Wednesday, December 16, 2009

Poster



Create by : nabiah hamzah
Date : 15 December 2009
Size : A4 size (lanscape & portrait)

Objective : to increase awareness among people about the importance of data protection.

Internet Censorship - Malaysia

Malaysia: A Step Closer To Internet Censorship?
The Malaysian government is looking into the feasibility of installing an Internet filter to block “undesirable websites”, along the lines of the People's Republic of China's abandoned “Green Dam” software. The reason for this new move is so that racial harmony in multicultural Malaysia is maintained, according to news site Malaysiakini.

According to the Malaysian Insider, the feasibility study is to be completed by December 2009 and “the results will be handed to a shadowy unit monitoring blogs and websites although the decision on implementation will lie with the National Security Council headed by Prime Minister Datuk Seri Najib Razak.”

The move is has critics and opposition politicians crying foul as it breaches the Multimedia Super Corridor (MSC) Bill of Guarantees. Furthermore, IT specialists have also said the move is “a waste of time”, which then makes the use of public funds in this endeavour questionable.
The Information, Communication and Culture Ministry has called for tenders for this proposed Internet filter. Unsurprisingly, this development comes hot on the heels of the previous proposal of getting bloggers registered.

The Honda Case of Copyright Infringement

The Honda case – Injunctive Relief in Industrial Design and Three Dimensional Copyright in Malaysia
3 November 2006 (MIP WEEK)
The High Court in Malaysia has delivered an important decision on the various issues pertaining to copyright and industrial design with special reference to an application for an interlocutory injunction.
In Honda Giken Kogyo Kabushiki Kaisha v Allied Pacific Motor (M) Sdn Bhd & Anor [2005] 3 MLJ 30, the famous Japanese marque for bikes and cars applied for an interlocutory injunction against a local manufacturer of a motorcycles in respect of two models manufactured by them. The first model was known as the COMEL MANJA JMP 125, to which Honda claimed had infringed its industrial design in respect of various designs filed embodying its HONDA WAVE 125 model motorcycle. The next was a claim against the defendants’ for manufacturing the COMEL MANJA JMP-100 (GS-5) motorcycle, for copyright infringement, on the grounds that the manufacture of the same was infringing the copyright of the design drawings embodying the plaintiff’s HONDA EX-5 DREAM motorcycle.
The key findings of the court on the law was that novelty for industrial designs in Malaysia is local, and thereby the publication or use of the design outside the country prior to registration will not render the design invalid.

COPYRIGHT

Copyright is a form of intellectual property that gives the author of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation, after which time the work is said to enter the public domain. Some jurisdictions also recognize "moral rights" of the creator of a work, such as the right to be credited for the work.
-- Wikipedia
http://en.wikipedia.org/wiki/Copyright

Copyright protection in Malaysia is governed by the Copyright Act 1987 which provides comprehensive protection for copyrightable works. The Act outlines the nature of works eligible for copyright (which includes computer software), the scope of protection, and the manner in which the protection is accorded. A unique feature of the Act is the inclusion of provisions for enforcing the Act, which include such powers to enter premises suspected of having infringing copies and to search and seize infringing copies and contrivances. A special team of officers is appointed to enforce the Act.
The Copyright Act (1987) provides for the enforcement of the law by the Ministry of Domestic Trade and Consumer Affairs, specifically the Enforcement Division, apart from the Police. The Act also provides the necessary clout to the enforcement agencies to effectively carry out anti-piracy measures.The Malaysian Copyright Act provides for a Copyright Tribunal whose function is to grant Licenses to produce and publish in the National Language a translation of a literary work written in any other language. The Act is currently amended to expand the power of the tribunal to include arbitration of disputes relating to use of copyright works.

WHAT WORK IS ELIGIBLE FOR PROTECTION UNDER THE COPYRIGHT ACT 1987 ?
-- A work that is eligible in fulfillment of the following conditions :
a) Sufficient effort has been expended to make the work original in character.
b) The work has been written down, recorded or reduced to material form.
c) The author is a qualified person or the work is made in Malaysia or the work is first published in Malaysia.

-- Works eligible for protection are:
a) Literary works
b) Musical works
c) Artistic works
d) Films
e)Sound recording
f) Broadcasts
g)Derivative works
h) Published editions

WHAT IS THE DURATION OF THE COPYRIGHT ?
Generally, copyright subsist during the life of the author plus 50 years after his death. However, if a work has not been published during the life time of the author, copyright in the work continue to subsist until the expiration of 50 years, following the year in which the work was first published. In the case of a work with joint authorship, the life of the author who dies last is used for the purpose of calculating the copyright duration of the work.

WHEN IS A COPYRIGHT WORK CONSIDERED INFRINGED ?

The copyright in a work is infringed when a person who, not being the owner of the copyright, and without license from the owner, does or authorizes any of the following acts :
i) Reproduces in any material form, performs, shows or plays or distributes to the public, communicates by cable or broadcast of the whole work or a substantial part thereof either in its original or derivative form
ii) Imports any article into Malaysia for the purpose of trade or financial gains
iii) Makes, lets for hire or by way of trade, exposes or offers for sale or hire any infringing copy
iv) Sells, lets for hire or by way of trade, exposes or offers for sale or hire any infringing copy
v) Distributes infringing copies
vi) Possesses, otherwise than for his private and domestic use, any infringing copy
vii) By way of trade, exhibits in public any infringing copy
viii) Imports into Malaysia, otherwise that for his private and domestic use any copy which if it were made in Malaysia would be an infringing copy
ix) Makes or has in the possession any contrivance used or intended to be sued for the purposes of making infringing copies or
x) Causes the work to be performed in public.

*The doing of (i) and (ii) above are termed as direct infringement and is actionable at the suit of the owner.
*The doing of (iii) to (x) are termed as indirect infringement and attract criminal sanction and enforceable by the Ministry of Domestic Trade and Consumer Affairs.

WHAT ARE THE LEGAL RIGHTS OF COPYRIGHT OWNERS ?

Generally, owner of copyright works have the exclusive right to :
a) Reproduce the work in any material form (including photocopying, recording, etc.).
b) Perform, show or play the work to the public (including performing a work live, or playing a recording or showing a film containing the work in a non-domestic situation).
c) Broadcast the work.
d) Communicate the work by cable and
e) Distribute copies of the work to the public by sale rental or lending.

http://www.lawyerment.com.my/intellectual/copyright.shtml

Monday, December 14, 2009

Cybercrime around the World

"More than 4,000 cyber crime cases were reported in Malaysia in the past two years. Cyber complaints mostly consisted of hacking threats, fraud, and denial of services and other computer problems of files lost or corrupted by viruses. The Malaysian police has received about 2, 000 complaints in 2007. In 2008, a total of 2,123 cases were lodged with the Cybersecurity Malaysia."
"Bangladesh is not lagging behind in the number of cyber criminal cases. The country’s government plans to prescribe 10 years of rigorous imprisonment for those involved in cyber crime. Besides, the proposed law also provides for a Taka ten million ($14,300 approximately or £8,708.37) in penalty for breaking into computer networks and putting false and indecent materials online."
"The first cyber crime incident took place in China in the mid-1980s, when the Chinese banking system was attacked. Through the 1980s and 1990s the growth of cyber crime in China was slow, but steady. However, the emergence of an unknown computer virus in the form of a malware program named, “Ping Pong” finally drew cyber crime to newer heights in the country. Five years ago, a Chinese government survey revealed that in 2003, 87.9% of Chinese PCs connected to the Internet were infected, and most were still infected in 2004."
"According to a survey released by the National Police Agency (NPA), cyber crime cases in Japan have increased at a whooping rate by 15.5 percent year-on-year to 6,321 in 2008. The number of cyber crimes cases in the last year, included internet-related cases of threat, libel, illegal access and fraud and it was three times as many as that of 2004, when it was only 2,081 cases. Incidents of threats and illegal access have leaped by 90 percent and 20 percent, respectively, to 112 and 1,740, according to the survey."
"In Saudi Arabia 796,000 cases of computer system crashes instigated by hackers were recorded in the past nine months, accounting for 64 percent of the total number of cases in the Gulf Cooperation Countries (GCC), according to Trend Micro, a firm specialized in network antivirus and Internet content security."
-- Mustapha Ajbaili, November 15, 2009
http://www.alarabiya.net/articles/2009/11/15/91411.html



"US statistic of identity theft in 2002 (top ten states) : California 15115 victims, New York 7076 victims, Texas 6496 victims, Florida 5696 victims, Illinois 3784 victims, Pennsylvania 2704 victims, Georgia 2592 victims, Michigan 2589 victims, New Jersey 2575 victims, Ohio 2283 victims."

Phishing ...

Phishing is the criminally frauduletnt process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
(Source : Wikipedia) http://en.wikipedia.org/wiki/Phishing

What to look for in a phishing email (Source : PhishTank.com)
http://www.phishtank.com/what_is_phishing.php

1 -- Generic greeting. Phishing emails are usually sent in large batches. To save time, Internet criminals use generic names like "First Generic Bank Customer" so they don't have to type all recipients' names out and send emails one-by-one. If you don't see your name, be suspicious.

2 -- Forged link. Even if a link has a name you recognize somewhere in it, it doesn't mean it links to the real organization. Roll your mouse over the link and see if it matches what appears in the email. If there is a discrepency, don't click on the link. Also, websites where it is safe to enter personal information begin with "https" — the "s" stands for secure. If you don't see "https" do not proceed.

3 -- Requests personal information. The point of sending phishing email is to trick you into providing your personal information. If you receive an email requesting your personal information, it is probably a phishing attempt.

4 -- Sense of urgency. Internet criminals want you to provide your personal information now. They do this by making you think something has happened that requires you to act fast. The faster they get your information, the faster they can move on to another victim.

Protect Your Identity!


Yes, it could happen to anyone. identity theft has become a major concern among Malaysians and other countries as well. tp prevent this, it is good to have some knowledge on how our identity can be stolen. our personal data are stolen through spam emails, virus attacks, and phishings. thus, we are advised not to reply to those spam emails and provide our personal data to unknown resources.