Cyber Law Bridging the Conventional and Cyber Juris

advertisement
Cyber Law
Bridging the Conventional and Cyber Juris
Hasib bin Mansor
BSc (USM), MSc (UiTM), Bachelor Of Legal Studies Hons. (UiTM)
Setiauaha Bahagian
Bahagian Pengurusan Maklumat
Kementerian Pertanian dan Industri Asas Tani
Malaysia
Definition of Cyber Law
In Simple word we can say that cyber law is unlawful acts
wherein the computer is either a tool or a target or both
• Cyber crimes can involve criminal activities that are traditional
in nature, such as theft, fraud, forgery, defamation and mischief,
all of which are subject to the Penal Code, Act 574.
• Cyber Defamation
Cyber Crime
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
3
Cyber Crime
1. The Computer as a Target ; using a computer
to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
2. The computer as a weapon; using a computer
to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card
frauds, EFT frauds, Pornography etc.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
4
Cyber Crime Statistics In Malaysia
• RM2.75billion losses for the period of 2005 to
2010
• 13,173 incidents reported in 2011 as
compared to 6204 incidents reported in 2010,
an increased of 112.3%
Jabatan Perdana Menteri, April 2012, The Star
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
5
UK cyber crime costs £27bn a year government report
• Security minister Baroness Neville-Jones said the
government was determined to work with industry to
tackle cyber crime.
• Nearly half of the £21bn cost to business is made up of
intellectual property theft - such as the theft of designs.
Industrial espionage, such as the theft of commercial
secrets.
• Intellectual property theft cost £9.2bn, industrial espionage
£7.6bn, this was followed by extortion, which cost £2.2bn,
and direct online theft, which cost business £1.3bn. Some
£1bn was lost through theft of customer data.
BBC World Service, London: Feb 2011
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
6
Enacted Cyber Laws in Malaysia
1. computer Crime Act, Act 563
2. Digital Signature Act, Act 562
3. Telemedicine Act, Act 564
4 Comm. and Multimedia Act, Act 589
5. Digital Signature Act, Act 562
6. Electronic Gov. Act, Act 680
IPR
7. Industrial Design Act, Act 552
8. Copy Right Act, Act 332
9. Patent Act, Act 291
10. Trade Description Act, Act 87
11. Personal Data Protection Act, Act 709
12. Electronic Commerce Act, Act 658
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
7
Power To Investigate and Prosecute
• Investigate
– Traditional Crime
• Police officer with the rank of sergeant or any officer in charge of a
police station (Section 109, Criminal Procedure code, Act 593)
– Cyber Crime
• CCA, Police officer with the rank of Inspector or Above to conduct
search, seizure and arrest (Section 10, Computer Crime Act 1997, Act
563)
• MCMC Officer Appointed by the Minister, S.245, case LETCHIMANAN
PERUMAL lwn. PP
• Prosecute
No prosecution shall be instituted for an offence under the acts
without the consent of the public prosecutor. S.12 CCA, S.259
MCMC
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
8
Type of Cyber Crimes
•
•
•
•
•
•
•
•
•
9/11/2012
Hacking (force)
Intrusion(invasion)
Virus, worm, spam, spyware, phishing, Trojan
Ddos (distributed denial of service)
Fraud, Defamation
IPR violation
Cyber Terrorism
Credit card fraud
Pornography
Seminar Keselamatan ICT Bil 1/2012 MoH
9
Computer Crime Act 1997
Unauthorized access to computer material
3. (1) A person shall be guilty of an offence if—
(a) he causes a computer to perform any function with
intent
to secure access to any program or data held in any
computer;
(b) the access he intends to secure is unauthorized; and
(c) he knows at the time when he causes the computer to
perform the function that is the case.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
10
Computer Crime Act 1997
Unauthorized access to computer material
3.(2) The intent a person has to have to commit an offence
under this section need not be directed at:—
(a) any particular program or data;
(b) a program or data of any particular kind; or
(c) a program or data held in any particular computer.
3.(3) A person guilty of an offence under this section shall on
conviction be liable to a fine not exceeding fifty thousand
ringgit or to imprisonment for a term not exceeding five
years or to both.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
11
S. 3 CCA Case
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
12
Issues Of The Case
Statement of Issues to be tries:• Whether the information and documents were
confidential and protected by law
• Whether the Defendants were under an
obligation not to remove and or disclose them
without the Plaintiff’s consent
• Whether the Defendants’ act of removing the
information and documents from the Plaintiff’s
computer systems to their personal computers or
emails were unauthorized and in breach of their
terms of employment or the law.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
13
Decision
Equitable Remedies
• Plaintiff’s claim for injunction and declaration
were allowed with
• Exemplary damages assessed by the Deputy
Registrar
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
14
Computer Crime Act 1997
Unauthorized access with intent to commit or facilitate
commission of further offence
4. (1) A person shall be guilty of an offence under this section
if he commits an offence referred to in section 3 with intent—
(a) to commit an offence involving fraud or dishonesty or
which causes injury as defined in the Penal Code [Act
574]; or
4.(b) to facilitate the commission of such an offence whether
by himself or by any other person.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
15
Computer Crime Act 1997
Unauthorized access with intent to commit or facilitate
commission of further offence
4.(2) For the purposes of this section, it is immaterial
whether the offence to which this section applies is to
be committed at the same time when the
unauthorized access is secured or on any future
occasion.
4.(3) A person guilty of an offence under this section shall
on conviction be liable to a fine not exceeding one
hundred and fifty thousand ringgit or to imprisonment
for a term not exceeding ten years or to both.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
16
Cases Fall Under S.4
• Causing injury or death to a patient as a result
of tampering his medical information
• Divert money from someone’s account into
another account
• Tampering with prisoner’s record
• Tampering with forwarding agent’s databases
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
17
Computer Crime Act 1997
Unauthorized modification of the contents of any computer
5. (1) A person shall be guilty of an offence if he does any act
which he knows will cause unauthorized modification of the contents
of any computer.
5.(2) For the purposes of this section, it is immaterial that the act
in question is not directed at—
(a) any particular program or data;
(b) a program or data of any kind; or
(c) a program or data held in any particular computer.
5.(3) For the purposes of this section, it is immaterial whether an
unauthorized modification is, or is intended to be, permanent or
merely temporary.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
18
Computer Crime Act 1997
5.(4) A person guilty of an offence under this
section shall on conviction be liable to a fine not
exceeding one hundred thousand ringgit or to
imprisonment for a term not exceeding seven
years or to both; or be liable to a fine not
exceeding one hundred and fifty thousand
ringgit or to imprisonment for a term not
exceeding ten years or to both, if the act is done
with the intention of causing injury as defined in
the Penal Code.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
19
CCA, S5, Case
http://www.tabunghaji.gov.my/tabunghajitheme/PDF/KLIP_AKHBAR/FEBRUARI2012/240212_APRIL%2025%20TRIAL%20FOR%20TABUNG%20HAJI%20DUO.pdf,
9:9-2012
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
20
Computer Crime Act 1997
Wrongful communication
6. (1) A person shall be guilty of an offence if he communicates
directly or indirectly a number, code, password or other means of
access to a computer to any person other than a person to whom
he is duly authorized to communicate.
(2) A person guilty of an offence under this section shall on
conviction be liable to a fine not exceeding twenty five thousand
ringgit or to imprisonment for a term not exceeding three years
or to both.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
21
8. Presumption.
• A person who has in his custody or control
any program, data or other information which
is held in any computer or retrieved from any
computer which he is not authorised to have
in his custody or control shall be deemed to
have obtained unauthorised access to such
program, data or information unless the
contrary is proved.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
22
S234, MCMC Act
• 234. Interception and disclosure of communications prohibited.
(1) A person who, without lawful authority under this Act or any other
written law(a) intercepts, attempts to intercept, or procures any other person to intercept or
attempt to intercept, any communications;
(b) discloses, or attempts to disclose, to any other person the contents of any
communications, knowing or having reason to believe that the information
was obtained through the interception of any communications in
contravention of this section; or
(c) uses, or attempts to use, the contents of any communications, knowing or
having reason to believe that the information was obtained through the
interception of any communications in contravention of this section,
commits an offence.
(3) A person who commits an offence under subsection (1) or (2)
shall, on conviction, be liable to a fine not exceeding fifty thousand
ringgit or to imprisonment for a term not exceeding one year or to
both.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
23
Section 6, Interpretation
• intercept
"intercept" means the aural or other
acquisition of the contents of any
communications through the use of any
electronic, mechanical, or other equipment,
device or apparatus;
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
24
Case Law, Section 234
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
25
The Allegation
D.I. was conducted on 5 December 2000 and the claimant had
duly attended. At its conclusion, the claimant was found guilty
of all the 6 charges except Charge 5.2 namely:
• 1. As MIS Manager, you were aware of other employees entering the Chief
Operating Officer's e-mail account illegally, but you did not stop or report
such activities;
• 2. Going into the internet for non-company related activities;
• 3. Entering into other people's e-mail account illegally;
• 4. Unauthorized access to your account whilst on suspension;
• 5. Together with the above two ladies (Ms. KK Lee and Ms. Tang Aye Tin),
paid an unscheduled visit to the Hong Leong Senior Management at
Wisma Hong Leong on Nov-11-2000;
• 6. Collaborating with other employees to undermine the Chief Operating
Officer.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
26
Rationale for the Court's Decision
• A Mere received copies of email and not active member as required
under section 234 MCMC
• not a misconduct in the absence of any written policy or practice and that
in respect of item 2, the respondent had failed to prove these 2 items on a
balance of probability.
• A mere possession of such an e-mail does not necessarily prove that the
claimant had entered into Mr. LC Ho's e-mail account and acquired it.
• The respondent ought to have known that if the claimant was not allowed
to use the said facility, it had to be withdrawn from her or to be expressly
mentioned in her letter of suspension. Without it being so expressed, it
would be inequitable to hold the claimant liable for a misconduct on such
a charge. This court agrees with the submission for the claimant that there
was no evidence led by the respondent to prove that the claimant had
deleted documents on 10 November 2000. …..He who seeks equity
must do equity
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
27
Remedy & Award
Claimant had pleaded for reinstatement to her former position
with backwages, inter alia.
• As a consequent of this case, this court is the view that there has
been bad feeling between Management team. Such environment
will certainly not be conducive for both the claimant as well as the
respondent since the mutual trust and confidence may be
diminishing.
• This court finds that reinstatement is not the appropriate remedy in
the circumstances. The alternative remedy to the claimant would
be compensation in term of back wages
• Ubi jus ibi remedium
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
28
Cyber Defamation
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
29
Defamation Arises
• Publication – The words are defamatory
• Tends to lower a person’s reputation (Tendency to
lower the estimation of the plaintiff in the mind of
right thinking members of society) OR
• To cause him to be shunned or avoided by
reasonable people in the society
• Thereby adversely affecting his reputation
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
30
Rindos v Hardwick
Facts of case
• A landmark case in cyber defamation in Western
Australia in 1994
• Dr Rindos, An American academic and probationary
lecturer at WA University
• He was denied tenure at the university on controversial
issue of homosexual.
• Hardwick was a student and studying in a different
department. He made defamatory statement about Dr
Rindos when he posted to the usenet newsgroup Sc.
anthropology computer bulletin board via DIALix, An
ISP
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
31
Rationale for the Court's Decision
• Rindos was awarded $40,000 damages from
Hardwick - but apparently did not collect
before his death.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
32
Bridging the Gaps
Basic Elements of Criminal Liability
1. ACTUS REUS – causing computer to perform S.3,
CCA 1997
1.
2.
In cyber world it is not physically painful but emotionally,
eg: computer crash, hand phone and notebook stolen
Action may from remote
2. MENS REA
2.1 He must intend to secure access to computer
2. He knew that his intended access was unauthorised
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
33
Bridging the Gaps
• Cyber defamation
– Circulation of defamatory words traditionally through sale
of book, magazine, newspaper, bulletin- come in person
– Cyber world, through www, email, social
networking(email, facebook, tweeter, blog) – through
electronic
– www = publisher
– Number of circulations, exponentially fast v traditional
printing
– The media of defamations are hard to disposed, case
youtube, Video: Police Inspector Held For ‘Beating’ Hotel
Employee , http://mynewshub.my/eng/2012/07/videopolice-inspector-held-for-beating-hotel-employee/
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
34
Challenges And Issues
• Law conflict with organization goals
• Law enforcer, Lack of competent technical skills in
computer crime forensic, Malaysia need 7000 such
personnel in the next three years, Cyber Security Malaysia ,
August 2012
• Shortage of lawyers in cyber laws
• Circumstantial evidences, forensic evidences – problem in
identifying the perpetrators
• Victims reluctant to report – fear of reputational damage
• Too many regulatory bodies that involves in cyber laws
• Lack of awareness of the law
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
35
S.114A Evidences Act
114A. Presumption of fact in publication.
• (1) A person whose name, photograph or pseudonym appears on any publication depicting
himself as the owner, host, administrator, editor or sub-editor, or who in any manner facilitates
to publish or re-publish the publication is presumed to have published or re-published the
contents of the publication unless the contrary is proved.
• (2) A person who is registered with a network service provider as a subscriber of a network
service on which any publication originates from is presumed to be the person who published
or re-published the publication unless the contrary is proved.
• (3) Any person who has in his custody or control any computer on which any publication
originates from is presumed to have published or re-published the content of the publication
unless the contrary is proved.
• (4) For the purpose of this section- (a)"network service" and "network service provider" have the meaning assigned to them
in section 6 of the Communications and Multimedia Act 1998 [Act 588]; and
- (b)"publication" means a statement or a representation, whether in written, printed,
pictorial, film, graphical, acoustic or other form displayed on the screen of a computer.
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
36
Terima Kasih
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
37
LACK OF AWARENESS OF THE LAW
Jeremy Bentham, the Classical Utilitarian Theory (A Positivist)
http://users.ox.ac.uk/~ball0888/oxfordopen/happiness.htm
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
38
CCA 1987 Analysis of the Punishments
Section
3
4
5
6
7
9/11/2012
Fine
(RM)
50000
150000
100000
150000
25
=
Max Imprisonment
(Year)
5
10
7
10
3
1/2 of the above
Seminar Keselamatan ICT Bil 1/2012 MoH
39
Letchimanan Perumal v PP
• Found Not Guilty
• IO was not Authorized by
the minister
• Lack of Evidences
– Video recordings, punch
card, job sheets of daily
activities were not
produced as exhibits
• Wrongful gain to one
person or wrongful loss to
another, not produced in
court
He who comes to equity must come with clean Hands, Maxim of equity
9/11/2012
Seminar Keselamatan ICT Bil 1/2012 MoH
40
Download