Importance Of Privacy In Malaysia

Superior Essays
Committee: Social, Humanitarian, and Cultural
Country: Malaysia

Recently a high number of minority Muslim Rohingya have migrated to Malaysia and other Southeast Asian Countries. We recognize that migrants are at a high risk for human rights violations. However, we refuse to accept any illegal migrants. Another issue we recognize as a major social rights issue involves the right to privacy in a digital age. We recognize the impact the internet has had on the world, and the power and information it grants a country given full access. We believe that all individuals have the right to privacy online, protected from others. We also believe that the citizens government has a right to this information, and in coalition between nations governments
…show more content…
In the past decade this transition has been accelerated and almost completed. Vast amounts of data and information are now stored online, in the world wide web which is considered to be a “no man 's land” or an area free of political jurisdiction. However, increasingly this privacy is being called under scrutiny and denied, by governments, corporations, and fellow citizens. We believe that the right to digital privacy belongs to all individuals from fellow citizens and corporations unless personally consented, however, we believe that the government has a right to all cyber information of its own citizens (Laws of Malaysia Act 709 Personal Protection Act 2010 pgs …show more content…
We believe that a country may use its own citizens information for security and official purposes. We urge to UN to establish a mandate requiring all nations to comply, and grant its citizens rights to privacy, and to agree to an international treaty of cyber security and awareness. Under this treaty each country would recognize each other 's rights to privacy, and observe all cyber investigations as though they were physical official investigations.

Migrant Works Cited
"Why Are so Many Rohingya Migrants Stranded at Sea? - BBC News." BBC News. Web. 13 Mar. 2016.
"Malaysia." Central Intelligence Agency. Central Intelligence Agency. Web. 13 Mar. 2016.
Devadason, Evelyn. "Policy Chaos over Migrant Workers in Malaysia." East Asia Forum. 11 Jan. 2011. Web. 13 Mar. 2016.
"Malaysia." U.S. Department of State. U.S. Department of State. Web. 13 Mar. 2016.
Watson, Hume, and Olarn. "We Will Send Rohingya Back, Says Malaysia." CNN. Cable News Network, 15 May 2015. Web. 13 Mar. 2016.

The Right to Privacy in the Digital Age Works Cited
Laws of Malaysia Act 709 Personal Protection Act 2010 (http://www.pdp.gov.my/images/LAWS_OF_MALAYSIA_PDPA.pdf)
“A Guide for Data Users.” Ministry of Communication and Multimedia. Personal Data Protection Commissioner Malaysia. Print 2010.
“2015 International Compendium of Data Privacy Laws.” BakerHostetler. Pgs 115-117. Web. 13 March

Related Documents

  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Asylum Seekers Case Study

    • 188 Words
    • 1 Pages

    Earlier this year the Australian Government had struck a deal with Malaysia to exchange 800 asylum seekers in exchange for 4000 already processed refugees. This was in an effort to break the people smugglers ‘business model’. Mr Bowen, Minister for Immigration, and his department was set to send the first group of asylum seekers to Malaysia in early August. The group of asylum seekers chosen to be sent included children and there was great fear for the safety of the minors. Refugee lawyers took the case to the High Court (Plaintiff M70/2011 v. Minister for Immigration and Citizenship and Plaintiff M106 of 2011 by his litigation guardian, plaintiff M70/2011 v. Minister for Immigration and Citizenship (2011) HCA 32) in a bid to strike down the…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    To oversimplify, matters surrounding privacy can be color coded. There are some issues that are very black and white related to the need to “violate” privacy. However, there are also quite a few gray areas where more research needs to be conducted and statistics gathered to formulate guidelines to determine when it is indeed necessary. Privacy in general needs to be treated in a way that is different from other rights and based on the serious consequences of not revealing facts that would be considered “private”.…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Many users on the internet distrust communication, sharing, and storing in fear of government surveillance. Many cannot express their will freely because they are aware the government will be supervising their data. If people know that there is a government data base that records information and stores every search or call, this poses a chilling effect for their free speech. The large amounts of data removes a person’s ability to move on from past experiences if it can be recalled (Schneier 2015). The 3rd amendment has been interpreted by courts that there would be privacy of the home; there is no privacy because individuals are constantly monitored.…

    • 1412 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    However, despite all of are major accomplishments in the past forty years, we’re facing a major problem with our privacy. As a result of almost 90% of Americans using the internet on a day to day basis, the Senate of the United States has just passed a resolution that removes our very right to privacy. As of matter of fact, the resolution known as “SJ Resolution 34” has been passed as a law and will remain a law until a supreme court justice deems it unconstitutional or the legislation repeals it. Presently, as of May…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Because online activities are treated like any other communications, the rules of privacy should apply. When people engage in online activities they have a legitimate expectation of privacy and this privacy is violated when the government accesses online activities without a warrant. The government should therefore not be allowed to access your online activities without a warrant. Moreover, there are situations where the government does not need a warrant but a court order to access this information. Despite the lesser evidence required for court orders, they nevertheless involve some adjudication on whether it is proper to infringe on the individual’s right to privacy.…

    • 1234 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    George Orwell based the Thought Police off the NKVD or Narodnyi Komissariat Vnutrennikh Del who arrested citizens of the Soviet Union who had rebellious actions or statements. Similarly, George Orwell prophesied the use of horrific techniques to implement governmental control in his novel, 1984, regarding a totalitarian government that prohibits any ideas outside their own, through the use of the Thought Police’s constant surveillance, audio detection software, and predictive analytic technology. The two governments of Oceana and the United States, both utilize technology and authorizing figures to constantly surveillance their citizens. In The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom?…

    • 1645 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    The recent changes and precedents in privacy, search law and technology adequately achieve a balance between individual and collective rights. Every individual should know the limit to their right, leading into the idea that citizens should be well know-ledged about the rights they are guaranteed. This does not mean memorizing the Charter, but it does mean knowing that the rights may be infringed under specific circumstances with a justification. An individual should be aware as to when their right is no longer applied or does not come into significance. The government also has some rights on their own but one of them does not include conducting unreasonable searches, as this may violate privacy rights.…

    • 1305 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Privacy In Australia

    • 919 Words
    • 4 Pages

    A survey by Pew Research Center had discovered that American citizens place an important emphasis on their privacy and many feel that they are being surveillanced by the government and have little control over their privacy situation. The research also reveals that many of the people had lost their faith with regards to the protection of their privacy and personal information. Further, they feel that governments and agencies need to curb down their surveillance activities and it is vital for them to be able to keep their privacy during online activities. The Pew research center states that ‘The majority of Americans believe it is important – often “very important” – that they be able to maintain privacy and confidentiality in commonplace activities of their lives’. This survey indicates how people still value their privacy and regarded as highly important and wish to protect it from being breached ( Madden & Rainie…

    • 919 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ethical Issues In Ecuador

    • 395 Words
    • 2 Pages

    While the Republic of Ecuador is relatively new to modern technological development in Latin America, its Internet has continued to expand in the past three years. The republic’s information and communications technology sector has experienced large growth due to the government’s efforts to push the domestic Internet connectivity to 50% of households by 2015. As the Republic of Ecuador breaks into the digital age, the issue of privacy in the digital age becomes increasingly important. It is tempting for the government to protect itself by using the new technology, just as various other nations have attempted to do in the past; however, it is also imperative that such efforts be discouraged on an international level to encourage ethical…

    • 395 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Citizens’ rights is a crucial concern to achieve greater society because of the major and rapid development of technology. Which is now shaping the way our society will be, and with this change comes new concerns such as citizen rights in a postindustrial society, in which technology plays major role. It’s in every aspect of life, it’s a new world with new rules, and different rights. The Electronic Frontier Foundation EFF has addressed many issues including free speech, fair use, and innovation throughout the world. Privacy and transparency issues concern me and it should concern anybody in the word.…

    • 372 Words
    • 2 Pages
    Decent Essays