Do Developing Countries Care about Internet Security?

Indeed, developing countries do care deeply about liability risk and based on my resources, internet security in general. There have been many steps taken towards establishing legislation, including:

In Jamaica, one large telecommunications company was hit hard “when a 26 year old computer science student hacked into its computer system and stole approximately $10, 000, 000.00 in call credit. His lawyer when interviewed, asked which legislation his client going to be prosecuted under.” Additionally, corporate espionage ran rampid, “corporate entities were either engaging computer hackers or buying information from them which was stolen from competing businesses in order to gain market advantage.” In recognition of liability risks, the country developed the Jamaican Cybercrimes Act 2010, police also set up the Cybercrimes Investigation and Research Unit (CIRU). (Gibson-Henlin)


In the case of Malaysia, where the focus is to push for a knowledge-based economy, legislation has been passed to combat cyber crime and to control liability risk. In passing the Malaysian Computer Crimes Act 1997 (CCA 1997), the desire to control security is there, but the true solution lays in maintaining close cooperation between different organizations and countries, passing laws is just not enough to fight cybercrime. (Chong 2002)

Also in the example of the Pacific Cybercrime Legislation Workshop (2011), where participants from the region's communications, justice and police departments attended a three-day summit, where the focus was “to ensure our citizens are protected from crimes that can be committed through the simple use of a computer and a network." (click-tongatoday.com)

Additional legislation:
The Computer Misuse Act of Singapore criminalizes unauthorized access to computer material, access with intent to commit or facilitate an offense, unauthorized modification of computer material, unauthorized use or interception of computer service, unauthorized obstruction of use of computers, and unauthorized disclosure of access code. (wikibooks.org)
In India, the Information Technology Act of 2000 prohibits tampering with computer source documents and hacking. (wikibooks.org)


Chong,W. (2002) Malaysian Law and Computer Crime. Retrieved from http://www.click-tongatoday.com/newsroom/press-releases/254-pacific-tackles-cybercrime-laws-and-protection-in-key-workshop-

Gibson-Henlin, G. Retrieved from http://henlin.pro/uploads/articles/Legislating%20Cybercrimes%20in%20Jamaica.pdf

Malaysian Law and Computer Crime. (April 2011) Retrieved from http://www.sans.org/reading_room/whitepapers/legal/malaysian-law-computer-crime_670

Legal and Regulatory Issues in the Information Economy/Cybercrimes (December 2006) Retrieved from
http://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in_the_Information_Economy/Cybercrimes

No comments:

Post a Comment