SlideShare a Scribd company logo
Prepared By…
Md. Zubair Kasem Khan.
G1110969.
Master of Comparative Laws(MCL)
International Islamic University Malaysia.
Subject: Islamic Jurisprudence.
1
 Introduction
 Background of the Seminar
 Issues of This Seminar
 Privacy In General Point of Views
 Privacy In SharīʿahPoint of Views
 Dalīl From Qur’ān,
 Dalīl From Sunnah,
 Opinions of Different Scholars (Ijtihād)
 Reconciliation Between Individual Privacy & National
Security in the Form of Electronic Surveillance.
 Conclusion.
2
With the proliferation of digital technologies at the
hands of individuals and the state, the tension between
security and privacy today has further escalated. The
immense development of the information and
communications technologies is seen as important tool to
help ensure National Security by way of Electronic
surveillance.
The latest Edward Snowden vis a vis the US
Government saga can only confirm that: Electronic
Surveillance Conducted By The State Over Individuals Has
Entered A Truly Worrying Level Nowadays. 3
The newly adopted Security Offences (Special
Measures) Act 2012 (“SOSMA”) and the amended
Prevention of Crime Act 2013 (”PCA”) have raised new
controversies relating to constitutional and privacy issues in
Malaysia, by allowing the police to impose electronic
monitoring as well as other types of technologically-aided
surveillance over the suspected or arrested criminals. To
illustrate, Sec-4(6) of SOSMA states-
“. . .If the police Officer is of view that . . . an electronic
monitoring device may be attached on the person . . . For
the purpose of investigation. . .”
4
Sec- 6(1) of the same act says that-
“. . . Notwithstanding. . . the Public Prosecutor. . .may
authorize any police officer-
a. to intercept, detain and open any postal article;
b. to intercept any massage transmitted or received by
any communication;
c. to intercept or listen to any conversation by any
communication. . .”
This processing of personal data by the security
officers through surveillance intersects with a very basic
notion of individuals’ data privacy which is protected by the
Sharīʿah. 5
Today’s Seminar is a part of an ongoing fresh debate
between security measures of Electronic Surveillance and
the emergence of Right To Privacy In Malaysia.
Through analysis of recent legislation and case laws,
this outlines the emergence of two potentially conflicting
legal developments in Malaysia regarding data privacy.
However, today we will have a crucial scrutiny about
Legitimacy of the following questions in the Sharīʿah
Point Of Views….
6
The questions are-
(i) What is the Stand Of Sharīʿah in the issue of
Individual Privacy Rights?
(ii) To What Extent this Privacy Rights can be
Compromised on the ground of national security in
Sharīʿah Point Of View?
(iii) What would be the Suggested Roadmap for further
Reconciling the need to national security with the
Individual Right To Privacy?
7
The abstraction on “privacy” decidedly becomes tricky
for anyone simply to understand what it is meant by and how
far it covers.
The origin of the word ‘privacy’ is still vague to the
majority of the scholars, albeit some exponents think that,
its root is very similar with other words like ‘privation’ and
‘deprivation’, which denote ‘not to be involved in public
matters or episodes’.
According to Bloustein (1964 A.D.) & Khan (2003
A.D.)- privacy is linked with human personality in a way
that, ‘autonomy, dignity and integrity’ of an individual
are depended, influenced and protected by privacy.
8
Westin (1967 A.D.) highlighted privacy as - human
desire to expose themselves, their attitudes and believes
to others freely.
However, the most accepted connotation on privacy
had been expressed by Warren and Brandeis (1890 A.D.)
as- Right To Be Alone, wherein ‘rights’ is referred to an
individual’s right to decide the limits of communication of
his- “thoughts, sentiments, and emotions to others”.
There are some different leitmotifs or unifying ideas that
have raised in dissimilar scholarly writings while
conceptualizing privacy which are-
9
 Privacy as the Form of Secrecy: by
Richard Posner.
 Privacy as a Form of Control over
Personal Information: by Charles Fried
and Jerry Kang.
 Privacy as an Aspect of Human Dignity:
by L. Prosser and E.J. Bloustein.
 Privacy as the Form of Limited Access: by
Gavison.
 Privacy as the Form of right to be alone:
by Warren and Brandeis. 10
11
So….. What is the difference between Human Being &
Animal …..???
Forthrightly speaking, the appellation ‘Privacy’ is
neither ingrained directly in the Holy Qur’ān nor in the
Sunnah of the Prophet Muḥammad, nor even stated firmly in
the Islamic Jurisprudence (uṣūl al-ƒiqh).
Notwithstanding, it does not confer that, Islam does
not value individual privacy or there is no space for privacy
rights for a person, as a human being.
In Islam, the individual privacy is considered as the
part and parcel of his dignity in family, society or state levels
which has been shielded by the Sharīʿah. 12
This can be testified to the verse of the Holy Qur’ān
where Allah lifted human dignity over other brute creations
by affirming that-
“… We have bestowed dignity (blessings) on the
children of Adam… and conferred on them special
favours, above a great part of our Creation….” (al- Isrā’,
17:70).
In this verse of Qur’ān, bestowing dignity upon
mankind is inherent, intrinsic in nature and not conceded by
any sovereign political power or authority and thus cannot be
withdrawn by any authority for any lame excuse. 13
Allah, the supreme and true Law-Giver, strongly
prohibits this kind of bad deeds, that provokes someone for
downgrading other’s dignity of a man by the following āyah
of Sūra al-Ḥujurāt-
“… O you who believe! Let no man mock another man,
who may perhaps be better than himself. Let no
woman mock another woman, who may perhaps be
better than herself. Do not defame one another, nor
call one another by nicknames. It is an evil thing to
be called by a bad name after embracing the true
faith….” (al-Ḥujurāt, 49:11). 14
Furthermore, human dignity in Islam, is an attested,
confirmed and established right of every individual heedless of
any discriminations which a person succeeds during the time of
his/her birth as a human being.
Sayyid Quṭb also showed a similar view of importance of
human dignity of a person by saying that- “Dignity is therefore
the absolute right of everyone”.
Therefore the momentous face of Islam that distinguish
from other religions is, the assurance of human dignity given to all
human beings regardless of status (Muslim or non-Muslim),
quality (devout or impious) or condition (famous or notorious) of
a person in the reckon of the society. Even, as a criminal, a person
should not be undignified and thus the endeavor of executing
punishment to a criminal is for retribution or reformation and not
affrontation or humiliation. 15
This can also be evident from a Ḥadīth of the Prophet, quoted
by numerous scholars where Prophet Muḥammad (p.bu.h)
beheld a funeral of a deceased person passing by and He
started showing respect to that death person and remained
standing until a companion told Him that, this funeral was
not for a Muslim but for a Jew.
Upon auditioned the companion’s remark, the Prophet
rebuked a counter question saying that-
“Was he not a human being?”
16
In Islam, the notion of ‘Privacy’ and its sphere in our
life is very widespread which cover all aspects of privacy like-
sanctity at home, private correspondence, intimate
conversation, privacy in working affairs, individual financial
affairs and so on.
In fact, all kinds of fundamental rights what the
western jurists denoted and resoluted in the last century, had
already been enthusiastically cherished and guaranteed
fourteen-hundred years back through Prophet Muḥammad
(p.b.u.h) in the primary sources (the Qur’ān & the Sunnah) of
Sharīʿah.
17
 Islam always gives high priority in conserving human
dignity by buttressing privacy in private dwellings. Allah
addresses the believers in the Qur’ān in this regards as-
 “… O you who believe! Do not enter houses other than
your own, until you have asked permission and
saluted those in them: that is best for you, in order
that you may heed (what is seemly). If you find no one
in the house, enter not until permission is given to
you; if you are asked to go back, go back: that makes
for greeter purity for yourselves: and Allah knows well
all that you do….” (al-Nūr, 24:27-29). 18
Moreover, whenever a person has obtained permission
to embark on a house, it is indispensable to enter thereto
from the appropriate door. In other words, Islam does not
allow any person to enter into another house by crossing the
wall or in a way that is not legitimate for him to enter into
that dwelling. The Qur’ān asserts that-
“… Righteousness does not consist in entering your
dwellings from the back. The righteous man is he that
fears Allah. Enter your dwellings by their doors and
fear Allah, so that you may prosper….” (al- Baqarah, 2:
189). 19
Even in the Qur’ān, Allah Sub’hana Ta’ala secures household
privacy for every people within their family members and ordain
that three times are not allowed for anyone to enter their masters
private room without taking prior explicit permission. The Qur’ān
thus apostrophize to the believers-
“… O ye who believe! Let those whom your right hands
possess (that is: servants and captives), and the (children)
among you who have not come of age ask your permission
(before they come to your presence), on three occasions:
before morning prayer; the while ye doff your clothes for
the noonday heat; and after the late night prayer: these are
your three times of privacy: outside those times it is not
wrong for you or for them to move about attending to each
other: Thus does Allah make clear the Signs to you: for
Allah is full of knowledge and wisdom….” (al- Nūr, 24:58). 20
Furthermore, Prophet’s stand was very strict in assuring
this right to privacy more specifically in household matters.
Numerous Ḥadīth of the Propher narrated by different Islamic
jurists that articulate the importance of obtaining permission
from the dweller prior to enter the house.
This had been reflected in a Ḥadīth where Prophet
Muḥammad (p.b.u.h) advised to his believers that- “Asking
for permission (Isti’nās) is [allowed up to] three times. If
it is not granted to you, you must return”. In another
Ḥadīth, Prophet (p.b.u.h) stated that- “Greetings (taslīm)
precedes conversation”
(Muslim, Mukhtaṣar Ṣaḥīḥ Muslim, Ḥadīth No. 1421) 21
If we consider the former Ḥadīth en-masse with the later one,
we can see that, two cardinal requirements- Isti’nās
(seeking permission) and taslīm (greeting) of
familiarization can been seen, that also had been mentioned
earlier in the Sūṙa al-Nūr, āyah: 27-29, by expressing- “hatta
tasta’nis ” which has been expounded as- “unless you have
obtained permission” or “until you have made sure that your
presence is welcomed by the dweller” by different scholars.
The precepts of Sharīʿahconcerning individual privacy
rights, however, do not only confined to his/her house, but
also cater similar privacy in private cars, boats, caravans and
cubicle compartment of a public offices etc.
22
In Islamic point of view, personal or confidential information of
an individual should not be thrashed out or divulged by other
without obtaining deliberate consent of the person, regardless of
the authenticity of the information. This rule can also be applied
over a private correspondence of an institution where he/she is
holding some confidential information by designation. This is
outlined based on the injunction of the holy Qur’ān where Allah
enjoined His believers-
“… O ye who believe! Avoid suspicion as much (as possible):
for suspicion is some cases is a sin (crime). Do not spy on
each other, nor speak ill of each other behind their backs.
Would any of you like to eat the flesh of his dead brother?
Surely you would loathe it. Have fear of Allah. He is
forgiving and most Merciful….” (al-Ḥujurāt, 49:12). 23
Prophet Muḥammad (p.b.u.h.)also admonishes His followers
not to show unnecessary suspicion over a person. He further
advise people, which narrated by Abu Hurayrah that-
“… Avoid suspicion, for suspicion is the gravest lie in
talk and do not be inquisitive about one another and
do not spy upon one another and do not feel envy with
the other, and nurse no malice, and nurse no aversion
and hostility against one another. And be fellow-
brothers and servants of Allah….”
(Muslim, Ṣaḥīḥ Muslim, Kitāb al-Birr was-Ṣālat-I-wa'l-
Adab, Ḥadīth No. 6214.) 24
In Islam, the privacy in information is highly protected and it
is not permitted by a person or an authority to know others
personal information which he or they are not required to
know.
It is because, any means of information such as- by post, fax
or e-mail, are considered as deposits (wādī’aḥ) from the side
of sender as well as the legitimate receiver. The messenger of
Allah further warned the believer of Allah as-
“… One who looks into the letter of his brother
without his permission, is like looking into the fire of
the Hell….”
(Al-Suyūṭī, al-Jāmīʿal-Ṣaghir, at 165. See also: al-Maqdisī, al-
Âdāb al-Sharʿiyyah, Vol. II at 166.) 25
The term ‘Electronic Surveillance’ does not have any trace in
any of the Qur’ānic verse or Ḥadīth of the Prophet
Muḥammad (p.b.u.h.), nor any Sharīʿahprinciple that confer
rules exclusively of it. The ratiocination behind this is, during
Prophet Muḥammad (p.b.u.h), the technology did not reach
up to that à la mode and up to date level what today’s
generation are in.
Notwithstanding, it does not betoken that Sharīʿahwas
totally unaware or does not have any ruling about it when it
agitates a controversy for the violation of individual privacy
right. 26
In Sharīʿah, there is a term “tajassus” found in the Qur’ān
and Ḥadīth of the Prophet Muḥammad (p.b.u.h.) which
literally means- ‘curiosity’, ‘the state of being excited to
know someone’s private matters’ or ‘looking secretly
about others’ fault’.
This term is used in the primary sources of Sharīʿahto
convey the mischievous effects of spying against an
individual or a country, which is strongly forbidden.
“Tajassus” includes any kinds of conspiracy for the purpose
of listening or watching someone’s conversation or activities
without getting prior consent of that person which may
further degrade individual’s dignity. 27
According to Mohammad Hashim Kamali, by using
the words “wa lā tajassasū” in the Sura: al-Ḥujurāt, āyah- 12,
Allah Sub’hana Ta’ala absolutely and unfetteredly proscribed
all kinds of spying regardless of background aspiration of
conducting this.
This direction of prohibiting spying does not only
confined to the private premises, but also outlawed
government to do so by means of wiretapping, spying at
night secretly, eavesdropping, fitting CCTV in the public
places and introducing electronic monitoring devices and so
on . 28
Even the Muḥtasib, who is in charge of ensuring ḥisbah (i.e.
adherence of goodness and forbiddance of evil) in a Islamic State, is not
allowed to do spying with the intention of controlling crime.
Some ʿulamāopined that, Muḥtasib who act as an inspector in
the governmental agencies must take action against any undue exertions
based on what he has found on the spot by direct observations, and not
by applying any methods of surveillance such as- espionage, video-
footage or wiretapping for the intention of gathering evidence.
This was also reiterated from the second Caliph of Islam, ʿUmar
ibn al-Khaṭṭāb, who proclaimed that- ‘government’s action always on the
basis of evidence. One who demonstrate benevolence in character,
should not be mistrusted by others. Undoubtedly, Allah is the
omniscient about the inner secret of every human beings’.
(Al-Ṭabarī, Ta’rīkh, Vol. V at 26. See also: Kamali, “The Dignity of Man:
An Islamic Perspective” at 64.)
29
Therefore, spying committed against another person is trenchantly
forbidden in Islam, even if a person hit or injure another person owing to
defend peeping to his/her premises, shall not be liable for any
punishment for that attack.
This prohibition of spying also has prolonged meaning which includes-
listening to others conversation by way of wiretapping, eavesdropping or
recording covertly by using tape-recorder while conducting electronic
surveillance in this modern era.
A similar warning is also erected in the Sunnah of the Prophet
Muḥammad (p.b.u.h.), narrated by Ibn-Abbāṣ, concerning prohibition of
these kind of surveillance which reads-
“… One who eavesdrops of others and hears what they would not
like him to hear, will have scorching lead poured into his ears on
the Day of Judgment….” (Al-Bukhārī, Ṣaḥīḥ al- Bukhārī, Ḥadīth No.
1159.) 30
The gravity of spying (tajassus) is so grievous that, according to
Prominent Imams, the punishment for those who spy against the
believers or engage in other forms of espionage, Shall-
 IMAM NAWAWI: as far as the spy from the enemies of Muslim
is concerned, then he is to be killed.
 IMAM MALIK & AUZAI: if the spy is a Dhimmi, then he has
breach the contract between the Muslims and himself. He may
be killed.
 IMAM SHAFI’: the spy is not be killed. Such Dhimmi is only be
killed if it was stipulated in the Muslim contract between
Muslims and the Dhimmis that they will not spy on the
Muslims.
31
 IBN AL-QAYYIM: the case of spy should be left to the
leader of Muslims, whether it is beneficial or not to kill or
just leave the spy.
 IBN AL-QAIM: spy is to be killed and it is not known that
he is to be asked for repentance.
 IBN TAYMIYYAH: Hanbali Scholars hold the opinion that
the spy is to be killed.
32
As we have seen that, the conduct of spying (Tajassus) is
trenchantly prohibited in Islam in conjunction with a
number of Qur’ānic and the Sunnahtic allusions, albeit it
cannot be professed firmly that, this privacy right of every
individual is absolute and out-and-out in nature.
There are some anomalous circumstances specified in the
Sharīʿah, where a muḥtasib or law enforcement agents are
allowed to intrude into another’s premises without securing
prior permission from the owner or spying for the purpose of
criminal investigation. This are-
 Populace Interest at large,
 Ensuring National Security,
 Necessity (Ḍarūrah), 33
It has been reported that, due to the breach of Hudaibiah treaty
by Ka’fer’s of Macca, Prophet decided to attack and conquer
Macca.
Hatib bin Abi Balta’a, a spy on behalf of the Ka’fer’s of Macca,
covertly wrote a letter to inform the Macca people about the
impending attack to Macca by Prophet (p.b.u.h.).
A woman, Umma Jamil by named, was assigned to convey this
letter to the Macca people. After perceiving this incident, Prophet
Muḥammad dispatched Ali bin Abū Tālib and Zubāyr bin al-
Awam to intercept the letter. Even though, Umma Jamil initially
denied revealing the contexts of the letter, she disclosed
meanwhile due to turbulent threats by the companions.
Important to note that, all these happened with the implied
consent of the Prophet Muḥammad.
34
This above mentioned Ḥadīth advocates that, a latter that
belonging to a third party can be unfastened without prior
consent of the owner only in the ground of national security
or for the state interest.
This doctrine shall also be applied in electronic mails, faxes,
web-pages or any other means of social Medias and modern
technologies in the ground of public interest by way of
securing national security .
35
As we have seen that, Islam always upheld individual dignity
of every human being by prohibiting spying conducted
against any Muslim.
However, Sharīʿahalso allow a muḥtasib or any law
enforcement agent to conduct spying in some certain grounds
as stated earlier.
Therefore, the Government of Malaysia should think carefully
about the necessity of adopting and imposing Electronic
Surveillance in the suspected crime offenders body and
ensuring human dignity by establishing individual privacy
rights. 36

More Related Content

Viewers also liked

Social Media in Defence & Military 2012
Social Media in Defence & Military 2012Social Media in Defence & Military 2012
Social Media in Defence & Military 2012
Dale Butler
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyers
Klamberg
 
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
Abdoulaye M Yansane
 
Browsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesBrowsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged Pictures
Davide Carboni
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
Klamberg
 
Cell police - The Basics
Cell police - The BasicsCell police - The Basics
Cell police - The Basics
Cell Police
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePoint
Ruben Pertusa Lopez
 
Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social NetworkingJodi Gersh
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
bhatiak997
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacy
djtennant
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement ppt
Yiwei Chen
 
Mobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudienceMobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your Audience
Purplegator
 
Google Geo APIs Overview
Google Geo APIs OverviewGoogle Geo APIs Overview
Google Geo APIs Overview
Ossama Alami
 
Aliens
AliensAliens
Aliens
panjjandrum
 
Ib geo skills overview
Ib geo skills overviewIb geo skills overview
Ib geo skills overview
Tom McLean
 
Social Media Pitfalls: How to avoid them
Social Media Pitfalls: How to avoid themSocial Media Pitfalls: How to avoid them
Social Media Pitfalls: How to avoid them
Susan Tenby
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
Arthit Suriyawongkul
 
India electronic security market report 2020 |India CCTV Market |India Video...
India electronic security market report  2020 |India CCTV Market |India Video...India electronic security market report  2020 |India CCTV Market |India Video...
India electronic security market report 2020 |India CCTV Market |India Video...
Ken Research Pvt ltd.
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
Reuben George
 

Viewers also liked (20)

Social Media in Defence & Military 2012
Social Media in Defence & Military 2012Social Media in Defence & Military 2012
Social Media in Defence & Military 2012
 
Social media and lawyers
Social media and lawyersSocial media and lawyers
Social media and lawyers
 
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane12 faces bi business intelligence ~Abdoulaye Mouke Yansane
12 faces bi business intelligence ~Abdoulaye Mouke Yansane
 
Browsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged PicturesBrowsing Large Collections of Geo-Tagged Pictures
Browsing Large Collections of Geo-Tagged Pictures
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Cell police - The Basics
Cell police - The BasicsCell police - The Basics
Cell police - The Basics
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePoint
 
Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social Networking
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacy
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement ppt
 
Mobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudienceMobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your Audience
 
Google Geo APIs Overview
Google Geo APIs OverviewGoogle Geo APIs Overview
Google Geo APIs Overview
 
Aliens
AliensAliens
Aliens
 
Ib geo skills overview
Ib geo skills overviewIb geo skills overview
Ib geo skills overview
 
Social Media Pitfalls: How to avoid them
Social Media Pitfalls: How to avoid themSocial Media Pitfalls: How to avoid them
Social Media Pitfalls: How to avoid them
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
India electronic security market report 2020 |India CCTV Market |India Video...
India electronic security market report  2020 |India CCTV Market |India Video...India electronic security market report  2020 |India CCTV Market |India Video...
India electronic security market report 2020 |India CCTV Market |India Video...
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 

Similar to Electronic surveillance and privacy issues in shariah

Apostasy and islam
Apostasy and islamApostasy and islam
Apostasy and islam
goffaree
 
The Broader Path
The Broader PathThe Broader Path
The Broader Path
Omar Ha-Redeye
 
Human Rights Mentioned In Quran
Human Rights Mentioned In QuranHuman Rights Mentioned In Quran
Human Rights Mentioned In Quran
EHSAN KHAN
 
Shariah Law article
Shariah Law articleShariah Law article
Shariah Law article
Ashraf Sahimun
 
freedom of speech
freedom of speechfreedom of speech
freedom of speech
Aliff Mansor
 
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
International Islamic University Malaysia
 
freedom of expression in islam.pptx
freedom of expression in islam.pptxfreedom of expression in islam.pptx
freedom of expression in islam.pptx
farzanashahid3
 
Human rights in islam
Human rights in islamHuman rights in islam
Human rights in islam
Ahmed Hasain
 
Human rights according to the quran
Human rights according to the quranHuman rights according to the quran
Human rights according to the quran
ghal60
 
Essay
EssayEssay
Does islam need_a_reformation_i_era_dont_hate_debate
Does islam need_a_reformation_i_era_dont_hate_debateDoes islam need_a_reformation_i_era_dont_hate_debate
Does islam need_a_reformation_i_era_dont_hate_debate
goffaree
 
Freedom of Expression
Freedom of ExpressionFreedom of Expression
Freedom of Expression
NurulHayyu1
 
AUTHENTICITY AND SCOPE OF CIRCUMSTANTIAL EVIDENCES IN THE PERSPECTIVE OF ISLA...
AUTHENTICITY AND SCOPE OF CIRCUMSTANTIAL EVIDENCES IN THE PERSPECTIVE OF ISLA...AUTHENTICITY AND SCOPE OF CIRCUMSTANTIAL EVIDENCES IN THE PERSPECTIVE OF ISLA...
AUTHENTICITY AND SCOPE OF CIRCUMSTANTIAL EVIDENCES IN THE PERSPECTIVE OF ISLA...
surrenderyourthrone
 
Islamic Judicial System vs. Pakistan's English Judicial System
Islamic Judicial System vs. Pakistan's English Judicial SystemIslamic Judicial System vs. Pakistan's English Judicial System
Islamic Judicial System vs. Pakistan's English Judicial System
Muhammad Imran Fawad Yousafzai
 
Islamic Judicial system Vs Capitalist Judicial System
Islamic Judicial system Vs Capitalist Judicial System Islamic Judicial system Vs Capitalist Judicial System
Islamic Judicial system Vs Capitalist Judicial System
Naveed Butt
 
اسلام کا عدالتی نظام بمقابلہ انگریزی عدالتی نظام
اسلام کا عدالتی نظام بمقابلہ انگریزی عدالتی نظاماسلام کا عدالتی نظام بمقابلہ انگریزی عدالتی نظام
اسلام کا عدالتی نظام بمقابلہ انگریزی عدالتی نظام
Muhammad Imran Fawad Yousafzai
 
Application of presumption of innocence in nigeria
Application of presumption of innocence in nigeriaApplication of presumption of innocence in nigeria
Application of presumption of innocence in nigeria
Alexander Decker
 
Freedom of access to information and privacy
Freedom of access to information and privacyFreedom of access to information and privacy
Freedom of access to information and privacy
UET Peshawar pakistan
 
Characteristics Of Welfar State
Characteristics Of Welfar StateCharacteristics Of Welfar State
Characteristics Of Welfar State
Najam Aneel
 
The Muslim Concept of Sovereignty: Islamicjerusalem during the First Muslim C...
The Muslim Concept of Sovereignty: Islamicjerusalem during the First Muslim C...The Muslim Concept of Sovereignty: Islamicjerusalem during the First Muslim C...
The Muslim Concept of Sovereignty: Islamicjerusalem during the First Muslim C...
islamicjerusalem
 

Similar to Electronic surveillance and privacy issues in shariah (20)

Apostasy and islam
Apostasy and islamApostasy and islam
Apostasy and islam
 
The Broader Path
The Broader PathThe Broader Path
The Broader Path
 
Human Rights Mentioned In Quran
Human Rights Mentioned In QuranHuman Rights Mentioned In Quran
Human Rights Mentioned In Quran
 
Shariah Law article
Shariah Law articleShariah Law article
Shariah Law article
 
freedom of speech
freedom of speechfreedom of speech
freedom of speech
 
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.
 
freedom of expression in islam.pptx
freedom of expression in islam.pptxfreedom of expression in islam.pptx
freedom of expression in islam.pptx
 
Human rights in islam
Human rights in islamHuman rights in islam
Human rights in islam
 
Human rights according to the quran
Human rights according to the quranHuman rights according to the quran
Human rights according to the quran
 
Essay
EssayEssay
Essay
 
Does islam need_a_reformation_i_era_dont_hate_debate
Does islam need_a_reformation_i_era_dont_hate_debateDoes islam need_a_reformation_i_era_dont_hate_debate
Does islam need_a_reformation_i_era_dont_hate_debate
 
Freedom of Expression
Freedom of ExpressionFreedom of Expression
Freedom of Expression
 
AUTHENTICITY AND SCOPE OF CIRCUMSTANTIAL EVIDENCES IN THE PERSPECTIVE OF ISLA...
AUTHENTICITY AND SCOPE OF CIRCUMSTANTIAL EVIDENCES IN THE PERSPECTIVE OF ISLA...AUTHENTICITY AND SCOPE OF CIRCUMSTANTIAL EVIDENCES IN THE PERSPECTIVE OF ISLA...
AUTHENTICITY AND SCOPE OF CIRCUMSTANTIAL EVIDENCES IN THE PERSPECTIVE OF ISLA...
 
Islamic Judicial System vs. Pakistan's English Judicial System
Islamic Judicial System vs. Pakistan's English Judicial SystemIslamic Judicial System vs. Pakistan's English Judicial System
Islamic Judicial System vs. Pakistan's English Judicial System
 
Islamic Judicial system Vs Capitalist Judicial System
Islamic Judicial system Vs Capitalist Judicial System Islamic Judicial system Vs Capitalist Judicial System
Islamic Judicial system Vs Capitalist Judicial System
 
اسلام کا عدالتی نظام بمقابلہ انگریزی عدالتی نظام
اسلام کا عدالتی نظام بمقابلہ انگریزی عدالتی نظاماسلام کا عدالتی نظام بمقابلہ انگریزی عدالتی نظام
اسلام کا عدالتی نظام بمقابلہ انگریزی عدالتی نظام
 
Application of presumption of innocence in nigeria
Application of presumption of innocence in nigeriaApplication of presumption of innocence in nigeria
Application of presumption of innocence in nigeria
 
Freedom of access to information and privacy
Freedom of access to information and privacyFreedom of access to information and privacy
Freedom of access to information and privacy
 
Characteristics Of Welfar State
Characteristics Of Welfar StateCharacteristics Of Welfar State
Characteristics Of Welfar State
 
The Muslim Concept of Sovereignty: Islamicjerusalem during the First Muslim C...
The Muslim Concept of Sovereignty: Islamicjerusalem during the First Muslim C...The Muslim Concept of Sovereignty: Islamicjerusalem during the First Muslim C...
The Muslim Concept of Sovereignty: Islamicjerusalem during the First Muslim C...
 

More from International Islamic University Malaysia

OSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal researchOSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal research
International Islamic University Malaysia
 
Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.
International Islamic University Malaysia
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
International Islamic University Malaysia
 
Air-Space Law
Air-Space LawAir-Space Law
Treaties And Its Nuts and Bolts
Treaties And Its Nuts and BoltsTreaties And Its Nuts and Bolts
Treaties And Its Nuts and Bolts
International Islamic University Malaysia
 
Diplomatic Immunities
Diplomatic ImmunitiesDiplomatic Immunities
Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)
International Islamic University Malaysia
 
The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)
International Islamic University Malaysia
 
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
International Islamic University Malaysia
 
Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).
International Islamic University Malaysia
 
Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.
International Islamic University Malaysia
 
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
International Islamic University Malaysia
 
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
International Islamic University Malaysia
 

More from International Islamic University Malaysia (13)

OSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal researchOSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal research
 
Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Air-Space Law
Air-Space LawAir-Space Law
Air-Space Law
 
Treaties And Its Nuts and Bolts
Treaties And Its Nuts and BoltsTreaties And Its Nuts and Bolts
Treaties And Its Nuts and Bolts
 
Diplomatic Immunities
Diplomatic ImmunitiesDiplomatic Immunities
Diplomatic Immunities
 
Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)
 
The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)
 
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
 
Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).
 
Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.
 
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
 
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
 

Recently uploaded

Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 

Recently uploaded (20)

Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 

Electronic surveillance and privacy issues in shariah

  • 1. Prepared By… Md. Zubair Kasem Khan. G1110969. Master of Comparative Laws(MCL) International Islamic University Malaysia. Subject: Islamic Jurisprudence. 1
  • 2.  Introduction  Background of the Seminar  Issues of This Seminar  Privacy In General Point of Views  Privacy In SharīʿahPoint of Views  Dalīl From Qur’ān,  Dalīl From Sunnah,  Opinions of Different Scholars (Ijtihād)  Reconciliation Between Individual Privacy & National Security in the Form of Electronic Surveillance.  Conclusion. 2
  • 3. With the proliferation of digital technologies at the hands of individuals and the state, the tension between security and privacy today has further escalated. The immense development of the information and communications technologies is seen as important tool to help ensure National Security by way of Electronic surveillance. The latest Edward Snowden vis a vis the US Government saga can only confirm that: Electronic Surveillance Conducted By The State Over Individuals Has Entered A Truly Worrying Level Nowadays. 3
  • 4. The newly adopted Security Offences (Special Measures) Act 2012 (“SOSMA”) and the amended Prevention of Crime Act 2013 (”PCA”) have raised new controversies relating to constitutional and privacy issues in Malaysia, by allowing the police to impose electronic monitoring as well as other types of technologically-aided surveillance over the suspected or arrested criminals. To illustrate, Sec-4(6) of SOSMA states- “. . .If the police Officer is of view that . . . an electronic monitoring device may be attached on the person . . . For the purpose of investigation. . .” 4
  • 5. Sec- 6(1) of the same act says that- “. . . Notwithstanding. . . the Public Prosecutor. . .may authorize any police officer- a. to intercept, detain and open any postal article; b. to intercept any massage transmitted or received by any communication; c. to intercept or listen to any conversation by any communication. . .” This processing of personal data by the security officers through surveillance intersects with a very basic notion of individuals’ data privacy which is protected by the Sharīʿah. 5
  • 6. Today’s Seminar is a part of an ongoing fresh debate between security measures of Electronic Surveillance and the emergence of Right To Privacy In Malaysia. Through analysis of recent legislation and case laws, this outlines the emergence of two potentially conflicting legal developments in Malaysia regarding data privacy. However, today we will have a crucial scrutiny about Legitimacy of the following questions in the Sharīʿah Point Of Views…. 6
  • 7. The questions are- (i) What is the Stand Of Sharīʿah in the issue of Individual Privacy Rights? (ii) To What Extent this Privacy Rights can be Compromised on the ground of national security in Sharīʿah Point Of View? (iii) What would be the Suggested Roadmap for further Reconciling the need to national security with the Individual Right To Privacy? 7
  • 8. The abstraction on “privacy” decidedly becomes tricky for anyone simply to understand what it is meant by and how far it covers. The origin of the word ‘privacy’ is still vague to the majority of the scholars, albeit some exponents think that, its root is very similar with other words like ‘privation’ and ‘deprivation’, which denote ‘not to be involved in public matters or episodes’. According to Bloustein (1964 A.D.) & Khan (2003 A.D.)- privacy is linked with human personality in a way that, ‘autonomy, dignity and integrity’ of an individual are depended, influenced and protected by privacy. 8
  • 9. Westin (1967 A.D.) highlighted privacy as - human desire to expose themselves, their attitudes and believes to others freely. However, the most accepted connotation on privacy had been expressed by Warren and Brandeis (1890 A.D.) as- Right To Be Alone, wherein ‘rights’ is referred to an individual’s right to decide the limits of communication of his- “thoughts, sentiments, and emotions to others”. There are some different leitmotifs or unifying ideas that have raised in dissimilar scholarly writings while conceptualizing privacy which are- 9
  • 10.  Privacy as the Form of Secrecy: by Richard Posner.  Privacy as a Form of Control over Personal Information: by Charles Fried and Jerry Kang.  Privacy as an Aspect of Human Dignity: by L. Prosser and E.J. Bloustein.  Privacy as the Form of Limited Access: by Gavison.  Privacy as the Form of right to be alone: by Warren and Brandeis. 10
  • 11. 11 So….. What is the difference between Human Being & Animal …..???
  • 12. Forthrightly speaking, the appellation ‘Privacy’ is neither ingrained directly in the Holy Qur’ān nor in the Sunnah of the Prophet Muḥammad, nor even stated firmly in the Islamic Jurisprudence (uṣūl al-ƒiqh). Notwithstanding, it does not confer that, Islam does not value individual privacy or there is no space for privacy rights for a person, as a human being. In Islam, the individual privacy is considered as the part and parcel of his dignity in family, society or state levels which has been shielded by the Sharīʿah. 12
  • 13. This can be testified to the verse of the Holy Qur’ān where Allah lifted human dignity over other brute creations by affirming that- “… We have bestowed dignity (blessings) on the children of Adam… and conferred on them special favours, above a great part of our Creation….” (al- Isrā’, 17:70). In this verse of Qur’ān, bestowing dignity upon mankind is inherent, intrinsic in nature and not conceded by any sovereign political power or authority and thus cannot be withdrawn by any authority for any lame excuse. 13
  • 14. Allah, the supreme and true Law-Giver, strongly prohibits this kind of bad deeds, that provokes someone for downgrading other’s dignity of a man by the following āyah of Sūra al-Ḥujurāt- “… O you who believe! Let no man mock another man, who may perhaps be better than himself. Let no woman mock another woman, who may perhaps be better than herself. Do not defame one another, nor call one another by nicknames. It is an evil thing to be called by a bad name after embracing the true faith….” (al-Ḥujurāt, 49:11). 14
  • 15. Furthermore, human dignity in Islam, is an attested, confirmed and established right of every individual heedless of any discriminations which a person succeeds during the time of his/her birth as a human being. Sayyid Quṭb also showed a similar view of importance of human dignity of a person by saying that- “Dignity is therefore the absolute right of everyone”. Therefore the momentous face of Islam that distinguish from other religions is, the assurance of human dignity given to all human beings regardless of status (Muslim or non-Muslim), quality (devout or impious) or condition (famous or notorious) of a person in the reckon of the society. Even, as a criminal, a person should not be undignified and thus the endeavor of executing punishment to a criminal is for retribution or reformation and not affrontation or humiliation. 15
  • 16. This can also be evident from a Ḥadīth of the Prophet, quoted by numerous scholars where Prophet Muḥammad (p.bu.h) beheld a funeral of a deceased person passing by and He started showing respect to that death person and remained standing until a companion told Him that, this funeral was not for a Muslim but for a Jew. Upon auditioned the companion’s remark, the Prophet rebuked a counter question saying that- “Was he not a human being?” 16
  • 17. In Islam, the notion of ‘Privacy’ and its sphere in our life is very widespread which cover all aspects of privacy like- sanctity at home, private correspondence, intimate conversation, privacy in working affairs, individual financial affairs and so on. In fact, all kinds of fundamental rights what the western jurists denoted and resoluted in the last century, had already been enthusiastically cherished and guaranteed fourteen-hundred years back through Prophet Muḥammad (p.b.u.h) in the primary sources (the Qur’ān & the Sunnah) of Sharīʿah. 17
  • 18.  Islam always gives high priority in conserving human dignity by buttressing privacy in private dwellings. Allah addresses the believers in the Qur’ān in this regards as-  “… O you who believe! Do not enter houses other than your own, until you have asked permission and saluted those in them: that is best for you, in order that you may heed (what is seemly). If you find no one in the house, enter not until permission is given to you; if you are asked to go back, go back: that makes for greeter purity for yourselves: and Allah knows well all that you do….” (al-Nūr, 24:27-29). 18
  • 19. Moreover, whenever a person has obtained permission to embark on a house, it is indispensable to enter thereto from the appropriate door. In other words, Islam does not allow any person to enter into another house by crossing the wall or in a way that is not legitimate for him to enter into that dwelling. The Qur’ān asserts that- “… Righteousness does not consist in entering your dwellings from the back. The righteous man is he that fears Allah. Enter your dwellings by their doors and fear Allah, so that you may prosper….” (al- Baqarah, 2: 189). 19
  • 20. Even in the Qur’ān, Allah Sub’hana Ta’ala secures household privacy for every people within their family members and ordain that three times are not allowed for anyone to enter their masters private room without taking prior explicit permission. The Qur’ān thus apostrophize to the believers- “… O ye who believe! Let those whom your right hands possess (that is: servants and captives), and the (children) among you who have not come of age ask your permission (before they come to your presence), on three occasions: before morning prayer; the while ye doff your clothes for the noonday heat; and after the late night prayer: these are your three times of privacy: outside those times it is not wrong for you or for them to move about attending to each other: Thus does Allah make clear the Signs to you: for Allah is full of knowledge and wisdom….” (al- Nūr, 24:58). 20
  • 21. Furthermore, Prophet’s stand was very strict in assuring this right to privacy more specifically in household matters. Numerous Ḥadīth of the Propher narrated by different Islamic jurists that articulate the importance of obtaining permission from the dweller prior to enter the house. This had been reflected in a Ḥadīth where Prophet Muḥammad (p.b.u.h) advised to his believers that- “Asking for permission (Isti’nās) is [allowed up to] three times. If it is not granted to you, you must return”. In another Ḥadīth, Prophet (p.b.u.h) stated that- “Greetings (taslīm) precedes conversation” (Muslim, Mukhtaṣar Ṣaḥīḥ Muslim, Ḥadīth No. 1421) 21
  • 22. If we consider the former Ḥadīth en-masse with the later one, we can see that, two cardinal requirements- Isti’nās (seeking permission) and taslīm (greeting) of familiarization can been seen, that also had been mentioned earlier in the Sūṙa al-Nūr, āyah: 27-29, by expressing- “hatta tasta’nis ” which has been expounded as- “unless you have obtained permission” or “until you have made sure that your presence is welcomed by the dweller” by different scholars. The precepts of Sharīʿahconcerning individual privacy rights, however, do not only confined to his/her house, but also cater similar privacy in private cars, boats, caravans and cubicle compartment of a public offices etc. 22
  • 23. In Islamic point of view, personal or confidential information of an individual should not be thrashed out or divulged by other without obtaining deliberate consent of the person, regardless of the authenticity of the information. This rule can also be applied over a private correspondence of an institution where he/she is holding some confidential information by designation. This is outlined based on the injunction of the holy Qur’ān where Allah enjoined His believers- “… O ye who believe! Avoid suspicion as much (as possible): for suspicion is some cases is a sin (crime). Do not spy on each other, nor speak ill of each other behind their backs. Would any of you like to eat the flesh of his dead brother? Surely you would loathe it. Have fear of Allah. He is forgiving and most Merciful….” (al-Ḥujurāt, 49:12). 23
  • 24. Prophet Muḥammad (p.b.u.h.)also admonishes His followers not to show unnecessary suspicion over a person. He further advise people, which narrated by Abu Hurayrah that- “… Avoid suspicion, for suspicion is the gravest lie in talk and do not be inquisitive about one another and do not spy upon one another and do not feel envy with the other, and nurse no malice, and nurse no aversion and hostility against one another. And be fellow- brothers and servants of Allah….” (Muslim, Ṣaḥīḥ Muslim, Kitāb al-Birr was-Ṣālat-I-wa'l- Adab, Ḥadīth No. 6214.) 24
  • 25. In Islam, the privacy in information is highly protected and it is not permitted by a person or an authority to know others personal information which he or they are not required to know. It is because, any means of information such as- by post, fax or e-mail, are considered as deposits (wādī’aḥ) from the side of sender as well as the legitimate receiver. The messenger of Allah further warned the believer of Allah as- “… One who looks into the letter of his brother without his permission, is like looking into the fire of the Hell….” (Al-Suyūṭī, al-Jāmīʿal-Ṣaghir, at 165. See also: al-Maqdisī, al- Âdāb al-Sharʿiyyah, Vol. II at 166.) 25
  • 26. The term ‘Electronic Surveillance’ does not have any trace in any of the Qur’ānic verse or Ḥadīth of the Prophet Muḥammad (p.b.u.h.), nor any Sharīʿahprinciple that confer rules exclusively of it. The ratiocination behind this is, during Prophet Muḥammad (p.b.u.h), the technology did not reach up to that à la mode and up to date level what today’s generation are in. Notwithstanding, it does not betoken that Sharīʿahwas totally unaware or does not have any ruling about it when it agitates a controversy for the violation of individual privacy right. 26
  • 27. In Sharīʿah, there is a term “tajassus” found in the Qur’ān and Ḥadīth of the Prophet Muḥammad (p.b.u.h.) which literally means- ‘curiosity’, ‘the state of being excited to know someone’s private matters’ or ‘looking secretly about others’ fault’. This term is used in the primary sources of Sharīʿahto convey the mischievous effects of spying against an individual or a country, which is strongly forbidden. “Tajassus” includes any kinds of conspiracy for the purpose of listening or watching someone’s conversation or activities without getting prior consent of that person which may further degrade individual’s dignity. 27
  • 28. According to Mohammad Hashim Kamali, by using the words “wa lā tajassasū” in the Sura: al-Ḥujurāt, āyah- 12, Allah Sub’hana Ta’ala absolutely and unfetteredly proscribed all kinds of spying regardless of background aspiration of conducting this. This direction of prohibiting spying does not only confined to the private premises, but also outlawed government to do so by means of wiretapping, spying at night secretly, eavesdropping, fitting CCTV in the public places and introducing electronic monitoring devices and so on . 28
  • 29. Even the Muḥtasib, who is in charge of ensuring ḥisbah (i.e. adherence of goodness and forbiddance of evil) in a Islamic State, is not allowed to do spying with the intention of controlling crime. Some ʿulamāopined that, Muḥtasib who act as an inspector in the governmental agencies must take action against any undue exertions based on what he has found on the spot by direct observations, and not by applying any methods of surveillance such as- espionage, video- footage or wiretapping for the intention of gathering evidence. This was also reiterated from the second Caliph of Islam, ʿUmar ibn al-Khaṭṭāb, who proclaimed that- ‘government’s action always on the basis of evidence. One who demonstrate benevolence in character, should not be mistrusted by others. Undoubtedly, Allah is the omniscient about the inner secret of every human beings’. (Al-Ṭabarī, Ta’rīkh, Vol. V at 26. See also: Kamali, “The Dignity of Man: An Islamic Perspective” at 64.) 29
  • 30. Therefore, spying committed against another person is trenchantly forbidden in Islam, even if a person hit or injure another person owing to defend peeping to his/her premises, shall not be liable for any punishment for that attack. This prohibition of spying also has prolonged meaning which includes- listening to others conversation by way of wiretapping, eavesdropping or recording covertly by using tape-recorder while conducting electronic surveillance in this modern era. A similar warning is also erected in the Sunnah of the Prophet Muḥammad (p.b.u.h.), narrated by Ibn-Abbāṣ, concerning prohibition of these kind of surveillance which reads- “… One who eavesdrops of others and hears what they would not like him to hear, will have scorching lead poured into his ears on the Day of Judgment….” (Al-Bukhārī, Ṣaḥīḥ al- Bukhārī, Ḥadīth No. 1159.) 30
  • 31. The gravity of spying (tajassus) is so grievous that, according to Prominent Imams, the punishment for those who spy against the believers or engage in other forms of espionage, Shall-  IMAM NAWAWI: as far as the spy from the enemies of Muslim is concerned, then he is to be killed.  IMAM MALIK & AUZAI: if the spy is a Dhimmi, then he has breach the contract between the Muslims and himself. He may be killed.  IMAM SHAFI’: the spy is not be killed. Such Dhimmi is only be killed if it was stipulated in the Muslim contract between Muslims and the Dhimmis that they will not spy on the Muslims. 31
  • 32.  IBN AL-QAYYIM: the case of spy should be left to the leader of Muslims, whether it is beneficial or not to kill or just leave the spy.  IBN AL-QAIM: spy is to be killed and it is not known that he is to be asked for repentance.  IBN TAYMIYYAH: Hanbali Scholars hold the opinion that the spy is to be killed. 32
  • 33. As we have seen that, the conduct of spying (Tajassus) is trenchantly prohibited in Islam in conjunction with a number of Qur’ānic and the Sunnahtic allusions, albeit it cannot be professed firmly that, this privacy right of every individual is absolute and out-and-out in nature. There are some anomalous circumstances specified in the Sharīʿah, where a muḥtasib or law enforcement agents are allowed to intrude into another’s premises without securing prior permission from the owner or spying for the purpose of criminal investigation. This are-  Populace Interest at large,  Ensuring National Security,  Necessity (Ḍarūrah), 33
  • 34. It has been reported that, due to the breach of Hudaibiah treaty by Ka’fer’s of Macca, Prophet decided to attack and conquer Macca. Hatib bin Abi Balta’a, a spy on behalf of the Ka’fer’s of Macca, covertly wrote a letter to inform the Macca people about the impending attack to Macca by Prophet (p.b.u.h.). A woman, Umma Jamil by named, was assigned to convey this letter to the Macca people. After perceiving this incident, Prophet Muḥammad dispatched Ali bin Abū Tālib and Zubāyr bin al- Awam to intercept the letter. Even though, Umma Jamil initially denied revealing the contexts of the letter, she disclosed meanwhile due to turbulent threats by the companions. Important to note that, all these happened with the implied consent of the Prophet Muḥammad. 34
  • 35. This above mentioned Ḥadīth advocates that, a latter that belonging to a third party can be unfastened without prior consent of the owner only in the ground of national security or for the state interest. This doctrine shall also be applied in electronic mails, faxes, web-pages or any other means of social Medias and modern technologies in the ground of public interest by way of securing national security . 35
  • 36. As we have seen that, Islam always upheld individual dignity of every human being by prohibiting spying conducted against any Muslim. However, Sharīʿahalso allow a muḥtasib or any law enforcement agent to conduct spying in some certain grounds as stated earlier. Therefore, the Government of Malaysia should think carefully about the necessity of adopting and imposing Electronic Surveillance in the suspected crime offenders body and ensuring human dignity by establishing individual privacy rights. 36