Sunday, March 21, 2010

FBI to Create International Cyber-Law Enforcement Agency

Link to us http://snipurl.com/uz44x
Source from http://mashable.com/2008/03/20/fbi-cyberlaw/

One of the beauties, if you can call it that, of organized crime is that while the criminal organizations of the world respect none of the boundaries that we call jurisdictions and countries, and by definition, the rule of law must respect those boundaries. These criminals, whether they be the traditional mob that we all know and love or the terrorist organizations bent on the destruction of civilization as we know it, have for more than a decade or two have known about and exploited this fact.

In fact, during the last decade and a half, organized crime has collaborated amongst the various sects (Italian, Russian, Columbian, etc) according to their various specialties across international jurisdictions and boundaries, much to the consternation of law enforcement of all nationalities. What’s even worse is the explosion of digital crimes that take place on a grand scale (as ‘inconsequential’ as spamming or bot-nets or as significant as money laundering) thanks to advances in the Internet and communication technology.

Technovelgy today is reporting that the FBI has finally had enough of this problem, and is hosting a gathering of the world’s intelligence organizations this May for a three day conference. Invited to participate is, aside from the FBI, the Royal Canadian Mounted Police, Australian Federal Police, New Zealand Police and the UK’s Serious Organised Crime Agency.
Amongst other goals of the conference, the most interesting is to set up a special area on Law Enforcement Online, the FBI’s secure Internet portal, to share intelligence internationally and create a bulletin system that will make member agencies more aware of accidental leaks that occur from thefts or accidentally dropping classified documents into your porn thumb drive or shared folder on your P2P client.

On the one hand, it does seem a bit like an issue of “What, you’re just now getting around to this?”. On the other, though, it does seem like this sort of international collaboration can lead to the circumvention of legal hurdles that we’ve constitutionally created preventing international spy agencies from becoming domestic spy agencies, and vice versa (separation of powers). Unfortunately, I’m not up on my domestic spying laws and regulations, so smarter policy wonks than I should be tackling this issue soon, but it is a significant development in terms of online law enforcement, and worthy of note.

The Obstacles Facing Cyber Law Enforcement

***

The online community is cruel and ruthless leaving no margin of error for anyone. Once you make a bona fide mistake you get crucified immediately. It is because of this general attitude among many people in social communities, that people jump to unfair and unjustified conclusions. Most participants of these communities are used to this behaviour and are not bothered by it too much. Most of these unjustified remarks often cause embarrassment for the comment maker, which is well deserved, because you should take the consequences of your actions for speaking out loud without thinking. Where am I going with this? What does this have to do with fighting cyber crime?

Let me explain with an example: When a big company like Microsoft cause a security risk for users of Internet Explorer out of negligence, you can be sure that the press (including the online community) will throw some big stones at them. This response is justified because the safety of innocent users is put at risk because of the negligence of a respectful organisation. But when Microsoft makes a remark that is misunderstood by some people, without causing any security threats because of this ill formulated remark, why should they be crucified? Microsoft is run by people and people make mistakes. If the community wants to rant and rave about something, then find something that deserves some ranting and raving and stop wasting time on things that can be excused. The company has to waste valuable resources to put out the fires caused by this overreaction instead of using those resources to improve the security of their products. No, I am not a Microsoft prophet, I am simply using them as an example.

Investigating spam and determining the origin of a scam letter is not as simple as tracking an IP address. Most people think so, but that is because they never really tried to locate a spammer on their own after being spammed. It is very easy to forge an e-mail header and that makes it almost impossible to locate the real sender of the e-mail. Even if the header is not forged, you never know whether it is a case of identity theft. Computer criminals hack into e-mail accounts, they hijack web sites and use it to their advantage under the identity of an innocent victim. This enables them to operate undetectable by moving from one account to another. Jurisdictional constraints makes it is hard for federal organisations of one country to prosecute crimes committed in another crime, not even to speak of locating the criminal.

Abuse departments of hosting companies and service providers are so swamped with so many daily reports of spam and network abuse that it is impossible for them to respond to each and every spam report individually. It obviously creates the impression that they do not really take action against the guilty parties. Of course, some companies appear to have an abuse department, but it is only a front to make people believe that they take action against spammers. This discourages people from reporting cyber crime and it effectively allows cyber criminals to operate in the open without the risk of getting caught.

People take cyber crime lightly, cyber crime is being handled as crime committed in another dimension, a dimension not regulated by law. Cyber crime is just like any other crime committed in the normal world, the only difference comes in the methods of investigation. Cyber swindlers are real life criminals, they should never be underestimated. The fact that they operate behind a computer screen makes no difference. Law enforcement agencies do not really care about the person robbed from a couple of dollars, they only pursue the big fish. Unfortunately this is how most scammers operate. They steal a bit from one victim, they steal a bit from another victim, they steal a bit from hundreds of helpless victims and pocked thousands of dollars in the end. Law enforcement agencies will take this crime more serious if everyone starts to report it to their local police department. Sooner or later they will realise that something has to be done. Many police departments are also not equipped to handle digital evidence effectively and many police officers still do not have the skills to conduct proper cyber crime investigations.

Cyber crime is very volatile and cannot always be solved using conventional methods, so I appeal to the online community not to question the unconventional methods of cyber crime investigators. At least they are doing something about an epidemic that is ignored by many influential and powerful organisations.

Controlling of Online Crimes Through Cyber Law Enforcement Practices

Link to us: http://snipurl.com/uz44g

***

source from http//www.online-law.co.uk/127

Organizations like Cyber Crime Law Enforcement Organization, Cybercrime Coordinate Unit, Cybertip.ca, INHOPE, Cyber Crime Control Unit, Internet Crime Complaint Center, Internet Fraud Complaint Center, etc. are some of the most important units that stop cyber crime to expand in rapid succession, across the globe. For instance, cyber law enforcement organization is an international panel that tracks down the different pockets of crime that goes on throughout the internet. There are proper vigilance processes that go over cyberlaws, investigative processes and techniques as well as locations of interactions that keep going on online. There are processes of cyberstalking along provisions of online education and spreading of knowledge regarding the different forms of cyber crimes that keep on going. There are spreading support groups that locally function near you in order to lodge and assess your complaints regarding anything that bothers you online. Pedophile activities, pornography, fraudulent processes, etc. all can be tracked down through these media. Even hacking and virus attack can be protected and addressed when understanding or taking help from cyber crime control units.

International units of varying degrees and order bring forth standardization of relations and communications between the crime control department and the local police. The Internet Service Providers can also be tracked down through IP address and the root of the crime can be spotted this way. There are worldwide groups extended to check on the varied pockets of cyber crime. There are law groups that support victims and bring advocacy groups together in order to help legal justice to prevail. When complained of any harassment or reported deals with cyber crime, there can be complete tracking down of the root of the problem through proper investigation. Support groups and online counseling are even provided for the victims so that they can rise up against the emergency of such problems. Cybertip.ca, for instance, is Canada’s international tipline for reaching for help in any cyber related problems. From online sexual exploitation to abuse and misuse of children’s photos to any form of harassment or non paid services, all issues can be addressed with hope at this point.

There are varied degrees of cyber crime reports including extremes of racism, unlawful acts or abuse within communities and forums, any form of threat or misuse of information and so on. Misuse of animals, any form of humanity related issues and even spreading of viruses or spam through email can be complained against through complain. Any form of repeated abuse source is in fact easy to track down as the cyber police have their own ways to track down these sites and their owners.

The internet can be a scary place without understanding the protecting and governing forces of cyber laws but then there have been proper establishment of laws that are there to control all these illegal processes. In terms of any unlawful entry, one should not hesitate to complain at any of the centers. There are plenty of legal aid support and protection areas that bring positive results in terms of cyber crime increase.
Investigation and assessment of any root of crime is always promised through the local team that deals with cyber law assistance.

Saturday, March 20, 2010

CyberLawTimes.com

***

Souce from http://www.cyberlawtimes.com/

Welcome to CyberLawTimes.com, a Cyber Law Portal !
CyberLawTimes.com brings to you cyber law news and cyberlaw updates from all around the world since 2006. They have a team of researchers and cyber laws experts to make this possible. As a member, you can gain knowledge as to changes in various cyber laws including the latest amended Information Technology Act 2000 or contribute cyber law articles. Further, CyberLawTimes.com also offer free basic consultancy to the cyber crime victims with the help of the panel of cyber law experts and cyber crime investigators or you can even try registering at the Discussion Forums and seek help from other members.

For any other help/guidance required in the field of Cyber Laws or Cyber Crime, you are welcome to ask question from their experts !

CyberLawTimes.com also provide consultancy services as to Cyber Law issues, Help to Cyber Crime Victims, Carry out Cyber Crime Investigations, etc. For the purpose they have panel of advocates/consultants specializing in Cyber Law matters and practicing at various High Courts/District Court in different cities all over India.

Further, the team of Cyber Law Consultants and Legal Experts can help you to make your websites cyber law compliant. CyberLawTimes.com can also help you to put up a disclaimer & Privacy Policy for your website to minimize your liability in case of any violation of law by a third-party user.
Cyber Law Consultancy is rendered subject to payment of fees in the name of Archer Softech Pvt Ltd. But you can get your basic cyber law queries answered for FREE. If you are interested in the Web-Development Services, please visit them at: www.archersoftech.com
P.S. They hold all the rights in the following Domain Names:

About CyberLawTimes.com
Archer Softech Pvt Ltd is a New Delhi based website designing firm mainly engaged in outsourcing of Web-Technologies. This Portal was launched in 2006 with a aim to provide a global platform to the cyber law students and professionals all around the world.
They have a team of Techno-Legal experts from all over India, who can help you solve your CyberLaw queries and guide you through the complicated Cyber Laws. Further you can browse through various sections like Forums, News, Articles, Newsletter, Consultancy, etc to help you gain extensive knowledge on the subject.
Other Features
  • Newsletter
  • Forums
  • Resources
  • Consultancy
  • FAQs
  • Contact

Group Offers Alternative to Cyber Regulations

***

CreditInternet Security Alliance Suggests 9 Incentives to Secure IT
EligibleDecember 3, 2009 - Eric Chabrow, Executive Editor, GovInfoSecurity.com

The Internet Security Alliance, an industry group affiliated with Carnegie Mellon's cybersecurity laboratory, issued a report Thursday that argues that giving businesses incentives and not regulating them will better safeguard the nation's IT systems.
Entitled Implementing the Obama Cybersecurity Strategy Via the ISA Social Contract Model, the ISA contends the process of developing effective regulations is inherently time consuming and that any regulations specific enough to assure improved cybersecurity would become outdated soon after their enactment.

The ISA report says cybersecurity is an enterprise-wide risk management that must be understood as much for its economic perspective as for its technical issues.
"Government's primary role ought to be to encourage the investment required to implement the standards, practices and technologies that have already been shown to be effective in improving cybersecurity," the 74-page report says.
Photobucket
ISA proposed nine incentives it contends could alter economic perspective with respect to investment in cybersecurity procedures, encouraging private entities to improve their security posture in the broad national interest:
  • Enact a Cyber Safety Act, patterned after the Safety Act that spurred physical development after the 9/11 attacks, by providing marketing and insurance benefits for companies that design, develop and implement of cybersecurity technology, standards and practices.
  • Tie federal monies - grants, Small Business Administration loans and stimulus and bailout money - to adoption of designated effective cybersecurity standards and best practices.
  • Leverage purchasing power of the federal government. Government could increase the value of security in the contracts it awards to the private sector, thereby encouraging broader inclusion of the level of security provided to government, which in turn could facilitate broad improvement of the cybersecurity posture among the owners and operators of the national critical IT infrastructure.
  • Streamline regulations and reduce complexity. Regulatory and legislative mandates and compliance frameworks that address information security, such as Sarbanes-Oxley, Gramm-Leach-Bliley, the Health Insurance Portability and Accountability Act, along with state regimes, could be analyzed to create a unified compliance mode for similar actions and to eliminate any wasteful overlaps.
  • Tax incentives for the development of and compliance with cybersecurity standards practices and use of technology. Tax credits can be made contingent upon compliance with established and pre-identified cybersecurity practices. Such incentives could encourage small and midsize businesses to implement cyber protections.
  • Provide grants and/or direct funding of cybersecurity research and development to companies that are developing and implementing cybersecurity technologies or best practices. Alternatively, R&D could be run through one or more of the federally funded R&D centers.
  • Limit liability for good actors. The government could create limited liability protections for certified products and processes or those certified against recognized industry best practices.
  • Create a national award for excellence in cybersecurity, akin to the Commerce Department's Malcolm Baldridge Award. Organizations may strive to receive the award as a means of differentiating themselves in marketing, particularly in a marketplace in which security concerns continue to increase.
  • Promote cyber insurance. Cyber insurance, if more broadly employed, could provide a set of uniform and constantly improving standards for corporations to adopt and to be measured against, all while simultaneously transferring a portion of risk that the federal government might face in the case of a major cyber event.
  • Besides incentives, the report also suggests ways to craft a new, practical model for information sharing; create an enterprise education program to properly structure industry; address the technical and legal disconnect created by digital systems; manage the global IT supply chain; and address the international nature of cybersecurity issues.

Friday, March 19, 2010

The Cyber Appellate Tribunal

***

Source from http://law.indiainfo.com/viewpoint/cyber-tribunal.html

Ever since the passing of the Information Technology Bill by both the Houses of Parliament, a lot has been said both for and against the Act. The controversy seems to have largely revolved around the fact that the police have been given unfettered powers to enter and search any place as well as the powers to arrest any person who is reasonably suspected to have committed or is about to commit an offence under the I.T. Act. The Government, on its part, has defended the above provisions by arguing that there is nothing new in enacting such a law and that similar provisions already exist in other statutes as well. Besides, there are adequate safeguards in the I.T. Act itself, which provides that the provisions of the Code of Criminal Procedure shall apply in relation to any entry, search or arrest made under the I.T. Act.

Be it as it may, it will not be long before the above provisions are subject to judicial scrutiny and ultimately it would be for the High Courts and the Supreme Court to decide whether the provisions of search, seizure and arrest are arbitrary or not.

What have so far escaped the public eye are the provisions relating to the Cyber Regulations Appellate Tribunal (CRAT) and more specifically, its composition. The I.T. Act envisages the establishment of CRATs at one or more places as the Government may deem fit. These Tribunals are placed lower in hierarchy to the High Courts and higher in hierarchy to the "adjudicating officer" The primary function of an "adjudicating officer" would be to hold an inquiry into whether any person has contravened the provisions of the I.T. Act and impose penalty accordingly. Although the CRAT does not seem to be vested with any original jurisdiction, it has been vested with the powers of a Civil Court in respect of, interalia,

  • summoning and examination of witnesses
  • requiring production of documents
  • receiving evidence
  • issuing commissions and
  • reviewing its decisions.

Typically, such powers are vested in a judicial body having original jurisdiction. Therefore, by being juxtaposed between the High Court and the "adjudicating officer", the CRAT would be both, an appellate authority as well as a fact finding authority, whose function would be to determine whether the provisions of the I.T Act have been contravened. Interestingly, the Act provides that the Tribunal shall consist of one person only (presiding officer) who is qualified to be a High Court judge or a member of the Indian Legal Services holding a Grade I post.

Apart from the factual issues that would be raised, the disputes before the CRAT are invariably going to involve the following legal issues as well:
  1. application of Private International Law (including the issue of "conflict of laws") in case the parties to the dispute belong to different nationalities;
  2. issues regarding jurisdiction; and
  3. application and interpretation of complex contractual, intellectual property and penal laws
Since the above issues are to be resolved vis- a -vis the laws pertaining to Information Technology, one would also need an in-depth knowledge of computer applications in the field of information technology. It is essential for the Tribunal to understand the technical aspects pertaining to digital signatures, cryptography etc. apart from keeping abreast with the latest developments in the field of Information Technology. While one cannot call into question the legal acumen of the presiding officer, as adequate safeguards are contained in the enactment to ensure that he possesses the requisite legal qualifications, it is still doubtful whether such presiding officer would possess the technological expertise and knowledge which is to be harmonized with the legal knowledge for resolving I.T. related disputes. It would therefore have been ideal for the CRAT to comprise of at least one judicial member and one technical member (with a computer science background) to effectively hear and resolve disputes before it. The omission of a technical member is all the more glaring since several tribunals/quasi judicial bodies like the Income Tax Appellate Tribunal, Sales Tax Tribunal, Central Administrative Tribunal, Company Law Board, Board for Industrial and Financial Reconstruction etc. have departmental members who assist the Presiding Officer or the judicial member in resolving the disputes.

Considering the fact that the case laws with respect to Information Technology are almost non-existent in our country and the decisions of the Cyber Regulations Appellate Tribunal are going to be trend setting, it is still not too late for the Government to consider amending the I.T Act and providing that the CRAT comprise of one technical member as well, which undoubtedly, is going to go a long way in ensuring that the correct concepts of Information Technology are applied while resolving I.T. disputes.

In The Uinted States Internet Crimes Will Not Remain Unreported Anymore

Link to us: http://snipurl.com/uwx0k
***
Source from http://www.ibls.com/internet_law_news_portal.aspx

According to the United States Federal Bureau of Investigation (FBI), the vast majority of cyber crimes are not reported, which allows the perpetrators to continue to carry out their crimes and victimize others. Reporting Internet-related crimes to appropriate law enforcement agencies at local, state, federal, or international levels, depending on the scope of the crime, is advisable as the first step to combat Internet illegality.

Who cyber crime victims should contact?
Should they contact the local police authorities, should they contact Internet Service Providers?

This article provides information on those law enforcement authorities with jurisdiction over certain cyber crimes. Despite technology and surveillance best efforts, cyber criminals continue raising their cyber crime statistics. Users may update software, install a firewall, monitor children’s internet habits, avoid unfamiliar emails; and still, fall victims of phishing scam, identity theft, internet pornography or many other cyber crimes. Internet users must know what to do if they are victims of a cyber crime; whether the crime involves identity theft, fraud, online solicitation, or stalking. In the United States for instance, many government agencies take the notice of cyber crimes.

The following are some of the primary U.S. Federal law enforcement agencies that investigate domestic crime on the Internet:
  1. the Federal Bureau of Investigation (FBI),
  2. the United States Secret Service,
  3. the United States Immigration and Customs Enforcement (ICE),
  4. the United States Postal Inspection Service, and
  5. the Bureau of Alcohol, Tobacco and Firearms (ATF)
These agencies have offices suitably located in every U.S. State to which crimes may be reported. Ordinarily, Federal crimes are reported to the proper local law enforcement office by a telephone call requesting the officer on duty. Some Federal law enforcement agencies have headquarters in Washington, D.C. These headquarters have agents who specialize in particular areas. For instance, the FBI and the U.S. Secret Service both have headquarters-based specialists in computer hacking cases.
Federal law enforcement agencies have various investigative units in charge of particular cyber crimes. Following there is a list of some Federal agencies with jurisdiction on certain cyber crimes,
  • For Computer intrusion (i.e. hacking) one should report to FBI local office, U.S. Secret Service or Internet Crime Complaint Center.
  • For password trafficking the reporting authorities are FBI local offices, U.S. Secret Service and the Internet Crime Complaint Center.
  • For counterfeiting of currency report to U.S. Secret Service.
  • For Internet fraud and SPAM person may contact to FBI local office, the U.S. Secret Service (Financial Crimes Division), and the Federal Trade Commission (online complaint). If the cyber crime involves securities fraud or investment-related SPAM e-mails, then one should approach the Securities and Exchange Commission (online complaint) and the Internet Crime Complaint Center.
  • For Internet harassment, the FBI local office is the reporting authority.
  • Internet bomb threats must be reported to the FBI local office and ATF local office.
  • For Internet trafficking in explosive or incendiary devices or firearms over, reports should be filed before the FBI local office and ATF local office.
Following there is a list of additional U.S. cyber crime reporting offices,
  • The Internet Crime Complaint Center (IC3): It is a partnership between the FBI and the National White Collar Crime Center (NW3C). Its mission is to serve as a vehicle to receive, develop, and refer criminal complaints pertaining to cyber crime.
  • Incidents relating to national security and infrastructure issues are to be reported before the Department of Homeland Security's National Infrastructure Coordinating Center.
  • The U.S. Computer Emergency Readiness Team (U.S. CERT) is the appropriate reporting authority for online technicians.

Thursday, March 18, 2010

Divining the Future of Law and Technology

***

What are the major Internet law and policy issues that are likely to crop up in 2002?

Larry Lessig, Professor, Stanford Law School
Microsoft and Disney will become the most important allies in defending the core values of the Internet.

Cass Sunstein, Professor, University of Chicago Law School
It's hard to predict the future. But let's look closely at (a) efforts to use to Internet to track terrorism and other crimes, (b) the possible diminution of privacy rights, and (c) efforts to censor apparently dangerous speech on the Internet.

James Boyle, Professor, Duke University Law School
If the Supreme Court signals some willingness to apply the First Amendment to intellectual property rules in a serious way, or to take seriously the restrictions of the Constitution's intellectual property clause, then the database bill will be in trouble. As a result it may be drafted in a less sweeping way. The converse is also true. Dismissive treatment from the Supreme Court will merely embolden the proponents of maximalist intellectual property protection. And in the long run, it is the property rules that will shape the Internet's future more thoroughly than the rules on censorship or filtering or taxation.

Marc Rotenberg, Executive Director, Electronic Privacy Information Center
The copyright industry was on a roll in the past year, knocking out Napster and defending the Digital Millennium Copyright Act. Now the question is whether consumers are ready for digital products that track users, report to manufacturers and shut down when licenses expire.

Jessica Litman, Professor, Wayne State University Law School
Some things will be watching in 2002: (1) What sorts of Internet privacy measures, those to enhance and those to diminish or prevent privacy and anonymity, will be acceptable in the wake of the September 11 terrorist attacks, and what will fly under the radar using prevention of terrorism as an excuse? (2) Whether a variety of government and business initiatives to respond to threats of cyber-terrorism will advance or undermine the adoption of open source software as an alternative to popular and currently vulnerable commercial computer programs.

Top 5 Pending Cases

Cyberlawcases.com seeks to cover the most important pending legal cases in “cyberlaw” broadly construed. That is, while we will cover cases typically discussed in cyberlaw courses, we will also include copyright, trademark, and patent cases that have a significant connection to networked environments or computer software.
***
Author Bios
  1. Brian W. Carver - Assistant Professor at UC Berkeley’s School of Information
  2. Joseph C. Gratz - Partner at Durie Tangri LLP
  3. Aaron K. Perzanowski - Assistant Professor at Wayne State University Law School
Top 5 Pending Cases (August 31st, 2009)
***
Case 1
Case name : The Google Books Settlement
Citation(s) of last decision(s) : The Authors Guild v. Google, Inc.
Docket No(s) : The McGraw-Hill Companies, Inc. v. Google, Inc.
Status :
  • December 14 – Supplemental Notice commences.
  • January 28 – Class member Opt outs are due.
  • February 4 – DOJ comment on settlement is due.
  • February 11 – Plaintiffs’ motion for final settlement approval is due.
  • February 18 – Final fairness hearing occurs in S.D.N.Y.
If approved, the Google Books settlement will dramatically impact the way books are accessed online and the copyright, competition, and privacy norms associated with such access. If rejected, there is a good chance that there will either be a revised settlement agreement for the court to consider or else a determination of a critical fair use issue affecting the future of copyright digitization efforts in the United States.
***
Case 2
Case name : The NSA Warrantless Wiretapping Cases
Citation(s) of last decision(s) :

  1. Jewel v. National Security Agency (N.D. Cal.).
  2. In re National Sec. Agency Telecom. Records Litig., (N.D. Cal. Jun. 3, 2009).
  3. Hepting v. AT&T Corp. (N.D. Cal.).
Docket No(s) :
  1. No. 08-04373
  2. No. M:06-01791
  3. No. 06-0672
Status :

  • In N.D. Cal. awaiting opinion on Defendants’ Motion to Dismiss and for Summary Judgment.
  • Some consolidated cases on appeal to 9th Cir., others briefing summary judgment motions in N.D. Cal.
  • Judgment entered in favor of Defendants in N.D. Cal. on Jul. 21, 2009 and on appeal to the 9th Cir. as No. 09-16676 with expected briefing schedule as follows: Opening brief Dec. 8, 2009, Opposition Feb. 10, 2010, and Reply Mar. 25, 2010.
***
Case 3
Case name : The Future of Method Patentability
Citation(s) of last decision(s) : In re Bilski, 545 F.3d 943 (Fed. Cir. 2008)
Docket No(s) : No. 2007-1130
Status :
On appeal to the Supreme Court as Bilski v. Kappos, No. 08-964. Oral argument held on Nov. 9, 2009.
The Supreme Court must decide where to draw the line between invention and abstract idea. The placement of this line could have a dramatic effect on any number of industries, from software to financial to pharmaceutical.
***
Case 4
Case name : A Billion Dollar Test of the DMCA Safe Harbors
Citation(s) of last decision(s) :

  1. Viacom Int’l Inc. v. YouTube, Inc. (S.D.N.Y.).
  2. The Football Ass’n Premier League Ltd. v. YouTube, Inc., (S.D.N.Y.)
Docket No(s) :

  1. No. 07-2103
  2. No. 07-03582
Status :
In discovery in S.D.N.Y. as No. 07-2103 and No. 07-03582.
***
Case 5
Case name : Is the FCC Authorized to Promote Net Neutrality?
Citation(s) of last decision(s) :
In the Matters of Formal Complaint of Free Press and Public Knowledge Against Comcast Corporation for Secretly Degrading Peer-to-Peer Applications, WC Docket No. 07-52 (FCC 2008).
Docket No(s) :

  1. WC Docket No. 07-52
  2. FCC 08-183
Status :
On appeal to the D.C. Cir. as Comcast Corp. v. FCC, No. 08-1291. Petitioner’s brief filed Jul. 27, 2009, Respondent’s brief filed Sep. 21, 2009, Petitioner’s Reply brief due Oct. 26, 2009, and Final briefs due Nov. 23, 2009.
Comcast’s challenge calls into question the Commission’s authority to implement any regulatory strategy to promote or maintain network neutrality absent an explicit congressional directive.

Wednesday, March 17, 2010

Cyber Law Enforcement Organization

Link to us: http://snipurl.com/uvyzf
***
Source from http://www.cyberlawenforcement.org/

The Cyber Law Enforcement Organization is a network of law enforcement officers, who specialize in cyber crime investigation, training other law enforcement officers and who assist cyber crime victims online. Their tip line handles child pornography, cyber stalking and missing children tips, as well as tips for cyber scams and fraud online. The Cyber Law Enforcement Organization also includes the Legal Eagles group of prosecutors, defense counsel and legal experts in the field of cyber crime, to help educate and guide the Internet community on crime prevention and reporting of cyber crimes.

The Cyber law Enforcement Organization (CLEO) has four main goals:
  1. To unite police officers worldwide and educate them on cyber crime, cyber law, investigative techniques and how they interact.
  2. To provide investigative assistance to police departments when requested.
  3. To provide online help and education for victims of cyber stalking, cyber harassment, pedophiles, hacking, and virus attacks, as well as access to support groups and online counseling.
  4. To standardize relations and communications between police departments, Internet Service Providers, Legal system contacts and victim advocacy groups worldwide.
Moreover, the Cyber Law Enforcement Organization provides training for those volunteer who apply to become law enforcement officer. Through the training provided, they are able to assist in some cyber crime cases or consultants. The application is intended only for law specialists interested in helping to educate the Internet community on Internet crime prevention and reporting of cyber crimes, as well as providing front line help in investigating cases from victims of cyber-stalking, pedophiles, fraud, hacking and missing children.
  • The steps for CLEO volunteer application:
  1. Download and print your preferred format of the application.
  2. Complete the application and mail it to the CLEO address on the application. Be sure to attach the appropriate authorization by your Agency Head or Designee on official agency letterhead. Failure to do this will result in delays in your application process.
  3. As soon as we receive your application, we will contact you by email with further instructions and let you know your status!
Contact:
  • Via E-mail
Contact: Oldog - oldog@cyberlawenforcement.com
Contact: Parry Aftab - parry@aftab.com
Contact: Team Directors - directors@cyberlawenforcement.com
  • Via Postal Mail
Cyberlawenforcement
Trenton Centre Post Office
P.O. Box 22073 Trenton
Ontario Canada K8V 6S3

Tuesday, March 16, 2010

Internet Lawyers – The 21st century internet service

Link to us: http://snipurl.com/uveb2
***
Source from http://www.traverselegal.com/
With the progress of the times, Internet has become part of our lives but because it is highly involved with everyone's daily lives, therefore, Internet has given us different influences. Cyber Law is to protect the rights of each of the users, but according to surveys, many users handle well in operating the Internet service, does not mean that they understand Internet law. In other words, sometimes when we encounter a problem, we do not know which channels to resolve it. This phenomenon will lead to greater spread of criminal organizations, increasing illegal internet crime and resulting in many innocent victims appeared. If you have a legal issue on the internet, you need an Internet Lawyer who understands the web, software and technology. Traverse Legal’s internet lawyers understand internet law and the technology which drives the web.

Internet Lawyers service is leading the discussion on:
  • Internet Law, Cyber Law
  • Trademark, Infringement, Registration
  • Domain Disputes, Cyber squatting
  • Copyright, Media Law, free speech
  • E-commerce Law
  • Trade Secret, Idea Protection
  • Governance, Fiduciary issues
  • General Counsel Service
The concept of Internet Lawyers created by an organization, Traverse Legal that provide legal professionals to answer the legal questions. As a niche law firm with controlled overhead and specialized practice areas, the organization can provide more cost-effective, knowledgeable and strategic representation than the other large firms.


Photobucket

Traverse Legal and Internet Lawyers service believe that when it comes to legal services, law firms can not afford to make a wrong decision. Before user select a law firm to represent their interest, Internet Lawyers service encourage users to speak with Traverse Legal. Their purpose is to commit to a level of excellence which users may not easily find in other law firms or lawyers.

The Mission :
  1. Law is a service business
  2. Value-Based Billing
  3. Technology Advantage Leveraging leading edge technology
  4. Experience and Expertise
If you have a legal matter which arose on the Internet, you need an Internet lawyer who understands Internet law. Contact an Internet lawyer today at Traverse Legal, PLC by calling international toll free (866) 936-7447.

Photobucket

More Details:
Traverse Legal, PLC
810 Cottageview Dr., G20, Traverse City, MI, 49684
(West Coast Office) 16830 Ventura Boulevard Suite 358, Los Angeles, CA 91436-1707
Maryland, Virgina, Washington DC Office, 22776 Three Notch Rd. ,Suite 201, Lexington Park, MD
231-932-0411 (phone)
866-936-7447 (toll free)
231-932-0636 (fax)

Friday, February 12, 2010

Will you get sued if you use Limewire?

Link to us: http://snipurl.com/v1qsb

When a piece of work by an artist becomes available to the general public it is considered part of the 'Public Domain'. It can become part of the public domain for three reasons:

1) the term of the copyright has expired.

2) the orginal author failed to gain a satisficatory copyright.

3) it a work belonging to the United States government.


There are numerous sites available with information for songs that are currently in the public domain. A google search with the following key words 'public domain' and 'music' will yield thousands of hits with information. One of the many useful sites is http://www.pdmusic.org/ which gives a list of genres, artists, and songs that are currently available for public use.

You are subject to lawsuits if you violate these copyrights. Here is advice and input on the question of whether you will get sued for using LimeWire:

A) Seems like "sharing" and "downloading" are different. if you look into all these lawsuits, at LEAST the VAST majority are people that are allowing their computers to be used as "supernodes", and I would bet money that ALL of the lawsuits are against people that have a shared folder on their computer with copywrited files on it, and they are allowing people to download from THEM. If you don't SHARE the music that you DOWNLOAD, then these lawyers probably won't even give you a second look. They have MUCH bigger fish to fry, with all the fools out there sharing a million files a day off their "downloaded music" folder. (Of course, these are the same fools that keep programs like LimeWire and KaZaa from becoming a digital DESERT with no files on them, so I don't mean to sound UNGRATEFUL; I'm just saying those are the ones getting sued.)

B) If you download a dummy file


C) There is always the chance that you will be one of the unfortunate ones who are caught and made an example of. You have to decide if using Limewire or similar software in an illegal manner - and sharing music, software, or any other copyright protected material IS illegal - is worth the risk. Personally, it's not a risk I would be willing to take. Remember, just because "everyone else is doing it" doesn't change the fact that it is legally, morally and ethically wrong. People DO get caught and they DO get prosecuted. You obviously know it's wrong or you wouldn't be concerned, correct? Do the right thing and you won't ever have to worry about getting sued.

D) It seems to me that the record companies and their people are trying to intimidate everyone into believing that file sharing is illegal. If I own the CD, cassette, or vinyl LP, and if it is legal to download those songs - so I don't have to make MP3's myself, then everyone needs to know they can do that without threats from anyone. If that is not legal, then it should be a simple answer from the experts. What about X-mas music. Can the same song be copyrighted by many different people? What about classical music that was written 200 years ago. Copyrighted? Graphics, stories, spreadsheets and many many other documents are perfectly legal to share without interference from any law enforcement.


E) You might get sued if you use LimeWire. The program is legal. However, if you use it to download music and other programs, it is illegal. If you were downloading uncopyrighted music, then the program would be legal. However, since almost all music is copyrighted, the program is very illegal. LimeWire and Kazaa are file sharing programs. This means that the files that you can download on these programs are files that are being shared with billions of other people across the globe. If you have downloaded these programs into your hard drive, they are still shared programs. Because these programs are in your hard drive, they are still being shared, so essentially, your hard drive is being shared as well. If you have done any school assignments on your computer, these have your first and last name on them. This opens up your identity to the public. Also, because these files are still being shared from your hard drive, law enforcement can target your internet connection by using your IP (Internet Protocol) address, and using these numbers (of your IP address), they can target you. To see what I'm talking about, and to see just how scary this is, click on the link. If law enforcement finds you, you will probably have to pay a fine to all of the recording companies or distributors of the songs/programs that you have downloaded, and you may be sued.

F) Rule of Thumb- You get sued if you download and distribute, sell, share the music. You get fined if you download the music for personal use.

Wednesday, February 10, 2010

Is LimeWire Legal?

Link to us: http://snipurl.com/ubqxm
***
http://communication.howstuffworks.com/limewire3.htm

Photobucket

http://pcwin.com/media/images/screen/74521-limewire_turbo.jpg

LimeWire, the software application, is completely legal. What many people do with LimeWire is namely downloading and distributing copyright material which is completely not legal. LimeWire's defense statement is that its software is a tool. Like any other tool, its use is dependent on the users. The same hammer that helps build a house can be used to break the back window and rob it. The person who sells the hammer can't be held responsible for how it's used, right?

But we're not talking about hammers. We're talking about software that millions of people use exclusively for illegally sharing copyrighted material. The U.S. Supreme Court, in its 2005 ruling against the maker of the file-sharing software Grokster and Morpheus, found that the company was intentionally positioning itself as a replacement for Napster (Grokster and Napster, for example, both have names that ends with "ster"). That was enough for the court to rule that Grokster and Morpheus encouraged their users to engage in illegal behavior.

In August 2006, several large record companies sued LimeWire for encouraging Internet piracy. They're asking for $150,000 for each song distributed without permission of, settled with the music industry for $115 million and installed special filters on its software to block copyright material. As of this writing, the case against LimeWire is still pending.

Even if LimeWire is found not guilty, its users are still vulnerable. Since September 2003, the Recording Industry Association of America (RIAA) has initiated lawsuits against more than 20,000 individuals for alleged illegal file-sharing. The accused individuals receive a letter from the RIAA's lawyers with a settlement offer to avoid going to court. The individuals are identified by their IP addresses. If the individual refuses to pay the settlement which is typically between $3,000 and $11,000 then the RIAA threatens to sue them by name for a larger amount.

Even with the RIAA's legal assault on software companies and individuals, the number of active worldwide file-sharers continues to grow. And if LimeWire gets shut down tomorrow, there are already dozens of other programs poised to take its place.

Tuesday, February 9, 2010

Weekly Poll Result Analysis 3

***

Based on the result, seven out of nine participants have agreed with Cyber Law has strongly affected their freedom in internet usage.


Photobucket



Photobucket



Photobucket



According to the first answer, Cyber law constraint us from entering certain web page, it comes with benefits and also disadvantages in different aspects. The advantage is that ensure internet user as much as possible to avoid unnecessary contact with unhealthy information, and even those web page which brings threat to society. From another point of view, this will cause a lot of inconvenience, because each country is different on the page limit. For example, Facebook and Blogger are banned in China however Facebook and Blogger are being so popular in Malaysia.

Without a proper approval or permission from original company for downloading can be known as illegal download. For example, from software, video, music to etc. Although almost every Internet users have some knowledge of Cyber Law and regulations, but the majority of users still insist on illegal downloading. The simple reason is because it is F.O.C, Free of Charge. Illegal downloading has against the law of Copyright and it brings negative effect on the industry development. However, internet users will still wish to get a free downloading compare to purchase it.

The biggest advantage of internet development is we can through the Internet to get the latest information to increase knowledge. However, Cyber Law such as copyright or Communication and Multimedia Act limit us in the use of information. For example, only allow free publish for part of the information. While internet users are feeling inconvenience, try to think it in another way. Such cyber law is to ensure that users are not misuse of available information and give community and author a protection.

Cyber Law brings some impact on internet usage but for some purely online chat users, or to the user only focus on a web page, they might think their freedom on internet usage will not be affected. In other words, they are not active on internet.

In short, most of the internet users find that it is difficult to understand and support the Government in developing cyber law, due to the freedom of internet usage do not be respected. In my opinion, I think as a internet user, we should try to stand in government’s shoe, for certain Cyber Law, it can really give us a protection however government need to give a compelling reason.

Thursday, February 4, 2010

How You Can Work With Cyber Law to Protect Yourself

***

A simple search online will bring up thousands of stories of people being defrauded by fake websites pretending to sell information to help you start your own business, or even memberships to get you started in your own internet business. But what is happening to the people who are responsible for these scams? Well, there are Laws that protect the consumer, but anyone with any real knowledge of the industry is aware that Information Technology law, the laws that govern internet usage is really in its infancy stage. However, the dominating effect that the internet has had on the community and popular culture has suddenly put Info Tech law into high gear.

Photobucket
http://media.photobucket.com/image/law/frankobel_photo/thelaw250.png?o=5

In the past year or so, the Federal Trade Commission has created laws that impact those who blog or try to sell things on the internet. People who blog are no longer able to write whatever they wish at will. Now they must say up front that their writings are opinions, and that they no way qualify as an expert. This is how Cyber Law works as a protection for internet user from misleading.
Unfortunately, this is not stopping the Google profits scam artists. If you search Google "home income," scam after scam still pops up. The reason is that these people actually know much more about Cyber Law and the new FTC regulations than the average consumer. The average consumer does not go to the Federal Trade Commission website before online shopping.

Cyber law is much like law in the real world just because stealing your purse is illegal, doesn't mean you are not at risk for it happening to you. You must be smart, watch the people around you, have your purse securely on your arm and even hold on the strap with your hand and show the muggers of the world that you won't be an easy target. The Federal Trade Commission or Cyber Law can only protect you once a crime has been committed. You, on the other hand, are the one who can prevent a crime from happening.

Wednesday, February 3, 2010

Case Study : Hacking & Cyber Law

Link to us : http://snipurl.com/u9gck
***

Case United States v. Morris, 928 F.2d 504, (March 7, 2001)
http://cyber.law.harvard.edu/ilaw/Cybercrime/

Morris was a first-year graduate student in Cornell University's computer science Ph.D. program and he entered Cornell, he was given an account on the computer at the Computer Science Division. This account gave him explicit authorization to use computers at Cornell.

In October 1988, Morris began work on a computer program, later known as the INTERNET "worm" or "virus." The goal of this program was to demonstrate the inadequacies of current security measures on computer networks by exploiting the security defects that Morris had discovered. The tactic he selected was release of a worm into network computers. Morris sought to program the INTERNET worm to spread widely without drawing attention to itself. Morris programmed the worm to make it difficult to detect and read in asking the question of having(yes) or not having(no) the worm copy, so that other programmers would not be able to "kill" the worm easily. As it turned out, Morris underestimated the number of times a computer would be asked the question, and his one-out-of-seven ratio resulted in far more copying than he had anticipated.

On November 2, 1988, Morris released the worm from a computer at the Massachusetts Institute of Technology. MIT was selected to disguise the fact that the worm came from Morris at Cornell. Morris soon discovered that the worm was replicating and reinfecting machines at a much faster rate than he had anticipated. Ultimately, many machines at locations around the country either crashed or became "catatonic." When Morris realized what was happening, he contacted a friend at Harvard to discuss a solution. Eventually, they sent an anonymous message from Harvard over the network, instructing programmers how to kill the worm and prevent reinfection. However, because the network route was clogged, this message did not get through until it was too late. Computers were affected at numerous installations, including leading universities, military sites, and medical research facilities. The estimated cost of dealing with the worm at each installation ranged from $200 to more than $53,000.

Morris was found guilty, following a jury trial, of violating 18 U.S.C. � 1030(a)(5)(A). He was sentenced to three years of probation, 400 hours of community service, a fine of $10,050, and the costs of his supervision.

Monday, February 1, 2010

Weekly Poll Result Analysis 2

***
Question:
How did you react to Cyber Law?
Answer 1: Ignore it.
Answer 2: Only concern when serious criminal activities involved.
Answer 3: Always follow every single Cyber Law rules & regulation.
Answer 4: I don't know
answer 5: None of these
----------
From the weekly poll survey, there are 10 respondents participated in answering the quick poll section from 26 Jan 2010, Tuesday to 31 Jan 2010, Sunday.

Photobucket

Photobucket

When the respondents are being questioned how they would react to Cyber Law, 20% or 2 out of the 10 people actually answered “I don’t know”. This shows that some of the internet user doesn’t concern about the law or they didn’t know that the laws exist. This is a very important issue because they might do some activities without knowing that it is actually illegal. We should increase the awareness towards these people because not only they will break the law; they might be the victim of internet crimes too. They should know the rights and wrongs in the cyberspace.

The majority answers of the respondents which is 60% or 6 out of 10 respondents answered is “only concern when serious criminal activities involved”. In our country, everybody doesn’t seem to care about an issue unless something had happened. This is actually very negative because people are not taking safety precautions. They should be advised to follow every rules and regulation whenever they are using the internet because this is for the user’s good. Everything will be too late when something had happened.

In the third answer, amazingly there are nobody who answered “follow every single cyber law rules and regulation”. This actually shows that none of the people actually follows the rules and regulation of cyber law in Malaysia. There must be certain reasons why the people don’t seem to care about these laws. Subjects regarding Cyber Law should be created to teach high school students and college students so that people will abide the law. This is the reason why in our cyberspace is so vulnerable to criminal activities and many people has became victim of frauds. Everybody who uses the internet have the responsibility to know about the rules and regulation.

In the fourth answer, there are 20% or 2 out of 10 people who answered “I don’t know”. They might be confused with the internet cultural that we have or maybe they wanted to react towards cyber law but there is not much information about it in Malaysia. There are nobody choose the last answer which is “none of the above”.

In conclusion, people don’t react well to Cyber Law. Cyber crimes is increasing and definitely we need more ways to increase the awareness about how important is cyber law. Ignoring the law may create more havoc and heavy punishment shall be given to the criminals who broke the law. If we can create a peaceful cyberspace it would improve the quality of the internet usage and people will have confidence and trust in internet commerce. We all know that internet is a very useful and powerful tool that human ever created. It is our responsibility to protect and preserve this tool but not abusing it.

Thursday, January 28, 2010

Internet freedom Discussion Topic

***
Freedom that kills, or kill the freedom?

Photobucket

http://resonantvibes.com/blog/wp-content/uploads/2008/10/illegal-downloading1.jpg


Not everybody in our country actually supports every single rules and regulation in Cyber Law. Well of course there are benefits for those who misuse the internet but at the same time we might do some damage to other people and we do not know when we will be a victim of cyber crime.

Most of the people who use the internet in Malaysia actually know how to download song files, movies, novels and it is actually a good way to save because the original products will actually cost us quite an amount of money. Not only by downloading, most of the young people nowadays knows how to stream online and watch movies or shows which is provided by certain software such as PPStream. This has actually given us some benefits because in Malaysia the government will not track us down and punish us unlike other countries. Some people might abuse the internet and scams other people for their own benefits. Private information such as credit card information, banking accounts, email accounts are the main targets for the scammers as they will steal your money through these areas.

On the other hand, the main reason for the need for the cyber law is the growth of the electronic commerce which makes it necessary to have effective laws. Private information will be vulnerable to hackers because almost everybody does transactions over the internet. E-commerce has become a huge activity in this world today and we must protect it from the people who called internet criminals from attacking people. The computer users that download illegal files from the internet are actually affecting the company who owns the original files. Even though the file is just a small file but what if the whole country is downloading the file but not buying the original product? We have all violated the rule because we are not using the product legally.

If businesses can make great use of the internet tools, so can the criminals.
Do you think that it is right to continue the internet freedom in Malaysia or shall we stop all the illegal activities in the internet? Please share you opinion.

Wednesday, January 27, 2010

Weekly Poll Result Analysis

Link to us: http://snipurl.com/u7ga3
***

Photobucket


Photobucket

From the weekly poll survey, there are 17 respondents participated in answering the quick poll section from 17 Jan 2010, Saturday to 23 Jan 2010, Saturday.

One of them is not sure or do not know about the best description of Cyber Law. This showed that most of the internet computer users at least have doundation knowledge on Cyber Law. The answer “Not sure/Don’t know” explained that although e-education became a basic activity everyday, but it does not means that all of the internet computer user will be familiar with Cyber rules and regulation. The reason is the users might only concentrate on their needed application, website and online knowledge. Thus, although in the first week poll section “Not sure/Don’t know” just scored 6% however, government should cooperate with law department and education sectors to ensure all of the internet computer users are aware to Cyber Law in order to avoid unnecessary illegal activities involved.

12% which is 2 out of 17 respondents choosed the answer “Protect the value of information”. This is not the wrong answer but it is not a complete answer as well. We believe that value of information play a very important part in internet world. There is many different information exchanging everyday through the internet from images, text, video, and more media elements, it is hardly to control other might misuse the information or copied from any other person’s work. In order to protect the value of original information, Copyright Act is one of the most common Cyber Laws in Malaysia and other countries. Come back to the CyberLaw.blogspot.com poll section, the internet computer users still do not really understanding Cyber Law because some of them only realized part of the role in cyber law.

From the result, part of the respondents choosed “protect computer user privacy” as the answer. Same as above, this is an incomplete answer. 4 out of 17 respondents found that Cyber Law is created for the purpose of protect internet computer user privacy. In our opinion, this is because after the internet became a daily activity, there are many illegal criminal activities involved which is against the privacy. For example, Cyber stalking or Hacking happened all around the world. Nothing to be doubt, those criminal acts have bring many troubles to the internet users. Some of the personal details or information might get spread through internet and it is hardly to stop it.

No matter “protect the value of information” or “protect the computer user privacy”, Cyber Law is created to protect both of it and even more than these. Most of the respondents agreed that Cyber Law can protect information and self-privacy. 59% of them have the basic knowledge and aware toward Cyber Law. This is a good sign that with the basic awareness, Cyber Law can helps up in controlling the discipline in internet activities. For the answer “others”, none of the respondents voted for it. It is clearly explained that because respondents do not hold the strong Cyber Law knowledge so they prefer go for answers showed in the poll.

In conclusion, internet computer users do have basic knowledge on Cyber Law but they do not really familiar with it. Actually, Cyber Law is not just covered the value of information and privacy but it is more than that. Different countries come with different Cyber Law, government and education sector should put in more efforts on education the Cyber Law to internet users. This will be one of the best strategy to reduce internet criminal activities.

Tuesday, January 26, 2010

Specific legal Instrument on Information Infrastructure

Link to us: http://snipurl.com/u71ny
***

Photobucket

Communication and Multimedia Act
Purpose: to promote national policy objectives for the communications and multimedia industry which is establishing a licensing and regulatory framework in support of national policy for the communications and multimedia industry. The Communications and Multimedia Act 1998 is based on the basic principles of transparency and clarity; more competition and less regulation; flexibility; bias towards generic rules; regulatory forbearance; emphasis on process rather than content; administrative and sector transparency; and industry self-regulation.

*
Computer Crimes Act
Purposes: a person secures access to any program or data held in a computer if, by causing a computer to perform any function, he alters or erases the program or data. Copying and moving the data to any storage medium other than that in which it is held or to a different location in the storage medium in which it is held. This will causes it to be output from the computer in which it is held whether by having it displayed or in any other manner. The explanation of this Act is basically about the misuse of internet for an inappropriate reason. Computer Crimes such as hacking, obtaining private organization data, creating a threat to the government is all classified under cyber terrorism.

*
Digital Signature Act
http://www.parlimen.gov.my/actindexbi/pdf/ACT-562.pdf

Purpose: This Act is to manifest approval of a certificate while knowing or having notice of its content or to apply to a licensed certification authority for a certificate, without revoking the application by delivering notice of the revocation to the licensed certification authority, and obtaining a signed, written receipt from the licensed certification authority, if the licensed certification authority subsequently issues a certificate based on the application. A digital signature is an electronic means of authenticating an online identity. A digital signature can: Authenticate the identity of the sender of a message or signer of a document. Encrypt the message so that it can only be read by the intended recipient. Be used to ensure that the original content of the message is unchanged. The message can be attributable to the sender and be automatically time-stamped.

*
BNM Minimum Guidelines in Internet Banking in Malaysia
http://www.bnm.gov.my/files/publication/ar/en/2004/cp05_002_whitebox.pdf
Purpose: Further initiatives were undertaken to strengthen the safety and soundness of the financial system and promote competition and efficiency in the banking industry. In addition, measures were implemented to ensure continuous access to financing as well as to enhance consumer protection and confidence in the banking sector. There are loads of Minimum Guidelines in BNM such as cheques, investment, insurance and Takaful and Shariah. This Guideline has enabled us to use internet banking with more confidence and it has minimized our task because we don’t need to go bank. All the banks in Malaysia have to fulfill the objectives and security which is set by the BNM so that they can minimize internet fraud.

*
Content Code
http://www.asialaw.com/Article/2097604/Search/Results/New-guidance-on-comparative-advertising.html?Keywords=Content+Code
Purpose: The Content Code adopted by the Communications and Multimedia Content Forum (CMCF) of Malaysia sets out best practices for online standards and broadcast content. The Code generally allows comparative advertising in advertisements with other advertisers or products in the interests of competition subject to the following conditions;
(a) Principles of fair competition are respected, without consumers likely being misled
(b) Comparisons shall not confer an artificial advantage upon the advertiser or misleadingly suggest a better bargain; and
(c) Comparisons shall be based on substantiated facts and shall be the same for all products compared, so that like is compared with like.

*
Electronic Commerce Act 2006
http://www.scribd.com/doc/24227541/Cyber-Law
Purpose: This is an Act to provide for legal recognition of electronic messages in commercial transactions. The use of the electronic messages to fulfill legal requirements and to enable facilitates commercial transactions through the use of electronic means and other matters connected therewith. E-commerce is a new way of conduction, managing and executing business transactions using modern means of information technology. It refers to all forms of transactions relation to commercial activities, including both organizations and individuals that are based upon the processing and transmission of digitized data, including text sound and visual image.
- Victor Chew -

Thursday, January 21, 2010

Malaysia Cyber Law Discussion Topic

***
Date - December 12, 2007, 19.03pm
Title - Malaysia should focus more on enforcing Cyber Law, Says Microsoft
Photobucket
Microsoft Corporation’s corporate vice – President Pamela S.Passman said that Malaysia should keep up-to-date with the latest cybercrime-related activities in order to deal with the current issues on Information and Communications Technology (ICT). Moreover, she advised Malaysia to invest on the law enforcement training to build up a legal infrastructure to serve as deterrent to cybercrime activities.


Malaysia has introduced an developed several cyber law which including :-Communication and multimedia Act, Computer Crimes Act, Digital Signature Act, Content Code, Copy Right Act and others that can be found in post 1.
Photobucket
However, as a computer internet user, I found that cyber law in Malaysia is totally incomplete. In this case, I would rate 2 out of 10 for the satisfaction toward Malaysia Cyber Law because Malaysia government does not really care about what the people do in the internet as long as it doesn’t concern serious criminal acts such as terrorism or creating riots. Cyber law in Malaysia can’t work because of the weak law enforcement and most likely there will be no criminal charges on the people who violated the laws. The other factors that made Malaysia vulnerable to internet crimes are because of the government body which are not able to stop other major crimes in Malaysia such as Free illegal Download. People will start to do these because they knew that the government wouldn’t care less.

In order to enforce the internet laws in Malaysia, the government has to start from the root of the problem such as banning all illegal cyber activities. Heavy punishment such as jail sentence and fines on the people who violated rules and regulations of the internet law will also help to reduce cybercrime activities. Last but not least, streaming application such as PPStream and free download website such as Limewire should be banned in Malaysia because it has fully violated the copyright and licensing law.
-Koli Law-

Dear Visitors,
Do you have any opinions toward Cyber Law in Malaysia? Please, s
hare with us.

Tuesday, January 19, 2010

Why Cyber Law?

***
Souce From
When internet was developed, a very large number of computers all connected together which allowed it became part of our life. Due to the reason that cyber threats and crime are very cheap and easy to create, as most of us today at least have basic computer knowledge, thus, internet could transform itself into an all pervading revolution which could be misused for criminal activities. Due to the anonymous nature of the internet, it is possible to engage into a variety of criminal activities in cyberspace. Hence, Cyber Law is needed among all the countries.

Photobucket
According to The Star on 6th January 2009, the report from Minister of Water, energy and Communications saying that the ministry had submitted more than 30 cyber crime cases to the Attorney Chambers in the last three years, the same was reported by Bernama. This fact alone is quite alarming.
SO, DO WE NEED A CYBER LAW TO CONTROL IT?
Yes, we do.

In my view, Cyber Law is important because it touches almost all aspects of activities on and concerning the Internet, the World Wide Web and Cyberspace. Whether we realize it or not, every activity of yours in Cyberspace will have some legal and Cyber legal perspectives. At every point of time, there are various Cyber Law issue involved. You may just ignore about it today because you feel that Cyber Law do not have any impact on your Cyber activities. But sooner or later, you will take note of Cyber Law is good for your own benefit.

So, Does Cyber Law concern you?
Yes, for sure!

***

While Malaysia has provisions in the law to prosecute cyber threats, however it is lacks in term of enforcement. Malaysia should focus more on enforcing Cyber Law, said Microsoft Corporation’s corporate vice- president Pamela S.Passman.

This will be the next chapter for discussion.

- Victor Chew Zee Zing –