CommonLII [Home] [Databases] [WorldLII] [Search] [Feedback]

Malaysia Legislation


P.U.(A) 359/98
DIGITAL SIGNATURE REGULATIONS 1998

PART XI - GENERAL



Regulation 81. Technical components.

(1) The technical components required for the purposes of the Act and these Regulations shall be the technical components specified in the Fourth Schedule.

(2) The technical components referred to in subregulation (1) shall be sufficiently examined under the state of the art and the fulfillment of the requirements shall be verified by the Controller in writing.

(3) If the technical components are placed in circulation or legally manufactured in accordance with the requirements under the Act and these Regulations and which guarantee the same level of security, it may be assumed that the requirements referred to in subregulation (1) regarding technical security are fulfilled.

(4) In individual cases and when there is a good reason, the Controller may require a demonstration that the requirements referred to in subregulation (1) have been fulfilled.

(5) Any security-relevant changes in technical components shall be apparent to the user.

(6) The technical components used for the purposes of the Act and these Regulations shall be protected from unauthorised access and unauthorised modification.

(7) The Controller shall keep and maintain a catalogue of suitable security measures that shall be taken into account in the design of the technical components.

(8) For the purposes of these Regulations, the expressions "unauthorised access" and "unauthorised modification" shall have the meaning assigned to them under the Computer Crimes Act 1997 [Act 563].