SlideShare a Scribd company logo
1 of 17
There is no god but Allah, and 
Muhammad is the messenger of 
Allah. 
MOVING TOWARDS AN “EAGLE-EYED” 
SOCIETY: 
MALAYSIAN PERSPECTIVE. 
Md. Zubair Kasem Khan 
Department of Civil Law 
Ahmad Ibrahim Kulliyyah of Laws 
(AIKOL) 
International Islamic University Malaysia
Outlines of the Presentation 
 Notion of E-Surveillance & Privacy. 
 Existence and Position of Privacy Rights in Malaysian 
Legislations. 
 Connotations of Security. 
 Concern for Security in Malaysia. 
 Inauguration of Electronic Surveillance in Malaysian 
Legislation. 
 Conflict that spring up between Privacy Rights & 
Security. 
 Conclusion and Policy Recommendations.
E- Surveillance, Right to Privacy, 
Security 
With the proliferation of digital technologies at the hands of individuals and the state, the tension 
between security and privacy today has further escalated. The immense development of the 
information and communications technologies is seen as important tool to help ensure national 
security by way of electronic surveillance. 
Electronic 
Surveillance 
Right to Privacy National 
Security
What is Electronic 
Surveillance 
Electronic Tracking Devices to 
monitor his specific physical 
locations and whereabouts. 
By way of tracing his Cellular 
Phone-calls. 
Installation of Video Cameras 
by way of photographs, 
detectives, robots 
‘X-radiation’ that can be used to 
peep inside containers or human 
bodies without having direct 
physical intervention.
Notion of Privacy 
The abstraction on “Privacy” decidedly becomes tricky for anyone simply 
to understand what it is meant by and how far it covers. 
According to Bloustein (1964 A.D.) & Khan 
(2003 A.D.) - “Privacy is linked with human 
personality in a way that, ‘autonomy, dignity and 
integrity’ of an individual are depended, 
influenced and protected by privacy ”. 
Westin (1967 A.D.) highlighted privacy as -human desire to expose 
themselves, their attitudes and believes to others freely .
‘Privacy’ According to Scholars’ 
Perception 
Privacy as the Form of Right to be Alone : by Warren 
and Brandeis. 
Privacy as the Form of Secrecy : by Richard Posner. 
Privacy as a Form of Control over Personal 
Information : by Charles Fried and Jerry Kang. 
Privacy as an Aspect of Human Dignity : by L. Prosser 
and E.J. Bloustein. 
Privacy as the Form of Limited Access : by Gavison.
Existence and Position of Privacy 
Rights in Malaysian Legislations. 
Under the Federal Constitution of Malaysia (FCM), the provision 
of ‘right to privacy’ has not been inserted directly; neither any 
legislation that has been adopted particularly in the establishment 
of the privacy rights of every individual within near or far legal 
history of Malaysia. However, it does not mean that the 
constitution of Malaysia is reluctant to accept the importance of 
privacy rights over its citizens. Furthermore, it can instead be 
interpreted as a subset to a stupendous fundamental right. 
There are some provisions, popularly known as the 
“Fundamental Liberties” as stated under part II of the Federal 
Constitution (FCM). The ‘Right To Life And Liberty’, 
‘Freedom Of Movement’ and ‘Right To Property’, which 
have been inserted under Articles 5, 9 and 13 of the Malaysian 
Constitution respectively, have also got similar value of right 
to privacy in many other countries.
Continuing… 
To illustrate, in India, this notion of right to privacy has got Constitutional 
recognition guaranteed for the inhabitants of India in the form of right to life and 
liberty under Article 21, and this has been proven in the case of Kharak Singh vs. 
State of Uttar Pradesh [1963] AIR SC 1295 and R. Rajagopal vs. State of Tamil 
Nadu [1995] AIR SC 264, where the learned Supreme Court Judge, B.P. Jeevan 
Reddy opined that: 
“…certain privacy rights such as: ‘Individual Privacy 
Rights’, ‘Privacy Of His Family’, ‘Child Bearing’, 
‘Marriage’, ‘Procreation’, ‘Motherhood And Education’ 
should be ensured and the violation of these privacy 
rights could be claimed under Art. 21 of the Constitution 
Of India 1949…”
Continuing… 
Interestingly, this idea has been reflected impliedly in the recent case of 
Sivarasa Rasiah vs. Badan Peguam Malaysia & Anor [2010] 2 MLJ 
115, whereby the learned judge refused to explain the notion of “right to 
personal liberty” as mentioned in Art. 5 of the FCM in a narrow and 
restricted point of view and therefore, other rights such as privacy rights 
could be encompassed under this Art. 5. 
A similar judgment also held in a number of contemporary different 
cases such as: Chew Peng Cheng vs. Anthony TeoTiao Gin [2008] 
5 MLJ 577 and Tan Seng Hin vs. Editor of “See Hua Daily News” 
& Anor [2008] 8 MLJ 73 whereby it has been manifested that the 
issue of ‘Right To Privacy’ shall cover under the spectrum of 
“personal liberty” stated under Art. 5(1) of the FCM.
Before 2006: 
Ignorance Of Privacy Rights In 
Malaysia. 
After 2006 and onwards: 
Recognition 0f Privacy Rights In 
Malaysia.
Connotation of National 
Security 
“… one purpose, and one purpose 
only, the Defence of the Realm.…” 
[Lord Denning, 1963] 
“…Security is a slippery concept. Its 
meanings are multiple and without 
clarity about which meaning is 
intended (or understood); exactly what 
is being provided and consumed, sold 
and bought, promised or sought 
remains. obscure….” [Lucia Zedner, 
2003] 
“…the words 'in the interests of 
national security' are not capable of 
legal or precise definition. The 
circumstances are infinite in which 
the national security may be 
imperiled, not only by spies in 
espionage but in all sorts of indefinite 
ways….”[Hanks, Peter, 1988] 
security as a form of assurance tallies 
strongly with the proliferation of 
community safety policies and private 
security firms. What they sell is … a 
form of assurance… ‘We are not a 
security guard company: We sell a 
concept of security”
Concern for Security in Malaysia. 
In Malaysia, since the adoption of Internal Security Act (ISA) 1960, the Courts in 
Malaysia had unceasingly shown a very much supportive attitude, to some extent 
by way of compromising populace constitutional rights (by way of curtailing civil 
liberties) against measures (such as- arrests or detentions) taken by executive 
bodies, when it came to the issue of ‘National Security’. 
Nik Adli bin Nik Abdul Aziz vs. Ketua Polis 
Negara [2001] 4 MLJ 598 Where Nik Adli 
claimed a ‘habeas corpus’ and challenging 
such detention order (under Sec. 73 of the 
ISA) and the court rejected such application. 
This detention order furthermore extended for 
two years more by the Minister which also been 
challenged in the High Court and the Federal 
Court respectively. However, in both the cases, 
the Courts upheld the decision of the minister by 
dismissing the application. 
A similar picture of upholding an executive 
decision by the judiciary was also evident in the 
case of Nasharuddin bin Nasir vs. Kerajaan 
Malaysia & Ors [2002] 6 MLJ 65, where Nasir 
was suspected to have connections with KMM and 
arrested thereafter on April 17, 2002 and the 
Federal Court set-aside ‘habeas corpus’. 
Kerajaan Malaysia, Menteri Dalam Negeri, 
and Ketua Polis Negara vs. Nasharuddin bin 
Nasir [2003] the Chief Justice clarify the 
stand of the court against decisions taken by 
the executive concerning matters of national 
security as: “…In matters of preventive 
detention relating to national security, the 
This attitude of non-hindrance of court against the decisions Judges are the executive….” 
taken by the executives has also continued to reflect in the 
following other contemporary cases, particularlyAbdul Razak 
Bin Baharudin & Ors vs. Ketua Polis Negara & Ors [2004] 
7 MLJ 267 and Ahmad Yani Bin Ismail & Anor vs. Inspector 
General of Police & Ors [2005] 4 MLJ 636.
Continuing… 
Thus, in eliminating the issue of national security from the 
domain of the Malaysian judicial review, the concern 
Federal Court judge, in the case of Kerajaan Malaysia, 
Menteri Dalam Negeri, and Ketua Polis Negara vs. 
Nasharuddin Bein Nasir [2003] No. 05-75-2002(B) held 
that: 
“…It Seems Apparent From These Cases That Where 
Matters Of National Security And Public Order Are 
Involved, The Court Should Not Intervene By Way Of 
Judicial Review Or Be Hesitant In Doing So As These Are 
Matters, Especially Within The Preserve Of The Executive, 
Involving As They Invariably Do, Policy Considerations And 
The Like….”
Inauguration of Electronic 
Surveillance in Malaysian 
Legislation. 
Primary Legislations For Domestic Security 
The Security Offences (Special 
Measures) Act (“SOSMA”) 2012. 
The Prevention of Crime 
(Amendment and 
Extension) Act (“PCA”) 2013. 
Sec. 4(1) 
Police 
Can 
Arrest 
& 
Detain 
Without 
Warrant 
Sec. 4(6); 7(1 & 
4): Attach 
Electronic 
Monitoring 
Device For 
Surveillance Of 
The Suspected 
Criminals. 
Sec. 6 (1, 2 & 3): 
Power To Intercept 
Communication 
Transmitted 
Through Post, 
Message Or 
Telephonic 
Conversation . 
Sec. 7(1)(b) & 7A 
(1): Electronic 
Monitoring 
Device Shall 
Attached With 
Released 
Suspected 
Criminals Body 
Sec. 7B & 
7C: 
Establishmen 
t Of A 
Prevention 
Of Crime 
Board 
Headed By 
Chairman.
Sec. 4(10) Of The SOSMA 2012 : E-Surveillance 
Shall Have Effect 
Notwithstanding Anything Inconsistent 
With Art. 5, 9 & Sec. 117 Of FCM & 
CrPC. 
Conflict that spring up 
between Privacy Rights 
& Security. 
Sec. 5(3) Of The SOSMA: Delay Of 
Notifications Shall Have Effect 
Notwithstanding Anything Inconsistent 
With Art. 5 Of FCM. 
Sec. 6(6) Of The SOSMA: The 
Power Of The Police Officer Or 
Public Prosecutor To Intercept 
Communications Shall Have Effect 
Notwithstanding Anything 
Inconsistent With Art. 5 Of FCM . 
Sec. 7(9) Of The SOSMA: Special 
Procedures Relating To Electronic 
Monitoring Device Shall Have Effect 
Notwithstanding Anything 
Inconsistent With Art. 9 Of FCM. 
Violation of Constitutional Rights.
Conclusion and Policy 
Recommendations. 
Firstly, Unnecessary Collection Of Information Over An 
Individual By The Security Agency Or By Any Other Public Or 
Private Authority Can Contravene Individual’s Privacy Right. 
Secondly, Under S. 4(6&7) Of The Security Offences (Special 
Measures) Act 2012, Any Possible Health-related Effect Needs To 
Be Considered And Mitigated While attaching Electronic Device. 
Thirdly, Under S. 7 And Schedule II Of The SOSMA 2012, The 
Investigating Officers Are Given Unlimited Power To Track, 
Monitor And Retain The Suspected Criminals’ Movement. There 
Should Be A Clear Guideline On How These Will Be Monitored 
So That The Purpose Of Putting This Electronic Device Could 
Be Achieved Without Violating The Privacy Right. 
Fourthly, By Virtue Of S. 4(9) Of The SOSMA 2012, It Is Noted 
That There Is No Such Provision To Ensure The Confidentiality 
Of This Personal Report. Some Certainty In This Aspect Is 
Warranted Because The Officer Deals With Data In Electronic 
Form, Which Is More Prone To Leak, Disclosure Or Security 
Threats. 
Last But Not Least, It Is Observed That There Is No Provision 
That Confers A Suspected Crime Offender To Appeal Or Contest 
The Ruling To Wear this Electronic Monitoring Device Or 
Otherwise To Ask The Reason Why He Needs To Wear Such 
Device.
Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.

More Related Content

What's hot

Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
Graham Smith
 
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH MasyarakatCaveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
LBH Masyarakat
 
E p royappa v state of Tamilnadu
E p royappa v state of TamilnaduE p royappa v state of Tamilnadu
E p royappa v state of Tamilnadu
Abhinandan Ray
 
Law: Right to Information Act, 2005
Law: Right to Information Act, 2005Law: Right to Information Act, 2005
Law: Right to Information Act, 2005
Parandeep Chawla
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
Chirine Haddad ?
 
CFAA & Fourth Amendment Writing Sample
CFAA & Fourth Amendment Writing SampleCFAA & Fourth Amendment Writing Sample
CFAA & Fourth Amendment Writing Sample
Andre Craig Jr
 
A Judge With Many Landmark Decisions
A Judge With Many Landmark DecisionsA Judge With Many Landmark Decisions
A Judge With Many Landmark Decisions
surrenderyourthrone
 

What's hot (20)

Privacy act
Privacy actPrivacy act
Privacy act
 
No 4g in kashmir judgement 11 may-2020
No 4g in kashmir judgement 11 may-2020No 4g in kashmir judgement 11 may-2020
No 4g in kashmir judgement 11 may-2020
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
The Right to Privacy
The Right to PrivacyThe Right to Privacy
The Right to Privacy
 
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH MasyarakatCaveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH Masyarakat
 
E p royappa v state of Tamilnadu
E p royappa v state of TamilnaduE p royappa v state of Tamilnadu
E p royappa v state of Tamilnadu
 
Penguatkuasaan Hak Asasi
Penguatkuasaan Hak AsasiPenguatkuasaan Hak Asasi
Penguatkuasaan Hak Asasi
 
Law: Right to Information Act, 2005
Law: Right to Information Act, 2005Law: Right to Information Act, 2005
Law: Right to Information Act, 2005
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Prevention Of Offences Against the Child
Prevention Of Offences Against the Child Prevention Of Offences Against the Child
Prevention Of Offences Against the Child
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
 
CFAA & Fourth Amendment Writing Sample
CFAA & Fourth Amendment Writing SampleCFAA & Fourth Amendment Writing Sample
CFAA & Fourth Amendment Writing Sample
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 
A Secure E-Medical Exemption System (E-MES): Jordan Case
A Secure E-Medical Exemption System (E-MES): Jordan CaseA Secure E-Medical Exemption System (E-MES): Jordan Case
A Secure E-Medical Exemption System (E-MES): Jordan Case
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
A Judge With Many Landmark Decisions
A Judge With Many Landmark DecisionsA Judge With Many Landmark Decisions
A Judge With Many Landmark Decisions
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 

Similar to Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.

Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
itgsabc
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
itgsabc
 
Bail 16 12 2012 final (3).rtf an outlook
Bail 16 12 2012 final (3).rtf an outlookBail 16 12 2012 final (3).rtf an outlook
Bail 16 12 2012 final (3).rtf an outlook
awasalam
 
Prevention of offences_against_the_child
Prevention of offences_against_the_childPrevention of offences_against_the_child
Prevention of offences_against_the_child
rubynakka
 
Constitutional Provision on Privacy ppt for socprof
Constitutional Provision on Privacy  ppt for socprofConstitutional Provision on Privacy  ppt for socprof
Constitutional Provision on Privacy ppt for socprof
louise hufancia
 
1 CRIM ASSIGNMENT Teddy Bear Clinic
1 CRIM ASSIGNMENT Teddy Bear Clinic1 CRIM ASSIGNMENT Teddy Bear Clinic
1 CRIM ASSIGNMENT Teddy Bear Clinic
Sarvesh Nair
 
Law relating to Bail in India
Law relating to Bail in IndiaLaw relating to Bail in India
Law relating to Bail in India
Vijesh Munot
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
ManuGupta344215
 

Similar to Moving Towards an “Eagle Eyed” Society: Malaysian Perspective. (20)

J and k hc order
J and k hc orderJ and k hc order
J and k hc order
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Electronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariahElectronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariah
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Atst dan pusaka
Atst dan pusakaAtst dan pusaka
Atst dan pusaka
 
Bail 16 12 2012 final (3).rtf an outlook
Bail 16 12 2012 final (3).rtf an outlookBail 16 12 2012 final (3).rtf an outlook
Bail 16 12 2012 final (3).rtf an outlook
 
Paper on Data Protection and Digital Privacy
Paper on Data Protection and Digital PrivacyPaper on Data Protection and Digital Privacy
Paper on Data Protection and Digital Privacy
 
A Comparison of Child Protection Law between Indonesia and Malaysia
A Comparison of Child Protection Law between Indonesia and MalaysiaA Comparison of Child Protection Law between Indonesia and Malaysia
A Comparison of Child Protection Law between Indonesia and Malaysia
 
Prevention of offences_against_the_child
Prevention of offences_against_the_childPrevention of offences_against_the_child
Prevention of offences_against_the_child
 
Right to privacy in tort law jeet
Right to privacy in tort law jeetRight to privacy in tort law jeet
Right to privacy in tort law jeet
 
Constitutional Provision on Privacy ppt for socprof
Constitutional Provision on Privacy  ppt for socprofConstitutional Provision on Privacy  ppt for socprof
Constitutional Provision on Privacy ppt for socprof
 
1 CRIM ASSIGNMENT Teddy Bear Clinic
1 CRIM ASSIGNMENT Teddy Bear Clinic1 CRIM ASSIGNMENT Teddy Bear Clinic
1 CRIM ASSIGNMENT Teddy Bear Clinic
 
Law relating to Bail in India
Law relating to Bail in IndiaLaw relating to Bail in India
Law relating to Bail in India
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal Data
 
Human rights related children
Human rights related children Human rights related children
Human rights related children
 
Shariah Law article
Shariah Law articleShariah Law article
Shariah Law article
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
The rights of private defence
The rights of private defenceThe rights of private defence
The rights of private defence
 

More from International Islamic University Malaysia

The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
International Islamic University Malaysia
 
Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...
International Islamic University Malaysia
 

More from International Islamic University Malaysia (13)

OSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal researchOSCOLA Reference guideline for conducting legal research
OSCOLA Reference guideline for conducting legal research
 
Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.Nuts and Bolts of Plagiarism.
Nuts and Bolts of Plagiarism.
 
Air-Space Law
Air-Space LawAir-Space Law
Air-Space Law
 
Treaties And Its Nuts and Bolts
Treaties And Its Nuts and BoltsTreaties And Its Nuts and Bolts
Treaties And Its Nuts and Bolts
 
Diplomatic Immunities
Diplomatic ImmunitiesDiplomatic Immunities
Diplomatic Immunities
 
Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)Introduction to Alternative Dispute Resolution (ADR)
Introduction to Alternative Dispute Resolution (ADR)
 
The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)The Permanent Court of Arbitration (PCA)
The Permanent Court of Arbitration (PCA)
 
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
The Frenzy Effectiveness of International Human Rights Treaties In Bangladesh.
 
Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).Medical negligence Law (Problem Solving Answer).
Medical negligence Law (Problem Solving Answer).
 
Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.Unitary Government: ‬The United Kingdom.
Unitary Government: ‬The United Kingdom.
 
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
Constitutional Suprimacy (Perspective Federal Constitution of Malaysian).
 
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
Punishment of Hudud Offenses –Utility of Applying it in Malaysia.
 
Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...Legal pluralism and its influence in shaping the current legal system of Mala...
Legal pluralism and its influence in shaping the current legal system of Mala...
 

Recently uploaded

INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
nyabatejosphat1
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 

Recently uploaded (20)

INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Doctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddpptDoctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddppt
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 

Moving Towards an “Eagle Eyed” Society: Malaysian Perspective.

  • 1. There is no god but Allah, and Muhammad is the messenger of Allah. MOVING TOWARDS AN “EAGLE-EYED” SOCIETY: MALAYSIAN PERSPECTIVE. Md. Zubair Kasem Khan Department of Civil Law Ahmad Ibrahim Kulliyyah of Laws (AIKOL) International Islamic University Malaysia
  • 2. Outlines of the Presentation  Notion of E-Surveillance & Privacy.  Existence and Position of Privacy Rights in Malaysian Legislations.  Connotations of Security.  Concern for Security in Malaysia.  Inauguration of Electronic Surveillance in Malaysian Legislation.  Conflict that spring up between Privacy Rights & Security.  Conclusion and Policy Recommendations.
  • 3. E- Surveillance, Right to Privacy, Security With the proliferation of digital technologies at the hands of individuals and the state, the tension between security and privacy today has further escalated. The immense development of the information and communications technologies is seen as important tool to help ensure national security by way of electronic surveillance. Electronic Surveillance Right to Privacy National Security
  • 4. What is Electronic Surveillance Electronic Tracking Devices to monitor his specific physical locations and whereabouts. By way of tracing his Cellular Phone-calls. Installation of Video Cameras by way of photographs, detectives, robots ‘X-radiation’ that can be used to peep inside containers or human bodies without having direct physical intervention.
  • 5. Notion of Privacy The abstraction on “Privacy” decidedly becomes tricky for anyone simply to understand what it is meant by and how far it covers. According to Bloustein (1964 A.D.) & Khan (2003 A.D.) - “Privacy is linked with human personality in a way that, ‘autonomy, dignity and integrity’ of an individual are depended, influenced and protected by privacy ”. Westin (1967 A.D.) highlighted privacy as -human desire to expose themselves, their attitudes and believes to others freely .
  • 6. ‘Privacy’ According to Scholars’ Perception Privacy as the Form of Right to be Alone : by Warren and Brandeis. Privacy as the Form of Secrecy : by Richard Posner. Privacy as a Form of Control over Personal Information : by Charles Fried and Jerry Kang. Privacy as an Aspect of Human Dignity : by L. Prosser and E.J. Bloustein. Privacy as the Form of Limited Access : by Gavison.
  • 7. Existence and Position of Privacy Rights in Malaysian Legislations. Under the Federal Constitution of Malaysia (FCM), the provision of ‘right to privacy’ has not been inserted directly; neither any legislation that has been adopted particularly in the establishment of the privacy rights of every individual within near or far legal history of Malaysia. However, it does not mean that the constitution of Malaysia is reluctant to accept the importance of privacy rights over its citizens. Furthermore, it can instead be interpreted as a subset to a stupendous fundamental right. There are some provisions, popularly known as the “Fundamental Liberties” as stated under part II of the Federal Constitution (FCM). The ‘Right To Life And Liberty’, ‘Freedom Of Movement’ and ‘Right To Property’, which have been inserted under Articles 5, 9 and 13 of the Malaysian Constitution respectively, have also got similar value of right to privacy in many other countries.
  • 8. Continuing… To illustrate, in India, this notion of right to privacy has got Constitutional recognition guaranteed for the inhabitants of India in the form of right to life and liberty under Article 21, and this has been proven in the case of Kharak Singh vs. State of Uttar Pradesh [1963] AIR SC 1295 and R. Rajagopal vs. State of Tamil Nadu [1995] AIR SC 264, where the learned Supreme Court Judge, B.P. Jeevan Reddy opined that: “…certain privacy rights such as: ‘Individual Privacy Rights’, ‘Privacy Of His Family’, ‘Child Bearing’, ‘Marriage’, ‘Procreation’, ‘Motherhood And Education’ should be ensured and the violation of these privacy rights could be claimed under Art. 21 of the Constitution Of India 1949…”
  • 9. Continuing… Interestingly, this idea has been reflected impliedly in the recent case of Sivarasa Rasiah vs. Badan Peguam Malaysia & Anor [2010] 2 MLJ 115, whereby the learned judge refused to explain the notion of “right to personal liberty” as mentioned in Art. 5 of the FCM in a narrow and restricted point of view and therefore, other rights such as privacy rights could be encompassed under this Art. 5. A similar judgment also held in a number of contemporary different cases such as: Chew Peng Cheng vs. Anthony TeoTiao Gin [2008] 5 MLJ 577 and Tan Seng Hin vs. Editor of “See Hua Daily News” & Anor [2008] 8 MLJ 73 whereby it has been manifested that the issue of ‘Right To Privacy’ shall cover under the spectrum of “personal liberty” stated under Art. 5(1) of the FCM.
  • 10. Before 2006: Ignorance Of Privacy Rights In Malaysia. After 2006 and onwards: Recognition 0f Privacy Rights In Malaysia.
  • 11. Connotation of National Security “… one purpose, and one purpose only, the Defence of the Realm.…” [Lord Denning, 1963] “…Security is a slippery concept. Its meanings are multiple and without clarity about which meaning is intended (or understood); exactly what is being provided and consumed, sold and bought, promised or sought remains. obscure….” [Lucia Zedner, 2003] “…the words 'in the interests of national security' are not capable of legal or precise definition. The circumstances are infinite in which the national security may be imperiled, not only by spies in espionage but in all sorts of indefinite ways….”[Hanks, Peter, 1988] security as a form of assurance tallies strongly with the proliferation of community safety policies and private security firms. What they sell is … a form of assurance… ‘We are not a security guard company: We sell a concept of security”
  • 12. Concern for Security in Malaysia. In Malaysia, since the adoption of Internal Security Act (ISA) 1960, the Courts in Malaysia had unceasingly shown a very much supportive attitude, to some extent by way of compromising populace constitutional rights (by way of curtailing civil liberties) against measures (such as- arrests or detentions) taken by executive bodies, when it came to the issue of ‘National Security’. Nik Adli bin Nik Abdul Aziz vs. Ketua Polis Negara [2001] 4 MLJ 598 Where Nik Adli claimed a ‘habeas corpus’ and challenging such detention order (under Sec. 73 of the ISA) and the court rejected such application. This detention order furthermore extended for two years more by the Minister which also been challenged in the High Court and the Federal Court respectively. However, in both the cases, the Courts upheld the decision of the minister by dismissing the application. A similar picture of upholding an executive decision by the judiciary was also evident in the case of Nasharuddin bin Nasir vs. Kerajaan Malaysia & Ors [2002] 6 MLJ 65, where Nasir was suspected to have connections with KMM and arrested thereafter on April 17, 2002 and the Federal Court set-aside ‘habeas corpus’. Kerajaan Malaysia, Menteri Dalam Negeri, and Ketua Polis Negara vs. Nasharuddin bin Nasir [2003] the Chief Justice clarify the stand of the court against decisions taken by the executive concerning matters of national security as: “…In matters of preventive detention relating to national security, the This attitude of non-hindrance of court against the decisions Judges are the executive….” taken by the executives has also continued to reflect in the following other contemporary cases, particularlyAbdul Razak Bin Baharudin & Ors vs. Ketua Polis Negara & Ors [2004] 7 MLJ 267 and Ahmad Yani Bin Ismail & Anor vs. Inspector General of Police & Ors [2005] 4 MLJ 636.
  • 13. Continuing… Thus, in eliminating the issue of national security from the domain of the Malaysian judicial review, the concern Federal Court judge, in the case of Kerajaan Malaysia, Menteri Dalam Negeri, and Ketua Polis Negara vs. Nasharuddin Bein Nasir [2003] No. 05-75-2002(B) held that: “…It Seems Apparent From These Cases That Where Matters Of National Security And Public Order Are Involved, The Court Should Not Intervene By Way Of Judicial Review Or Be Hesitant In Doing So As These Are Matters, Especially Within The Preserve Of The Executive, Involving As They Invariably Do, Policy Considerations And The Like….”
  • 14. Inauguration of Electronic Surveillance in Malaysian Legislation. Primary Legislations For Domestic Security The Security Offences (Special Measures) Act (“SOSMA”) 2012. The Prevention of Crime (Amendment and Extension) Act (“PCA”) 2013. Sec. 4(1) Police Can Arrest & Detain Without Warrant Sec. 4(6); 7(1 & 4): Attach Electronic Monitoring Device For Surveillance Of The Suspected Criminals. Sec. 6 (1, 2 & 3): Power To Intercept Communication Transmitted Through Post, Message Or Telephonic Conversation . Sec. 7(1)(b) & 7A (1): Electronic Monitoring Device Shall Attached With Released Suspected Criminals Body Sec. 7B & 7C: Establishmen t Of A Prevention Of Crime Board Headed By Chairman.
  • 15. Sec. 4(10) Of The SOSMA 2012 : E-Surveillance Shall Have Effect Notwithstanding Anything Inconsistent With Art. 5, 9 & Sec. 117 Of FCM & CrPC. Conflict that spring up between Privacy Rights & Security. Sec. 5(3) Of The SOSMA: Delay Of Notifications Shall Have Effect Notwithstanding Anything Inconsistent With Art. 5 Of FCM. Sec. 6(6) Of The SOSMA: The Power Of The Police Officer Or Public Prosecutor To Intercept Communications Shall Have Effect Notwithstanding Anything Inconsistent With Art. 5 Of FCM . Sec. 7(9) Of The SOSMA: Special Procedures Relating To Electronic Monitoring Device Shall Have Effect Notwithstanding Anything Inconsistent With Art. 9 Of FCM. Violation of Constitutional Rights.
  • 16. Conclusion and Policy Recommendations. Firstly, Unnecessary Collection Of Information Over An Individual By The Security Agency Or By Any Other Public Or Private Authority Can Contravene Individual’s Privacy Right. Secondly, Under S. 4(6&7) Of The Security Offences (Special Measures) Act 2012, Any Possible Health-related Effect Needs To Be Considered And Mitigated While attaching Electronic Device. Thirdly, Under S. 7 And Schedule II Of The SOSMA 2012, The Investigating Officers Are Given Unlimited Power To Track, Monitor And Retain The Suspected Criminals’ Movement. There Should Be A Clear Guideline On How These Will Be Monitored So That The Purpose Of Putting This Electronic Device Could Be Achieved Without Violating The Privacy Right. Fourthly, By Virtue Of S. 4(9) Of The SOSMA 2012, It Is Noted That There Is No Such Provision To Ensure The Confidentiality Of This Personal Report. Some Certainty In This Aspect Is Warranted Because The Officer Deals With Data In Electronic Form, Which Is More Prone To Leak, Disclosure Or Security Threats. Last But Not Least, It Is Observed That There Is No Provision That Confers A Suspected Crime Offender To Appeal Or Contest The Ruling To Wear this Electronic Monitoring Device Or Otherwise To Ask The Reason Why He Needs To Wear Such Device.