SlideShare a Scribd company logo
KEMENTERIAN PELAJARAN MALAYSIA 
Self Access Learning Module 
IICCT LLiitterraccy fforr 
SSeccondarry 
PPrrooggrraammee 
NETWORKS AND THE INTERNET 
Cyber Law 
BAHAGIAN PEMBANGUNAN KURIKULUM 
KEMENTERIAN PELAJARAN MALAYSIA
ICTL for Secondary School - Networks and The Internet Module 
MODULE 7 
Cyber Law 
Curriculum Development Division 
Ministry of Education Malaysia 
1
ICTL for Secondary School - Networks and The Internet Module 
2 
1. Name of Module : Cyber Law 
2. Learning Outcomes : The students should be able to: 
a. describe the need for cyber law 
3. Knowledge and Skills : 
a. Internet. 
b. various forms of communication on the internet. 
4. Module Summary : At the end of the module, the student is able to 
a. describe the need to understand cyber law. 
This module contains two activities: 
Activity : Discussion on the reasons needed for cyber law.
ICTL for Secondary School - Networks and The Internet Module 
Activity : Discussion On Reasons For The Need Of Cyber Law 
3 
What is Cyber Law? 
Cyber law refers to any laws relating to protecting the Internet and other online 
communication technologies. 
The Cyber Law Acts In Malaysia 
The Malaysian Government has already passed several cyber laws to control and reduce 
Internet abuse. 
These cyber laws include: 
• Digital Signature Act 1997 
• Computer Crimes Act 1997 
• Telemedicine Act 1997 
• Communications and Multimedia Act 1998 
Beside these cyber laws, there are three other cyber laws being drafted. 
• Private Data Protection Bill 
• Electronic Government Activities Bill 
• Electronic Transactions Bill 
Digital Signature Act 1997 
Digital Signature is an identity verification standard that uses 
encryption techniques to protect against e-mail forgery. The 
encrypted code consists of the user’s name and a hash of all the 
parts of the message. 
By attaching the digital signature, one can ensure that nobody can 
eavesdrop, intercept or temper with transmitted data. 
Computer Crimes Act 1997 
Gives protection against the misuse of computers and computer 
criminal activities such as unauthorised use of programmes, illegal 
transmission of data or messages over computers, hacking and 
cracking of computer systems and networks. 
Users can protect their rights to privacy and build trust in the 
computer system. 
The government can have control at a certain level over cyberspace to reduce cyber crime 
activities.
ICTL for Secondary School - Networks and The Internet Module 
CYBER LAW 
Privacy and Confidentially 
of Information 
4 
Telemedicine Act 1997 
The Telemedicine Act 1997 ensures that only qualified medical 
practitioners can practice telemedicine and that their patient's rights 
and interests are protected. 
This act provides future development and delivery of healthcare in 
Malaysia. 
Communications And Multimedia Act 1998 
The implementation of Communication and Telecommunication Act 
1998 ensures that information is secure, the network is reliable and 
affordable all over Malaysia. 
Needs for Cyber Law 
Integrity and Security 
of Information 
Legal Status of Online 
Transactions 
Examples of Cyber abuse on the users 
• sending a computer virus via e-mail 
• hacking into your school’s database to change your examination 
results. 
• selling pirated software in a night market 
Security of 
Government Data 
Intellectual Property 
Rights
ICTL for Secondary School - Networks and The Internet Module 
5 
Worksheet : 
Write a short essay on the need of cyber law
ICTL for Secondary School - Networks and The Internet Module 
Reference 
Cashman, S. (2006) Discovering Computers 2006. USA : Thomson Course Technology. 
Ibrahim Ahmad, Mohd Hafiz et al (2007) Information and Communication Technology (ICT) 
Based on SPM Syllabus. Selangor: Venton Publishing (M) Sdn Bhd. 
CD courseware ICT, Pusat Perkembangan Kurikulum. KPM 
http://www.wikipedia.org 
http://images.search.yahoo.com 
http://www.google.com.my 
6

More Related Content

What's hot

Session 5 6
Session 5 6Session 5 6
Session 5 6
Sam Serpentine
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
Editor IJCATR
 
Cyber law
Cyber lawCyber law
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming Process
Casey Robertson
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
safa
 
Should government control_internet
Should government control_internetShould government control_internet
Should government control_internet
Sumeet Kagwade
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
manisha9kathuria
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
Nasir Bhutta
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Muktadir Shoaib
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
Wesen Tegegne
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
shanueduthoughts
 
presentation
presentationpresentation
presentation
Shah Ali
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
Syaiful Ahdan
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
Prof. Erwin Globio
 
Cyber laws
Cyber lawsCyber laws
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
safa
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
blogzilla
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
esther_sonu
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 

What's hot (20)

Session 5 6
Session 5 6Session 5 6
Session 5 6
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
 
Cyber law
Cyber lawCyber law
Cyber law
 
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming Process
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Should government control_internet
Should government control_internetShould government control_internet
Should government control_internet
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
 
presentation
presentationpresentation
presentation
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cyber security
 Cyber security Cyber security
Cyber security
 

Viewers also liked

Take home test il
Take home test ilTake home test il
Take home test il
FAROUQ
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Presentation question 2
Presentation question 2Presentation question 2
Presentation question 2
FAROUQ
 
Law of the sea tribunals orders russia to free greenpeacers
Law of the sea tribunals orders russia to free greenpeacersLaw of the sea tribunals orders russia to free greenpeacers
Law of the sea tribunals orders russia to free greenpeacers
FAROUQ
 
Criminal law and cyber
Criminal law and cyberCriminal law and cyber
Criminal law and cyber
Mayank Sharma
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Rini Mahade
 
Landlawtest
LandlawtestLandlawtest
Landlawtest
FAROUQ
 
Partnership property
Partnership propertyPartnership property
Partnership property
Ikram Abdul Sattar
 
Doctrine of Cypress
Doctrine of CypressDoctrine of Cypress
Doctrine of Cypress
a_sophi
 
Azahan bin mohd aminallah v public prosecutor
Azahan bin mohd aminallah v public prosecutorAzahan bin mohd aminallah v public prosecutor
Azahan bin mohd aminallah v public prosecutor
Ikram Abdul Sattar
 
Land test
Land testLand test
Land test
FAROUQ
 
Al Bakhtiar bin Ab Samat v Public Prosecutor
 Al Bakhtiar bin Ab Samat v Public Prosecutor Al Bakhtiar bin Ab Samat v Public Prosecutor
Al Bakhtiar bin Ab Samat v Public Prosecutor
Ikram Abdul Sattar
 
Michael O'Brien v Chief Constable of South Wales Police [2005] UKHL 26
Michael O'Brien v Chief Constable of South Wales Police [2005] UKHL 26Michael O'Brien v Chief Constable of South Wales Police [2005] UKHL 26
Michael O'Brien v Chief Constable of South Wales Police [2005] UKHL 26
Ikram Abdul Sattar
 
Definition of law_1-_jurisprudence
Definition of law_1-_jurisprudenceDefinition of law_1-_jurisprudence
Definition of law_1-_jurisprudence
Student
 
Bail and the amount of bond
Bail and the amount of bondBail and the amount of bond
Bail and the amount of bond
Ikram Abdul Sattar
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin
 
Charitabletrust 3
Charitabletrust 3Charitabletrust 3
Charitabletrust 3
Ikram Abdul Sattar
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Joseph Baffour
 
Application of the doctrine of cy-pres
Application of the doctrine of cy-presApplication of the doctrine of cy-pres
Application of the doctrine of cy-pres
Ikram Abdul Sattar
 

Viewers also liked (20)

Take home test il
Take home test ilTake home test il
Take home test il
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Presentation question 2
Presentation question 2Presentation question 2
Presentation question 2
 
Law of the sea tribunals orders russia to free greenpeacers
Law of the sea tribunals orders russia to free greenpeacersLaw of the sea tribunals orders russia to free greenpeacers
Law of the sea tribunals orders russia to free greenpeacers
 
Criminal law and cyber
Criminal law and cyberCriminal law and cyber
Criminal law and cyber
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Landlawtest
LandlawtestLandlawtest
Landlawtest
 
Partnership property
Partnership propertyPartnership property
Partnership property
 
Doctrine of Cypress
Doctrine of CypressDoctrine of Cypress
Doctrine of Cypress
 
Azahan bin mohd aminallah v public prosecutor
Azahan bin mohd aminallah v public prosecutorAzahan bin mohd aminallah v public prosecutor
Azahan bin mohd aminallah v public prosecutor
 
Land test
Land testLand test
Land test
 
Al Bakhtiar bin Ab Samat v Public Prosecutor
 Al Bakhtiar bin Ab Samat v Public Prosecutor Al Bakhtiar bin Ab Samat v Public Prosecutor
Al Bakhtiar bin Ab Samat v Public Prosecutor
 
Michael O'Brien v Chief Constable of South Wales Police [2005] UKHL 26
Michael O'Brien v Chief Constable of South Wales Police [2005] UKHL 26Michael O'Brien v Chief Constable of South Wales Police [2005] UKHL 26
Michael O'Brien v Chief Constable of South Wales Police [2005] UKHL 26
 
Definition of law_1-_jurisprudence
Definition of law_1-_jurisprudenceDefinition of law_1-_jurisprudence
Definition of law_1-_jurisprudence
 
Bail and the amount of bond
Bail and the amount of bondBail and the amount of bond
Bail and the amount of bond
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Charitabletrust 3
Charitabletrust 3Charitabletrust 3
Charitabletrust 3
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Application of the doctrine of cy-pres
Application of the doctrine of cy-presApplication of the doctrine of cy-pres
Application of the doctrine of cy-pres
 

Similar to Module 7 cyber law

Module Cyber Law
Module Cyber LawModule Cyber Law
Module Cyber Law
Ira Raji
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
Habib Noroozi
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdf
ShieAnneGarcia
 
Week 4 - 6.pdf
Week 4 - 6.pdfWeek 4 - 6.pdf
Week 4 - 6.pdf
AlyzaSablas
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32
KLIBEL
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
 
LLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - SussexLLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - Sussex
Chris Marsden
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
Ethical Sector
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
Malaysia University of Science and Technology (MUST)
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
Madhavi38
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
Areniym Lovelova
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
Martyn Taylor
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
safa
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
Khalizan Halid
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
MSC Malaysia Cybercentre @ Bangsar South City
 

Similar to Module 7 cyber law (20)

Module Cyber Law
Module Cyber LawModule Cyber Law
Module Cyber Law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdf
 
Week 4 - 6.pdf
Week 4 - 6.pdfWeek 4 - 6.pdf
Week 4 - 6.pdf
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
LLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - SussexLLM Masters in Information Technology and Intellectual Property Law - Sussex
LLM Masters in Information Technology and Intellectual Property Law - Sussex
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 

More from Fatin Izzaty

MESYUARAT KOKURIKULUM BILANGAN 4 SESI 2023/2024
MESYUARAT KOKURIKULUM BILANGAN 4 SESI 2023/2024MESYUARAT KOKURIKULUM BILANGAN 4 SESI 2023/2024
MESYUARAT KOKURIKULUM BILANGAN 4 SESI 2023/2024
Fatin Izzaty
 
Rpt t2 pj 2017 the latest edit
Rpt t2 pj 2017 the latest editRpt t2 pj 2017 the latest edit
Rpt t2 pj 2017 the latest edit
Fatin Izzaty
 
Soalan pjpk-tingkatan-1
Soalan pjpk-tingkatan-1Soalan pjpk-tingkatan-1
Soalan pjpk-tingkatan-1
Fatin Izzaty
 
Pat pjk tingkatan 1
Pat pjk tingkatan 1Pat pjk tingkatan 1
Pat pjk tingkatan 1
Fatin Izzaty
 
Tuntutan elaun perjalanan
Tuntutan elaun perjalananTuntutan elaun perjalanan
Tuntutan elaun perjalanan
Fatin Izzaty
 
Laporan harian guru bertugas
Laporan harian guru bertugasLaporan harian guru bertugas
Laporan harian guru bertugas
Fatin Izzaty
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internet
Fatin Izzaty
 
Module 5 e mail
Module 5   e mailModule 5   e mail
Module 5 e mail
Fatin Izzaty
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
Fatin Izzaty
 
Com hardware
Com hardwareCom hardware
Com hardware
Fatin Izzaty
 
Rancangan tahunan PJK T2
Rancangan tahunan PJK T2Rancangan tahunan PJK T2
Rancangan tahunan PJK T2
Fatin Izzaty
 
Rancangan tahunan PJK T1
Rancangan tahunan PJK T1Rancangan tahunan PJK T1
Rancangan tahunan PJK T1
Fatin Izzaty
 
Paper 2 math f1
Paper 2 math f1Paper 2 math f1
Paper 2 math f1
Fatin Izzaty
 

More from Fatin Izzaty (14)

MESYUARAT KOKURIKULUM BILANGAN 4 SESI 2023/2024
MESYUARAT KOKURIKULUM BILANGAN 4 SESI 2023/2024MESYUARAT KOKURIKULUM BILANGAN 4 SESI 2023/2024
MESYUARAT KOKURIKULUM BILANGAN 4 SESI 2023/2024
 
Rpt t2 pj 2017 the latest edit
Rpt t2 pj 2017 the latest editRpt t2 pj 2017 the latest edit
Rpt t2 pj 2017 the latest edit
 
Soalan pjpk-tingkatan-1
Soalan pjpk-tingkatan-1Soalan pjpk-tingkatan-1
Soalan pjpk-tingkatan-1
 
Pat pjk tingkatan 1
Pat pjk tingkatan 1Pat pjk tingkatan 1
Pat pjk tingkatan 1
 
Tuntutan elaun perjalanan
Tuntutan elaun perjalananTuntutan elaun perjalanan
Tuntutan elaun perjalanan
 
Laporan harian guru bertugas
Laporan harian guru bertugasLaporan harian guru bertugas
Laporan harian guru bertugas
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internet
 
Module 5 e mail
Module 5   e mailModule 5   e mail
Module 5 e mail
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Com hardware
Com hardwareCom hardware
Com hardware
 
Rancangan tahunan PJK T2
Rancangan tahunan PJK T2Rancangan tahunan PJK T2
Rancangan tahunan PJK T2
 
Rancangan tahunan PJK T1
Rancangan tahunan PJK T1Rancangan tahunan PJK T1
Rancangan tahunan PJK T1
 
Paper 2 math f1
Paper 2 math f1Paper 2 math f1
Paper 2 math f1
 
Paper 1 maths f1
Paper 1 maths f1Paper 1 maths f1
Paper 1 maths f1
 

Recently uploaded

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Module 7 cyber law

  • 1. KEMENTERIAN PELAJARAN MALAYSIA Self Access Learning Module IICCT LLiitterraccy fforr SSeccondarry PPrrooggrraammee NETWORKS AND THE INTERNET Cyber Law BAHAGIAN PEMBANGUNAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA
  • 2. ICTL for Secondary School - Networks and The Internet Module MODULE 7 Cyber Law Curriculum Development Division Ministry of Education Malaysia 1
  • 3. ICTL for Secondary School - Networks and The Internet Module 2 1. Name of Module : Cyber Law 2. Learning Outcomes : The students should be able to: a. describe the need for cyber law 3. Knowledge and Skills : a. Internet. b. various forms of communication on the internet. 4. Module Summary : At the end of the module, the student is able to a. describe the need to understand cyber law. This module contains two activities: Activity : Discussion on the reasons needed for cyber law.
  • 4. ICTL for Secondary School - Networks and The Internet Module Activity : Discussion On Reasons For The Need Of Cyber Law 3 What is Cyber Law? Cyber law refers to any laws relating to protecting the Internet and other online communication technologies. The Cyber Law Acts In Malaysia The Malaysian Government has already passed several cyber laws to control and reduce Internet abuse. These cyber laws include: • Digital Signature Act 1997 • Computer Crimes Act 1997 • Telemedicine Act 1997 • Communications and Multimedia Act 1998 Beside these cyber laws, there are three other cyber laws being drafted. • Private Data Protection Bill • Electronic Government Activities Bill • Electronic Transactions Bill Digital Signature Act 1997 Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message. By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data. Computer Crimes Act 1997 Gives protection against the misuse of computers and computer criminal activities such as unauthorised use of programmes, illegal transmission of data or messages over computers, hacking and cracking of computer systems and networks. Users can protect their rights to privacy and build trust in the computer system. The government can have control at a certain level over cyberspace to reduce cyber crime activities.
  • 5. ICTL for Secondary School - Networks and The Internet Module CYBER LAW Privacy and Confidentially of Information 4 Telemedicine Act 1997 The Telemedicine Act 1997 ensures that only qualified medical practitioners can practice telemedicine and that their patient's rights and interests are protected. This act provides future development and delivery of healthcare in Malaysia. Communications And Multimedia Act 1998 The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and affordable all over Malaysia. Needs for Cyber Law Integrity and Security of Information Legal Status of Online Transactions Examples of Cyber abuse on the users • sending a computer virus via e-mail • hacking into your school’s database to change your examination results. • selling pirated software in a night market Security of Government Data Intellectual Property Rights
  • 6. ICTL for Secondary School - Networks and The Internet Module 5 Worksheet : Write a short essay on the need of cyber law
  • 7. ICTL for Secondary School - Networks and The Internet Module Reference Cashman, S. (2006) Discovering Computers 2006. USA : Thomson Course Technology. Ibrahim Ahmad, Mohd Hafiz et al (2007) Information and Communication Technology (ICT) Based on SPM Syllabus. Selangor: Venton Publishing (M) Sdn Bhd. CD courseware ICT, Pusat Perkembangan Kurikulum. KPM http://www.wikipedia.org http://images.search.yahoo.com http://www.google.com.my 6