Objective : to increase awareness among people about the importance of data protection.
Wednesday, December 16, 2009
Poster
Objective : to increase awareness among people about the importance of data protection.
Internet Censorship - Malaysia
According to the Malaysian Insider, the feasibility study is to be completed by December 2009 and “the results will be handed to a shadowy unit monitoring blogs and websites although the decision on implementation will lie with the National Security Council headed by Prime Minister Datuk Seri Najib Razak.”
The move is has critics and opposition politicians crying foul as it breaches the Multimedia Super Corridor (MSC) Bill of Guarantees. Furthermore, IT specialists have also said the move is “a waste of time”, which then makes the use of public funds in this endeavour questionable.
The Information, Communication and Culture Ministry has called for tenders for this proposed Internet filter. Unsurprisingly, this development comes hot on the heels of the previous proposal of getting bloggers registered.
The Honda Case of Copyright Infringement
In Honda Giken Kogyo Kabushiki Kaisha v Allied Pacific Motor (M) Sdn Bhd & Anor [2005] 3 MLJ 30, the famous Japanese marque for bikes and cars applied for an interlocutory injunction against a local manufacturer of a motorcycles in respect of two models manufactured by them. The first model was known as the COMEL MANJA JMP 125, to which Honda claimed had infringed its industrial design in respect of various designs filed embodying its HONDA WAVE 125 model motorcycle. The next was a claim against the defendants’ for manufacturing the COMEL MANJA JMP-100 (GS-5) motorcycle, for copyright infringement, on the grounds that the manufacture of the same was infringing the copyright of the design drawings embodying the plaintiff’s HONDA EX-5 DREAM motorcycle.
The key findings of the court on the law was that novelty for industrial designs in Malaysia is local, and thereby the publication or use of the design outside the country prior to registration will not render the design invalid.
COPYRIGHT
-- Wikipedia
http://en.wikipedia.org/wiki/Copyright
Copyright protection in Malaysia is governed by the Copyright Act 1987 which provides comprehensive protection for copyrightable works. The Act outlines the nature of works eligible for copyright (which includes computer software), the scope of protection, and the manner in which the protection is accorded. A unique feature of the Act is the inclusion of provisions for enforcing the Act, which include such powers to enter premises suspected of having infringing copies and to search and seize infringing copies and contrivances. A special team of officers is appointed to enforce the Act.
The Copyright Act (1987) provides for the enforcement of the law by the Ministry of Domestic Trade and Consumer Affairs, specifically the Enforcement Division, apart from the Police. The Act also provides the necessary clout to the enforcement agencies to effectively carry out anti-piracy measures.The Malaysian Copyright Act provides for a Copyright Tribunal whose function is to grant Licenses to produce and publish in the National Language a translation of a literary work written in any other language. The Act is currently amended to expand the power of the tribunal to include arbitration of disputes relating to use of copyright works.
WHAT WORK IS ELIGIBLE FOR PROTECTION UNDER THE COPYRIGHT ACT 1987 ?
-- A work that is eligible in fulfillment of the following conditions :
a) Sufficient effort has been expended to make the work original in character.
b) The work has been written down, recorded or reduced to material form.
c) The author is a qualified person or the work is made in Malaysia or the work is first published in Malaysia.
-- Works eligible for protection are:
a) Literary works
b) Musical works
c) Artistic works
d) Films
e)Sound recording
f) Broadcasts
g)Derivative works
h) Published editions
WHAT IS THE DURATION OF THE COPYRIGHT ?
Generally, copyright subsist during the life of the author plus 50 years after his death. However, if a work has not been published during the life time of the author, copyright in the work continue to subsist until the expiration of 50 years, following the year in which the work was first published. In the case of a work with joint authorship, the life of the author who dies last is used for the purpose of calculating the copyright duration of the work.
WHEN IS A COPYRIGHT WORK CONSIDERED INFRINGED ?
The copyright in a work is infringed when a person who, not being the owner of the copyright, and without license from the owner, does or authorizes any of the following acts :
i) Reproduces in any material form, performs, shows or plays or distributes to the public, communicates by cable or broadcast of the whole work or a substantial part thereof either in its original or derivative form
ii) Imports any article into Malaysia for the purpose of trade or financial gains
iii) Makes, lets for hire or by way of trade, exposes or offers for sale or hire any infringing copy
iv) Sells, lets for hire or by way of trade, exposes or offers for sale or hire any infringing copy
v) Distributes infringing copies
vi) Possesses, otherwise than for his private and domestic use, any infringing copy
vii) By way of trade, exhibits in public any infringing copy
viii) Imports into Malaysia, otherwise that for his private and domestic use any copy which if it were made in Malaysia would be an infringing copy
ix) Makes or has in the possession any contrivance used or intended to be sued for the purposes of making infringing copies or
x) Causes the work to be performed in public.
*The doing of (i) and (ii) above are termed as direct infringement and is actionable at the suit of the owner.
*The doing of (iii) to (x) are termed as indirect infringement and attract criminal sanction and enforceable by the Ministry of Domestic Trade and Consumer Affairs.
WHAT ARE THE LEGAL RIGHTS OF COPYRIGHT OWNERS ?
Generally, owner of copyright works have the exclusive right to :
a) Reproduce the work in any material form (including photocopying, recording, etc.).
b) Perform, show or play the work to the public (including performing a work live, or playing a recording or showing a film containing the work in a non-domestic situation).
c) Broadcast the work.
d) Communicate the work by cable and
e) Distribute copies of the work to the public by sale rental or lending.
http://www.lawyerment.com.my/intellectual/copyright.shtml
Monday, December 14, 2009
Cybercrime around the World
http://www.microexpert.com/2009/10/is-there-any-permanent-solution-to-end.html
Phishing ...
(Source : Wikipedia) http://en.wikipedia.org/wiki/Phishing
What to look for in a phishing email (Source : PhishTank.com)
http://www.phishtank.com/what_is_phishing.php
1 -- Generic greeting. Phishing emails are usually sent in large batches. To save time, Internet criminals use generic names like "First Generic Bank Customer" so they don't have to type all recipients' names out and send emails one-by-one. If you don't see your name, be suspicious.
2 -- Forged link. Even if a link has a name you recognize somewhere in it, it doesn't mean it links to the real organization. Roll your mouse over the link and see if it matches what appears in the email. If there is a discrepency, don't click on the link. Also, websites where it is safe to enter personal information begin with "https" — the "s" stands for secure. If you don't see "https" do not proceed.
3 -- Requests personal information. The point of sending phishing email is to trick you into providing your personal information. If you receive an email requesting your personal information, it is probably a phishing attempt.
4 -- Sense of urgency. Internet criminals want you to provide your personal information now. They do this by making you think something has happened that requires you to act fast. The faster they get your information, the faster they can move on to another victim.
Protect Your Identity!
Identity Theft - Malaysian Concern
“Preventive measures that can be taken to combat identity theft (for example) include implementing the use of biometric data, such as fingerprint reading and iris scanning for validating online transactions,” he said.
According to him, fraudsters are always on the look out for “softer targets” — those that don’t possess tightened and up-to-date security measures.
“And everyone should also be wary of the websites they visit or the online merchants that they buy from,” Whyman said.
He said that in the past, people shied away from online transactions due to threats from viruses and hackers.
Today’s encryption technologies and other programs to safeguard online transactions have reduced such threats but Internet users should always keep their guard up.
“While many people (and organisations) are less concerned about these threats nowadays, they still need to be on the lookout (for them),” Whyman said.
He was speaking to the press after releasing the results of the latest Unisys Security Index survey.
According to the survey, 78% of Malaysians who responded said they were very or extremely concerned over identity theft.
“Though there has been a slight decrease in the overall level of concern, Malaysians are beginning to be more aware of these (online) security risks and are looking into ways to reduce them,” Whyman said.
Identity theft is one of the primary concerns across the entire Asia-Pacific region because more people are going online and are being targeted by online fraudsters looking for easy prey, said Unisys.
After identity theft, the next primary concerns among Malaysians are credit or debit card fraud (76%) and the war on terrorism (71%), in that order.
The survey polled 872 Malaysians, aged between 18 and 64 years, across Peninsula Malaysia. Updated twice a year, the survey aims to provide a snapshot of the country’s sense of security in four key areas — national, personal, financial and Internet.
Other countries are also surveyed by Unisys, including Singapore and Hong Kong.
Tutorial on PDP
Data Protection Principles (summary from PDP lecture slides)
The Data Protection Principles (as in the First Schedule of the latest PDP Bill) :
1 -- Personal data shall be collected lawfully and fairly.
2 -- Purpose of collection of personal data.
3 -- Use of personal data.
4 -- Disclosure of personal data.
5 -- Accuracy of personal data.
6 -- Duration of retention of personal data.
7 -- Access to and correction of personal data.
8 -- Security of personal data.
9 -- Information to be generally available.
TUTORIAL (take-home task)
a) Andrew is a computer science attached with Microhard Corporation in Cyberjaya as a practical trainee. One day he managed to crack the company's information system but did not do anything afterwards. The following day he also managed to intrude into Microhard Corporation's website system and then posted his picture on the front page of the website and left his mobile number below his picture, hoping that someone will call him and make friends. Subsequently his phone rang, but unfortunately it was his training manager who called and later warned him that actions will be taken. Upon investigations, it was also revealed that Andrew had previously leaked the company's system access code to his friend at University, to whom he also sent emails telling bad things about his manager. Advise Microhard Corporation on various potential liabilitites of Andrew from the above incident, with reference to various cybercrime laws applicable in Malaysia.
Answer :
a) Issue 1 :
- Andrew cracked company's information system but did not do anything afterwards.
- Cracking a computer system can be defined as hacking a computer system or legally defined as accessing a computer system without authority.
- Computer Crimes Act, Section 3(1): A person shall be guilty of an offence if (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer; (b) the access he intends to secure is unauthorized; and (c) he knows at the time when he causes the computer to perform the function that that is the case.
By virtue of this provision, the following acts are prohibited:
a. Unauthorized access to computer, computer system and computer network;
b. Recreational hacking;
c. Computer cracking to explore loopholes in the system;
d. System intrusion;
e. System and e-mail spoofing
The person guilty under this section is liable to a maximum RM 50,000.00 fine or to 5 years imprisonment or to both. [taken from the article "Computer Crimes in Malaysia" by Sonny Zulhuda]
Issue 2 :
- Andrew intrude company's website system and posted his picture and mobile number on the front page of the website.
- CCA Section 3(1):
By virtue of this provision, the following acts are prohibited:
a. Unauthorized access to computer, computer system and computer network;
d. System intrusion
Liable to a maximum RM 50,000.00 fine or to 5 years imprisonment or to both. [ "Computer Crimes in Malaysia" by Sonny Zulhuda]
- Computer Crimes Act, Section 5(1): A person shall be guilty of an offence if he does any act which he knows will cause unauthorized modification of the contents of any computer.
By virtue of this provision, the following acts are punishable offences:
a. Unauthorized alteration, amendment and modification of data;
b. System intrusion and sabotage;
c. Website defacing;
d. System and website destruction;
e. Spreading virus that will cause data alteration or system destruction
The offences under this section are punishable with a maximum RM 100,000.00 fine or to 7 years imprisonment or to both. However, if the act is done with further intention of causing injury, it can be punished up to RM 150,000.00 fine or 10 years imprisonment or both. [ "Computer Crimes in Malaysia" by Sonny Zulhuda]
Issue 3 :
- Andrew leaked company's system access code to his friend.
- Computer Crimes Act, Section 6(1): A person shall be guilty of an offence if he communicates directly or indirectly a number, code, password or other means of access to a computer to any person other than a person to whom he is duly authorized to communicate.
- This type of offence is punishable by a maximum RM 25,000.00 fine or a 3 years imprisonment or both. [ "Computer Crimes in Malaysia" by Sonny Zulhuda]
Issue 4 :
- Andrew sent emails to his friend telling bad things about his manager.
- Communication and Multimedia Act, Section 211(1) stipulates that no content applications service provider, or other person using a content application service, shall provide content which is indecent, obscene, false, menacing, or offensive in character with intent to annoy, abuse, threaten or harass any person.
By virtue of this provision, among other things, the Internet application and service providers as well as end users are prohibited from providing and distributing offensive contents through the computer system. This includes prohibition of offensive emails and offensive web pages from being published. It also makes the following actions as offences:
a. Online harassment through email or websites or other Internet content;
b. Hatred and abusive content;
c. False rumor spreading;
d. Indecent and/or obscene materials;
e. Threat Email
- The punishment for such an offence is a fine at maximum RM 50,000.00 or imprisonment of maximum one year or both. The provision also prescribes additional fines or jail term if the offence is continuing. [ "Computer Crimes in Malaysia" by Sonny Zulhuda]
Tuesday, December 8, 2009
Protecting Your Password (Summary from lecture slides)
Privacy
Thursday, November 26, 2009
Murder Charge Amended
Murder charge amended to causing death
KUALA LUMPUR: Two brothers and a cousin, who were initially charged with murdering a couple on Aifilfitri last year, have been spared the gallows when the High Court here today amended the charge.
Judicial Commissioner Azman Abdullah, in amending the charge at the end of the prosecution case, ruled that the case fell under Exception 5 of Section 300 of the Penal Code. The exception states that "culpable homicide is not murder when the person whose death is cause, being above the age 18 years, suffers death, or takes the risk of death with his own consent.'' However, the three relatives still maintained their not guilty plea and were ordered to enter their defence, which hearing would begin on Dec 30. In the dock are Muhammad Ilyas Abdul Razak, 25, his brother, Muhammad Fauzi, 23, and their cousin, Muhammad Nizam Mohd Ibrahim, 21, who are jointly charged with causing the death of Mohd Ibrahim Kader Mydin, 48, and Rosina SM Mydin Pillay, 42, at house No 5-7C, Blok A, Flat Seri Sarawak, Jalan Kenanga here between noon and 8pm on Oct 1, 2008.
They are charged under Section 304(a) of the Penal Code which carries a jail sentence of up to 20 years.
In his judgment, Azman said although there was no evidence that the three relatives had beaten the couple to death, a witness had testified that Muhammad Fauzi and Muhammad Nizam did that to others on Muhammad Ilyas'' orders. "The court rules that the prosecution has succeeded in establishing a prima facie case under Section 304(a) of the Penal Code," he added. Earlier, Azman said that from witnesses' testimonies, it showed that the three accused and their families believed that the ceremony held on Hari Raya could heal a person from illnesses and also bring back the dead to life. He said the willingness of the family to undergo the healing ceremony proved their belief in the ritual, including on the parents allowing their son to beat them. "A testimony by a witness who heard a ceramah by Muhammad Ilyas showed that the two families (Muhammad Ilyas and Muhammad Nizam's families) had high regard for Muhammad Ilyas' spiritual capabilities," he added. Meanwhile, defence counsel Supramaniam Kasia Pillay, who represented the three accused, said none of the witnesses in the hosue where the incident took place was able to tell how the couple died and who caused their death. He also said that a psychiatric report also confirmed that Muhammad Ilyas had mental problems and that Muhammad Fauzi and Muhammad Nizam were only following Muhammad Ilyas' order. Deputy public prosecutor Anselm Charles Fernandis submitted that the accused murdered the couple to convince other relatives that they could bring the dead back to life. -- BERNAMA
http://m.nst.com.my/Current_News/NST/articles/20091123205218/mobile/index.pda
this is an article reporting about two brothers and a cousin who were charged with murdering a couple last year had been spared from the punishment as the High Court here amended the charge today. the Judicial Commissioner, Azman Abdullah ruled that the case were fall under Exception 5 of Section 300 of the Penal Code where it is stated that "culpable homicide is not murder when the person whose death is cause, being above the age 18 years, suffers death, or takes the risk of death with his own consent." in this case which mentioned in this article, the reason why the three relatives were not charged under murdering is because the couple themselves were willingly to be beaten by the three as a practice in a ceremony of Hari Raya.
reading this article, I remembered the topic that we've learned in the Legal Framework class, where Sir Sonny said that there is three degrees of murder charge.
1st degree : murder
2nd degree : culpable homicide
3rd degree : accidently murder
this case fell into the second degree where the three relatives were charged culpable homiside. this article has improved my understanding about the murder charge that I've learned in class.
Tuesday, November 24, 2009
Stabbed Over Key
MIRI: A 14-year-old boy has died after he was stabbed allegedly by a relative at the Tudan housing area, about 20km from here.
Miri police chief Assistant Commissioner Jamaludin Ibrahim, who confirmed the incident, said the victim was identified as Servester Budit. He was in his bedroom when the incident took place at midnight on Sunday.Jamaludin said the 24-year-old suspect went to Servester's bedroom to demand for the return of his motorcycle key, which the victim denied having. After failing to get the key, the suspect left the bedroom in a rage, returned with a small knife and started to stab the boy. Police arrested the suspect within the Tudan area at about 3am.
What is Law and Multimedia Law
Monday, November 16, 2009
Introduction
My name is Nabiah Hamzah and I'm currently studying in Multimedia University, Malaysia, majoring in Media Innovation and Entrepreneurship. In this trimester, I'm taking the course of Legal Framework for Multimedia and this blog is actually one of the asignment for this paarticular course.
Previously, I always had a thought that studying law is very boring and difficult as it needs creativity to struggle your mind to solve a problem and do so much research upon one single problem. But, as i step into the first class of this course, I found that it is very interesting to sit together and discuss about one problem after another and get the answer. It is actually worth it to do research about a case and looked back to the history of law and everything about it. In some way, it is in fact benefits me.
I learned that recently I am more cautious when I do something and my level of inquisitiveness have increase.
But, this is not a course of general law but it is specified to the law in multimedia. This particular course's objective is to provide the understanding of multimedia law.Anyway, whatever it is, I am looking forward to learn more about it and hopefully I can score for this course.
Welcome to BBL 3014 - Legal Framework for Multimedia !