SlideShare une entreprise Scribd logo
1  sur  10
Presentation ICT Impact of ICT on Society Malaysian Cyber Law  and Electronic Government Law ,[object Object],[object Object]
DIGITAL SIGNATURE ACT 1997 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Malaysian Cyber Law
TELEMEDICINE ACT 1997 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Malaysian Cyber Law
COMMUNICATIONS AND MULTIMEDIA ACT 1998 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Malaysian Cyber Law
WHY THE ELECTRONIC GOVERNMENT EXIST: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Electronic Government Law
ELECTRONIC GOVERNMENT DATABASES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Electronic Government Law
INFORMATION TECHNOLOGY ACT 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Electronic Government Law
THE INDUCE ACT ,[object Object],[object Object],[object Object],[object Object],[object Object],Electronic Government Law
CONCLUSION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REFERENCES   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patentsravijain90
 
Internet
InternetInternet
InternetJodip
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAWpattok
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idhambuu
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 

Tendances (17)

Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Internet
InternetInternet
Internet
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idham
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
It act 2000
It act 2000It act 2000
It act 2000
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
The e commerce law
The e commerce lawThe e commerce law
The e commerce law
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 

En vedette

Social media and defamation law (watermarked)
Social media and defamation law (watermarked) Social media and defamation law (watermarked)
Social media and defamation law (watermarked) Bradley W. Deacon
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
( malaysia ) Company Law
( malaysia ) Company Law ( malaysia ) Company Law
( malaysia ) Company Law Amine Med
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacylegalPadmin
 
Legal Framework of Internet Banking
Legal Framework of Internet BankingLegal Framework of Internet Banking
Legal Framework of Internet BankingMahyuddin Khalid
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsCma Mohd
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...International Islamic University Malaysia
 
Pdpa presentation
Pdpa presentationPdpa presentation
Pdpa presentationAlan Teh
 

En vedette (14)

Social media and defamation law (watermarked)
Social media and defamation law (watermarked) Social media and defamation law (watermarked)
Social media and defamation law (watermarked)
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
( malaysia ) Company Law
( malaysia ) Company Law ( malaysia ) Company Law
( malaysia ) Company Law
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
Blogging & Law
Blogging & LawBlogging & Law
Blogging & Law
 
Legal Framework of Internet Banking
Legal Framework of Internet BankingLegal Framework of Internet Banking
Legal Framework of Internet Banking
 
Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
it act 2000
it act 2000it act 2000
it act 2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Pdpa presentation
Pdpa presentationPdpa presentation
Pdpa presentation
 

Similaire à Presentation ICT2

Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internetguesta5c32a
 
E-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons LearnedE-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons LearnedJanette Toral
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chettyEndcode_org
 
A Proposed Transformation Model for Integration Between E-justice Application...
A Proposed Transformation Model for Integration Between E-justice Application...A Proposed Transformation Model for Integration Between E-justice Application...
A Proposed Transformation Model for Integration Between E-justice Application...Eswar Publications
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaPatrick McCormick
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 

Similaire à Presentation ICT2 (20)

Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
Brief kif0809
Brief kif0809Brief kif0809
Brief kif0809
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
E-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons LearnedE-Commerce Law Lobbying Lessons Learned
E-Commerce Law Lobbying Lessons Learned
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
E-commerce regulation pria chetty
E-commerce regulation pria chettyE-commerce regulation pria chetty
E-commerce regulation pria chetty
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
A Proposed Transformation Model for Integration Between E-justice Application...
A Proposed Transformation Model for Integration Between E-justice Application...A Proposed Transformation Model for Integration Between E-justice Application...
A Proposed Transformation Model for Integration Between E-justice Application...
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social media
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Presentation ICT2

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.