|
想问有法律知识的朋友,关于网络犯罪的问题。
1)网络游戏,通过hacker,拿取他人的物品。是犯了section几的法律?
2)有些大公司有online event,通过hacker方式,改变成绩。是犯了什么罪?
3)e-banking,若有人hack了你的电脑。是犯了什么罪?
想问,总结以上几个案列,都是犯了一样的section吗?
想知道,在大马,网络犯罪的现象。和被控告时会出现的问题?
比如说,法律的漏洞,让被控人都无罪释放?
谢谢。 |
|
|
|
|
|
|
|
发表于 31-3-2008 06:15 PM
|
显示全部楼层
|
|
|
|
|
|
|
发表于 31-3-2008 06:33 PM
|
显示全部楼层
原帖由 kaiyet 于 31-3-2008 18:15 发表
cyber crime law在马来西亚还算是一条很新,有待发展的法律~~
主要来源是computer misused act 1999,但是。。。。。我太久没看。。。。给我一点时间找找得mou?
但是。。。。第一。。。。虚拟世界游戏罢了wor。 ...
我在报章上看过一位美妹因为网络游戏上的道具被偷去,结果跑去警察局报警。 |
|
|
|
|
|
|
|
发表于 31-3-2008 07:06 PM
|
显示全部楼层
回复 3# rajamango 的帖子
如果我没有猜错,那些警察只会叫那美眉回家读书不要玩那么多game , 要不然,一定以为这个美眉白目的,特地来捣乱。 |
|
|
|
|
|
|
|
发表于 31-3-2008 07:09 PM
|
显示全部楼层
|
|
|
|
|
|
|
楼主 |
发表于 31-3-2008 07:57 PM
|
显示全部楼层
原帖由 kaiyet 于 31-3-2008 06:15 PM 发表
cyber crime law在马来西亚还算是一条很新,有待发展的法律~~
主要来源是computer misused act 1999,但是。。。。。我太久没看。。。。给我一点时间找找得mou?
但是。。。。第一。。。。虚拟世界游戏罢了wor。 ...
好好好,怎样都是谢谢你的回复。
我想看更多相关资料,有什么官方网站介绍吗?
哦,就很好奇咯,大多人在网都以假名、假资料…
怎样查哦?
ip address能证明什么吗? |
|
|
|
|
|
|
|
楼主 |
发表于 31-3-2008 08:01 PM
|
显示全部楼层
对了,我在网上搜索到的资料。
请问,这是最新的cyber law吗?
Malaysian Cyber Laws
Computer Crime Act 1997
Copyright (Amendment) Bill 1997
Digital Signature Act 1997
Telemedicine Bill 1997
Communication and Multimedia Act 1998
Digital Signature Regulations 1998 |
|
|
|
|
|
|
|
发表于 1-4-2008 09:28 PM
|
显示全部楼层
请问识法之人一宗也是有关网络的案件。
若我在某间店遭遇不诚实/货不对版对待,我理论不果(对方敷衍了事,没作任何补偿),我只好把事情的前因后果写在部落格或论坛上,并引用“黑店”字眼来说明那间店,提醒大家小心那间店。结果那间店的负责人因此不爽,还说要出律师信告我,请问我是否会被告“诽谤”或“毁坏他人声誉”之类的罪名?
谢谢! |
|
|
|
|
|
|
|
发表于 1-4-2008 11:10 PM
|
显示全部楼层
原帖由 kiansoon9 于 1-4-2008 09:28 PM 发表
请问识法之人一宗也是有关网络的案件。
若我在某间店遭遇不诚实/货不对版对待,我理论不果(对方敷衍了事,没作任何补偿),我只好把事情的前因后果写在部落格或论坛上,并引用“黑店”字眼来说明那间店,提醒大家小 ...
这和cyber crime应该无关~~
还是能够被告诽谤。。。
但是能不能够告的进又是另一个问题了~~律师信罢了~~~cari年中接不少~~~又不见cari真的被诉~
因为这是暗喻诽谤,虽没指名道姓,但是如果有暗示到让普通有脑,会想的人联想起该间店的话,就可以了
但是你可以提出justification和fair comment
焦点在于对于‘黑店’一词的指责有没有达到一个reasonable标准。 |
|
|
|
|
|
|
|
发表于 2-4-2008 08:49 PM
|
显示全部楼层
原帖由 kaiyet 于 1-4-2008 11:10 PM 发表
这和cyber crime应该无关~~
还是能够被告诽谤。。。
但是能不能够告的进又是另一个问题了~~律师信罢了~~~cari年中接不少~~~又不见cari真的被诉~
因为这是暗喻诽谤,虽没指名道姓,但是如果有暗示到让普通有脑, ...
感谢你的回答! |
|
|
|
|
|
|
|
发表于 3-4-2008 02:04 AM
|
显示全部楼层
回复 6# gozy 的帖子
关于 nillwong说的Computer Crime Act, 1997 里, Section 3 - Section 8 ,我po上让大家参考:
COMPUTER CRIMES ACT 1997
ACT 563
PART II
OFFENCES
3. Unauthorised to access to computer material.
(1) A person shall be guilty of an offence if-
(a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer;
(b) the access he intends to secure is unauthorised; and
(c) he knows at the time when he causes the computer to perform the function that that is the case.
(2) The intent a person has to have to commit an offence under this section need not be directed at-
(a) any particular program or data;
(b) a program or data of any particular kind; or
(c) a program or data held in any particular computer.
(3) A person guilty of an offence under this section shall on conviction be liable to a fine not exceedingfifty thousand ringgit or to imprisonment for a term not exceeding five years or to both.
4. Unauthorised access with intent to commit or facilitate commission of further offence.
(1) A person shall be guilty of an offence under this section if he commits an offence referred to in section 3 with intent-
(a) to commit an offence involving fraud or dishonesty or which causes injury as defined in the Penal Code [F.M.S. Cap. 45];
[Now Act 574]
or
(b) to facilitate the commission of such an offence whether by himself or by any other person.
(2) For the purposes of this section, it is immaterial whether the offence to which this section applies is to be committed at the same time when the unauthorised access is secured or on any future occasion.
(3) A person guilty of an offence under this section shall on conviction be liable to a fine not exceeding one hundred and fifty thousand ringgit or to imprisonment for a term not exceeding ten years or to both.
5. Unauthorised modification of the contents of any computer.
(1) A person shall be guilty of an offence if he does any act which he knows will cause unauthorised modification of the contents of any computer.
(2) For the purposes of this section, it is immaterial that the act in question is not directed at-
(a) any particular program or data;
(b) a program or data of any kind; or
(c) a program or data held in any particular computer.
(3) For the purposes of this section, it is immaterial whether an unauthorised modification is, or is intended to be, permanent or merely temporary.
(4) A person guilty of an offence under this section shall on conviction be liable to a fine not exceeding one hundred thousand ringgit or to imprisonment for a term not exceeding seven years or to both; or be liable to a fine not exceeding one hundred and fifty thousand ringgit or to imprisonment for a term not exceeding ten years or to both, if the act is done with the intention of causing injury as defined in the Penal Code.
6. Wrongful communication.
(1) A person shall be guilty of an offence if he communicates directly or indirectly a number, code, password or other means of access to a computer to any person other than a person to whom he is duly authorised to communicate.
(2) A person guilty of an offence under this section shall on conviction be liable to a fine not exceeding twenty-five thousand ringgit or to imprisonment for a term not exceeding three years or to both.
7. Abetments and attempts punishable as offences.
(1) A person who abets the commission of or who attempts to commit any offence under this Act shall be guilty of that offence and shall on conviction be liable to the punishment provided for the offence.
(2) A person who does any act preparatory to or in furtherance of the commission of any offence under this Act shall be guilty of that offence and shall on conviction be liable to the punishment provided for the offence:
Provided that any term of imprisonment imposed shall not exceed one-half of the maximum term provided for the offence.
8. Presumption.
A person who has in his custody or control any program, data or other information which is held in any computer or retrieved from any computer which he is not authorised to have in his custody or control shall be deemed to have obtained unauthorised access to such program, data or information unless the contrary is proved. |
|
|
|
|
|
|
| |
本周最热论坛帖子
|