Hostname: page-component-7479d7b7d-rvbq7 Total loading time: 0 Render date: 2024-07-12T01:20:02.916Z Has data issue: false hasContentIssue false

Internet Law: Latest Developments in Cyber Laws in Malaysia

Published online by Cambridge University Press:  28 February 2019

Extract

The first cyberlaws of Malaysia were passed in 1997 and Malaysia has been hailed as one of the first ASEAN countries to have done so. Since then, there have been various amendments to current legislation to adapt to Internet situations, and new cyberlaws have been passed, such as the Electronic Commerce Act 2006 (Act 658) and the Personal Data Protection Act 2010 (Act 709). This paper will give an overview of these laws relating to the Internet.

Type
Articles
Copyright
Copyright © 2012 by the International Association of Law Libraries. 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 The term cyberlaw or cyberlaws are used by the author to describe legislation that had been created specifically for Internet situations.Google Scholar

2 Gazetted on 31 August 2006. The issue of jurisdiction was touched upon indirectly as ‘place of contracting’ was determined when electronic means were used. This will be looked at in greater detail in subsequently.Google Scholar

3 Date of Royal Assent 18 June 1997, Gazetted on 30 June 1997, Date came into operation is 1 October 1998 [P.U.(B) 397/98] and amended in 2001 (Digital Signature (Amendment) Act 2001 [Act A1121]). In addition, there are Digital Signature Regulations 1998 [P.U.(A) 359/98],Google Scholar

4 S.2 Digital Signature Act 1997 provides that a digital signature is “a transformation of a message using an asymmetric cryptosystem” and that an asymmetric cryptosystem is “an algorithm or series of algorithms which provide a secure key pair.”Google Scholar

5 Since 1 November 2001, the Communications and Multimedia Commission have taken over in the regulatory function of the Digital Signature Act.Google Scholar

6 As per s.64(1) of the Digital Signature Act 1997, “A message shall be as valid, enforceable and effective as if it had been written on paper if – (a) it bears in its entirety a digital signature; and (b) that digital signature is verified by the public key listed in a certificate which - (i) was issued by a licensed certification authority; and (ii) was valid at the time the digital signature was created.”Google Scholar

7 “The provisions of this Act shall, in relation to any person, whatever his nationality or citizenship, have effect outside as well as within Malaysia, and where an offence under this Act is committed by any person in any place outside Malaysia, he may be dealt with in respect of such offence as if it was committed at any place within Malaysia”Google Scholar

8 S.3(1) which stipulates that “A person shall be guilty of an offence if- (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer; (b) the access he intends to secure is unauthorized; and (c) he knows at the time when he causes the computer to perform the function that that is the case.”Google Scholar

9 As per s.5(1), “A person shall be guilty of an offence if he does any act which he knows will cause unauthorized modification of the contents of any computer.”Google Scholar

10 By s.6(1), “A person shall be guilty of an offence if he communicates directly or indirectly a number, code, password or other means of access to a computer to any person other than a person to whom he is duly authorized to communicate.”Google Scholar

11 By s.7(1), “A person who abets the commission of or who attempts to commit any offene under this Act shall be guilty of that offence and shall on conviction be liable to the punishment provided for the offence.”Google Scholar

12 As per s.7(2) which stipulates that “A person who does any act preparatory to or in furtherance of the commission of any offence under this Act shall be guilty of that offence and shall on conviction be liable to the punishment provided for the offence: Provided that any term of imprisonment imposed shall not exceed one-half of the maximum term provided for the offence.”Google Scholar

13 S.3(3)Google Scholar

14 S.4(3)Google Scholar

15 Both (i) and (ii) can be found under s.5(4). Here, ‘causing injury’ is as per defined under the Penal Code.Google Scholar

16 By s.6(1), “A person shall be guilty of an offence if he communicates directly or indirectly a number, code, password or other means of access to a computer to any person other than a person to whom he is duly authorized to communicate.”Google Scholar

17 As per s.3(1).Google Scholar

18 As per s.3(1)(b), “a medical practitioner who is registered or licensed outside Malaysia and – (i) holds a certificate to practice telemedicine issued by the Council; and (ii) practices telemedicine from outside Malaysia through a fully registered medical practitioner holding a valid practicing certificate.”Google Scholar

19 As per s.3(2).Google Scholar

20 Under s.5(2), the fully registered medical practitioner must have informed the patient that “(a) he is free to withdraw his consent at any time without affecting his right to future care or treatment; (b) of the potential risks, consequences and benefits of telemedicine; (c) that all existing confidentially protection apply to any information about the patient obtained or disclosed in the course of the telemedicine interaction; (d) that any image or information communicated or used during or resulting from telemedicine interaction which can be identified as being that of or about the patient will not be disseminated to any researcher or any other person without the consent of the patient.”Google Scholar

21 As per s.5(6).Google Scholar

22 Date of Royal Assent is 23 September 1998, Gazetted on 15 October 1998 and came into force on 1 April 1999 (except for sections 157, 159, 160, 161, 162, 164, 165, 166, 167, 168, 169, 170, 171, 176, 178, 197 and 198 [P.U.(B) 128/99]); 1 April 2000 for sections 157, 159, 160, 161, 162, 164, 165, 166, 167, 168, 169, 170, 171, 176 and 178 [P.U.(B) 106/2000] and 1 March 2002 for sections 197 and 198 [P.U.(B) 66/2002]. There had been one amendment in 2002: Communications and Multimedia (Amendment) Act 2004 [Act A1220]Google Scholar

23 S.4(1) stipulates that ‘This Act and its subsidiary legislation apply both within and outside Malaysia”.Google Scholar

24 S.4(2).Google Scholar

25 As required by s.126, “Subject to such exemptions as may be determined by the Minister by order published in the Gazette, no person shall – (a) own or provide any network facilities; (b) provide any network services; or (c) provide any application services, [–] except under and in accordance with the terms and conditions of – (aa) a valid individual licence granted under this Act; or (bb) a class licence granted under this Act, [–] expressly authorizing the ownership or provision of the facilities or services.”Google Scholar

26 As per s.6, “Any element or combination of elements of physical infrastructure used principally for, or in connection with, the provision of network services, but does not include customer equipment.”Google Scholar

27 As per s.6, “A service for carrying communications by means of guided and/or unguided electromagnetic radiation”.Google Scholar

28 As per s.6, “Service provided by means of, but not solely by means of, one or more network services.”Google Scholar

29 S.4(3) states that “For the purposes of this section, “a place” means a point of any nature or description whether on land, in the atmosphere, in outer space, underground, underwater, at sea or anywhere else.”Google Scholar

30 Boundaries here denotes the territorial limits of Malaysia, be it its geographical boundaries (land) or territorial waters (sea).Google Scholar

31 As per s.4(3). In addition, s.4(4) stipulates that “For the purpose of this section, a place that is – (a) in or below the stratosphere; and (b)above the geographical limits of Malaysia and her territorial waters, is taken to be a place within the geographical limits of Malaysia and her territorial waters.”Google Scholar

32 By s.232(1), “A person who – (a) dishonestly transmits or allows to be transmitted any communication or obtains a service provided by a licensed network facilities provider, network service provider, applications service provider or content applications service provider; or (b) dishonestly receives a content applications service from a place within Malaysia not intended for general reception, with intent to avoid payment of any rate or fee applicable to the provision of that facility or service commits an offence.Google Scholar

33 By s.232(2), “A person who possesses, obtains or creates a system designed to fraudulently use or obtain any network facilities, network service, applications service or content applications service commits an offence.Google Scholar

34 Under s.233(1), “A person who – (a) by means of any network facilities or network service or applications service knowingly – (i) makes, creates or solicits; and (ii) initiates the transmission of, any comment, request, suggestion or other communication which is obscene, indecent, false, menacing or offensive in character with intent to annoy, abuse, threaten or harass another person; or (b) initiates a communication using any applications service, whether continuously, repeatedly or otherwise, during which communication may or may not ensue, with or without disclosing his identity and with intent to annoy, abuse, threaten or harass any person at any number or electronic address, commits an offence.” And under s.233(2), “A person who knowingly – (a) by means of a network service or applications service provides any obscene communication for commercial purposes to any person; or (b) permits a network service or applications service under the person's control to be used for an activity described in paragraph (a), commits an offence.”Google Scholar

35 As under s.233(3).Google Scholar

36 Date of Royal Assent is 23 September 1998, Gazetted on 15 October 1998, came into force 1 November 1998 [P.U.(B) 451/98] and amended twice in 2002: the Malaysian Communications and Multimedia Commission (Amendment) Act 2002 [Act A1148] and the Malaysian Communications and Multimedia Commission (Amendment) Act 2002 [Act A1231]Google Scholar

37 Date of Royal Assent: 30 August 2006. Gazetted 31 August 2006.Google Scholar

38 Date of Royal Assent:Google Scholar

39 By s.5 ECA and EGA, this refers to “a single communication or multiple communications of a commercial nature, whether contractual or not, which includes any matters relating to the supply or exchange of goods or services, agency, investments, financing, banking and insurance”. Section 2(2) ECA states, however, that the Electronic Commerce Act would not apply to the transactions or documents in the Schedule i.e. the power of attorney, the creation of wills and codicils, the creation of trusts and negotiable instruments.Google Scholar

40 By s.2, ‘electronic messages’ refers to “information generated, sent, received or stored by electronic means”Google Scholar

41 S.3(1) ECA and EGA.Google Scholar

42 S.3(2) ECA and EGA.Google Scholar

43 By s.7(2) ECA and s.11(2) EGA, “A contract shall not be denied legal effect, validity or enforceability on the ground that an electronic message is used in its formation”Google Scholar

44 By s.8 ECA and s.12 EGA, “Where any law requires information to be in writing, the requirement of the law is fulfilled if the information is contained in an electronic message that is accessible and intelligible so as to be usable for subsequent reference”Google Scholar

45 By s.9 ECA and s.13 EGA, “(1) Where any law requires a signature of a person on a document, the requirement of the law is fulfilled, if the document is in the form of an electronic message, by an electronic signature”Google Scholar

46 Under s.10(1) ECA and s.14(1) EGA: “Where any law requires a seal to be affixed to a document, the requirement of the law is fulfilled, if the document is in the form of an electronic message, by a digital signature as provided under the Digital Signature Act 1997”Google Scholar

47 By s.11 ECA and s.15 EGA, “Where any law requires the signature of a witness on a document, the requirement of the law is fulfilled, if the document is in the form of an electronic message, by an electronic signature of the witness that complies with the requirements of section 9.”Google Scholar

48 By s.6(1) ECA and s.10(1) EGA, it is stated that “Any information shall not be denied legal effect, validity or enforceability on the ground that it is wholly or partly in an electronic form.”Google Scholar

49 As per s.20 ECA and s.31 EGA.Google Scholar

50 S.21 ECA and s.32 EGA.Google Scholar

51 By s.21(a), an electronic message is deemed received “where the addressee has designated an information processing system for the purpose of receiving electronic messages, when the electronic message enters the designated information processing system”Google Scholar

52 By s.21(b), it was stated that an electronic message is deemed received “where the addressee has not designated an information processing system for the purpose of receiving electronic messages, when the electronic message comes to the knowledge of the addressee.”Google Scholar

53 However, this does not include “any information that is processed for the purpose of a credit reporting business carried on by a credit reporting agency under the Credit Reporting Agencies Act 2009” (s.2)Google Scholar

54 That is, by s.4 of the Data Protection Act, “wholly or partly by means of equipment operating automatically in response to instructions given for that purpose”Google Scholar

55 This would be personal data that is recorded “with the intention that it should wholly or partly be processed by means of such equipment” (as per s.2(b) of the Data Protection Act 2010) or “as part of a relevant filing system or with the intention that it should form part of a relevant filing system” (as per s.2(c) of the Data Protection Act 2010).Google Scholar

56 As per s.4, and it would include “(a) the organization, adaptation or alteration of personal data; (b) the retrieval, consultation or use of personal data; (c) the disclosure of personal data by transmission, transfer, dissemination or otherwise making available; or (d) the alignment, combination, correction, erasure or destruction of personal data”Google Scholar

57 “whether contractual or not, which includes any matters relating to the supply of exchange of goods or services, agency, investments, financing, banking and insurance, but does not include a credit reporting business carried out by a credit reporting agency under the Credit Reporting Agencies Act 2009.Google Scholar

58 S.3(1)Google Scholar

59 S.3(2). Note, however, that the Act would still apply if the data would eventually be processed in Malaysia as well.Google Scholar

60 S.5(2)Google Scholar

61 By s.6(1)(a), a data user shall not “process personal data about a data subject unless the data subject has given his consent to the processing of the personal data.”Google Scholar

62 S.6(3)Google Scholar

69 That is, “(i) for the purposes of exercising or performing any right or obligation which is conferred or imposed by law on the data user in connection with employment; (ii) in order to protect the vital interests of the data subject or another person, in a case where — (A) consent cannot be given by or on behalf of the data subject; or (B) the data user cannot reasonably be expected to obtain the consent of the data subject; (iii) in order to protect the vital interests of another person, in a case where consent by or on behalf of the data subject has been unreasonably withheld; (iv) for medical purposes and is undertaken by — (A) a healthcare professional; or (B) a person who in the circumstances owes a duty of confidentiality which is equivalent to that which would arise if that person were a healthcare professional; (v) for the purpose of, or in connection with, any legal proceedings; (vi) for the purpose of obtaining legal advice; (vii) for the purposes of establishing, exercising or defending legal rights; (viii) for the administration of justice; (ix) for the exercise of any functions conferred on any person by or under any written law; or (x) for any other purposes as the Minister thinks fit;”Google Scholar

70 S.40(1)(c).Google Scholar

71 S.40(3)Google Scholar