Monday, 18 July 2011

Online Defamation Law






      What is defamation?

Generally,defamation refers to a wrong and unprivileged statement that would be harmful to someone reputation or good name.


Defamation consists of the following:

(1) A defamatory statement;
(2) published to third parties; and
(3) which the speaker or publisher knew or should have known was false.
Each of these elements has generated controversy.



What are the elements of a defamation claim?
The elements that must be proved to establish defamation are:
  1. a publication to one other than the person defamed;
  2. a false statement of fact;
  3. that is understood as
    • a. being of and concerning the plaintiff; an  
    • b. tending to harm the reputation of plaintiff. 
    • If the plaintiff is a public figure, he or she must also prove actual malice.  
  

Recently As we have read in media about Dominique Strauss Kahn,









spamming

What is spam?

Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.






Phishing scams





what is Phishing?


phishing is a way of attempting to acquire sensitive information such as user names, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication 

Phishing is typically carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies.Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures







 


                Now what's your idea?have you ever been victim of Phishing scams?  

Cyberterrorism





Cyber terrorism is the act of hacking into government computer systems, but under the Patriot Act also extends to hacking into and damaging any networked computer. It is punishable by up to twenty years in prison.
there are two strategies that can be used in order to prevent attacks.

1.  Build Strong Firewalls: A good firewall system can protect networks . These personal firewalls provide a great deal of protection for mobile users or users who do not operate their systems behind an adequate corporate firewall system.

2.  Enact and enforce strong policy: Staff members with access to or control over critical information should undergo rigorous background checks and should comply with strong security policy. 

Ramping up fight against child porn

Child porn
  

Child pornography is one the biggest criminal issue in the word which every day is growing faster.
By the developing and spreading of the Internet in the world enable people to accesses more to children in privet s,so providing increased opportunities for the solicitation of children and the committing of abusive acts by offenders outside the family.

Identity Theft


    • ·         Identity theft is one of the fastest growing crimes in Malaysia. Credit card numbers, NRIC numbers, date of birth, and other personal identification can net criminals thousands of Ringgit in a very short time. Most often, an identity thief can  get  your personal identification numbers from the trash and obtain credit in your name by having credit cards, goods or services delivered to their address or mail drop. Since the bills for the charges incurred with be sent to the thief's address, not yours, you will be unaware that debt is mounting up in your name until the collections department tracks you down. By then your credit report will already be riddled with late payment histories and show many accounts in collections. As you can imagine, the credit reporting bureaus will be reluctant to change negative credit without proof that you had not created the bad credit. 



              
      ·         by flowing below point you can prevent such a these crime:

      Run a credit report on yourself to see if there are any unknown credit inquiries or unauthorised accounts.
        Limit the number of credit cards you have to reduce exposure, and cancel any inactive accounts.
      • Destroy all cheques immediately when you close a current account. Destroy or keep in a secure place, any courtesy cheques that your bank or credit card company may mail to you.
      • Memorise your passwords and personal identification numbers (PIN).
      • Do not give out your PIN or write them on your credit cards or ATM cards.
      • Keep a list of, or photocopy all credit and identification cards you carry with you, including front and back, so that you can quickly call the issuers to inform them about missing or stolen cards.

Wednesday, 13 July 2011

The purposes of assignment

This weblog is created for the purposes of assignment for the subject BYL 7134, Cyberlaw by Faculty of Management, Multimedia University (MMU), Malaysia. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research only. Appropriate acknowledgements to the materials that do not belong to the weblog owner have been publicly made. If you are the author or a copyright or a trademark owner of any of the articles or images or graphics or pictures or any material posted in this weblog herein and you object to such posting on any grounds, including copyright or trademark infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. “