Wrongfully accessing a computer’s system or network.
Published in Chapter:
Cybersecurity Laws in Malaysia
Olivia Swee Leng Tan (Multimedia University, Malaysia), Rossanne Gale Vergara (Multimedia University, Malaysia), Raphael C. W. Phan (Multimedia University, Malaysia), Shereen Khan (Multimedia University, Malaysia), and Nasreen Khan (Multimedia University, Malaysia)
Copyright: © 2020
|Pages: 14
DOI: 10.4018/978-1-5225-9715-5.ch030
Abstract
The progression of information and communication technologies (ICT) use have been matched by the rise in corruption and abuse of technology for criminal activities. In 2018, The Malaysia Computer Emergency Response Team reported 10,699 incidents, of which “fraud” had the highest reported incidents (5,123) and the second highest “intrusion attempt” (1,805) of the total incidents. Malaysia cyber laws have existed since 1997 and are still used today to prosecute cybercrimes. Most recent cases were charged under Malaysian laws—Computer Crimes Act 1997, Copyright (Amendment) Act 1997, Communications and Multimedia Act 1998, Personal Data Protection Act 2010, and Malaysian Penal Code—to combat cybercrimes. This chapter discusses Malaysia's cyber laws, cases charged under these laws, and their relevance to combating cybercrimes in Malaysia.