Sunteți pe pagina 1din 10

Version 1.

4 (INFO 4502)
Date: 23rd May 2007
Department of Information Systems (DIS)

INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA


COURSE OUTLINE

Kulliyyah Kulliyyah of Information and Communication Technology

Department Department of Information Systems

Programme Bachelor of Information Technology

Course Title Cyber Laws & Islamic Ethics

Course Code INFO 4502

Status Kulliyyah Required Course

Level 4

Credit Hours 3

Contact Hours 3

Pre-requisites INFO 3401 (Human Computer Interaction)


(if any)

Co-requisites None
(if any)

Instructional 1. Lectures
Strategies 2. Class discussions and dialogues
3. Cases analysis on current issues.
Course
Assessment LO Method %
State weightage 1,2,3 Mid-term 20
of each type of 1,2 Quizes 20
assessment. 4,5,5 Participation 5
2,3,4,5 Project 15
1,2,3,4 Final examination 40
Total 100
Instructor(s) Elistina Abu Bakar

Semester All Semesters


Offered

1
Course Synopsis This course would emphasize on identifying the issues and problems
created from the application of the Internet which suggests that the earlier
legal infrastructure and norms would no longer be suitable for the digital
environment. This course will provide the students an understanding of the
existing legal rules and norms that have been developed to accommodate
the needs of the digital age. The foundational and ethical context in cyber
laws are also a case of concern in Shari’ah.

Course The objectives of this course are to;


Objectives
1. introduce the concepts of ethics, morals, values and
attitudes from the western and Islamic perspective as the basis for the
code of practice in the society of the information age.
2. familiarize the students with the laws that govern
information technology.
3. discuss the legal and ethical problems that are commonly
encountered in dealing with information technology.

Learning After completing this course, the student should be able to:
Outcomes
1. explain the various legal issues related to information
technology
2. describe the laws that govern information technology
3. compare between the western and Islamic perspective on
issues related to legal and ethical affairs in cyber law
4. apply principles of cyber law in daily situations
5. evaluate situations commonly encountered in dealing with
information technology from the legal perspective

Content Outlines

Weeks Topics Task/Reading

1 INTRODUCTION -Abu Bakar


Munir,
- Emergence of Cyber Laws in Malaysia chapter 1,
- Islamic Legal History. -Lecture notes.

ETHICAL STANDARD IN INFORMATION


TECHNOLOGY

- Common Law Ethical Principles


- Shari’ah Ethical Standard.

2
2 SOURCES OF CYBER LAW -Ahmad
Ibrahim,
Sources of cyber law in Malaysia chapter 1
- Lecture notes
1) Written law
- Constitution
- Legislation
- Subsidiary legislation

2) Unwritten law
- Foreign law
- Judicial Precedent

3 Sources of Islamic Law Affecting Cyberspace Mohammad


1) Primary sources Hashim
- Al-Qur’an Kamali,
- Al-sunnah Chapter 1

2) Secondary sources Lecture notes


- al-Ijma’
- al- Qiyas
- Masaleh al-mursalah
- Miscellaneous.

REGULATORY FRAMEWORKS GOVERNING


CYBERSPACE
-Abu Bakar
- Regulatory Authorities Munir,
- Regulatory Instruments. chapter 1,

4 RIGHTS AND PRIVACY -Lecture Notes

- Rights of communication &


Privacy
- Classes of rights and privacy.
- Problems arise in online
communication.
- Online privacy and law.

SHARI’AH PERSPECTIVE ON RIGHTS (AL-


HUQUQ) & OBLIGATIONS (AL-HURRIYYAH)

- al-Huquq -Lecture Notes


- al-Hurriyyah
- Rights of privacy

3
5 DATA PROTECTION -OECD
Guidelines
- Data Protection Principles - Data
- Registration Formalities for data Protection Act
protection. - Lecture notes
- Shari’ah perspective on data
protection.

6 CONTENT REGULATION: CENSORSHIP - The


Government
- Forms of expression should be Bill of
prohibited. Guarantee,
- The implication of the Malaysia - The Commu-
Government Bill of Guarantees. nications and
- Shari’ah perspective on Multimedia
censorship. Act 1998

TELEMEDICINE
-The
- Confidentiality of data Telemedicine
- Qualification of practitioners Act 1997
- Rights of medical practitioners - Lecture
- Shariah perspective on the practice Notes
of telemedicine

7 INTELLECTUAL PROPERTY IN CYBERSPACE -The


Copyright Act
- Protection of computer software 1987
and multimedia.
- Trademarks and domain names
- Shariah rulings on the protection
of intellectual property.

4
8 COMPUTER CRIMES AND PENALTIES -Sulaiman
Azmil. 1997
- The categories of crimes in
cyberspace. -Lecture notes
- Unauthorised access to computer
materials (hacking)
- Unauthorised access with intent to
commit or facilitate commission of further offence.
- Unauthorised modifications of the
contents of any computers.
- Wrongful communication
- Doctrine of al-Jenayah affecting
cyberspace

9 CIVIL LIABILITIES IN TORT -Lecture notes

- Examples of torts in cyberspace .


- Online defamation.
- Trespass to chattel.
- Negligence.
- Shari’ah rulings.

10 ENCRYPTION AND DIGITAL SIGNATURE - The Digital


Signature Act
- Legal issues on digital signature 1997
- Rights and duties of subscriber, - Lecture notes
certification authority, controller and repository.
- Offences against unauthorized use
of keys.
- Shari‘ah perspective on Digital
Signature.

11 E-COMMERCE : LEGAL AND POLICY -OECD


FRAMEWORK Guidelines
-Lecture notes
- Features of electronic commerce.
- Legal obstacles to electronic
commerce
- Financial issues ; Electronic
payment system, tax issues.

5
12 CYBERSPACE CONTRACTING -UNCITRAL
Model
- Legal issues in cyberspace - Uniform
contracting Commercial
- The essential elements of a valid Code
contract. - Electronic
- Developing law for cyber contract. Commerce
Act 2006
SHARIAH PERSPECTIVE ON E-COMMERCE
- Syahirah
- E- Commerce and the principles of Abdul Shukor,
jurisprudence (Usul Fiqh) 2003
- E-Commerce and the Islamic Law - lecture notes
of contract
- Prohibition of riba, masyir and
gharar.

13 E-COMMERCE AND CONSUMER PROTECTION -EU Distance


Selling
- Online selling and buying Directive
- Rights of consumer - Lecture notes
- Shari’ah perspective on online
selling
& buying.

14 ELECTRONIC COMMUNICATION AND THE LAW -Section 90 of


OF EVIDENCE. the Evidence
Act 1960.
- Computer output and the law of -Lecture notes
evidence.
- The Hearsay Evidence
- Best Evidence Eule
- Islamic law of evidence.

References Required

Munir. A. B. (1999). Cyber law policies & challenges. Kuala Lumpur:


Butterworths Asia.

Recommended

Ibrahim, A. & Joned, A. (1987). The Malaysian legal system. Kuala


Lumpur: Dewan Bahasa dan Pustaka

Al-Zuhayly, W. (1984). Al-fiqh al-Islami wa’adillatuh (Vol:4). Beirut:


Dar al-Fikr.
6
Audah, A. Q. (1977). Al-tashri’ al-jenai al-Islam (Vol:1). Cairo: Dar al-
Turath.

Edwards, L., & Waelde, C. (2000). Law and the internet: a framework for
electronic commerce (2nd ed.). Oxford: Hart Publishing.

Miller, R. L., & Cross, F. B. (2002). The legal and e-commerce


environment today (3rd ed.). USA: West/Thomson Learning.

Kamali, M. H. (1999). Principles of Islamic jurisprudence (2nd ed.). Kuala


Lumpur: Ilmiah Publishers.

Reed, C., & Angel, J. (2000). Computer law ( 4th ed.). London:
Blackstone Press Ltd.

Azmil, S., (1997). Crimes on the electronic frontier – some thoughts on the
Computer Crimes Act 1997. Malaysian Law Journal, 3.

Suri, R.K., & Diwan, P. (2001). Laws relating to cyber and e-


commerce. Kuala Lumpur: International Law Book Services.

Abdul Shukor, S., (2003, September). The role of syari‘ah in e-commerce.


Proceedings of the international seminar on Islam and the challenges
of science & technology in the 21st Century, UTM, Johor Bahru.

Statutes / Code

- Computer Crimes Act 1997


- Digital Signature Act 1997
- Telemedicine Act 1997
- Communication and Multimedia Act 1998
- Copyright (amendment) Act 1997
- Electronic Commerce Act 2006

Proposed Start Semester 1, 2007/2008


Date (Semester)
Batch of Students 021 and above
to be Affected
Prepared by: Checked by: Approved by:

__________________ __________________ _____________________


( Elistina Abu Bakar ) ( HOD ) (Prof. Dr. Ahmad Bakeri
Abu Bakar)

7
Cyber Laws & Islamic Ethics

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Learning Outcomes Matrix


Programme Outcomes

LO LO LO LO
Learning Outcomes 1 2 3 LO 4 5 LO 6 LO 7 LO 8
1 1. explain the various legal issues related to information - - - - - 3 2 1
technology

2 2. describe the laws that govern information technology - - - - - 3 - -

3 3. compare between the western and Islamic perspective on - - - - - 3 3 -


issues related to legal and ethical affairs in cyber law

4 4. apply principles of cyber law in daily situations - - - - - 2 3 2

5 5. evaluate situations commonly encountered in dealing with - - - - - 2 3 1


information technology from the legal and ethical perspective

Subtotal 0 0 0 0 0 13 11 4

Level of emphasis total/# of LO 0 0 0 0 0 3 2 1

8
9
Slightly 1

Moderately 2

Substantively 3

1. The ability to acquire and apply the knowledge, tools and methodologies of computing.
2. The ability to understand the fundamental aspects of business organizations, business models and business processes.
3. The ability to analyze business processes, design and develop a computer-based information system to solve business or organizational
problems.
4. The ability to function on multidisciplinary teams effectively.
5. The ability to communicate effectively.
6. The ability to understand the impacts of IT in global, economic, environmental and societal context.
7. The ability to understand the professional and ethical responsibility to develop and use IT in accordance to the teachings of Islam.
8. The ability to recognise the need for, and ability to engage in life long learning

10

S-ar putea să vă placă și