You are here

Malaysia

Country:
Survey Question:
Survey Answer:

Activities which adversely affect or threaten security, confidentiality, integrity or availability of IT systems, infrastructures, etc. Such activities are prohibited or regulated under the CMA. For example, it is an offence to use any apparatus or device with intent to obtain information regarding the contents, sender or addressee of any communication without an approval by a registered certifying agency (section 231 of the CMA); possessing or creating a system designed to fraudulently use or obtain any network facilities, network service, applications service or content applications service (section 232(2) of the CMA); intercepting, attempting to intercept, or procuring any other person to intercept or attempt to intercept, any communications (section 234 of the CMA); extending, tampering with, adjusting, altering, removing, destroying or damaging any network facilities or any part thereof (section 235 of the CMA).
A person who is found liable for any of the above offences under CMA may upon conviction be held liable to a maximum fine ranging from RM50,000 to RM300,000 or imprisonment not exceeding 2 to 3 years or both.
Cyberterrorism. The Penal Code creates offences for committing or facilitating terrorism activities. In the context of cyberterrorism specifically, sub-section (2)(k) of section 130J of the Penal Code provides that “support” to a terrorist group extends to the act of “using social media or any other means to:
(a) advocate for or to promote a terrorist group, support for a terrorist group or the commission of a terrorist act; or
further or facilitate the activities of a terrorist group”.

Provided By:
Deepak Pillai, CHRISTOPHER & LEE ONG