This paper is aimed at assessing the perspectives and experiences of Malaysia on the concept and application of electronic government (e-government), more on policy context. Attempts are made to observe preparatory initiatives taken by the government of Malaysia in three distinctive but interconnected aspects: administrative measures, regulatory frameworks, and public participation. Some update applications of e-government in Malaysia will also be touched at the later part. This paper will be ended by underlining the lessons that can be learned by Indonesia in seeking the best format for e-government application, especially in tabling policies and regulatory framework.
Electronic Government (E-Government) is variably defined, but basically refers to “the use by government agencies of information technologies (such as Wide Area Networks, the Internet, and mobile computing) that have the ability to transform relations with citizens, businesses, and other arms of government.” Nevertheless in this context, this general meaning of the Information Technology (IT) has been so much associated to the use of the Internet. Thus e-government would generally mean the development and utilization of Internet-based solutions in government services and works. Exactly like e-commerce, which is a utilization of Internet-based solutions in business activities.
Continue reading “Reinvention of Future Governance through E-Government”
By Sonny Zulhuda
The corporate world today has grabbed the efficiencies of information and communications technology (ICT) in its maximum use. Regardless the size and area of industries, workplaces have been equipped with cutting-edge tools of the computers technology and connected to the Internet. With the adoption of electronic tools such as computers, Internet or Intranet, businesses have been operated more or less electronic way. Meeting notices are no longer served by printed paper, and personal data of employees and customers are no longer kept on bulk of papers previously stored in wooden or metal cabinets. In large extent, the electronic mail (email) and electronic storage have been used to replace traditional way of doing business.
Websites have now become a virtual address of companies. They are used to publish companies’ profile, products, promotions, activities, as well as interactive portals. In Malaysia, for public listed companies alone, there are already 225 public listed companies that have website for their business operations, ranging from merely informational sites to commercially designed and transactional websites (Source: Bursa Malaysia). Besides, more and more government agencies are also posting their websites in the World Wide Web.
Continue reading “Cybersquatting and Some Legal Concerns Surrounding Corporate Websites”
WHAT prevents people from driving recklessly, forging signatures, breaking into homes, kidnapping or stealing? Ideally, conscience should be enough but it’s more likely because people don’t want to pay the penalties for these crimes. And thanks to law enforcement, people are compelled to conduct themselves properly so the rest of us can go about our daily affairs with peace of mind.
So, if laws are essential to communities in the conventional world, what of the Internet – a networked world in which more and more of us dwell in each day?
“It is a myth that cyberlaws are ‘high profile’ legal matters that concern only techies, computer scientists and information security professionals,” said Sonny Zulhuda, a cyberlaws researcher at the International Islamic University of Malaysia (IIUM).
Continue reading “Making a Case for Cyberlaws”
Oleh: Sonny Zulhuda
Saat ini e-mail telah menjadi media komunikasi yang makin popular baik untuk konteks komunikasi personal maupun untuk komunikasi rasmi dan urusan berbisnis. Hal ini disebabkan oleh semakin pesatnya kemajuan teknologi komunikasi dan maklumat menerusi Internet yang telahpun dipakai oleh hampir semua bidang industri dan sektor kerajaan di Malaysia. Hal ini pula merupakan konsekuensi dari perkembangan aplikasi e-government bagi bidang awam dan kerajaan, serta e-commerce bagi sektor industri dan swasta.
Continue reading “Isu-isu Keselamatan dan ‘Privacy’ dalam Penggunaan E-mail di Premis Kerja”
By: Sonny Zulhuda
By transforming to the workplace environment that uses the Internet and other devices of information and communications technology (ICT) as the enabler in running their businesses, organizations are exposed to potential risks out of the abuse and misuse of the said technology by internal employees and any strangers outside the company alike. Such misuse can take the form of security breaches, theft of company’s informational assets, lost productivity, wasted computer resources, electronic viral infections, business interruption and public embarrassment should a workplace lawsuit be filed.
While lots are done for preventing external hackers from jeopardizing internal network and information system, risks from internal sources are often overlooked by most companies. In fact, the threats exposed by these ‘internal saboteurs’ may be as great as the external intruders, and therefore may be as harmful as the external sources of threats.
Continue reading “Managing Online Risks through Contractual Instruments”
By: Sonny Zulhuda
The massive use of internet and other appliances of information and communications technologies (ICT) at the workplace has intensified productivity through intensive communications between employers and employees as well as between a company and external parties including customers, clients, regulators, etc. Most workplace has now installed Internet and email system by which the employees and employers build their networks and communications both internally and externally. Electronic mail, or e-mail, is a boon to office communications. All employees can be notified instantaneously of important office matters. Phone messages can be logged on the computer and sent via e-mail. A message for someone in a meeting can be e-mailed.
However, what most employees fail to realize with respect to e-mail is that:
- They are probably not the only person who has access to their e-mail, despite the password protection;
- Electronic mail, even if deleted from their personal databases, can be saved in numerous forms by the computer’s own internal backup systems, or by the person to whom the e-mail is being sent.
There is arising concern on employees’ email surveillance that has been widely practiced by employers. This practice, while seen important for maintaining ‘due diligence’ of a company, gives rise to questions of intrusion to privacy.
Continue reading “Electronic Privacy at Workplace”
By: Sonny Zulhuda
Implications of Data Protection Laws to Business Organizations
Whichever approach being preferred, it is quite true to forewarn industries and business organizations that the legislatures worldwide are seeking even wider legal measures to protect personal information. It will someday come to the point where all matters will be regulated.
To enable continued business activities and growth, organizations needs to be alert of the legal risks surrounding the personal data protection. The legal fences being enacted will automatically reduce the organizations’ liberty to conduct activities previously enjoyed. Especially with ever increasing consumerism that keeps watching the industries, puts them in liability risks whenever principles of data collection and use is ever infringed. The lack of awareness in this aspect will certainly position them in high risk too. There seems no available option for business organizations other than to follow and comprehend the development of the law and safely avoid legal liabilities.
Continue reading “Personal Data and E-Security (3) – Its Implication to Business Organizations”
By: Sonny Zulhuda
Legal Responses and Liabilities to the Personal Data Protection
The apprehension of consumers regarding the use of their personal data is increasing. A survey on March 2001 published by the Asian Wall Street Journal and Harris Interactive found that 73% Net users are concerned with their personal privacy on the Internet (AWSJ, 22/3/2001). This fact and many more similar surveys conducted worldwide brought policy makers to ponder on how, and to what extent, the state can make laws and regulations to protect people’s right to control the use and exploitation of their personal data in the networked world.
Questions as to which approach is more effective arise. And there are at least two different approaches being championed by different jurisdictions, and eventually inspired others in the world to adopt. The choice is between having state’s legislation to regulate this problem or to leave the Internet industries to regulate themselves. It is submitted that a working knowledge of those legal requirements is essential for parties in a business organizations involved with data systems that store or process the personal data of members of the public.
Continue reading “Personal Data and E-Security (2) – Global Responses to Data Protection”
By: Sonny Zulhuda
This paper seeks to provide an overview of the legal risk liability issues that arise in the management of personal data in e-security policies. It argues that if personal data is properly managed, not only can legal liabilities be avoided but organizations can transform the practice of personal data management into a corporate asset building exercise. At the end of this paper, the reader should understand how personal data should be managed in a proactive and structured manner in the context of an organization’s e-security policies.
Continue reading “Personal Data and E-Security (1) – From Liabilities to Asset Management”
By: Sonny Zulhuda
The recall of Malaysia’s existing legal landscape related to electronic business (see my previous posting here on ‘Legal Landscape of Malaysian E-Business Environment’) may result in impression that the country has done good enough. True, Malaysia should take the pride of among the regional leader in enacting legal framework for e-business. But surely enacting rules alone is not sufficient. Not only they need to be implemented, but also they need to prove their effectiveness.
Continue reading “Cyberlaw and Beyond – What to Expect After Legislation?”