ASSIGNMENT 14
CYBER LAW
Cyberlaw is a term that encapsulates the legal issues related to use of communicative, transactional, and distributive aspects of networked information devices and technologies. It is less a distinct field of law in the way that property or contract are, as it is a domain covering many areas of law and regulation. Some leading topics include intellectual property, privacy, freedom of expression, and jurisdiction.
1.1 DIGITAL SIGNATURE ACT 1997
1.1.1 WHY THE DIGITAL SIGNATURE ACT 1997 ?
The Digital Signature Act was enforced on the 1st October 1998.
The Digital Signature Act 1997 aims at promoting the processing of transactions especially commercial transactions, electronically through the use of digital signatures.
This Act is an enabling law that allows for the development of, amongst others, e-commerce by providing an avenue for secure on-line transactions through the use of digital signatures. The Act provides a framework for the licensing and regulation of Certification Authorities, and the recognition of digital signatures.
The Controller of Certification Authority who has authority to monitor and license recognized Certification Authorities was appointed on 1st of October 1998.
1.1.2 WHAT IS DIGITAL SIGNATURE AS DEFINED BY THE ACT ?
"Digital Signature" is defined by the Act as a transformation of a message using an asymmetric cryptosystem such that a person having the initial message and the signer's public key can accurately determine whether the transformation was created using the private key that corresponds to the signer's public key and whether the message has been altered since the transformation was made.
Essentially, what this means is that a digital signature is an electronic version of a conventional signature. It is a pair of keys created with the use of asymmetric cryptosystem and involves the use of algorithm or a specific series of algorithm. The pair of keys is made up of a private key as well as a public key. The private key is used to create the digital signature while the public key is used to verify the digital signature. While the private key cannot be known by anyone else except the subscriber, the public key is known to the public and noted in the certificate issued by the certification authority and may be retrieved from the repository.
The transaction of a digitally signed message begins with the preparation of the message. The message is then transformed or hashed into message digest with the use of a one-way hash function. The signer signs this message digest using his private key. The result of using a private key on a message digest is called digital signature.
The original message is sent through an electronic line to the receiver. The recipient of the message, uses the signer's public key to verify the digital signature - only the signer's public key will verify a digital signature created with the signer's private key. The recipient may also verify if the message has been modified, by changing/hashing the received message with the use of the same algorithm (one way hash function).
If the value of the message digest is the same as the value of the message digest in the digital signature received, then no modification has been made to the message since its transformation. Digital signature is similar to the auto teller machine (ATM) card system.
1.2 COMPUTER CRIME ACT 1997
• Gives protection against the misuses of computers & computer criminal activities such as unauthorized use of programs, illegal transmission of data or messages over computers & hacking & cracking of computer systems & networks
• By implementing Computer Crimes Act 1997 users can protect their rights to privacy and build trust in the computer system. At the same time, the government can have control at a certain level over the Cyber Space to reduce Cyber Crime activities.
1.3 TELEMEDICINE ACT 1997
• The implementation of Communications & multimedia act 1998 ensures that information is secure, the network is reliable and the service is affordable all over Malaysia.
• This act also ensures high level of users confidence in the information & communication technology industry.
1.4 COMMUNICATION AND MULTIMEDIA ACT 1998
• The implementation of Communications & multimedia act 1998 ensures that information is secure, the network is reliable and the service is affordable all over Malaysia.
• This act also ensures high level of users confidence in the information & communication technology industry.
This comment has been removed by a blog administrator.
ReplyDeleteVery useful post. You have clearly explained digital signature act and the meaning of digital signature defined by this act. As I am collecting information about it this article is of great help to me.
ReplyDeleteesign