SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
KEMENTERIAN PELAJARAN MALAYSIA


 Self Access Learning Module


           ICT Literacy for
         Secondary School
                           Programme


NETWORKS AND THE INTERNET
           Cyber Law




    PUSAT PERKEMBANGAN KURIKULUM
    KEMENTERIAN PELAJARAN MALAYSIA
ICTL for Secondary School - Networks and The Internet Module




  MODULE 4
        Cyber Law




Curriculum Development Centre
 Ministry of Education Malaysia


              2
ICTL for Secondary School - Networks and The Internet Module




1. Name of Module :           Cyber Law


2. Learning Outcomes : The students should be able to:

               a. describe the need for cyber law



3. Knowledge and Skills :

               a. Internet.
               b. various forms of communication on the internet.


4. Module Summary :           At the end of the module, the student is able to

               a. describe the need to understand cyber law.



This module contains two activities:

       Activity :     Discussion on the reasons needed for cyber law.




                                                3
ICTL for Secondary School - Networks and The Internet Module



Activity :       Discussion On Reasons For The Need Of Cyber Law

What is Cyber Law?

   Cyber law refers to any laws relating to protecting the Internet and other online
   communication technologies.

The Cyber Law Acts In Malaysia

   The Malaysian Government has already passed several cyber laws to control and reduce
   Internet abuse.

   These cyber laws include:

             •   Digital Signature Act 1997
             •   Computer Crimes Act 1997
             •   Telemedicine Act 1997
             •   Communications and Multimedia Act 1998

       Beside these cyber laws, there are three other cyber laws being drafted.

             •   Private Data Protection Bill
             •   Electronic Government Activities Bill
             •   Electronic Transactions Bill


Digital Signature Act 1997

   Digital Signature is an identity verification standard that uses
   encryption techniques to protect against e-mail forgery. The
   encrypted code consists of the user’s name and a hash of all the
   parts of the message.

   By attaching the digital signature, one can ensure that nobody can
   eavesdrop, intercept or temper with transmitted data.


Computer Crimes Act 1997

   Gives protection against the misuse of computers and computer
   criminal activities such as unauthorised use of programmes, illegal
   transmission of data or messages over computers, hacking and
   cracking of computer systems and networks.

   Users can protect their rights to privacy and build trust in the
   computer system.

   The government can have control at a certain level over cyberspace to reduce cyber crime
   activities.


                                                  4
ICTL for Secondary School - Networks and The Internet Module




Telemedicine Act 1997

   The Telemedicine Act 1997 ensures that only qualified medical
   practitioners can practice telemedicine and that their patient's rights
   and interests are protected.

   This act provides future development and delivery of healthcare in
   Malaysia.


Communications And Multimedia Act 1998

   The implementation of Communication and Telecommunication Act
   1998 ensures that information is secure, the network is reliable and
   affordable all over Malaysia.




Needs for Cyber Law



       Integrity and Security                                                 Security of
           of Information                                                  Government Data


                                          CYBER LAW
       Legal Status of Online                                             Intellectual Property
           Transactions                                                           Rights

                                    Privacy and Confidentially
                                          of Information




Examples of Cyber abuse on the users

          •   sending a computer virus via e-mail
          •   hacking into your school’s database to change your examination
              results.
          •   selling pirated software in a night market




                                                5
ICTL for Secondary School - Networks and The Internet Module




Worksheet :

Write a short essay on the need of cyber law




                                                6
ICTL for Secondary School - Networks and The Internet Module




Reference

Cashman, S. (2006) Discovering Computers 2006. USA : Thomson Course Technology.

Ibrahim Ahmad, Mohd Hafiz et al (2007) Information and Communication Technology (ICT)
Based on SPM Syllabus. Selangor: Venton Publishing (M) Sdn Bhd.

CD courseware ICT, Pusat Perkembangan Kurikulum. KPM

http://www.wikipedia.org

http://images.search.yahoo.com

http://www.google.com.my




                                          7

Mais conteúdo relacionado

Mais procurados

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber lawshreya sanghvi
 

Mais procurados (20)

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 

Semelhante a Cyber Law

Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber lawFatin Izzaty
 
Module Cyber Law
Module Cyber LawModule Cyber Law
Module Cyber LawIra Raji
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011Prof. (Dr.) Tabrez Ahmad
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityEthical Sector
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Habib Noroozi
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy lawsesther_sonu
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and SecurityIMT CDL
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandeyRithikaD1
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 

Semelhante a Cyber Law (20)

Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber law
 
Module Cyber Law
Module Cyber LawModule Cyber Law
Module Cyber Law
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
 
188
188188
188
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 

Mais de Miz Malinz

SPM ENGLISH PAPER 2 Pulau Pinang 2020
SPM ENGLISH PAPER 2 Pulau Pinang 2020SPM ENGLISH PAPER 2 Pulau Pinang 2020
SPM ENGLISH PAPER 2 Pulau Pinang 2020Miz Malinz
 
Sad I Ams - PT3 Exam Practice (Answer)
Sad I Ams - PT3 Exam Practice (Answer)Sad I Ams - PT3 Exam Practice (Answer)
Sad I Ams - PT3 Exam Practice (Answer)Miz Malinz
 
The Elephant Man (Chapter Summaries, Setting & Characters)
The Elephant Man (Chapter Summaries, Setting & Characters)The Elephant Man (Chapter Summaries, Setting & Characters)
The Elephant Man (Chapter Summaries, Setting & Characters)Miz Malinz
 
Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)Miz Malinz
 
Poisoned Talk poem
Poisoned Talk poemPoisoned Talk poem
Poisoned Talk poemMiz Malinz
 
The Day the Bulldozers Came (Quiz Show)
The Day the Bulldozers Came (Quiz Show)The Day the Bulldozers Came (Quiz Show)
The Day the Bulldozers Came (Quiz Show)Miz Malinz
 
The day the bulldozers came
The day the bulldozers cameThe day the bulldozers came
The day the bulldozers cameMiz Malinz
 
My Hero - paraphrasing stanza
My Hero  - paraphrasing stanzaMy Hero  - paraphrasing stanza
My Hero - paraphrasing stanzaMiz Malinz
 
My Hero - Theme
My Hero - ThemeMy Hero - Theme
My Hero - ThemeMiz Malinz
 
PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)Miz Malinz
 
PT3 English Mid Year Exam Form 3 2016 (Q)
PT3 English Mid Year Exam Form 3 2016 (Q)PT3 English Mid Year Exam Form 3 2016 (Q)
PT3 English Mid Year Exam Form 3 2016 (Q)Miz Malinz
 
PT3 - Question 3
PT3 - Question 3PT3 - Question 3
PT3 - Question 3Miz Malinz
 
PT3 - Information Transfer (Question 2)
PT3 - Information Transfer (Question 2)PT3 - Information Transfer (Question 2)
PT3 - Information Transfer (Question 2)Miz Malinz
 
Sad I Ams (Themes & Moral Values)
Sad I Ams (Themes & Moral Values)Sad I Ams (Themes & Moral Values)
Sad I Ams (Themes & Moral Values)Miz Malinz
 
Sad I Ams (Introduction)
Sad I Ams (Introduction)Sad I Ams (Introduction)
Sad I Ams (Introduction)Miz Malinz
 
Ops form 2 unit 3 City Life, Kampong Life page 14
Ops form 2 unit 3 City Life, Kampong Life page 14Ops form 2 unit 3 City Life, Kampong Life page 14
Ops form 2 unit 3 City Life, Kampong Life page 14Miz Malinz
 
Computer software (Introduction to OS)
Computer software (Introduction to OS)Computer software (Introduction to OS)
Computer software (Introduction to OS)Miz Malinz
 
Pentaksiran Tingkatan 1 Bahasa Inggeris (Answer)
Pentaksiran Tingkatan 1 Bahasa Inggeris (Answer)Pentaksiran Tingkatan 1 Bahasa Inggeris (Answer)
Pentaksiran Tingkatan 1 Bahasa Inggeris (Answer)Miz Malinz
 

Mais de Miz Malinz (20)

SPM ENGLISH PAPER 2 Pulau Pinang 2020
SPM ENGLISH PAPER 2 Pulau Pinang 2020SPM ENGLISH PAPER 2 Pulau Pinang 2020
SPM ENGLISH PAPER 2 Pulau Pinang 2020
 
Sad I Ams - PT3 Exam Practice (Answer)
Sad I Ams - PT3 Exam Practice (Answer)Sad I Ams - PT3 Exam Practice (Answer)
Sad I Ams - PT3 Exam Practice (Answer)
 
The Elephant Man (Chapter Summaries, Setting & Characters)
The Elephant Man (Chapter Summaries, Setting & Characters)The Elephant Man (Chapter Summaries, Setting & Characters)
The Elephant Man (Chapter Summaries, Setting & Characters)
 
Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)
 
Poisoned Talk poem
Poisoned Talk poemPoisoned Talk poem
Poisoned Talk poem
 
The Day the Bulldozers Came (Quiz Show)
The Day the Bulldozers Came (Quiz Show)The Day the Bulldozers Came (Quiz Show)
The Day the Bulldozers Came (Quiz Show)
 
The day the bulldozers came
The day the bulldozers cameThe day the bulldozers came
The day the bulldozers came
 
My Hero - paraphrasing stanza
My Hero  - paraphrasing stanzaMy Hero  - paraphrasing stanza
My Hero - paraphrasing stanza
 
My Hero
My HeroMy Hero
My Hero
 
My Hero - Theme
My Hero - ThemeMy Hero - Theme
My Hero - Theme
 
PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)
 
PT3 English Mid Year Exam Form 3 2016 (Q)
PT3 English Mid Year Exam Form 3 2016 (Q)PT3 English Mid Year Exam Form 3 2016 (Q)
PT3 English Mid Year Exam Form 3 2016 (Q)
 
PT3 - Question 3
PT3 - Question 3PT3 - Question 3
PT3 - Question 3
 
PT3 - Information Transfer (Question 2)
PT3 - Information Transfer (Question 2)PT3 - Information Transfer (Question 2)
PT3 - Information Transfer (Question 2)
 
Section A PT3
Section A PT3Section A PT3
Section A PT3
 
Sad I Ams (Themes & Moral Values)
Sad I Ams (Themes & Moral Values)Sad I Ams (Themes & Moral Values)
Sad I Ams (Themes & Moral Values)
 
Sad I Ams (Introduction)
Sad I Ams (Introduction)Sad I Ams (Introduction)
Sad I Ams (Introduction)
 
Ops form 2 unit 3 City Life, Kampong Life page 14
Ops form 2 unit 3 City Life, Kampong Life page 14Ops form 2 unit 3 City Life, Kampong Life page 14
Ops form 2 unit 3 City Life, Kampong Life page 14
 
Computer software (Introduction to OS)
Computer software (Introduction to OS)Computer software (Introduction to OS)
Computer software (Introduction to OS)
 
Pentaksiran Tingkatan 1 Bahasa Inggeris (Answer)
Pentaksiran Tingkatan 1 Bahasa Inggeris (Answer)Pentaksiran Tingkatan 1 Bahasa Inggeris (Answer)
Pentaksiran Tingkatan 1 Bahasa Inggeris (Answer)
 

Cyber Law

  • 1. KEMENTERIAN PELAJARAN MALAYSIA Self Access Learning Module ICT Literacy for Secondary School Programme NETWORKS AND THE INTERNET Cyber Law PUSAT PERKEMBANGAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA
  • 2. ICTL for Secondary School - Networks and The Internet Module MODULE 4 Cyber Law Curriculum Development Centre Ministry of Education Malaysia 2
  • 3. ICTL for Secondary School - Networks and The Internet Module 1. Name of Module : Cyber Law 2. Learning Outcomes : The students should be able to: a. describe the need for cyber law 3. Knowledge and Skills : a. Internet. b. various forms of communication on the internet. 4. Module Summary : At the end of the module, the student is able to a. describe the need to understand cyber law. This module contains two activities: Activity : Discussion on the reasons needed for cyber law. 3
  • 4. ICTL for Secondary School - Networks and The Internet Module Activity : Discussion On Reasons For The Need Of Cyber Law What is Cyber Law? Cyber law refers to any laws relating to protecting the Internet and other online communication technologies. The Cyber Law Acts In Malaysia The Malaysian Government has already passed several cyber laws to control and reduce Internet abuse. These cyber laws include: • Digital Signature Act 1997 • Computer Crimes Act 1997 • Telemedicine Act 1997 • Communications and Multimedia Act 1998 Beside these cyber laws, there are three other cyber laws being drafted. • Private Data Protection Bill • Electronic Government Activities Bill • Electronic Transactions Bill Digital Signature Act 1997 Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message. By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data. Computer Crimes Act 1997 Gives protection against the misuse of computers and computer criminal activities such as unauthorised use of programmes, illegal transmission of data or messages over computers, hacking and cracking of computer systems and networks. Users can protect their rights to privacy and build trust in the computer system. The government can have control at a certain level over cyberspace to reduce cyber crime activities. 4
  • 5. ICTL for Secondary School - Networks and The Internet Module Telemedicine Act 1997 The Telemedicine Act 1997 ensures that only qualified medical practitioners can practice telemedicine and that their patient's rights and interests are protected. This act provides future development and delivery of healthcare in Malaysia. Communications And Multimedia Act 1998 The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and affordable all over Malaysia. Needs for Cyber Law Integrity and Security Security of of Information Government Data CYBER LAW Legal Status of Online Intellectual Property Transactions Rights Privacy and Confidentially of Information Examples of Cyber abuse on the users • sending a computer virus via e-mail • hacking into your school’s database to change your examination results. • selling pirated software in a night market 5
  • 6. ICTL for Secondary School - Networks and The Internet Module Worksheet : Write a short essay on the need of cyber law 6
  • 7. ICTL for Secondary School - Networks and The Internet Module Reference Cashman, S. (2006) Discovering Computers 2006. USA : Thomson Course Technology. Ibrahim Ahmad, Mohd Hafiz et al (2007) Information and Communication Technology (ICT) Based on SPM Syllabus. Selangor: Venton Publishing (M) Sdn Bhd. CD courseware ICT, Pusat Perkembangan Kurikulum. KPM http://www.wikipedia.org http://images.search.yahoo.com http://www.google.com.my 7