SlideShare a Scribd company logo
There is no god but Allah, and 
Muhammad is the messenger of 
Allah. 
MOVING TOWARDS AN “EAGLE-EYED” 
SOCIETY: 
MALAYSIAN PERSPECTIVE. 
Md. Zubair Kasem Khan 
Department of Civil Law 
Ahmad Ibrahim Kulliyyah of Laws 
(AIKOL) 
International Islamic University Malaysia
Outlines of the Presentation 
 Notion of E-Surveillance & Privacy. 
 Existence and Position of Privacy Rights in Malaysian 
Legislations. 
 Connotations of Security. 
 Concern for Security in Malaysia. 
 Inauguration of Electronic Surveillance in Malaysian 
Legislation. 
 Conflict that spring up between Privacy Rights & 
Security. 
 Conclusion and Policy Recommendations.
E- Surveillance, Right to Privacy, 
Security 
With the proliferation of digital technologies at the hands of individuals and the state, the tension 
between security and privacy today has further escalated. The immense development of the 
information and communications technologies is seen as important tool to help ensure national 
security by way of electronic surveillance. 
Electronic 
Surveillance 
Right to Privacy National 
Security
What is Electronic 
Surveillance 
Electronic Tracking Devices to 
monitor his specific physical 
locations and whereabouts. 
By way of tracing his Cellular 
Phone-calls. 
Installation of Video Cameras 
by way of photographs, 
detectives, robots 
‘X-radiation’ that can be used to 
peep inside containers or human 
bodies without having direct 
physical intervention.
Notion of Privacy 
The abstraction on “Privacy” decidedly becomes tricky for anyone simply 
to understand what it is meant by and how far it covers. 
According to Bloustein (1964 A.D.) & Khan 
(2003 A.D.) - “Privacy is linked with human 
personality in a way that, ‘autonomy, dignity and 
integrity’ of an individual are depended, 
influenced and protected by privacy ”. 
Westin (1967 A.D.) highlighted privacy as -human desire to expose 
themselves, their attitudes and believes to others freely .
‘Privacy’ According to Scholars’ 
Perception 
Privacy as the Form of Right to be Alone : by Warren 
and Brandeis. 
Privacy as the Form of Secrecy : by Richard Posner. 
Privacy as a Form of Control over Personal 
Information : by Charles Fried and Jerry Kang. 
Privacy as an Aspect of Human Dignity : by L. Prosser 
and E.J. Bloustein. 
Privacy as the Form of Limited Access : by Gavison.
Existence and Position of Privacy 
Rights in Malaysian Legislations. 
Under the Federal Constitution of Malaysia (FCM), the provision 
of ‘right to privacy’ has not been inserted directly; neither any 
legislation that has been adopted particularly in the establishment 
of the privacy rights of every individual within near or far legal 
history of Malaysia. However, it does not mean that the 
constitution of Malaysia is reluctant to accept the importance of 
privacy rights over its citizens. Furthermore, it can instead be 
interpreted as a subset to a stupendous fundamental right. 
There are some provisions, popularly known as the 
“Fundamental Liberties” as stated under part II of the Federal 
Constitution (FCM). The ‘Right To Life And Liberty’, 
‘Freedom Of Movement’ and ‘Right To Property’, which 
have been inserted under Articles 5, 9 and 13 of the Malaysian 
Constitution respectively, have also got similar value of right 
to privacy in many other countries.
Continuing… 
To illustrate, in India, this notion of right to privacy has got Constitutional 
recognition guaranteed for the inhabitants of India in the form of right to life and 
liberty under Article 21, and this has been proven in the case of Kharak Singh vs. 
State of Uttar Pradesh [1963] AIR SC 1295 and R. Rajagopal vs. State of Tamil 
Nadu [1995] AIR SC 264, where the learned Supreme Court Judge, B.P. Jeevan 
Reddy opined that: 
“…certain privacy rights such as: ‘Individual Privacy 
Rights’, ‘Privacy Of His Family’, ‘Child Bearing’, 
‘Marriage’, ‘Procreation’, ‘Motherhood And Education’ 
should be ensured and the violation of these privacy 
rights could be claimed under Art. 21 of the Constitution 
Of India 1949…”
Continuing… 
Interestingly, this idea has been reflected impliedly in the recent case of 
Sivarasa Rasiah vs. Badan Peguam Malaysia & Anor [2010] 2 MLJ 
115, whereby the learned judge refused to explain the notion of “right to 
personal liberty” as mentioned in Art. 5 of the FCM in a narrow and 
restricted point of view and therefore, other rights such as privacy rights 
could be encompassed under this Art. 5. 
A similar judgment also held in a number of contemporary different 
cases such as: Chew Peng Cheng vs. Anthony TeoTiao Gin [2008] 
5 MLJ 577 and Tan Seng Hin vs. Editor of “See Hua Daily News” 
& Anor [2008] 8 MLJ 73 whereby it has been manifested that the 
issue of ‘Right To Privacy’ shall cover under the spectrum of 
“personal liberty” stated under Art. 5(1) of the FCM.
Before 2006: 
Ignorance Of Privacy Rights In 
Malaysia. 
After 2006 and onwards: 
Recognition 0f Privacy Rights In 
Malaysia.
Connotation of National 
Security 
“… one purpose, and one purpose 
only, the Defence of the Realm.…” 
[Lord Denning, 1963] 
“…Security is a slippery concept. Its 
meanings are multiple and without 
clarity about which meaning is 
intended (or understood); exactly what 
is being provided and consumed, sold 
and bought, promised or sought 
remains. obscure….” [Lucia Zedner, 
2003] 
“…the words 'in the interests of 
national security' are not capable of 
legal or precise definition. The 
circumstances are infinite in which 
the national security may be 
imperiled, not only by spies in 
espionage but in all sorts of indefinite 
ways….”[Hanks, Peter, 1988] 
security as a form of assurance tallies 
strongly with the proliferation of 
community safety policies and private 
security firms. What they sell is … a 
form of assurance… ‘We are not a 
security guard company: We sell a 
concept of security”
Concern for Security in Malaysia. 
In Malaysia, since the adoption of Internal Security Act (ISA) 1960, the Courts in 
Malaysia had unceasingly shown a very much supportive attitude, to some extent 
by way of compromising populace constitutional rights (by way of curtailing civil 
liberties) against measures (such as- arrests or detentions) taken by executive 
bodies, when it came to the issue of ‘National Security’. 
Nik Adli bin Nik Abdul Aziz vs. Ketua Polis 
Negara [2001] 4 MLJ 598 Where Nik Adli 
claimed a ‘habeas corpus’ and challenging 
such detention order (under Sec. 73 of the 
ISA) and the court rejected such application. 
This detention order furthermore extended for 
two years more by the Minister which also been 
challenged in the High Court and the Federal 
Court respectively. However, in both the cases, 
the Courts upheld the decision of the minister by 
dismissing the application. 
A similar picture of upholding an executive 
decision by the judiciary was also evident in the 
case of Nasharuddin bin Nasir vs. Kerajaan 
Malaysia & Ors [2002] 6 MLJ 65, where Nasir 
was suspected to have connections with KMM and 
arrested thereafter on April 17, 2002 and the 
Federal Court set-aside ‘habeas corpus’. 
Kerajaan Malaysia, Menteri Dalam Negeri, 
and Ketua Polis Negara vs. Nasharuddin bin 
Nasir [2003] the Chief Justice clarify the 
stand of the court against decisions taken by 
the executive concerning matters of national 
security as: “…In matters of preventive 
detention relating to national security, the 
This attitude of non-hindrance of court against the decisions Judges are the executive….” 
taken by the executives has also continued to reflect in the 
following other contemporary cases, particularlyAbdul Razak 
Bin Baharudin & Ors vs. Ketua Polis Negara & Ors [2004] 
7 MLJ 267 and Ahmad Yani Bin Ismail & Anor vs. Inspector 
General of Police & Ors [2005] 4 MLJ 636.
Continuing… 
Thus, in eliminating the issue of national security from the 
domain of the Malaysian judicial review, the concern 
Federal Court judge, in the case of Kerajaan Malaysia, 
Menteri Dalam Negeri, and Ketua Polis Negara vs. 
Nasharuddin Bein Nasir [2003] No. 05-75-2002(B) held 
that: 
“…It Seems Apparent From These Cases That Where 
Matters Of National Security And Public Order Are 
Involved, The Court Should Not Intervene By Way Of 
Judicial Review Or Be Hesitant In Doing So As These Are 
Matters, Especially Within The Preserve Of The Executive, 
Involving As They Invariably Do, Policy Considerations And 
The Like….”
Inauguration of Electronic 
Surveillance in Malaysian 
Legislation. 
Primary Legislations For Domestic Security 
The Security Offences (Special 
Measures) Act (“SOSMA”) 2012. 
The Prevention of Crime 
(Amendment and 
Extension) Act (“PCA”) 2013. 
Sec. 4(1) 
Police 
Can 
Arrest 
& 
Detain 
Without 
Warrant 
Sec. 4(6); 7(1 & 
4): Attach 
Electronic 
Monitoring 
Device For 
Surveillance Of 
The Suspected 
Criminals. 
Sec. 6 (1, 2 & 3): 
Power To Intercept 
Communication 
Transmitted 
Through Post, 
Message Or 
Telephonic 
Conversation . 
Sec. 7(1)(b) & 7A 
(1): Electronic 
Monitoring 
Device Shall 
Attached With 
Released 
Suspected 
Criminals Body 
Sec. 7B & 
7C: 
Establishmen 
t Of A 
Prevention 
Of Crime 
Board 
Headed By 
Chairman.
Sec. 4(10) Of The SOSMA 2012 : E-Surveillance 
Shall Have Effect 
Notwithstanding Anything Inconsistent 
With Art. 5, 9 & Sec. 117 Of FCM & 
CrPC. 
Conflict that spring up 
between Privacy Rights 
& Security. 
Sec. 5(3) Of The SOSMA: Delay Of 
Notifications Shall Have Effect 
Notwithstanding Anything Inconsistent 
With Art. 5 Of FCM. 
Sec. 6(6) Of The SOSMA: The 
Power Of The Police Officer Or 
Public Prosecutor To Intercept 
Communications Shall Have Effect 
Notwithstanding Anything 
Inconsistent With Art. 5 Of FCM . 
Sec. 7(9) Of The SOSMA: Special 
Procedures Relating To Electronic 
Monitoring Device Shall Have Effect 
Notwithstanding Anything 
Inconsistent With Art. 9 Of FCM. 
Violation of Constitutional Rights.
Conclusion and Policy 
Recommendations. 
Firstly, Unnecessary Collection Of Information Over An 
Individual By The Security Agency Or By Any Other Public Or 
Private Authority Can Contravene Individual’s Privacy Right. 
Secondly, Under S. 4(6&7) Of The Security Offences (Special 
Measures) Act 2012, Any Possible Health-related Effect Needs To 
Be Considered And Mitigated While attaching Electronic Device. 
Thirdly, Under S. 7 And Schedule II Of The SOSMA 2012, The 
Investigating Officers Are Given Unlimited Power To Track, 
Monitor And Retain The Suspected Criminals’ Movement. There 
Should Be A Clear Guideline On How These Will Be Monitored 
So That The Purpose Of Putting This Electronic Device Could 
Be Achieved Without Violating The Privacy Right. 
Fourthly, By Virtue Of S. 4(9) Of The SOSMA 2012, It Is Noted 
That There Is No Such Provision To Ensure The Confidentiality 
Of This Personal Report. Some Certainty In This Aspect Is 
Warranted Because The Officer Deals With Data In Electronic 
Form, Which Is More Prone To Leak, Disclosure Or Security 
Threats. 
Last But Not Least, It Is Observed That There Is No Provision 
That Confers A Suspected Crime Offender To Appeal Or Contest 
The Ruling To Wear this Electronic Monitoring Device Or 
Otherwise To Ask The Reason Why He Needs To Wear Such 
Device.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.

More Related Content

What's hot

Privacy act
Privacy actPrivacy act
Privacy act
DAM Interactive
 
No 4g in kashmir judgement 11 may-2020
No 4g in kashmir judgement 11 may-2020No 4g in kashmir judgement 11 may-2020
No 4g in kashmir judgement 11 may-2020
sabrangsabrang
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
Soundrya Singh
 
The Right to Privacy
The Right to PrivacyThe Right to Privacy
The Right to Privacy
sherice henderson
 
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
International Islamic University Malaysia
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
Graham Smith
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
International Islamic University Malaysia
 
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH MasyarakatCaveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
LBH Masyarakat
 
E p royappa v state of Tamilnadu
E p royappa v state of TamilnaduE p royappa v state of Tamilnadu
E p royappa v state of Tamilnadu
Abhinandan Ray
 
Penguatkuasaan Hak Asasi
Penguatkuasaan Hak AsasiPenguatkuasaan Hak Asasi
Penguatkuasaan Hak Asasi
surrenderyourthrone
 
Law: Right to Information Act, 2005
Law: Right to Information Act, 2005Law: Right to Information Act, 2005
Law: Right to Information Act, 2005
Parandeep Chawla
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
Roopanshi Virang
 
Prevention Of Offences Against the Child
Prevention Of Offences Against the Child Prevention Of Offences Against the Child
Prevention Of Offences Against the Child
rubynakka
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
Chirine Haddad ?
 
CFAA & Fourth Amendment Writing Sample
CFAA & Fourth Amendment Writing SampleCFAA & Fourth Amendment Writing Sample
CFAA & Fourth Amendment Writing Sample
Andre Craig Jr
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
- Mark - Fullbright
 
A Secure E-Medical Exemption System (E-MES): Jordan Case
A Secure E-Medical Exemption System (E-MES): Jordan CaseA Secure E-Medical Exemption System (E-MES): Jordan Case
A Secure E-Medical Exemption System (E-MES): Jordan Case
IJNSA Journal
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
atuljaybhaye
 
A Judge With Many Landmark Decisions
A Judge With Many Landmark DecisionsA Judge With Many Landmark Decisions
A Judge With Many Landmark Decisions
surrenderyourthrone
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
Dr. Arun Verma
 

What's hot (20)

Privacy act
Privacy actPrivacy act
Privacy act
 
No 4g in kashmir judgement 11 may-2020
No 4g in kashmir judgement 11 may-2020No 4g in kashmir judgement 11 may-2020
No 4g in kashmir judgement 11 may-2020
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
The Right to Privacy
The Right to PrivacyThe Right to Privacy
The Right to Privacy
 
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH MasyarakatCaveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
 
E p royappa v state of Tamilnadu
E p royappa v state of TamilnaduE p royappa v state of Tamilnadu
E p royappa v state of Tamilnadu
 
Penguatkuasaan Hak Asasi
Penguatkuasaan Hak AsasiPenguatkuasaan Hak Asasi
Penguatkuasaan Hak Asasi
 
Law: Right to Information Act, 2005
Law: Right to Information Act, 2005Law: Right to Information Act, 2005
Law: Right to Information Act, 2005
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Prevention Of Offences Against the Child
Prevention Of Offences Against the Child Prevention Of Offences Against the Child
Prevention Of Offences Against the Child
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
 
CFAA & Fourth Amendment Writing Sample
CFAA & Fourth Amendment Writing SampleCFAA & Fourth Amendment Writing Sample
CFAA & Fourth Amendment Writing Sample
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 
A Secure E-Medical Exemption System (E-MES): Jordan Case
A Secure E-Medical Exemption System (E-MES): Jordan CaseA Secure E-Medical Exemption System (E-MES): Jordan Case
A Secure E-Medical Exemption System (E-MES): Jordan Case
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
A Judge With Many Landmark Decisions
A Judge With Many Landmark DecisionsA Judge With Many Landmark Decisions
A Judge With Many Landmark Decisions
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 

Similar to Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.

J and k hc order
J and k hc orderJ and k hc order
J and k hc order
sabrangsabrang
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
itgsabc
 
Electronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariahElectronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariah
International Islamic University Malaysia
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
Jason Nathu
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Dr Kaustav Choudhoury
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
itgsabc
 
Atst dan pusaka
Atst dan pusakaAtst dan pusaka
Atst dan pusaka
Mohd Yusri Ibrahim
 
Bail 16 12 2012 final (3).rtf an outlook
Bail 16 12 2012 final (3).rtf an outlookBail 16 12 2012 final (3).rtf an outlook
Bail 16 12 2012 final (3).rtf an outlook
awasalam
 
Paper on Data Protection and Digital Privacy
Paper on Data Protection and Digital PrivacyPaper on Data Protection and Digital Privacy
Paper on Data Protection and Digital Privacy
RichikDadhich
 
A Comparison of Child Protection Law between Indonesia and Malaysia
A Comparison of Child Protection Law between Indonesia and MalaysiaA Comparison of Child Protection Law between Indonesia and Malaysia
A Comparison of Child Protection Law between Indonesia and Malaysia
iosrjce
 
Prevention of offences_against_the_child
Prevention of offences_against_the_childPrevention of offences_against_the_child
Prevention of offences_against_the_child
rubynakka
 
Right to privacy in tort law jeet
Right to privacy in tort law jeetRight to privacy in tort law jeet
Right to privacy in tort law jeet
Shubham Verma
 
Constitutional Provision on Privacy ppt for socprof
Constitutional Provision on Privacy  ppt for socprofConstitutional Provision on Privacy  ppt for socprof
Constitutional Provision on Privacy ppt for socprof
louise hufancia
 
1 CRIM ASSIGNMENT Teddy Bear Clinic
1 CRIM ASSIGNMENT Teddy Bear Clinic1 CRIM ASSIGNMENT Teddy Bear Clinic
1 CRIM ASSIGNMENT Teddy Bear Clinic
Sarvesh Nair
 
Law relating to Bail in India
Law relating to Bail in IndiaLaw relating to Bail in India
Law relating to Bail in India
Vijesh Munot
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal Data
H. T. Besik
 
Human rights related children
Human rights related children Human rights related children
Human rights related children
badrulalam33
 
Shariah Law article
Shariah Law articleShariah Law article
Shariah Law article
Ashraf Sahimun
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
ManuGupta344215
 
The rights of private defence
The rights of private defenceThe rights of private defence
The rights of private defence
Md Abdul Karim
 

Similar to Moving Towards an “Eagle Eyed” Society: Malaysian Perspective. (20)

J and k hc order
J and k hc orderJ and k hc order
J and k hc order
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Electronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariahElectronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariah
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Atst dan pusaka
Atst dan pusakaAtst dan pusaka
Atst dan pusaka
 
Bail 16 12 2012 final (3).rtf an outlook
Bail 16 12 2012 final (3).rtf an outlookBail 16 12 2012 final (3).rtf an outlook
Bail 16 12 2012 final (3).rtf an outlook
 
Paper on Data Protection and Digital Privacy
Paper on Data Protection and Digital PrivacyPaper on Data Protection and Digital Privacy
Paper on Data Protection and Digital Privacy
 
A Comparison of Child Protection Law between Indonesia and Malaysia
A Comparison of Child Protection Law between Indonesia and MalaysiaA Comparison of Child Protection Law between Indonesia and Malaysia
A Comparison of Child Protection Law between Indonesia and Malaysia
 
Prevention of offences_against_the_child
Prevention of offences_against_the_childPrevention of offences_against_the_child
Prevention of offences_against_the_child
 
Right to privacy in tort law jeet
Right to privacy in tort law jeetRight to privacy in tort law jeet
Right to privacy in tort law jeet
 
Constitutional Provision on Privacy ppt for socprof
Constitutional Provision on Privacy  ppt for socprofConstitutional Provision on Privacy  ppt for socprof
Constitutional Provision on Privacy ppt for socprof
 
1 CRIM ASSIGNMENT Teddy Bear Clinic
1 CRIM ASSIGNMENT Teddy Bear Clinic1 CRIM ASSIGNMENT Teddy Bear Clinic
1 CRIM ASSIGNMENT Teddy Bear Clinic
 
Law relating to Bail in India
Law relating to Bail in IndiaLaw relating to Bail in India
Law relating to Bail in India
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal Data
 
Human rights related children
Human rights related children Human rights related children
Human rights related children
 
Shariah Law article
Shariah Law articleShariah Law article
Shariah Law article
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
The rights of private defence
The rights of private defenceThe rights of private defence
The rights of private defence
 

More from International Islamic University Malaysia

OSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal researchOSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal research
International Islamic University Malaysia
 
Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.
International Islamic University Malaysia
 
Air-Space Law
Air-Space LawAir-Space Law
Treaties And Its Nuts and Bolts
Treaties And Its Nuts and BoltsTreaties And Its Nuts and Bolts
Treaties And Its Nuts and Bolts
International Islamic University Malaysia
 
Diplomatic Immunities
Diplomatic ImmunitiesDiplomatic Immunities
Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)
International Islamic University Malaysia
 
The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)
International Islamic University Malaysia
 
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
International Islamic University Malaysia
 
Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).
International Islamic University Malaysia
 
Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.
International Islamic University Malaysia
 
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
International Islamic University Malaysia
 
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
International Islamic University Malaysia
 
Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...
International Islamic University Malaysia
 

More from International Islamic University Malaysia (13)

OSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal researchOSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal research
 
Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.
 
Air-Space Law
Air-Space LawAir-Space Law
Air-Space Law
 
Treaties And Its Nuts and Bolts
Treaties And Its Nuts and BoltsTreaties And Its Nuts and Bolts
Treaties And Its Nuts and Bolts
 
Diplomatic Immunities
Diplomatic ImmunitiesDiplomatic Immunities
Diplomatic Immunities
 
Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)
 
The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)
 
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
 
Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).
 
Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.
 
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
 
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
 
Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...
 

Recently uploaded

Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 

Recently uploaded (20)

Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 

Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.

  • 1. There is no god but Allah, and Muhammad is the messenger of Allah. MOVING TOWARDS AN “EAGLE-EYED” SOCIETY: MALAYSIAN PERSPECTIVE. Md. Zubair Kasem Khan Department of Civil Law Ahmad Ibrahim Kulliyyah of Laws (AIKOL) International Islamic University Malaysia
  • 2. Outlines of the Presentation  Notion of E-Surveillance & Privacy.  Existence and Position of Privacy Rights in Malaysian Legislations.  Connotations of Security.  Concern for Security in Malaysia.  Inauguration of Electronic Surveillance in Malaysian Legislation.  Conflict that spring up between Privacy Rights & Security.  Conclusion and Policy Recommendations.
  • 3. E- Surveillance, Right to Privacy, Security With the proliferation of digital technologies at the hands of individuals and the state, the tension between security and privacy today has further escalated. The immense development of the information and communications technologies is seen as important tool to help ensure national security by way of electronic surveillance. Electronic Surveillance Right to Privacy National Security
  • 4. What is Electronic Surveillance Electronic Tracking Devices to monitor his specific physical locations and whereabouts. By way of tracing his Cellular Phone-calls. Installation of Video Cameras by way of photographs, detectives, robots ‘X-radiation’ that can be used to peep inside containers or human bodies without having direct physical intervention.
  • 5. Notion of Privacy The abstraction on “Privacy” decidedly becomes tricky for anyone simply to understand what it is meant by and how far it covers. According to Bloustein (1964 A.D.) & Khan (2003 A.D.) - “Privacy is linked with human personality in a way that, ‘autonomy, dignity and integrity’ of an individual are depended, influenced and protected by privacy ”. Westin (1967 A.D.) highlighted privacy as -human desire to expose themselves, their attitudes and believes to others freely .
  • 6. ‘Privacy’ According to Scholars’ Perception Privacy as the Form of Right to be Alone : by Warren and Brandeis. Privacy as the Form of Secrecy : by Richard Posner. Privacy as a Form of Control over Personal Information : by Charles Fried and Jerry Kang. Privacy as an Aspect of Human Dignity : by L. Prosser and E.J. Bloustein. Privacy as the Form of Limited Access : by Gavison.
  • 7. Existence and Position of Privacy Rights in Malaysian Legislations. Under the Federal Constitution of Malaysia (FCM), the provision of ‘right to privacy’ has not been inserted directly; neither any legislation that has been adopted particularly in the establishment of the privacy rights of every individual within near or far legal history of Malaysia. However, it does not mean that the constitution of Malaysia is reluctant to accept the importance of privacy rights over its citizens. Furthermore, it can instead be interpreted as a subset to a stupendous fundamental right. There are some provisions, popularly known as the “Fundamental Liberties” as stated under part II of the Federal Constitution (FCM). The ‘Right To Life And Liberty’, ‘Freedom Of Movement’ and ‘Right To Property’, which have been inserted under Articles 5, 9 and 13 of the Malaysian Constitution respectively, have also got similar value of right to privacy in many other countries.
  • 8. Continuing… To illustrate, in India, this notion of right to privacy has got Constitutional recognition guaranteed for the inhabitants of India in the form of right to life and liberty under Article 21, and this has been proven in the case of Kharak Singh vs. State of Uttar Pradesh [1963] AIR SC 1295 and R. Rajagopal vs. State of Tamil Nadu [1995] AIR SC 264, where the learned Supreme Court Judge, B.P. Jeevan Reddy opined that: “…certain privacy rights such as: ‘Individual Privacy Rights’, ‘Privacy Of His Family’, ‘Child Bearing’, ‘Marriage’, ‘Procreation’, ‘Motherhood And Education’ should be ensured and the violation of these privacy rights could be claimed under Art. 21 of the Constitution Of India 1949…”
  • 9. Continuing… Interestingly, this idea has been reflected impliedly in the recent case of Sivarasa Rasiah vs. Badan Peguam Malaysia & Anor [2010] 2 MLJ 115, whereby the learned judge refused to explain the notion of “right to personal liberty” as mentioned in Art. 5 of the FCM in a narrow and restricted point of view and therefore, other rights such as privacy rights could be encompassed under this Art. 5. A similar judgment also held in a number of contemporary different cases such as: Chew Peng Cheng vs. Anthony TeoTiao Gin [2008] 5 MLJ 577 and Tan Seng Hin vs. Editor of “See Hua Daily News” & Anor [2008] 8 MLJ 73 whereby it has been manifested that the issue of ‘Right To Privacy’ shall cover under the spectrum of “personal liberty” stated under Art. 5(1) of the FCM.
  • 10. Before 2006: Ignorance Of Privacy Rights In Malaysia. After 2006 and onwards: Recognition 0f Privacy Rights In Malaysia.
  • 11. Connotation of National Security “… one purpose, and one purpose only, the Defence of the Realm.…” [Lord Denning, 1963] “…Security is a slippery concept. Its meanings are multiple and without clarity about which meaning is intended (or understood); exactly what is being provided and consumed, sold and bought, promised or sought remains. obscure….” [Lucia Zedner, 2003] “…the words 'in the interests of national security' are not capable of legal or precise definition. The circumstances are infinite in which the national security may be imperiled, not only by spies in espionage but in all sorts of indefinite ways….”[Hanks, Peter, 1988] security as a form of assurance tallies strongly with the proliferation of community safety policies and private security firms. What they sell is … a form of assurance… ‘We are not a security guard company: We sell a concept of security”
  • 12. Concern for Security in Malaysia. In Malaysia, since the adoption of Internal Security Act (ISA) 1960, the Courts in Malaysia had unceasingly shown a very much supportive attitude, to some extent by way of compromising populace constitutional rights (by way of curtailing civil liberties) against measures (such as- arrests or detentions) taken by executive bodies, when it came to the issue of ‘National Security’. Nik Adli bin Nik Abdul Aziz vs. Ketua Polis Negara [2001] 4 MLJ 598 Where Nik Adli claimed a ‘habeas corpus’ and challenging such detention order (under Sec. 73 of the ISA) and the court rejected such application. This detention order furthermore extended for two years more by the Minister which also been challenged in the High Court and the Federal Court respectively. However, in both the cases, the Courts upheld the decision of the minister by dismissing the application. A similar picture of upholding an executive decision by the judiciary was also evident in the case of Nasharuddin bin Nasir vs. Kerajaan Malaysia & Ors [2002] 6 MLJ 65, where Nasir was suspected to have connections with KMM and arrested thereafter on April 17, 2002 and the Federal Court set-aside ‘habeas corpus’. Kerajaan Malaysia, Menteri Dalam Negeri, and Ketua Polis Negara vs. Nasharuddin bin Nasir [2003] the Chief Justice clarify the stand of the court against decisions taken by the executive concerning matters of national security as: “…In matters of preventive detention relating to national security, the This attitude of non-hindrance of court against the decisions Judges are the executive….” taken by the executives has also continued to reflect in the following other contemporary cases, particularlyAbdul Razak Bin Baharudin & Ors vs. Ketua Polis Negara & Ors [2004] 7 MLJ 267 and Ahmad Yani Bin Ismail & Anor vs. Inspector General of Police & Ors [2005] 4 MLJ 636.
  • 13. Continuing… Thus, in eliminating the issue of national security from the domain of the Malaysian judicial review, the concern Federal Court judge, in the case of Kerajaan Malaysia, Menteri Dalam Negeri, and Ketua Polis Negara vs. Nasharuddin Bein Nasir [2003] No. 05-75-2002(B) held that: “…It Seems Apparent From These Cases That Where Matters Of National Security And Public Order Are Involved, The Court Should Not Intervene By Way Of Judicial Review Or Be Hesitant In Doing So As These Are Matters, Especially Within The Preserve Of The Executive, Involving As They Invariably Do, Policy Considerations And The Like….”
  • 14. Inauguration of Electronic Surveillance in Malaysian Legislation. Primary Legislations For Domestic Security The Security Offences (Special Measures) Act (“SOSMA”) 2012. The Prevention of Crime (Amendment and Extension) Act (“PCA”) 2013. Sec. 4(1) Police Can Arrest & Detain Without Warrant Sec. 4(6); 7(1 & 4): Attach Electronic Monitoring Device For Surveillance Of The Suspected Criminals. Sec. 6 (1, 2 & 3): Power To Intercept Communication Transmitted Through Post, Message Or Telephonic Conversation . Sec. 7(1)(b) & 7A (1): Electronic Monitoring Device Shall Attached With Released Suspected Criminals Body Sec. 7B & 7C: Establishmen t Of A Prevention Of Crime Board Headed By Chairman.
  • 15. Sec. 4(10) Of The SOSMA 2012 : E-Surveillance Shall Have Effect Notwithstanding Anything Inconsistent With Art. 5, 9 & Sec. 117 Of FCM & CrPC. Conflict that spring up between Privacy Rights & Security. Sec. 5(3) Of The SOSMA: Delay Of Notifications Shall Have Effect Notwithstanding Anything Inconsistent With Art. 5 Of FCM. Sec. 6(6) Of The SOSMA: The Power Of The Police Officer Or Public Prosecutor To Intercept Communications Shall Have Effect Notwithstanding Anything Inconsistent With Art. 5 Of FCM . Sec. 7(9) Of The SOSMA: Special Procedures Relating To Electronic Monitoring Device Shall Have Effect Notwithstanding Anything Inconsistent With Art. 9 Of FCM. Violation of Constitutional Rights.
  • 16. Conclusion and Policy Recommendations. Firstly, Unnecessary Collection Of Information Over An Individual By The Security Agency Or By Any Other Public Or Private Authority Can Contravene Individual’s Privacy Right. Secondly, Under S. 4(6&7) Of The Security Offences (Special Measures) Act 2012, Any Possible Health-related Effect Needs To Be Considered And Mitigated While attaching Electronic Device. Thirdly, Under S. 7 And Schedule II Of The SOSMA 2012, The Investigating Officers Are Given Unlimited Power To Track, Monitor And Retain The Suspected Criminals’ Movement. There Should Be A Clear Guideline On How These Will Be Monitored So That The Purpose Of Putting This Electronic Device Could Be Achieved Without Violating The Privacy Right. Fourthly, By Virtue Of S. 4(9) Of The SOSMA 2012, It Is Noted That There Is No Such Provision To Ensure The Confidentiality Of This Personal Report. Some Certainty In This Aspect Is Warranted Because The Officer Deals With Data In Electronic Form, Which Is More Prone To Leak, Disclosure Or Security Threats. Last But Not Least, It Is Observed That There Is No Provision That Confers A Suspected Crime Offender To Appeal Or Contest The Ruling To Wear this Electronic Monitoring Device Or Otherwise To Ask The Reason Why He Needs To Wear Such Device.