exceeding seven years or both; if the act is done intentionally to cause injury
as defined in the penal code then the penalty is stiffer with a fine not
exceeding one hundred and fifty thousand ringgit or to imprisonment for a
term not exceeding ten years or to both.
Section 6(1) states “A person shall be
guilty of an offence if he communicates directly or indirectly a number, code,
password, or other means of access to a computer to any other person other
than a person to whom he is duly authorised to communicate.” The above
will catch the hacker who publishes passwords on bulletin boards or by emailing.
Would a worker who accesses his office server from his home be
committing an offence under section 6(1) if a visitor unintentionally and
without his knowledge happens to see that access code? Even authors of
books that seek to alert users to certain security weaknesses or holes in
computer systems and indicate the means by which such systems could be
compromised may well be committing an offence under section 6(1). Section
7(1)(2) Abetments and attempts to commit offence are punishable offences.
Even any act preparatory to or in furtherance of the commission of any
offence shall be liable to punishment.
Compared with penalties for computer misuse in other jurisdictions (e.g. UK and Singapore),
the fine for a s.3 offence is set at an extremely high level. The powers of enforcement in
CCA97 are set out in section 10. Section 10 gives a police office of or above
the rank of Inspector wide powers of search. These powers extending from
cooperation of suspect to arrest without warrant (section 10(3)) were
criticized for – lack of safeguards to check abuse; - infringement of the right
to privacy and; - infringement of the right against self-incrimination. It is
rather unsettling that under Malaysian law, there is no rule of law that
evidence obtained from an illegal search and seizure is inadmissible in legal
proceedings. The CCA97 may be open to abuse where privacy might be
invaded to trawl for potential victims rather than to pursue criminals. Are the
sweeping powers given to enforcement officials to gather evidence really
that necessary? Is it really necessary to have such stiff penalties when to date
no one has yet been prosecuted successfully under the CCA97; evidence
gathering and subsequent prosecution is no easy task. Section 9(1) sets out
the principle that the offences under the Act are extra-territorial in nature and
those persons of nationality other than Malaysian are still liable to be
prosecuted for offences committed under the Act. If either the perpetrator’s
computer or the victim’s computer is physically in Malaysia, or the situation
where Malaysia is used as a transit point, then jurisdiction will be founded.
(section 9(2)). Enforcement would not be a trivial issue, as the enforcement
authorities would require the cooperation of the enforcement authorities of
the other country to obtain necessary evidence to be able to extradite the
accused. Furthermore Section 9(3) wording is rather confusing but it appears
that it is a statutory enactment of the rule against double jeopardy.
1 Response to "Malaysian Cyberlaws : issues and development"
Hello!
I would like to know is there any laws in Malaysia that can hinder digital forensics process specifically in cloud environment? If forensics investigator, for example, from US wanted to perform investigation onto cloud server located in Malaysia, will he face cross-jurisdiction issues? If yes, what are the laws that preventing him to do so?
Leave A Reply