SlideShare uma empresa Scribd logo
1 de 12
Prepared by : HANIN
   WAJIHAH BAHARUDIN
             
    INTAN NUR BALQIS
       AMIRUDIN :D
     Presentation ICT
 Impact of ICT on Society
   Malaysian Cyber Law
            and
Electronic Government Law
Meaning Of Cyber Law
Any laws relating to protecting the
Internet and other online
communication technologies
Needs For Cyber Law
Integrity and Security of Information
Security of Government Data
Intellectual Property Rights
Privacy and Confidentially of
Information
Legal Status of Online Transactions
DIGITAL SIGNATURE ACT 1997
     Why the Act exist:
- Transactions conducted via internet increasing.
- Identities and messages can falsified
- Need purchaser and seller identity for the integrity of messages.
- Removing doubt and possibility of fraud
     What the Act is about?
- Provides for regulation of public key infrastructure.
- Make digital signature legally valid and enforceable as traditional
  signature.
         COPYRIGHT (AMENDMENT) ACT 1997
     Why the Act exists:
- To protect expressions of thoughts and ideas from unauthorized
  copying alteration.
- Creative expression is being captured and
     What the Amended Act is about?
- Clear protection accorded to multimedia works.
- Transmissions of copyright works over the Internet clearly amount to
   infringement.
- Technological methods of ensuring works and authorship info are not
     altered or removed is protected.
TELEMEDICINE ACT 1997
  Why the Act exists:
- Healthcare systems and providers around the world are becoming
  interconnected.
- Unclear quality healthcare advice and consultation from specialist
  because doesn’t have truth value
- To regulate practice of teleconsultations in medical profession.
  What the Act is about?
- The Act provides that any registered doctor may practice
  “telemedicine” but other healthcare providers must first obtain a license
  to do so.
               COMPUTER CRIMES ACT 1997
  Why the Act exists:
- As computing becomes more central to people’s life and work,
  computers become both targets and tools of crime.
- To ensure misuse of computers is offense.
  What the Act is about?
- Offers to:* Enter or attempt into computers and computer systems
              without authorization.
            * Damage or alter data/information in computers or computer
              systems by planting viruses.
COMMUNICATIONS AND MULTIMEDIA ACT 1998
  Why the Act exist:
- Convergence of technologies is driving convergence of
  telecommunication, broadcasting, computing and content.
  What the Act is about?
- A restructuring of converged ICT industry.
- Create and define a new system of licenses
- Provide communication and multimedia services.
- Provide the existence of the Communication and Multimedia
  Commission.
          POLICY OBJECTIVES OF CMA
 To regulate for the long-term benefit of the end user.
 To promote consumer confidence in service delivery.
 To ensure equitable provision of affordable services.
 To create a robust applications environment for the end user.
WHY THE ELECTRONIC GOVERNMENT EXIST:
  Government is working on individual departmental projects
  rather than creating a general framework to take it forward
  There is strong belief in electronic government
  To control bloggers and prevent from spreading "disharmony,
  chaos, seditious material and lies" on websites
  Registering bloggers help prevent controversy in the
  government and help promote harmony in the country

WHAT THE ELECTRONIC GOVERNMENT IS ABOUT?
   Electronic government is already in many departments; in fact,
   ahead of most of Europe are in electronic governance
   Electronic government needs to be more central steering,
“The government isn't against it, but it certainly isn't championing
   it”.
   Ecommerce will radically reshape government over the next
   five years.
ELECTRONIC GOVERNMENT DATABASES
  American Government
Curriculum based reference database for government that includes
  daily UPI stories, annotated bibliographies, interactive topic
  exploration, and political commentary from Robert Novak and Bill
  Press.

  Facts on File
Collection of databases on history, geography, science, and health.
  Includes career and curriculum resources as well as personal and
  business forms.

  FirstSearch
Collection of fifteen databases including WorldCat, Medline,
  WilsonSelectPlus that provide both citations and full-text. WorldCat
  is the largest international database featuring more than 54 million
  items from the 50,000 plus OCLC member libraries.

  Edgar Database
Database of searchable SEC filings such as annual and quarterly
  reports. Search by company name, SIC code, etc. Obtain mutual
  fund prospectuses, as well as archived information.
INFORMATION TECHNOLOGY ACT 2000

Relate to electronic form which filing, issue, grant or payment
effected
Relate to manner and format which electronic records be filed,
issued and method of payment of fee
Relate to security procedure for purpose of creating secure
electronic record and secure digital signature
Relate to other standards observed by Controller of Certifying
Authorities
Relate to fee to be paid to Certifying Authority for issue of a Digital
Signature Certificate
Relate procedure for investigation of misbehavior or incapacity of
Presiding Officer
Relate to any other power of a civil court required to be prescribed
Relate to any other matter which is required to be, or may be,
prescribed.
Relate to maintenance of database containing disclosure record of
Certifying Authority
Relate to conditions and restrictions subject which Controller may
recognize any foreign
THE INDUCE ACT
Supported by Senate Judiciary Committee Chairman
Orrin Hatch, R-Utah

Make manufacturers of such software liable for
inducing people to commit copyright infringement

Consumer complained that the bill's language is too
broad and could apply liability to legitimate
technology

Represent sides to propose own compromise in
congressional session and are given tight deadline,
according to condition of anonymity

Necessary after a federal appeals court; manufacturer
of file-sharing software of liability committed by
customers was cleared
REFERENCES

  Teacher’s handouts
The Malaysian Cyber Laws
  Internet
*www.fountaindale.lib.il.us/information/databases/governmentDB
   .htm
*www.silicon.com/management/government/0,39024852,110027
   86,00.htm
*http://www.asianlaws.org/consultancy/setting_up.htm
*http://www.digitaljournal.com/article/66510/Malaysian_Gov_t_L
   ooking_to_Quiet_Bloggers
*http://www.asianlaws.org/cyberlaw/newsletter/issues/cl_nl_49.h
   tm
*www.jagat.com.my/Cyberlawseries/consultancy.htm
CONCLUSION
Future Cyber Laws must recognizes the people development
component-crucial for a K-Economy.
The existing Cyber Laws created the necessary impact… but
constant review is necessary.
Technology innovations
# Business innovations
# “Criminal” innovations
# Globalization
An exclusive legislative process may shorten review cycle.

Malaysian Government envisions to reinvent governance activities
through e-Government projects and applications.
Several test-beds are already in place to provide ICT which
enabled solutions such as e-judiciary, e-passport and tele-
healthcare. 
Such e-applications inevitably come with legal impediments that
would slow down the reinvention process unless they are properly
addressed and solved.

Mais conteúdo relacionado

Mais procurados

Internet
InternetInternet
Internet
Jodip
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
Endcode_org
 
Cyber Law
Cyber LawCyber Law
Cyber Law
ihah
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 

Mais procurados (20)

Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
The Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and RegulationsThe Electronic Commerce Act and its Implementing Rules and Regulations
The Electronic Commerce Act and its Implementing Rules and Regulations
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
Cyber law
Cyber lawCyber law
Cyber law
 
Internet
InternetInternet
Internet
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 

Destaque (8)

Ten Ways to Wealth
Ten Ways to WealthTen Ways to Wealth
Ten Ways to Wealth
 
Maps
MapsMaps
Maps
 
Everything you ever wanted to know about lenox v5
Everything you ever wanted to know about lenox v5Everything you ever wanted to know about lenox v5
Everything you ever wanted to know about lenox v5
 
Saurabhrecession
SaurabhrecessionSaurabhrecession
Saurabhrecession
 
Top 10 Strategies to Maximize LinkedIn for Entrepreneurs
Top 10 Strategies to Maximize LinkedIn for EntrepreneursTop 10 Strategies to Maximize LinkedIn for Entrepreneurs
Top 10 Strategies to Maximize LinkedIn for Entrepreneurs
 
Seven50 polling results weeks 1-9
Seven50  polling results weeks 1-9 Seven50  polling results weeks 1-9
Seven50 polling results weeks 1-9
 
Compliance and FMV - Karen Lowney
Compliance and FMV - Karen LowneyCompliance and FMV - Karen Lowney
Compliance and FMV - Karen Lowney
 
Summit 3 Opportunity FHEA Presentation
Summit 3 Opportunity FHEA Presentation Summit 3 Opportunity FHEA Presentation
Summit 3 Opportunity FHEA Presentation
 

Semelhante a Presentation ict3992

CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
 

Semelhante a Presentation ict3992 (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber law
Cyber lawCyber law
Cyber law
 
It act 2000
It act 2000It act 2000
It act 2000
 
Brief kif0809
Brief kif0809Brief kif0809
Brief kif0809
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Presentation ict3992

  • 1. Prepared by : HANIN WAJIHAH BAHARUDIN  INTAN NUR BALQIS AMIRUDIN :D Presentation ICT Impact of ICT on Society Malaysian Cyber Law and Electronic Government Law
  • 2. Meaning Of Cyber Law Any laws relating to protecting the Internet and other online communication technologies
  • 3. Needs For Cyber Law Integrity and Security of Information Security of Government Data Intellectual Property Rights Privacy and Confidentially of Information Legal Status of Online Transactions
  • 4. DIGITAL SIGNATURE ACT 1997 Why the Act exist: - Transactions conducted via internet increasing. - Identities and messages can falsified - Need purchaser and seller identity for the integrity of messages. - Removing doubt and possibility of fraud What the Act is about? - Provides for regulation of public key infrastructure. - Make digital signature legally valid and enforceable as traditional signature. COPYRIGHT (AMENDMENT) ACT 1997 Why the Act exists: - To protect expressions of thoughts and ideas from unauthorized copying alteration. - Creative expression is being captured and What the Amended Act is about? - Clear protection accorded to multimedia works. - Transmissions of copyright works over the Internet clearly amount to infringement. - Technological methods of ensuring works and authorship info are not altered or removed is protected.
  • 5. TELEMEDICINE ACT 1997 Why the Act exists: - Healthcare systems and providers around the world are becoming interconnected. - Unclear quality healthcare advice and consultation from specialist because doesn’t have truth value - To regulate practice of teleconsultations in medical profession. What the Act is about? - The Act provides that any registered doctor may practice “telemedicine” but other healthcare providers must first obtain a license to do so. COMPUTER CRIMES ACT 1997 Why the Act exists: - As computing becomes more central to people’s life and work, computers become both targets and tools of crime. - To ensure misuse of computers is offense. What the Act is about? - Offers to:* Enter or attempt into computers and computer systems without authorization. * Damage or alter data/information in computers or computer systems by planting viruses.
  • 6. COMMUNICATIONS AND MULTIMEDIA ACT 1998 Why the Act exist: - Convergence of technologies is driving convergence of telecommunication, broadcasting, computing and content. What the Act is about? - A restructuring of converged ICT industry. - Create and define a new system of licenses - Provide communication and multimedia services. - Provide the existence of the Communication and Multimedia Commission. POLICY OBJECTIVES OF CMA To regulate for the long-term benefit of the end user. To promote consumer confidence in service delivery. To ensure equitable provision of affordable services. To create a robust applications environment for the end user.
  • 7. WHY THE ELECTRONIC GOVERNMENT EXIST: Government is working on individual departmental projects rather than creating a general framework to take it forward There is strong belief in electronic government To control bloggers and prevent from spreading "disharmony, chaos, seditious material and lies" on websites Registering bloggers help prevent controversy in the government and help promote harmony in the country WHAT THE ELECTRONIC GOVERNMENT IS ABOUT? Electronic government is already in many departments; in fact, ahead of most of Europe are in electronic governance Electronic government needs to be more central steering, “The government isn't against it, but it certainly isn't championing it”. Ecommerce will radically reshape government over the next five years.
  • 8. ELECTRONIC GOVERNMENT DATABASES American Government Curriculum based reference database for government that includes daily UPI stories, annotated bibliographies, interactive topic exploration, and political commentary from Robert Novak and Bill Press. Facts on File Collection of databases on history, geography, science, and health. Includes career and curriculum resources as well as personal and business forms. FirstSearch Collection of fifteen databases including WorldCat, Medline, WilsonSelectPlus that provide both citations and full-text. WorldCat is the largest international database featuring more than 54 million items from the 50,000 plus OCLC member libraries. Edgar Database Database of searchable SEC filings such as annual and quarterly reports. Search by company name, SIC code, etc. Obtain mutual fund prospectuses, as well as archived information.
  • 9. INFORMATION TECHNOLOGY ACT 2000 Relate to electronic form which filing, issue, grant or payment effected Relate to manner and format which electronic records be filed, issued and method of payment of fee Relate to security procedure for purpose of creating secure electronic record and secure digital signature Relate to other standards observed by Controller of Certifying Authorities Relate to fee to be paid to Certifying Authority for issue of a Digital Signature Certificate Relate procedure for investigation of misbehavior or incapacity of Presiding Officer Relate to any other power of a civil court required to be prescribed Relate to any other matter which is required to be, or may be, prescribed. Relate to maintenance of database containing disclosure record of Certifying Authority Relate to conditions and restrictions subject which Controller may recognize any foreign
  • 10. THE INDUCE ACT Supported by Senate Judiciary Committee Chairman Orrin Hatch, R-Utah Make manufacturers of such software liable for inducing people to commit copyright infringement Consumer complained that the bill's language is too broad and could apply liability to legitimate technology Represent sides to propose own compromise in congressional session and are given tight deadline, according to condition of anonymity Necessary after a federal appeals court; manufacturer of file-sharing software of liability committed by customers was cleared
  • 11. REFERENCES Teacher’s handouts The Malaysian Cyber Laws Internet *www.fountaindale.lib.il.us/information/databases/governmentDB .htm *www.silicon.com/management/government/0,39024852,110027 86,00.htm *http://www.asianlaws.org/consultancy/setting_up.htm *http://www.digitaljournal.com/article/66510/Malaysian_Gov_t_L ooking_to_Quiet_Bloggers *http://www.asianlaws.org/cyberlaw/newsletter/issues/cl_nl_49.h tm *www.jagat.com.my/Cyberlawseries/consultancy.htm
  • 12. CONCLUSION Future Cyber Laws must recognizes the people development component-crucial for a K-Economy. The existing Cyber Laws created the necessary impact… but constant review is necessary. Technology innovations # Business innovations # “Criminal” innovations # Globalization An exclusive legislative process may shorten review cycle. Malaysian Government envisions to reinvent governance activities through e-Government projects and applications. Several test-beds are already in place to provide ICT which enabled solutions such as e-judiciary, e-passport and tele- healthcare.  Such e-applications inevitably come with legal impediments that would slow down the reinvention process unless they are properly addressed and solved.