Вы находитесь на странице: 1из 7

KEMENTERIAN PELAJARAN MALAYSIA

Self Access Learning Module

ICT Literacy for


Secondary School
Programme

NETWORKS AND THE INTERNET


Cyber Law

PUSAT PERKEMBANGAN KURIKULUM


KEMENTERIAN PELAJARAN MALAYSIA
ICTL for Secondary School - Networks and The Internet Module

MODULE 4
Cyber Law

Curriculum Development Centre


Ministry of Education Malaysia

2
ICTL for Secondary School - Networks and The Internet Module

1. Name of Module : Cyber Law

2. Learning Outcomes : The students should be able to:

a. describe the need for cyber law

3. Knowledge and Skills :

a. Internet.
b. various forms of communication on the internet.

4. Module Summary : At the end of the module, the student is able to

a. describe the need to understand cyber law.

This module contains two activities:

Activity : Discussion on the reasons needed for cyber law.

3
ICTL for Secondary School - Networks and The Internet Module

Activity : Discussion On Reasons For The Need Of Cyber Law

What is Cyber Law?

Cyber law refers to any laws relating to protecting the Internet and other online
communication technologies.

The Cyber Law Acts In Malaysia

The Malaysian Government has already passed several cyber laws to control and reduce
Internet abuse.

These cyber laws include:

• Digital Signature Act 1997


• Computer Crimes Act 1997
• Telemedicine Act 1997
• Communications and Multimedia Act 1998

Beside these cyber laws, there are three other cyber laws being drafted.

• Private Data Protection Bill


• Electronic Government Activities Bill
• Electronic Transactions Bill

Digital Signature Act 1997

Digital Signature is an identity verification standard that uses


encryption techniques to protect against e-mail forgery. The
encrypted code consists of the user’s name and a hash of all the
parts of the message.

By attaching the digital signature, one can ensure that nobody can
eavesdrop, intercept or temper with transmitted data.

Computer Crimes Act 1997

Gives protection against the misuse of computers and computer


criminal activities such as unauthorised use of programmes, illegal
transmission of data or messages over computers, hacking and
cracking of computer systems and networks.

Users can protect their rights to privacy and build trust in the
computer system.

The government can have control at a certain level over cyberspace to reduce cyber crime
activities.

4
ICTL for Secondary School - Networks and The Internet Module

Telemedicine Act 1997

The Telemedicine Act 1997 ensures that only qualified medical


practitioners can practice telemedicine and that their patient's rights
and interests are protected.

This act provides future development and delivery of healthcare in


Malaysia.

Communications And Multimedia Act 1998

The implementation of Communication and Telecommunication Act


1998 ensures that information is secure, the network is reliable and
affordable all over Malaysia.

Needs for Cyber Law

Integrity and Security Security of


of Information Government Data

CYBER LAW
Legal Status of Online Intellectual Property
Transactions Rights

Privacy and Confidentially


of Information

Examples of Cyber abuse on the users

• sending a computer virus via e-mail


• hacking into your school’s database to change your examination
results.
• selling pirated software in a night market

5
ICTL for Secondary School - Networks and The Internet Module

Worksheet :

Write a short essay on the need of cyber law

6
ICTL for Secondary School - Networks and The Internet Module

Reference

Cashman, S. (2006) Discovering Computers 2006. USA : Thomson Course Technology.

Ibrahim Ahmad, Mohd Hafiz et al (2007) Information and Communication Technology (ICT)
Based on SPM Syllabus. Selangor: Venton Publishing (M) Sdn Bhd.

CD courseware ICT, Pusat Perkembangan Kurikulum. KPM

http://www.wikipedia.org

http://images.search.yahoo.com

http://www.google.com.my

Вам также может понравиться