGANG KEPELBAGAIAN
 
LAND LAW - Pendaftaran Urusniaga
LAND LAW - Pendaftaran UrusniagaLAND LAW - Pendaftaran Urusniaga
LAND LAW - Pendaftaran Urusniaga
 
Sources of law - customary law part 2
Sources of law  - customary law part 2Sources of law  - customary law part 2
Sources of law - customary law part 2
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
MALAYSIAN LEGAL SYSTEM Sources of law – subsidiary legislation
MALAYSIAN LEGAL SYSTEM Sources of law – subsidiary legislationMALAYSIAN LEGAL SYSTEM Sources of law – subsidiary legislation
MALAYSIAN LEGAL SYSTEM Sources of law – subsidiary legislation
 
Tajuk 8 Penyahjajahan Dekolonisasi
Tajuk 8 Penyahjajahan DekolonisasiTajuk 8 Penyahjajahan Dekolonisasi
Tajuk 8 Penyahjajahan Dekolonisasi
 
Hubungan Etnik 2011 - Islam & Hubungan Etnik
Hubungan Etnik 2011 - Islam & Hubungan EtnikHubungan Etnik 2011 - Islam & Hubungan Etnik
Hubungan Etnik 2011 - Islam & Hubungan Etnik
 
Tort - Kacau ganggu (Nuisance)
Tort - Kacau ganggu (Nuisance)Tort - Kacau ganggu (Nuisance)
Tort - Kacau ganggu (Nuisance)
 
Topik 3 etika dlm masyarakat kepelbagaian
Topik 3 etika dlm masyarakat kepelbagaianTopik 3 etika dlm masyarakat kepelbagaian
Topik 3 etika dlm masyarakat kepelbagaian
 
Bab 2 potret hubungan etnik
Bab 2  potret hubungan etnikBab 2  potret hubungan etnik
Bab 2 potret hubungan etnik
 
Bab 4 perlembagaan persekutuan
Bab 4 perlembagaan persekutuanBab 4 perlembagaan persekutuan
Bab 4 perlembagaan persekutuan
 
UiTM - Case Study Report (ENT300)
UiTM - Case Study Report (ENT300)UiTM - Case Study Report (ENT300)
UiTM - Case Study Report (ENT300)
 
Kerajaan Negeri Selangor v Sagong Tasi & Ors [2005] 6 MLJ 289
Kerajaan Negeri Selangor v Sagong Tasi & Ors [2005] 6 MLJ 289Kerajaan Negeri Selangor v Sagong Tasi & Ors [2005] 6 MLJ 289
Kerajaan Negeri Selangor v Sagong Tasi & Ors [2005] 6 MLJ 289
 
MALAYSIAN LEGAL SYSTEM Sources of law -- customary law
MALAYSIAN LEGAL SYSTEM Sources of law -- customary lawMALAYSIAN LEGAL SYSTEM Sources of law -- customary law
MALAYSIAN LEGAL SYSTEM Sources of law -- customary law
 
lab report structure deflection of cantilever
lab report structure deflection of cantileverlab report structure deflection of cantilever
lab report structure deflection of cantilever
 
Example Business Plan Presentation - Steamboat Leleh
Example Business Plan Presentation - Steamboat Leleh Example Business Plan Presentation - Steamboat Leleh
Example Business Plan Presentation - Steamboat Leleh
 
JENIS PEMILIKAN PERNIAGAAN
JENIS PEMILIKAN PERNIAGAANJENIS PEMILIKAN PERNIAGAAN
JENIS PEMILIKAN PERNIAGAAN
 
Malaysian legal system
Malaysian legal systemMalaysian legal system
Malaysian legal system
 
DPB2012 Lecture 6 - Social Media Marketing for Entrepreneurs
DPB2012 Lecture 6 - Social Media Marketing for EntrepreneursDPB2012 Lecture 6 - Social Media Marketing for Entrepreneurs
DPB2012 Lecture 6 - Social Media Marketing for Entrepreneurs
 
Soalan dan Jawapan - Hubungan Etnik (Kuiz/Past Year) 2
Soalan dan Jawapan - Hubungan Etnik (Kuiz/Past Year) 2Soalan dan Jawapan - Hubungan Etnik (Kuiz/Past Year) 2
Soalan dan Jawapan - Hubungan Etnik (Kuiz/Past Year) 2
 

Viewers also liked

Electronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariahElectronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariah
International Islamic University Malaysia
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
Jacqueline Fick
 
About the computer
About the computerAbout the computer
About the computer
Aarifa Banu
 
Cell police - The Basics
Cell police - The BasicsCell police - The Basics
Cell police - The Basics
Cell Police
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyers
Klamberg
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
bhatiak997
 
Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social NetworkingJodi Gersh
 
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
Abdoulaye M Yansane
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacy
djtennant
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePoint
Ruben Pertusa Lopez
 
Browsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesBrowsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged Pictures
Davide Carboni
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
Klamberg
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement ppt
Yiwei Chen
 
Mobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudienceMobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your Audience
Purplegator
 
Google Geo APIs Overview
Google Geo APIs OverviewGoogle Geo APIs Overview
Google Geo APIs Overview
Ossama Alami
 
Aliens
AliensAliens
Aliens
panjjandrum
 
Ib geo skills overview
Ib geo skills overviewIb geo skills overview
Ib geo skills overview
Tom McLean
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
Klamberg
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
Arthit Suriyawongkul
 
India electronic security market report 2020 |India CCTV Market |India Video...
India electronic security market report  2020 |India CCTV Market |India Video...India electronic security market report  2020 |India CCTV Market |India Video...
India electronic security market report 2020 |India CCTV Market |India Video...
Ken Research Pvt ltd.
 

Viewers also liked (20)

Electronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariahElectronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariah
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
About the computer
About the computerAbout the computer
About the computer
 
Cell police - The Basics
Cell police - The BasicsCell police - The Basics
Cell police - The Basics
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyers
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
 
Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social Networking
 
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacy
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePoint
 
Browsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesBrowsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged Pictures
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement ppt
 
Mobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudienceMobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your Audience
 
Google Geo APIs Overview
Google Geo APIs OverviewGoogle Geo APIs Overview
Google Geo APIs Overview
 
Aliens
AliensAliens
Aliens
 
Ib geo skills overview
Ib geo skills overviewIb geo skills overview
Ib geo skills overview
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
India electronic security market report 2020 |India CCTV Market |India Video...
India electronic security market report  2020 |India CCTV Market |India Video...India electronic security market report  2020 |India CCTV Market |India Video...
India electronic security market report 2020 |India CCTV Market |India Video...
 

Similar to Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.

Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
International Islamic University Malaysia
 
Outline D
Outline DOutline D
Outline D
butest
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
M S Siddiqui
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
Tam Nguyen
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
iosrjce
 
E017242431
E017242431E017242431
E017242431
IOSR Journals
 
Online Safety and Security
Online Safety and SecurityOnline Safety and Security
Online Safety and Security
PaulFajardo7
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
Info_Studies_Aberystwyth
 
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
London Metropolitan - UK
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
IRJET Journal
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
anthony4web
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
RAVIKUMAR Digital Signal Processing
 
ONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITYONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITY
PaulFajardo7
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
kevinwetzel
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
Megan Espinoza
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Dharani Adusumalli
 

Similar to Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus. (20)

Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
 
Outline D
Outline DOutline D
Outline D
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
 
E017242431
E017242431E017242431
E017242431
 
Online Safety and Security
Online Safety and SecurityOnline Safety and Security
Online Safety and Security
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
ONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITYONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITY
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 

More from International Islamic University Malaysia

OSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal researchOSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal research
International Islamic University Malaysia
 
Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.
International Islamic University Malaysia
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
International Islamic University Malaysia
 
Air-Space Law
Air-Space LawAir-Space Law
Treaties And Its Nuts and Bolts
Treaties And Its Nuts and BoltsTreaties And Its Nuts and Bolts
Treaties And Its Nuts and Bolts
International Islamic University Malaysia
 
Diplomatic Immunities
Diplomatic ImmunitiesDiplomatic Immunities
Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)
International Islamic University Malaysia
 
The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)
International Islamic University Malaysia
 
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
International Islamic University Malaysia
 
Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).
International Islamic University Malaysia
 
Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.
International Islamic University Malaysia
 
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
International Islamic University Malaysia
 
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
International Islamic University Malaysia
 
Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...
International Islamic University Malaysia
 

More from International Islamic University Malaysia (14)

OSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal researchOSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal research
 
Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Air-Space Law
Air-Space LawAir-Space Law
Air-Space Law
 
Treaties And Its Nuts and Bolts
Treaties And Its Nuts and BoltsTreaties And Its Nuts and Bolts
Treaties And Its Nuts and Bolts
 
Diplomatic Immunities
Diplomatic ImmunitiesDiplomatic Immunities
Diplomatic Immunities
 
Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)
 
The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)
 
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
 
Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).
 
Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.
 
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
 
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
 
Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...
 

Recently uploaded

The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 

Recently uploaded (20)

The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 

Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.

  • 1. There is no god but Allah, and Muhammad is the messenger of Allah. ELECTRONIC SURVEILLANCE AND PRIVACY CONCERN IN MALAYSIA: A QUEST FOR CONSENSUS Md. Zubair Kasem Khan LL.B (Hons.), MCL. INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM).
  • 2. E- Surveillance, Right to Privacy, Security With the proliferation of digital technologies at the hands of individuals and the state, the tension between security and privacy today has further escalated. The immense development of the information and communications technologies is seen as important tool to help ensure national security by way of electronic surveillance. Electronic Surveillance Right to Privacy National Security
  • 3. What is Electronic Surveillance ‘Electronicsurveillance’connotesanykindofsecretorcloseobservationoverparticularlocation oraperson,anditcouldbeconductedbyseveralelectronicformssuchasradiosurveillance, radarsurveillance,Infraredsurveillance,visualsurveillance,aerialsurveillanceandultraviolet surveillance Electronic Tracking Devices to monitor his specific physical locations and whereabouts. By way of tracing his Cellular Phone-calls. Installation of Video Cameras by way of photographs, detectives, robots ‘X-radiation’ that can be used to peep inside containers or human bodies without having direct physical intervention.
  • 4. Notion of Privacy The abstraction on “privacy” decidedly becomes tricky for anyone simply to understand what it is meant by and how far it covers. According to Bloustein (1964 A.D.) & Khan (2003 A.D.)- “Privacy is linked with human personality in a way that, ‘autonomy, dignity and integrity’ of an individual are depended, influenced and protected by privacy”. Westin (1967 A.D.) highlighted privacy as - human desire to expose themselves, their attitudes and believes to others freely.
  • 5. ‘Privacy’ According to Scholars’ Perception Privacy as the Form of Right to be Alone : by Warren and Brandeis. Privacy as the Form of Secrecy : by Richard Posner. Privacy as a Form of Control over Personal Information : by Charles Fried and Jerry Kang. Privacy as an Aspect of Human Dignity : by L. Prosser and E.J. Bloustein. Privacy as the Form of Limited Access : by Gavison.
  • 6. Connotation of National Security “… one purpose, and one purpose only, the Defence of the Realm.…” [Lord Denning, 1963] “…the words 'in the interests of national security' are not capable of legal or precise definition. The circumstances are infinite in which the national security may be imperiled, not only by spies in espionage but in all sorts of indefinite ways….”[Hanks, Peter, 1988] “…Security is a slippery concept. Its meanings are multiple and without clarity about which meaning is intended (or understood); exactly what is being provided and consumed, sold and bought, promised or sought remains. obscure….” [Lucia Zedner, 2003] security as a form of assurance tallies strongly with the proliferation of community safety policies and private security firms. What they sell is … a form of assurance…Westec: ‘We are not a security guard company: We sell a concept of security”
  • 7. E-Surveillance vis-à-vis Privacy Rights: Chapter Malaysia. Primary Legislations For Domestic Security The Security Offences (Special Measures) Act (“SOSMA”) 2012. The Prevention of Crime (Amendment and Extension) Act (“PCA”) 2013. Sec. 4(1) Police Can Arrest & Detain Without Warrant Sec. 4(6); 7(1 & 4): Attach Electronic Monitoring Device For Surveillance Of The Suspected Criminals. Sec. 6 (1, 2 & 3): Power To Intercept Communication Transmitted Through Post, Message Or Telephonic Conversation . Sec. 7(1)(b) & 7A (1): Electronic Monitoring Device Shall Attached With Released Suspected Criminals Body Sec. 7B & 7C: Establishmen t Of A Prevention Of Crime Board Headed By Chairman.
  • 8. Sec. 4(10) Of The SOSMA 2012 : E- Surveillance Shall Have Effect Notwithstanding Anything Inconsistent With Art. 5, 9 & Sec. 117 Of FCM & CrPC. Sec. 5(3) Of The SOSMA: Delay Of Notifications Shall Have Effect Notwithstanding Anything Inconsistent With Art. 5 Of FCM. Sec. 6(6) Of The SOSMA: The Power Of The Police Officer Or Public Prosecutor To Intercept Communications Shall Have Effect Notwithstanding Anything Inconsistent With Art. 5 Of FCM . Sec. 7(9) Of The SOSMA: Special Procedures Relating To Electronic Monitoring Device Shall Have Effect Notwithstanding Anything Inconsistent With Art. 9 Of FCM. Violation of Constitutional Rights.
  • 9. Before 2006: Ignorance Of Privacy Rights In Malaysia. After 2006 and onwards: Recognition 0f Privacy Rights In Malaysia.
  • 10. CONSENSUS BETWEEN E-SURVEILLANCE AND PRIVACY RIGHT: VISUALIZING FUTURE DIRECTION Firstly, Unnecessary Collection Of Information Over An Individual By The Security Agency Or By Any Other Public Or Private Authority Can Contravene Individual’s Privacy Right. Secondly, Under S. 4(6&7) Of The Security Offences (Special Measures) Act 2012, Any Possible Health-related Effect Needs To Be Considered And Mitigated While attaching Electronic Device. Thirdly, Under S. 7 And Schedule II Of The SOSMA 2012, The Investigating Officers Are Given Unlimited Power To Track, Monitor And Retain The Suspected Criminals’ Movement. There Should Be A Clear Guideline On How These Will Be Monitored So That The Purpose Of Putting This Electronic Device Could Be Achieved Without Violating The Privacy Right. Fourthly, By Virtue Of S. 4(9) Of The SOSMA 2012, It Is Noted That There Is No Such Provision To Ensure The Confidentiality Of This Personal Report. Some Certainty In This Aspect Is Warranted Because The Officer Deals With Data In Electronic Form, Which Is More Prone To Leak, Disclosure Or Security Threats. Last But Not Least, It Is Observed That There Is No Provision That Confers A Suspected Crime Offender To Appeal Or Contest The Ruling To Wear this Electronic Monitoring Device Or Otherwise To Ask The Reason Why He Needs To Wear Such Device.