type
status
date
slug
summary
tags
category
icon
password
Remarks
Be prepared for a VERY VERY VERY VAGUEEE course arrangement.
Don’t rely on anybody except yourself and your reliable friends.
Imagine being in a jungle where you might face a tiger or just a mosquito. Even if it seems like only a mosquito is around, you should prepare fully. I would choose an atomic bomb for both, rather than relying on bare hands to face the unknown.
如果要满绩,请你狠狠的准备,然后优雅的大炮打蚊子.
Preparation for Midterm Exam
Prepared by: Khor Yu Zhuang and Kow Chi Fhong
Disclaimer:
We have no clear idea about the exact requirements of this exam.
There are 8 case studies with instructions to prepare 3 legal issues and 2 ethical issues for each, but no additional references are provided.
We’re also unsure if any extra information will be given during the exam.
I didn’t ask my tutor for feedback or review my paper, as I feel it probably wouldn’t help and I was too lazy to follow up.
Even though you happen to score low, don’t be frustrated because we know it isn’t our problem. (This is not for you if you are too chill/lazy to prepare)
Hence, this is just a reference. We hope that this helps.
Best wishes,
Khor Yu Zhuang.
20241207 1833
Acknowledgements:
We would like to extend our sincere gratitude to our lecturer for his valuable guidance and advice during the preparation process. We also express our appreciation to Fong Jien Hung for providing insightful feedback, which greatly contributed to the improvement of this work.
Maybe it helps:
Refer to the MBOT Code of Ethics and relevant laws in Malaysia.
ITPE: For Finals
The following is a preparation for Finals.
Disclaimer:
This preparation is focusing on the big picture and aborting the minor details.
Hence, it is unavoidable that possible mistakes exists within the notes.
You may help by commenting below.
It is my honour if this notes happen to enlighten you.
Remark:
The motive of studying is not to memorize, but this paper definitely needs tons of temporary memory space to excel.
This paper requires us to memorize lecture notes, some frequent used law, relevant punishments and some general knowledge.
It is almost impossible to really prepare for general knowledge as you don't know what is tested during the exam.
With a little bit of consistent effort, we can definitely succeed.
Lecture Notes
Lecture 1: Intro to Law
1.1 Ethics in IT
- Professional ethics: Standards set by professional organizations for the behaviour and values of people working within a specific field.
- Moral = Right or wrong actions done based on personal and group values, affected by religion and culture
- Law = Right or wrong actions established by Parliament and written in black and white
- Ethics = Right or wrong actions established by true facts collected by researchers and studies that are agreed by majority
Ethics is basically unwritten rules.
- Importance of Ethics
Guides Professional Conduct
Ethics provides rules for professionals to interact with others in their field.
Promotes Morality
It helps individuals act in ways that align with concepts of goodness and fairness.
Defines Identity
Ethics shapes individual and societal values, influencing how we see ourselves and others.
Prevents Chaos
A shared ethical framework ensures order by providing a common standard for right and wrong.
- Possible conflicts that may arise
a. Moral but Illegal - Hack to other network to reveal evil activityb. Legal but not ethical - Pay low wages in countries where labour laws are lenientc. Legal but not moral - Abortion
- MBOT Code of Ethics (PIC is D BullShit)
Professionalism
Integrity
Competence
Diligence (Hard-working)
Benevolence (Kindness)
Strive to Perfection
1.2 Introduction to Law
Features of Law
a. Protect basic rights (Liberty, Equality, Freedom of Speech)Liberty: Freedom from oppressive restrictions on life, behavior, or views.Equality: Equal status, rights, and opportunities for all.Freedom of Speech: The right to express opinions without censorship or punishment.b. Ensure a safe and peaceful societyc. Applies to alld. Essential to abide (must follow) (east adoption to change that occur)e. Change with time (constantly amended when needed)
1.3 Dual Legal System
- The Federal Constitution is a supreme law in Malaysia and consists of 183 articles of law
Legal framework to measure validity of other laws
- Dual Legal System = Federal Law + Syariah Law
- Federal laws made by legislators in Parliament of Malaysia, known as Acts
a. Criminal law: Punishes person found guilty of committing a crimeCrime:Violent (robbery)Property (burglary)Financial (fraud)Drug-related (trafficking)Sex (rape)Public order (rioting)Computer (cyberbullying)Traffic offenses (hit and run)Crime is done purposely and the State must prove all elements of a crime beyond a reasonable doubt to obtain a convictionb. Civil law: Involves non-criminal cases such as (business/family) dispute, marriage & divorce, inheritance dispute that are punishable by compensations or damagesCases under Civil Law: Breaches of contract claims, complaints against the city, equitable claims
- State laws made by assemblymen in DUN (Dewan Undangan Negeri), known as ordinances/enactments.
- Article 75 of Constitution states that federal law prevail over any inconsistent state law
- Syariah Law applies to Muslims only and has jurisdiction in marriage, inheritance and apostasy叛教
- Judiciary司法机关
Superior Courts (Federal Court, Court of Appeal, High Court)
Subordinate Courts (Sessions Court, Magistrate Court)
Cyber Law
- Cyber law governs legal issues involving computers, the Internet, and networked technologies, covering communication, transactions, and information distribution.
- Computer Crimes Act 1997:
- Unauthorized Access Addresses illegal access to computer material without permission.
- Unauthorized Modification Covers offenses involving the alteration of computer content without authorization.
- Misuse of Network Facilities Regulates improper use of network services or systems.
- Digital Signature Act 1997:
- Regulation of Digital Signatures Establishes rules for the use and validity of digital signatures.
- Facilitation of Electronic Transactions Supports secure and reliable electronic transactions.
- Recognition of Electronic Documents Ensures legal acceptance of electronic documents and signatures.
- Communications and Multimedia Act 1998:
- Secure Information and Reliable Networks Ensures data security and dependable communication networks across Malaysia.
- Affordable Services Promotes accessible and reasonably priced communication services.
- Licensing Regulates licensing for communication and multimedia services.
- Consumer Protection Safeguards users' rights in communication and multimedia sectors.
- Offenses Addresses misuse of networks and computers.
- Personal Data Protection Act 2010:
- Regulates Personal Data Processing Governs the handling of personal data in commercial transactions.
- Protects Privacy Safeguards individuals' privacy by ensuring proper data management.
- Covers Data Handling Includes rules for collecting, processing, and storing personal data.
Lecture 2: Legal Issues in IT
2.1 Digital Signature
- Electronic Signature - used within computer systems (any electronic method of signing a doc, such as typing a name/insert a scanned signature)
- Digital Signature - uses cryptographic techniques to secure doc and ensure authenticity, is ⊆ Electronic Signature.
- Advantages of Digital Signature
Non-repudiation 不可反悔Confidentiality (private 保密性)Identity AuthenticationCost and Time effectiveHigh security
- Disadvantages
Technical issues (e.g., software malfunctions, compatibility)Requires specialized knowledge to use and manageCybersecurity risks (e.g., private key compromise密钥被盗)Limited legal recognition in some jurisdictionsDependence on costly and complex infrastructurePrivacy concerns due to online verification
- Digital Signature created by:
- Creates a fixed-length hash value (randomized characters).
- Conceals the input’s actual size and protects data integrity.
- Encrypts the hash value.
- Recipient uses the signer’s public key to decrypt, ensuring only authorized access.
Hash Function:
Private Key Encryption:
- Documents cant be signed by digital signature
Powers of attorney (授权委托书)Wills and codicils (遗嘱 & 附遗嘱)Trusts (信托——受托人必须按照委托人的指示管理财产)Negotiable instruments (流通票据——例:支票)
- 电子文件同书面文件具足同等效力的充要条件为:
a. fully secured with a digital signature ANDb. digital signature is verified using a public key from a certificate (which is issued by a licensed CA) ANDc. valid when digital signature is created
- A digital certificate is a small data file that contains verified, identifying information about you or your organization.
- DSA 1997 - MCMC's role is as follows:
Responsible in administering, enforcing, carrying out and giving effect to the provisions under DSA 1997
Monitor and oversee the activities of Certification Authority's (CA)
CA == MSC Trustgate.com, Telekom Applied Business
2.2 Domain Name
- A domain name is website's equivalent of a physical address, find a site by using this will be easy instead of using IP.
- Eight popular domain extensions in Malaysia
.my – This is the country code top-level domain (ccTLD) for Malaysia, widely used by individuals, businesses, and organizations from both local and international users.com.my – Primarily used by commercial organizations and businesses operating within Malaysia.org.my – For non-profit organizations, associations, and societies.net.my – Typically used by network-related organizations.edu.my – Reserved for educational institutions in Malaysia.gov.my – Exclusive for Malaysian government entities.biz.my – Geared towards businesses and MSMEs.name.my – Used for personal websites by Malaysian individuals
- Issues with domain name trademark
- Typosquatting (distorted domain intended to lure or similar to cybersquatting)
- Gripe Sites (websites which criticize someone or something, where the person or thing criticized is a trademark owner)
- Foreign Language Variation
Cybersquatting (intended to sell or commercial purpose)
- Malaysian Network Information Centre (MYNIC)
Provide registry, domain name services, Domain Name System Security Extensions (DNSSEC)Provide Domain Name Dispute Resolution ServiceTrademark owner must show reasonable similarity + provide good reasons to cancel others' registered domain name
- Reverse engineering - legal way to know competitors' trade secret
CopycatHiring competitors' employee
2.3 Antitrust and Anticompetition
- Antitrust law (反垄断法) - prevents anti-competitive behaviours
Price fixingCartel formation同行操纵市场竞争Predatory pricing通过短期亏损来消除竞争
2.4 Jurisdiction in Cyberspace
- Jurisdiction and Legal Aspects of E-Business:
Courts have the authority to hear cases and resolve disputes related to e-business activities.E-Business Reach Launching an e-business may subject a company to lawsuits in states or countries where its users reside.Company Protection Companies are protected under the Constitution of Malaysia and state laws where they are based.User Protection All users, including distant ones, are entitled to legal protections when accessing a website.
- Website Soliciting Level and Future Plans:
- Passive Website
- Transmits information only, without soliciting business.
- Typically not subject to jurisdiction in foreign states or countries.
- Interactive Website
- Solicits business and aids users in making purchasing decisions.
- May incur jurisdiction in foreign states or countries.
- Cyberlaw challenges is due to unique qualities of cyberspace
- Borderless: No physical boundaries.
- Unlimited Access: Open to anyone globally.
- Ubiquitous: Present everywhere.
- Spontaneous: Dynamic and unpredictable.
- Challenges in Combating Cybercrime:
- Jurisdictional Issues
- Cybercrimes cross multiple jurisdictions, making it unclear which country's laws apply.
- Perpetrators may exploit countries with weak laws to commit crimes elsewhere.
- Inadequate Knowledge
- Law enforcement lacks sufficient technical expertise.
- Difficulty in establishing the evidentiary link between crimes and perpetrators.
- Evasion Techniques
- Advanced cybercriminals erase evidence or make detection impossible.
2.5 Software Licensing
- Open Source Software
- Source code is publicly available.
- Programmers can modify it to fix bugs or add features.
- Users can create new versions of the software.
- Closed Source Software/Proprietary Software
- Source code is not accessible to the public.
- Users cannot view, modify, or customize the software.
- Benefits of Proprietary Software:
- Ownership and Copyright
- Software producers are granted ownership rights to protect their creations.
- Profit Opportunity
- Licensing software provides financial benefits to producers.
- Encourages Creativity and Competition
- Ownership rights drive individuals to work harder and innovate.
- Competition motivates the creation of high-quality products.
- Rewards for Excellence
- Producers of superior software can earn profits and recognition.
- Benefits of Open Source Software:
- Cooperation
- Promotes the idea that software source code should be freely shared, examined, and improved.
- Improvement Over Time
- Users can fix bugs, enhance features, or adapt software for other uses.
- Faster evolution due to contributions from a larger community.
- Frequent New Releases
- Open-source programs often have more regular updates compared to proprietary software.
- No Distribution Burden
- Removes conflict between copyright compliance and helping others.
- Users can share the software freely without licensing issues.
- No Hindrance to Future Development
- Open-source software belongs to the community, allowing continuous improvement.
- Unlike proprietary software, which may be abandoned, open-source projects can evolve indefinitely.
- Better Support
- Shifts the focus from production to service, leading to improved customer support.
- Author:路红叶先生/YZ
- URL:https://www.hongyeblogspace.uk//article/uccd3053-information-technology-professional-ethics
- Copyright:All articles in this blog, except for special statements, adopt BY-NC-SA agreement. Please indicate the source!
Relate Posts