Sunday, March 21, 2010
FBI to Create International Cyber-Law Enforcement Agency
Source from http://mashable.com/2008/03/20/fbi-cyberlaw/
One of the beauties, if you can call it that, of organized crime is that while the criminal organizations of the world respect none of the boundaries that we call jurisdictions and countries, and by definition, the rule of law must respect those boundaries. These criminals, whether they be the traditional mob that we all know and love or the terrorist organizations bent on the destruction of civilization as we know it, have for more than a decade or two have known about and exploited this fact.
In fact, during the last decade and a half, organized crime has collaborated amongst the various sects (Italian, Russian, Columbian, etc) according to their various specialties across international jurisdictions and boundaries, much to the consternation of law enforcement of all nationalities. What’s even worse is the explosion of digital crimes that take place on a grand scale (as ‘inconsequential’ as spamming or bot-nets or as significant as money laundering) thanks to advances in the Internet and communication technology.
Technovelgy today is reporting that the FBI has finally had enough of this problem, and is hosting a gathering of the world’s intelligence organizations this May for a three day conference. Invited to participate is, aside from the FBI, the Royal Canadian Mounted Police, Australian Federal Police, New Zealand Police and the UK’s Serious Organised Crime Agency.
Amongst other goals of the conference, the most interesting is to set up a special area on Law Enforcement Online, the FBI’s secure Internet portal, to share intelligence internationally and create a bulletin system that will make member agencies more aware of accidental leaks that occur from thefts or accidentally dropping classified documents into your porn thumb drive or shared folder on your P2P client.
On the one hand, it does seem a bit like an issue of “What, you’re just now getting around to this?”. On the other, though, it does seem like this sort of international collaboration can lead to the circumvention of legal hurdles that we’ve constitutionally created preventing international spy agencies from becoming domestic spy agencies, and vice versa (separation of powers). Unfortunately, I’m not up on my domestic spying laws and regulations, so smarter policy wonks than I should be tackling this issue soon, but it is a significant development in terms of online law enforcement, and worthy of note.
The Obstacles Facing Cyber Law Enforcement
Controlling of Online Crimes Through Cyber Law Enforcement Practices
Link to us: http://snipurl.com/uz44g
***
source from http//www.online-law.co.uk/127
Organizations like Cyber Crime Law Enforcement Organization, Cybercrime Coordinate Unit, Cybertip.ca, INHOPE, Cyber Crime Control Unit, Internet Crime Complaint Center, Internet Fraud Complaint Center, etc. are some of the most important units that stop cyber crime to expand in rapid succession, across the globe. For instance, cyber law enforcement organization is an international panel that tracks down the different pockets of crime that goes on throughout the internet. There are proper vigilance processes that go over cyberlaws, investigative processes and techniques as well as locations of interactions that keep going on online. There are processes of cyberstalking along provisions of online education and spreading of knowledge regarding the different forms of cyber crimes that keep on going. There are spreading support groups that locally function near you in order to lodge and assess your complaints regarding anything that bothers you online. Pedophile activities, pornography, fraudulent processes, etc. all can be tracked down through these media. Even hacking and virus attack can be protected and addressed when understanding or taking help from cyber crime control units.
International units of varying degrees and order bring forth standardization of relations and communications between the crime control department and the local police. The Internet Service Providers can also be tracked down through IP address and the root of the crime can be spotted this way. There are worldwide groups extended to check on the varied pockets of cyber crime. There are law groups that support victims and bring advocacy groups together in order to help legal justice to prevail. When complained of any harassment or reported deals with cyber crime, there can be complete tracking down of the root of the problem through proper investigation. Support groups and online counseling are even provided for the victims so that they can rise up against the emergency of such problems. Cybertip.ca, for instance, is Canada’s international tipline for reaching for help in any cyber related problems. From online sexual exploitation to abuse and misuse of children’s photos to any form of harassment or non paid services, all issues can be addressed with hope at this point.
There are varied degrees of cyber crime reports including extremes of racism, unlawful acts or abuse within communities and forums, any form of threat or misuse of information and so on. Misuse of animals, any form of humanity related issues and even spreading of viruses or spam through email can be complained against through complain. Any form of repeated abuse source is in fact easy to track down as the cyber police have their own ways to track down these sites and their owners.
The internet can be a scary place without understanding the protecting and governing forces of cyber laws but then there have been proper establishment of laws that are there to control all these illegal processes. In terms of any unlawful entry, one should not hesitate to complain at any of the centers. There are plenty of legal aid support and protection areas that bring positive results in terms of cyber crime increase.
Investigation and assessment of any root of crime is always promised through the local team that deals with cyber law assistance.
Saturday, March 20, 2010
CyberLawTimes.com
- Newsletter
- Forums
- Resources
- Consultancy
- FAQs
- Contact
Group Offers Alternative to Cyber Regulations
The Internet Security Alliance, an industry group affiliated with Carnegie Mellon's cybersecurity laboratory, issued a report Thursday that argues that giving businesses incentives and not regulating them will better safeguard the nation's IT systems.
- Enact a Cyber Safety Act, patterned after the Safety Act that spurred physical development after the 9/11 attacks, by providing marketing and insurance benefits for companies that design, develop and implement of cybersecurity technology, standards and practices.
- Tie federal monies - grants, Small Business Administration loans and stimulus and bailout money - to adoption of designated effective cybersecurity standards and best practices.
- Leverage purchasing power of the federal government. Government could increase the value of security in the contracts it awards to the private sector, thereby encouraging broader inclusion of the level of security provided to government, which in turn could facilitate broad improvement of the cybersecurity posture among the owners and operators of the national critical IT infrastructure.
- Streamline regulations and reduce complexity. Regulatory and legislative mandates and compliance frameworks that address information security, such as Sarbanes-Oxley, Gramm-Leach-Bliley, the Health Insurance Portability and Accountability Act, along with state regimes, could be analyzed to create a unified compliance mode for similar actions and to eliminate any wasteful overlaps.
- Tax incentives for the development of and compliance with cybersecurity standards practices and use of technology. Tax credits can be made contingent upon compliance with established and pre-identified cybersecurity practices. Such incentives could encourage small and midsize businesses to implement cyber protections.
- Provide grants and/or direct funding of cybersecurity research and development to companies that are developing and implementing cybersecurity technologies or best practices. Alternatively, R&D could be run through one or more of the federally funded R&D centers.
- Limit liability for good actors. The government could create limited liability protections for certified products and processes or those certified against recognized industry best practices.
- Create a national award for excellence in cybersecurity, akin to the Commerce Department's Malcolm Baldridge Award. Organizations may strive to receive the award as a means of differentiating themselves in marketing, particularly in a marketplace in which security concerns continue to increase.
- Promote cyber insurance. Cyber insurance, if more broadly employed, could provide a set of uniform and constantly improving standards for corporations to adopt and to be measured against, all while simultaneously transferring a portion of risk that the federal government might face in the case of a major cyber event.
- Besides incentives, the report also suggests ways to craft a new, practical model for information sharing; create an enterprise education program to properly structure industry; address the technical and legal disconnect created by digital systems; manage the global IT supply chain; and address the international nature of cybersecurity issues.
Friday, March 19, 2010
The Cyber Appellate Tribunal
- summoning and examination of witnesses
- requiring production of documents
- receiving evidence
- issuing commissions and
- reviewing its decisions.
- application of Private International Law (including the issue of "conflict of laws") in case the parties to the dispute belong to different nationalities;
- issues regarding jurisdiction; and
- application and interpretation of complex contractual, intellectual property and penal laws
In The Uinted States Internet Crimes Will Not Remain Unreported Anymore
***
- the Federal Bureau of Investigation (FBI),
- the United States Secret Service,
- the United States Immigration and Customs Enforcement (ICE),
- the United States Postal Inspection Service, and
- the Bureau of Alcohol, Tobacco and Firearms (ATF)
- For Computer intrusion (i.e. hacking) one should report to FBI local office, U.S. Secret Service or Internet Crime Complaint Center.
- For password trafficking the reporting authorities are FBI local offices, U.S. Secret Service and the Internet Crime Complaint Center.
- For counterfeiting of currency report to U.S. Secret Service.
- For Internet fraud and SPAM person may contact to FBI local office, the U.S. Secret Service (Financial Crimes Division), and the Federal Trade Commission (online complaint). If the cyber crime involves securities fraud or investment-related SPAM e-mails, then one should approach the Securities and Exchange Commission (online complaint) and the Internet Crime Complaint Center.
- For Internet harassment, the FBI local office is the reporting authority.
- Internet bomb threats must be reported to the FBI local office and ATF local office.
- For Internet trafficking in explosive or incendiary devices or firearms over, reports should be filed before the FBI local office and ATF local office.
- The Internet Crime Complaint Center (IC3): It is a partnership between the FBI and the National White Collar Crime Center (NW3C). Its mission is to serve as a vehicle to receive, develop, and refer criminal complaints pertaining to cyber crime.
- Incidents relating to national security and infrastructure issues are to be reported before the Department of Homeland Security's National Infrastructure Coordinating Center.
- The U.S. Computer Emergency Readiness Team (U.S. CERT) is the appropriate reporting authority for online technicians.
Thursday, March 18, 2010
Divining the Future of Law and Technology
Top 5 Pending Cases
- Brian W. Carver - Assistant Professor at UC Berkeley’s School of Information
- Joseph C. Gratz - Partner at Durie Tangri LLP
- Aaron K. Perzanowski - Assistant Professor at Wayne State University Law School
- December 14 – Supplemental Notice commences.
- January 28 – Class member Opt outs are due.
- February 4 – DOJ comment on settlement is due.
- February 11 – Plaintiffs’ motion for final settlement approval is due.
- February 18 – Final fairness hearing occurs in S.D.N.Y.
- Jewel v. National Security Agency (N.D. Cal.).
- In re National Sec. Agency Telecom. Records Litig., (N.D. Cal. Jun. 3, 2009).
- Hepting v. AT&T Corp. (N.D. Cal.).
- No. 08-04373
- No. M:06-01791
- No. 06-0672
- In N.D. Cal. awaiting opinion on Defendants’ Motion to Dismiss and for Summary Judgment.
- Some consolidated cases on appeal to 9th Cir., others briefing summary judgment motions in N.D. Cal.
- Judgment entered in favor of Defendants in N.D. Cal. on Jul. 21, 2009 and on appeal to the 9th Cir. as No. 09-16676 with expected briefing schedule as follows: Opening brief Dec. 8, 2009, Opposition Feb. 10, 2010, and Reply Mar. 25, 2010.
Case 3
- Viacom Int’l Inc. v. YouTube, Inc. (S.D.N.Y.).
- The Football Ass’n Premier League Ltd. v. YouTube, Inc., (S.D.N.Y.)
- No. 07-2103
- No. 07-03582
- WC Docket No. 07-52
- FCC 08-183
Wednesday, March 17, 2010
Cyber Law Enforcement Organization
***
Source from http://www.cyberlawenforcement.org/
- To unite police officers worldwide and educate them on cyber crime, cyber law, investigative techniques and how they interact.
- To provide investigative assistance to police departments when requested.
- To provide online help and education for victims of cyber stalking, cyber harassment, pedophiles, hacking, and virus attacks, as well as access to support groups and online counseling.
- To standardize relations and communications between police departments, Internet Service Providers, Legal system contacts and victim advocacy groups worldwide.
- The steps for CLEO volunteer application:
- Download and print your preferred format of the application.
- Complete the application and mail it to the CLEO address on the application. Be sure to attach the appropriate authorization by your Agency Head or Designee on official agency letterhead. Failure to do this will result in delays in your application process.
- As soon as we receive your application, we will contact you by email with further instructions and let you know your status!
- Via E-mail
- Via Postal Mail
Tuesday, March 16, 2010
Internet Lawyers – The 21st century internet service
***
Source from http://www.traverselegal.com/
- Internet Law, Cyber Law
- Trademark, Infringement, Registration
- Domain Disputes, Cyber squatting
- Copyright, Media Law, free speech
- E-commerce Law
- Trade Secret, Idea Protection
- Governance, Fiduciary issues
- General Counsel Service
- Law is a service business
- Value-Based Billing
- Technology Advantage Leveraging leading edge technology
- Experience and Expertise
Friday, February 12, 2010
Will you get sued if you use Limewire?
Link to us: http://snipurl.com/v1qsb
When a piece of work by an artist becomes available to the general public it is considered part of the 'Public Domain'. It can become part of the public domain for three reasons:
1) the term of the copyright has expired.
2) the orginal author failed to gain a satisficatory copyright.
3) it a work belonging to the United States government.
There are numerous sites available with information for songs that are currently in the public domain. A google search with the following key words 'public domain' and 'music' will yield thousands of hits with information. One of the many useful sites is http://www.pdmusic.org/ which gives a list of genres, artists, and songs that are currently available for public use.
You are subject to lawsuits if you violate these copyrights. Here is advice and input on the question of whether you will get sued for using LimeWire:
A) Seems like "sharing" and "downloading" are different. if you look into all these lawsuits, at LEAST the VAST majority are people that are allowing their computers to be used as "supernodes", and I would bet money that ALL of the lawsuits are against people that have a shared folder on their computer with copywrited files on it, and they are allowing people to download from THEM. If you don't SHARE the music that you DOWNLOAD, then these lawyers probably won't even give you a second look. They have MUCH bigger fish to fry, with all the fools out there sharing a million files a day off their "downloaded music" folder. (Of course, these are the same fools that keep programs like LimeWire and KaZaa from becoming a digital DESERT with no files on them, so I don't mean to sound UNGRATEFUL; I'm just saying those are the ones getting sued.)
B) If you download a dummy file
C) There is always the chance that you will be one of the unfortunate ones who are caught and made an example of. You have to decide if using Limewire or similar software in an illegal manner - and sharing music, software, or any other copyright protected material IS illegal - is worth the risk. Personally, it's not a risk I would be willing to take. Remember, just because "everyone else is doing it" doesn't change the fact that it is legally, morally and ethically wrong. People DO get caught and they DO get prosecuted. You obviously know it's wrong or you wouldn't be concerned, correct? Do the right thing and you won't ever have to worry about getting sued.
D) It seems to me that the record companies and their people are trying to intimidate everyone into believing that file sharing is illegal. If I own the CD, cassette, or vinyl LP, and if it is legal to download those songs - so I don't have to make MP3's myself, then everyone needs to know they can do that without threats from anyone. If that is not legal, then it should be a simple answer from the experts. What about X-mas music. Can the same song be copyrighted by many different people? What about classical music that was written 200 years ago. Copyrighted? Graphics, stories, spreadsheets and many many other documents are perfectly legal to share without interference from any law enforcement.
E) You might get sued if you use LimeWire. The program is legal. However, if you use it to download music and other programs, it is illegal. If you were downloading uncopyrighted music, then the program would be legal. However, since almost all music is copyrighted, the program is very illegal. LimeWire and Kazaa are file sharing programs. This means that the files that you can download on these programs are files that are being shared with billions of other people across the globe. If you have downloaded these programs into your hard drive, they are still shared programs. Because these programs are in your hard drive, they are still being shared, so essentially, your hard drive is being shared as well. If you have done any school assignments on your computer, these have your first and last name on them. This opens up your identity to the public. Also, because these files are still being shared from your hard drive, law enforcement can target your internet connection by using your IP (Internet Protocol) address, and using these numbers (of your IP address), they can target you. To see what I'm talking about, and to see just how scary this is, click on the link. If law enforcement finds you, you will probably have to pay a fine to all of the recording companies or distributors of the songs/programs that you have downloaded, and you may be sued.
F) Rule of Thumb- You get sued if you download and distribute, sell, share the music. You get fined if you download the music for personal use.
Wednesday, February 10, 2010
Is LimeWire Legal?
***
http://communication.howstuffworks.com/limewire3.htm
http://pcwin.com/media/images/screen/74521-limewire_turbo.jpg
Tuesday, February 9, 2010
Weekly Poll Result Analysis 3
Based on the result, seven out of nine participants have agreed with Cyber Law has strongly affected their freedom in internet usage.
According to the first answer, Cyber law constraint us from entering certain web page, it comes with benefits and also disadvantages in different aspects. The advantage is that ensure internet user as much as possible to avoid unnecessary contact with unhealthy information, and even those web page which brings threat to society. From another point of view, this will cause a lot of inconvenience, because each country is different on the page limit. For example, Facebook and Blogger are banned in China however Facebook and Blogger are being so popular in Malaysia.
Without a proper approval or permission from original company for downloading can be known as illegal download. For example, from software, video, music to etc. Although almost every Internet users have some knowledge of Cyber Law and regulations, but the majority of users still insist on illegal downloading. The simple reason is because it is F.O.C, Free of Charge. Illegal downloading has against the law of Copyright and it brings negative effect on the industry development. However, internet users will still wish to get a free downloading compare to purchase it.
The biggest advantage of internet development is we can through the Internet to get the latest information to increase knowledge. However, Cyber Law such as copyright or Communication and Multimedia Act limit us in the use of information. For example, only allow free publish for part of the information. While internet users are feeling inconvenience, try to think it in another way. Such cyber law is to ensure that users are not misuse of available information and give community and author a protection.
Cyber Law brings some impact on internet usage but for some purely online chat users, or to the user only focus on a web page, they might think their freedom on internet usage will not be affected. In other words, they are not active on internet.
In short, most of the internet users find that it is difficult to understand and support the Government in developing cyber law, due to the freedom of internet usage do not be respected. In my opinion, I think as a internet user, we should try to stand in government’s shoe, for certain Cyber Law, it can really give us a protection however government need to give a compelling reason.
Thursday, February 4, 2010
How You Can Work With Cyber Law to Protect Yourself
In the past year or so, the Federal Trade Commission has created laws that impact those who blog or try to sell things on the internet. People who blog are no longer able to write whatever they wish at will. Now they must say up front that their writings are opinions, and that they no way qualify as an expert. This is how Cyber Law works as a protection for internet user from misleading.
Wednesday, February 3, 2010
Case Study : Hacking & Cyber Law
***
Case United States v. Morris, 928 F.2d 504, (March 7, 2001)
Morris was a first-year graduate student in Cornell University's computer science Ph.D. program and he entered Cornell, he was given an account on the computer at the Computer Science Division. This account gave him explicit authorization to use computers at Cornell.
In October 1988, Morris began work on a computer program, later known as the INTERNET "worm" or "virus." The goal of this program was to demonstrate the inadequacies of current security measures on computer networks by exploiting the security defects that Morris had discovered. The tactic he selected was release of a worm into network computers. Morris sought to program the INTERNET worm to spread widely without drawing attention to itself. Morris programmed the worm to make it difficult to detect and read in asking the question of having(yes) or not having(no) the worm copy, so that other programmers would not be able to "kill" the worm easily. As it turned out, Morris underestimated the number of times a computer would be asked the question, and his one-out-of-seven ratio resulted in far more copying than he had anticipated.
On November 2, 1988, Morris released the worm from a computer at the Massachusetts Institute of Technology. MIT was selected to disguise the fact that the worm came from Morris at Cornell. Morris soon discovered that the worm was replicating and reinfecting machines at a much faster rate than he had anticipated. Ultimately, many machines at locations around the country either crashed or became "catatonic." When Morris realized what was happening, he contacted a friend at Harvard to discuss a solution. Eventually, they sent an anonymous message from Harvard over the network, instructing programmers how to kill the worm and prevent reinfection. However, because the network route was clogged, this message did not get through until it was too late. Computers were affected at numerous installations, including leading universities, military sites, and medical research facilities. The estimated cost of dealing with the worm at each installation ranged from $200 to more than $53,000.
Morris was found guilty, following a jury trial, of violating 18 U.S.C. � 1030(a)(5)(A). He was sentenced to three years of probation, 400 hours of community service, a fine of $10,050, and the costs of his supervision.
Monday, February 1, 2010
Weekly Poll Result Analysis 2
When the respondents are being questioned how they would react to Cyber Law, 20% or 2 out of the 10 people actually answered “I don’t know”. This shows that some of the internet user doesn’t concern about the law or they didn’t know that the laws exist. This is a very important issue because they might do some activities without knowing that it is actually illegal. We should increase the awareness towards these people because not only they will break the law; they might be the victim of internet crimes too. They should know the rights and wrongs in the cyberspace.
The majority answers of the respondents which is 60% or 6 out of 10 respondents answered is “only concern when serious criminal activities involved”. In our country, everybody doesn’t seem to care about an issue unless something had happened. This is actually very negative because people are not taking safety precautions. They should be advised to follow every rules and regulation whenever they are using the internet because this is for the user’s good. Everything will be too late when something had happened.
In the third answer, amazingly there are nobody who answered “follow every single cyber law rules and regulation”. This actually shows that none of the people actually follows the rules and regulation of cyber law in Malaysia. There must be certain reasons why the people don’t seem to care about these laws. Subjects regarding Cyber Law should be created to teach high school students and college students so that people will abide the law. This is the reason why in our cyberspace is so vulnerable to criminal activities and many people has became victim of frauds. Everybody who uses the internet have the responsibility to know about the rules and regulation.
In the fourth answer, there are 20% or 2 out of 10 people who answered “I don’t know”. They might be confused with the internet cultural that we have or maybe they wanted to react towards cyber law but there is not much information about it in Malaysia. There are nobody choose the last answer which is “none of the above”.
In conclusion, people don’t react well to Cyber Law. Cyber crimes is increasing and definitely we need more ways to increase the awareness about how important is cyber law. Ignoring the law may create more havoc and heavy punishment shall be given to the criminals who broke the law. If we can create a peaceful cyberspace it would improve the quality of the internet usage and people will have confidence and trust in internet commerce. We all know that internet is a very useful and powerful tool that human ever created. It is our responsibility to protect and preserve this tool but not abusing it.
Thursday, January 28, 2010
Internet freedom Discussion Topic
http://resonantvibes.com/blog/wp-content/uploads/2008/10/illegal-downloading1.jpg
Not everybody in our country actually supports every single rules and regulation in Cyber Law. Well of course there are benefits for those who misuse the internet but at the same time we might do some damage to other people and we do not know when we will be a victim of cyber crime.
Most of the people who use the internet in Malaysia actually know how to download song files, movies, novels and it is actually a good way to save because the original products will actually cost us quite an amount of money. Not only by downloading, most of the young people nowadays knows how to stream online and watch movies or shows which is provided by certain software such as PPStream. This has actually given us some benefits because in Malaysia the government will not track us down and punish us unlike other countries. Some people might abuse the internet and scams other people for their own benefits. Private information such as credit card information, banking accounts, email accounts are the main targets for the scammers as they will steal your money through these areas.
On the other hand, the main reason for the need for the cyber law is the growth of the electronic commerce which makes it necessary to have effective laws. Private information will be vulnerable to hackers because almost everybody does transactions over the internet. E-commerce has become a huge activity in this world today and we must protect it from the people who called internet criminals from attacking people. The computer users that download illegal files from the internet are actually affecting the company who owns the original files. Even though the file is just a small file but what if the whole country is downloading the file but not buying the original product? We have all violated the rule because we are not using the product legally.
If businesses can make great use of the internet tools, so can the criminals.
Do you think that it is right to continue the internet freedom in Malaysia or shall we stop all the illegal activities in the internet? Please share you opinion.
Wednesday, January 27, 2010
Weekly Poll Result Analysis
***
One of them is not sure or do not know about the best description of Cyber Law. This showed that most of the internet computer users at least have doundation knowledge on Cyber Law. The answer “Not sure/Don’t know” explained that although e-education became a basic activity everyday, but it does not means that all of the internet computer user will be familiar with Cyber rules and regulation. The reason is the users might only concentrate on their needed application, website and online knowledge. Thus, although in the first week poll section “Not sure/Don’t know” just scored 6% however, government should cooperate with law department and education sectors to ensure all of the internet computer users are aware to Cyber Law in order to avoid unnecessary illegal activities involved.
12% which is 2 out of 17 respondents choosed the answer “Protect the value of information”. This is not the wrong answer but it is not a complete answer as well. We believe that value of information play a very important part in internet world. There is many different information exchanging everyday through the internet from images, text, video, and more media elements, it is hardly to control other might misuse the information or copied from any other person’s work. In order to protect the value of original information, Copyright Act is one of the most common Cyber Laws in Malaysia and other countries. Come back to the CyberLaw.blogspot.com poll section, the internet computer users still do not really understanding Cyber Law because some of them only realized part of the role in cyber law.
From the result, part of the respondents choosed “protect computer user privacy” as the answer. Same as above, this is an incomplete answer. 4 out of 17 respondents found that Cyber Law is created for the purpose of protect internet computer user privacy. In our opinion, this is because after the internet became a daily activity, there are many illegal criminal activities involved which is against the privacy. For example, Cyber stalking or Hacking happened all around the world. Nothing to be doubt, those criminal acts have bring many troubles to the internet users. Some of the personal details or information might get spread through internet and it is hardly to stop it.
No matter “protect the value of information” or “protect the computer user privacy”, Cyber Law is created to protect both of it and even more than these. Most of the respondents agreed that Cyber Law can protect information and self-privacy. 59% of them have the basic knowledge and aware toward Cyber Law. This is a good sign that with the basic awareness, Cyber Law can helps up in controlling the discipline in internet activities. For the answer “others”, none of the respondents voted for it. It is clearly explained that because respondents do not hold the strong Cyber Law knowledge so they prefer go for answers showed in the poll.
In conclusion, internet computer users do have basic knowledge on Cyber Law but they do not really familiar with it. Actually, Cyber Law is not just covered the value of information and privacy but it is more than that. Different countries come with different Cyber Law, government and education sector should put in more efforts on education the Cyber Law to internet users. This will be one of the best strategy to reduce internet criminal activities.
Tuesday, January 26, 2010
Specific legal Instrument on Information Infrastructure
***
Communication and Multimedia Act
*
Computer Crimes Act
*
Digital Signature Act
*
BNM Minimum Guidelines in Internet Banking in Malaysia
Purpose: Further initiatives were undertaken to strengthen the safety and soundness of the financial system and promote competition and efficiency in the banking industry. In addition, measures were implemented to ensure continuous access to financing as well as to enhance consumer protection and confidence in the banking sector. There are loads of Minimum Guidelines in BNM such as cheques, investment, insurance and Takaful and Shariah. This Guideline has enabled us to use internet banking with more confidence and it has minimized our task because we don’t need to go bank. All the banks in Malaysia have to fulfill the objectives and security which is set by the BNM so that they can minimize internet fraud.
*
Content Code
Purpose: The Content Code adopted by the Communications and Multimedia Content Forum (CMCF) of Malaysia sets out best practices for online standards and broadcast content. The Code generally allows comparative advertising in advertisements with other advertisers or products in the interests of competition subject to the following conditions;
(a) Principles of fair competition are respected, without consumers likely being misled
(b) Comparisons shall not confer an artificial advantage upon the advertiser or misleadingly suggest a better bargain; and
(c) Comparisons shall be based on substantiated facts and shall be the same for all products compared, so that like is compared with like.
*
Electronic Commerce Act 2006
Purpose: This is an Act to provide for legal recognition of electronic messages in commercial transactions. The use of the electronic messages to fulfill legal requirements and to enable facilitates commercial transactions through the use of electronic means and other matters connected therewith. E-commerce is a new way of conduction, managing and executing business transactions using modern means of information technology. It refers to all forms of transactions relation to commercial activities, including both organizations and individuals that are based upon the processing and transmission of digitized data, including text sound and visual image.
Thursday, January 21, 2010
Malaysia Cyber Law Discussion Topic
Title - Malaysia should focus more on enforcing Cyber Law, Says Microsoft
Malaysia has introduced an developed several cyber law which including :-Communication and multimedia Act, Computer Crimes Act, Digital Signature Act, Content Code, Copy Right Act and others that can be found in post 1.
In order to enforce the internet laws in Malaysia, the government has to start from the root of the problem such as banning all illegal cyber activities. Heavy punishment such as jail sentence and fines on the people who violated rules and regulations of the internet law will also help to reduce cybercrime activities. Last but not least, streaming application such as PPStream and free download website such as Limewire should be banned in Malaysia because it has fully violated the copyright and licensing law.
Dear Visitors,
Do you have any opinions toward Cyber Law in Malaysia? Please, share with us.
Tuesday, January 19, 2010
Why Cyber Law?
In my view, Cyber Law is important because it touches almost all aspects of activities on and concerning the Internet, the World Wide Web and Cyberspace. Whether we realize it or not, every activity of yours in Cyberspace will have some legal and Cyber legal perspectives. At every point of time, there are various Cyber Law issue involved. You may just ignore about it today because you feel that Cyber Law do not have any impact on your Cyber activities. But sooner or later, you will take note of Cyber Law is good for your own benefit.
So, Does Cyber Law concern you?
Yes, for sure!
While Malaysia has provisions in the law to prosecute cyber threats, however it is lacks in term of enforcement. Malaysia should focus more on enforcing Cyber Law, said Microsoft Corporation’s corporate vice- president Pamela S.Passman.
This will be the next chapter for discussion.
- Victor Chew Zee Zing –