Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
JCSD-aw Citizenship in an e-World Johnston Community School District.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Computers and Legal Education at the Nicolaus Copernicus University in Toruń Methodology and Experiences Karol Dobrzeniecki, LLM.
1 Cyber Laws: Uganda UGANDA’S CYBER LAWS Presentation Presentation by by Ambrose Ruyooka, PMP® Ag Commissioner Information Technology Ministry of ICT ISACA.
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Cyber Laws 1.
Impact of Ict on society Malaysia Cyber Law.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
How To Be A Good Netizens? By Yew Keat Yat. E-Care Take a break from looking for screen. Go for jogging.
Computer Legislation The need for computer laws Go to Contents.
CHAPTER 10 Technology Issues.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Aware the Effect of Social Network For 1 Malaysia’s Safety Towards A Healthy Virtual Socialization.
Por Guan Xiong PROJECT OBJECTIVES To develop a sense of ‘keNegaraan’, collaboration, responsibility and ownership to the communities during.
Digital Citizenship Working and playing in a digital word.
Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution.
Jeopardy: Digital Citizenship Please use presentation mode!
Presentation.  Suppression of speech or public communication.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Digital citizenship By: Cody Quinn.
Lesson 15 : Networks And The Internet
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Computer crimes.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
1 WEB TECHNOLOGY UNIT – 1 THETOPPERSWAY.COM. 2 HISTORY AND GROWHT OF WEB The idea of a nonproprietary computer communication system was first conceived.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
COMPUTER ETHICS AND LEGAL ISSUES
The 9 Themes of Digital Citizenship By: Austin. Digital Access Full electronic participation in society. Being able to access technology through the internet.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Principles of E-business. Two factors that significant contribute to the success of e-business are: the trust people place in the online businesseshow.
SECURITY STANDARDS AND CYBER LAWS
Security
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Learning Area 1 Information And Communication Technology and Society
Chapter 13 Security and Ethical Challenges.
Unit 8 Network Security.
LO1 - Know about aspects of cyber security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Credit:

 Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.

CYBER LAW Integrity and Security of Information Legal Status of Online Transactions Privacy and Confidentially of Information Security of Government Data Intellectual Property Rights

 The Malaysian Government has already passed several cyber laws to control and reduce the Internet abuse.

These cyber laws include:  Digital Signature Act 1997  Computer Crimes Act 1997  Telemedicine Act 1997  Communications and Multimedia Act 1998

 The Digital Signature Act 1997 secures electronic communications especially on the Internet.

 gives protection against the misuses of computers and computer criminal activities  Example : unauthorised use of programmes, illegal transmission of data or messages over computers and hacking and cracking of computer systems and networks.

 ensures that only qualified medical practitioners can practice telemedicine and that their patient's rights and interests are protected

 ensures that information is secure, the network is reliable and the service is affordable all over Malaysia.

1. Communications and Multimedia Commission Act 1998 Communications and Multimedia Commission Act 1998 Function : 2. Electronic Commerce Act Electronic Commerce Act 2006 Function :