Professional Documents
Culture Documents
INSTRUCTIONS TO CANDIDATES
2. Answer ALL questions from PART A, PART C and TWO (2) questions from PART B in the
Answer Booklet. Start each answer on a new page.
4. Do not bring any material into the examination room unless permission is given by the
invigilator.
5. Please check to make sure that this examination pack consists of:
PART A
QUESTION 1
The Electronic Commerce Act 2006 aims to facilitate electronic commerce and strengthen
the cyberspace framework. The Act, however, was rushed through and it is with flaws.
Briefly discuss any three of them.
(6 marks)
QUESTION 2
The Uniform Domain Name Dispute Resolution Policy (UDRP) as adopted by ICANN
(Internet Corporation for Assigned Names and Numbers) is designed to provide an
arbitration service for "abusive registration of domain names". Explain, with examples the
three-fold test that must be established by a complainant under the UDRP.
(6 marks)
QUESTION 3
The Social Networking Sites (SNS) are one of the most remarkable technology phenomena
of the 21 st century. Most children and young people use the internet positively but sometimes
behave in ways that may place them at risk. Explain any three of these potential risks.
(6 marks)
QUESTION 4
Explain, with examples, the different approaches adopted by countries around the world to
protect personal data.
(6 marks)
QUESTION 5
(6 marks)
PARTB
QUESTION 1
Phishing is emerging as one of the crimes of the 21 s t century. Being one of the fastest
growing forms of Internet fraud, phishing has become the hottest and most troubling new
scam on the internet. In the United States and United Kingdom, credible estimates of direct
and indirect financial losses due to phishing alone exceed a billion dollars per year, in which
banks and financial institutions are normally the prime target.
a) Explain the different techniques of phishing and discuss why phishing succeeds and
the phishers are rarely caught.
(10 marks)
b) Anti-phishing laws have been enacted in several states in the United States.
Meanwhile, the United Kingdom has amended her Fraud Act. Explain the common
features of the anti- phishing laws and discuss to what extent the United Kingdom
law managed to curb the crime.
(10 marks)
QUESTION 2
"It was another sad day; sitting in the Dewan Rakyat observing the
'Wakil Rakyat' ... approving another new law. The Electronic
Government Activities Act (EGAA) 2007 was passed. ...The EGAA
contains loopholes and defects, some of which are so glaring. A
number of provisions are with missing words that made them
meaningless. The same mistakes as in an earlier law passed in less
than a year before it, are repeated."
Abu Bakar Munir & Siti Hajar Mohd. Yasin, Information and
Communication Technology Law: State, Internet and Information -
Legal and Regulatory Challenges (2010), at p 73, Thomson Reuters
(Sweet and Maxwell Asia)
(20 marks)
QUESTION 3
The Malaysian Personal Data Protection Act (PDPA) 2010, like any data protection law of
other jurisdictions, seeks to regulate the processing of personal data in the country. The law
was passed by Parliament and received the Royal Assent in June 2010. However, it is not
yet enforced. With reference to the said Act, answer the following:
a) Explain the personal data protection principles which become the key elements of the
PDPA.
(10 marks)
PARTC
QUESTION 1
Yayan, a graphic artist, creates, exhibits and markets cartoons under the name
'YayanCartoon.' Yayan licenses his cartoons to others for display on T-shirts, coffee mugs
and other items, many of which are sold at gift stores across Malaysia. He has marketed his
cartoons under the "YayanCartoon" label for the past fifteen years. Yayan has learnt about
the prospect of e-commerce. He came to you for advice as to how he can make his
presence on the Internet.
Both Miss Jons and Mr. Right came to you for advice whether they can take any legal action
against either Yayan, Jajai, the Bank or Murray.com.
Advise all the parties to their rights and liabilities (if there is any).
(30 marks)