Author name: Edwin Lee

Edwin is a corporate and technology lawyer. He is also the founder of Edwin Lee & Partners. Edwin has advised a range of companies from technology startups to multinational corporations on a range of matters. In 2020, Edwin was named as a Malaysian Rising Star by Asian Legal Business, a finalist for the Young Lawyer of the Year at the ALB Malaysia Law Awards as well as a lawyer in the annual ALB publication of Asia 40 under 40. View his full profile here.

Edwin Lee
Legalising Ride-Sharing Services

Legalising Ride-Sharing Services

Taxi-booking services such as MyTeksi and Easy Taxi, as well as ride-sharing booking services such as Uber and GrabCar, have been touted as the game changers as they set to revolutionise and transform the taxi-booking system and practice in the taxi industry. These ride-sharing services leverage on smartphone technology to connect passengers to drivers in a reliable, affordable and safe way. Many have lauded the introduction of these services into the market as they set to solve the taxi woes, end the frustration and ease the pain when it comes to booking a taxi. Features such as real-time GPS tracking and cashless payment system on these services give a greater level of confidence, convenience and security to passengers and drivers. Protests and Bans The reality is, change often brings resistance. The ride-sharing business model is not short of controversy. Uber is facing a number of court cases worldwide and its service is banned in several countries. Incumbent taxi drivers are up in arms, claiming that Uber engages in unfair competition and bulldozes its ways through the system by using drivers and cars not licensed/authorised by law. Some have claimed that as these drivers do not have passenger liability insurance, this will put the passengers’ safety at risk. Authorities around the world continue to crack down on Uber’s and GrabCar’s drivers and some drivers had been unfortunately harassed and attacked by other taxi drivers. Legality of Ride-Sharing MyTeksi and Easy Taxi are essentially taxi-booking services, where passengers can summon taxis through mobile apps. They both work with licensed taxi drivers, and do not charge passengers anything extra. Passengers will pay the metered fare as regulated by the government. From the look of it, it appears that they work within the boundaries of the law. Uber and GrabCar, on the other hand, are described as ride-sharing services. Uber and GrabCar partner with private vehicle owners, licensed for-hire chauffeur-driven limousine and commercially licensed rental car companies. Their drivers do not use a taxi meter, but rather they use a mobile app to calculate fares based on distance travelled and time is taken, which apparently are much cheaper than the regulated metered fare. In Malaysia, there is no express prohibition under the law which prohibits someone from using a software to connect its users to drivers for rides on private cars. Under the Land Public Transport Act 2010, no person shall operate or provide a public vehicle service using a class of public service vehicles unless he holds an operator’s licence issued under the Act. A person is deemed to be operating or providing a public service vehicle service if he uses or drives a public service vehicle or employs one or more persons to use or drive a public service vehicle and he owns the said vehicle or is responsible to maintain or operate the said vehicle. “Public service vehicle” includes a motor vehicle used for carrying persons on any journey in consideration of a single fare. It appears that Uber and GrabCar do not fall within the above scope. Uber and GrabCar also claim that they are just a technology company that facilitates the ride-sharing services and not a transportation company. Their drivers, however, appear to fall within the above scope and are potentially liable under the Act, which attracts fine up to RM10,000 and/or imprisonment up to 1 year. Their vehicles can also be confiscated. Legalising Ride-Sharing Services Governments in several jurisdictions have taken steps to create a regulatory framework for the ride-sharing market. In the US, California is the first jurisdiction that legalizes the ride-sharing services through the creation of a new category of public transportation service known as “Transportation Network Company” (“TNC”). A TNC is a company that uses an online-enabled platform to connect passengers with drivers using their private vehicles. Some of the conditions that must be met before a company can be licensed as a TNC include driver background checks, driver training, minimum insurance coverage, the maximum age limit of the vehicle, the requirement to install a GPS tracking device, etc. The TNC model ensures a level playing field is established by preventing ride-sharing services from undertaking specific taxi related activities (rank, hail, pre-booked and cash transactions). A High Court in London recently delivered a landmark judgment, saying that Uber’s app does not operate in the same way as “taxi meter”, and therefore Uber’s service is not considered as providing taxi service. In May 2015, the Philippines became the first country in Asia to legalise and regulate the ride-sharing services nationwide by adopting California’s TNC model. In Singapore, the Third-Party Taxi Booking Service Providers Act 2015, which regulates taxi-booking services, came into force on 1 September 2015. The Singapore Government has also announced that the next phase will involve the review of the ride-sharing services. On 8 October 2015, Didi Kuaidi, the largest ride-sharing company in China, received the first official car booking license for its ride-sharing service from Shanghai’s Municipal Transportation Commission. According to the regulations, Didi Kuaidi is required to do in-house screening and training of all its potential drivers as well as to make sure that all the private cars registered on its platform are certified and properly licensed by the authority and that each vehicle, driver and passenger must be insured. Uber China is said to be actively preparing documents for its own application in Shanghai. In Australia, ride-sharing companies will be able to legally operate in the state of Canberra from 30 October 2015 onwards. In Malaysia, a Bill to amend the Land Public Transport Act 2010 is expected to be tabled in Parliament in October 2015. The amendments would include provisions to regulate mobile app providers offering any public transport, commercial transport and delivery services as well as to deal with mobile apps that facilitate car-pooling or the charging of passengers using unlicensed vehicles. It would be interesting to see if the Bill is a move to legalise ride-sharing services or a move to allow the authorities to exert control

Legalising Ride-Sharing Services Read More »

WiFi Piggybacking – Is It Legal?

WiFi Piggybacking – Is It Legal?

It was recently reported that the Malaysian Communications and Multimedia Commision (“MCMC”) had received six complaints regarding the supply and sale of devices that can hack into WiFi connections. Three cases have since been sentenced by the courts and the other three will soon be brought to the courts soon. Most of the WiFi hacking incidents were carried out by using devices such as WiFi booster and WiFi cracker, which can amplify signals to attract WiFi signals within a distance of one to three kilometres. The MCMC said that a person who uses, has in possession or sells this type of non-standard equipment or device can be charged under Section 239 of the Communications and Multimedia Act 1998 (“CMA”), and will be fined up to RM100,000 and/or jailed up to 2 years upon conviction. A person who possesses, obtains or creates an equipment or device designed to fraudulently use or obtain any network facilities, network service, applications service or content applications service can also be charged under Section 232 of the CMA, which upon conviction, will be fined up to RM300,000 and/or jailed up to 3 years. There is also another form of “stealing” WiFi connections without having to use any equipment or device such as WiFi booster or WiFi cracker. It has been established that using another person’s unsecured WiFi connection without his or her consent and knowledge is known as “piggybacking” or “mooching”. If a person’s WiFi connection is not secured by a password, any person can actually connect to the account, without the person’s consent and knowledge. WiFi piggybacking normally happens when a person uses his neighbour’s WiFi connection without permission, or when a person sitting in a car near a WiFi hotspot to access the WiFi connection. The issue on WiFi piggybacking remains controversial. Some argue that it is harmless, because it is no different to sitting behind another passenger on a train, and reading his newspaper over his shoulder, or enjoying the music a neighbour is playing in his backyard. Others, however, argue that it is unethical, because it is akin to entering a home just because the door is unlocked, or hanging on the outside of a bus to get a free ride (Source: Wikipedia – Piggybacking (Internet Access)). Let’s take a look at what has happened around the world in respect of WiFi piggybacking. In the United States, most of the states prohibit unauthorised access to computer networks which include open WiFi networks. In 2005, a man in Florida was charged with unauthorised access to a computer network because he was using a resident’s WiFi connection from a car parked outside. In 2007, a man in Michigan was fined for using a cafe’s WiFi connection from a car parked nearby to check his email every day. In Singapore, a 17 years old teenager was arrested for tapping into his neighbour’s WiFi connection. Apparently, he went outside his house to piggyback on any available WiFi connection after his mother had confiscated his computer modem. He was seen chatting online when a passerby asked what he was doing, became suspicious, and later called the police. He pleaded guilty and was sentenced to 18 months’ probation under the Computer Misuse Act. In the United Kingdom, a man was also convicted for dishonestly obtaining an electronic communication service when he was found repeatedly trying to gain access to a neighbour’s WiFi connection with a laptop from his car. In Malaysia, no one has been arrested or charged for WiFi piggybacking so far. Our Computer Crimes Act 1997 is very similar to the Computer Misuse Act in Singapore and the United Kingdom, which means WiFi piggybacking could potentially constitute a criminal offence under Malaysian law. Section 3 of the Computer Crimes Act 1997 states that a person who: causes a computer to perform any function with intent to secure access to any program or data held in any computer; the access he intends to secure is unauthorised; and he knows at the time when he causes the computer to perform the function that that is the case, will be fined up to RM50,000 and/or jailed up to 5 years upon conviction. This section is also targeted at hackers who hack into other’s computer network or system. One peculiar feature of this Computer Crimes Act 1997 is that it has extra-territorial scope. The Computer Crimes Act 1997 states that regardless of the person’s nationality or citizenship, where an offence is committed by the person in any place outside Malaysia, in which the computer, program or data that he accessed was in Malaysia, or capable of being connected to or sent to or used by or with a computer in Malaysia, he may be charged under the Computer Crimes Act 1997 as if it was committed at any place within Malaysia. What this means is that a foreign hacker may be charged in Malaysia if he hacks into a computer, program or data in Malaysia. It will be interesting to see how the enforcement authorities will enforce the law against people who piggyback on other’s WiFi connection, especially with the Government’s plan to increase public WiFi hotspot to make it freely available to the people across the nation. From a technological point of view, it might do no harm to you sharing your WiFi connection with others. However, from a legal perspective, that may attract several problems. For example, sharing your home WiFi connection with neighbours may violate your Internet Service Provider’s terms of service. That is because usually home WiFi package only allows WiFi connection to be shared within home users only (as opposed to those business WiFi package used by cafés, offices and shopping malls which allows them to share with the public). Another legal implication that may arise from allowing WiFi connection freely available is that you may be liable for the conduct of the person using your WiFi connection since you are the subscriber of the WiFi connection. While it is clear that unauthorised access

WiFi Piggybacking – Is It Legal? Read More »

Taxation on the Internet

Taxation on the Internet

In this world, nothing is certain except death and taxes – Benjamin Franklin (1706-90), one of the Founding Fathers of the United States. In October 2014, the Hungarian government submitted its proposed tax law for 2015. One of the features under that tax law is the introduction of “Internet tax” that will be imposed on Internet users at a rate of HUF 150 (approximately USD 0.60) for every gigabyte of data or part thereof. For example, downloading a movie in HD quality (8.5 GB) would attract a tax charge of approximately USD 5. This proposal has caused an uproar and received negative criticisms from the public and the industry players. It was even condemned by the European Union. Some people perceived this as a way for the Hungarian government to control the Internet and stifle free expression and access to information. The Hungarian government was later pressured into changing its stance slightly, by stating that this new tax will be capped at HUF 700 (approximately USD 2.8) for home users and HUF 5,000 (USD 20) for business users, with Internet Service Providers (“ISPs”) expected to pick up the rest of the tab. That did not help much as the public still believed that the ISPs will pass on the costs of complying with this law onto the consumers eventually. The Hungarian government has finally backed down and decided to shelve this law after large-scale protests from its people. From the inception of the Internet until the late 1990s, the Internet was free of regulation by governments all over the world. However, things began to change when government realized that Internet services is a potential source of tax revenue, especially in the e-commerce sphere where the world is becoming one big marketplace. As a result, many governments have amended their tax law to accommodate to this new way of doing business. In the United States, President Bill Clinton signed the Internet Tax Freedom Act into law in 1998, in an effort to promote and preserve the commercial, educational and informational potential of the Internet. This law bans federal, state and local governments from imposing tax on internet access and other discriminatory Internet-only taxes such as bit tax, bandwidth tax and email tax. The law also prohibits multiple taxes on e-commerce, although it does not exempt sales tax made through online transactions. A tax on internet access is not the same thing as a tax on internet sales. The former is what the Hungarian government was trying to introduce, whereas the latter is becoming a norm in many parts of the world. Likewise, the Malaysian government is not left out when it comes to taxing the internet sales. In March 2013, the Inland Revenue Board of Malaysia (“IRB Malaysia”) published a “Guidelines on Taxation of Electronic Commerce” (“E-Commerce Guidelines”) which as the name suggests, aims to provide guidance on the tax treatment of e-commerce transactions. E-commerce is defined to mean any commercial transaction conducted through electronic networks including the provision of information, promotion, marketing, supply order or delivery of goods or services although payment and delivery of such goods and services may be conducted off-line. The IRB Malaysia acknowledged that as there are no specific provisions under the Income Tax Act 1967 (“ITA”) that address e-commerce transactions, hence it is hoped that the E-Commerce Guidelines will provide the much needed guidance to clear the confusion as to whether online businesses need to pay income tax or not. The E-Commerce Guidelines adopts the principle of neutrality where both conventional and online businesses are subject to the same tax treatment under the ITA. What this means is that there is no difference between a seller who sells goods in a physical shop and a seller who sells goods on a website (online shop) – both of them need to pay income tax. With the coming into force of the E-Commerce Guidelines, it signals an end of the tax-free ride era enjoyed by e-commerce players since the beginning of the e-commerce industry in 1997. In general, income of a person accruing in or derived from Malaysia is subject to income tax in Malaysia. Where business operations are carried out in Malaysia, the income attributable to those business operations is deemed to be derived from Malaysia. Whether an income is considered to be derived from Malaysia or not is subject to the business operations test i.e. whether there are substantial business activities being carried out in Malaysia. Para 5.1 of the E-Commerce Guidelines states that a server/website by itself does not carry any meaning in determining derivation of income. Para 5.2 provides 3 examples of situations where income from e-commerce is deemed to be derived from Malaysia even though the company conducts business through a website which is hosted on a server located outside Malaysia. Para 6 examines the various permutations of e-commerce business models with varying assumptions, in each case, stating the IRB Malaysia’s position on whether or not business income is deemed to be derived from Malaysia. With the impending coming into force of the Goods and Services Tax (“GST”) Act 2014, the Royal Malaysian Customs Department, the authority tasked with administering, assessing, collecting and enforcing payment of GST, has also published a “Guide on E-Commerce” and a “Guide on Web Hosting Services” in August 2014 to assist e-commerce players and web hosting service providers in understanding the GST and its implications on their businesses. GST is a form of consumption tax i.e. it is charged on all taxable supplies of goods and services in Malaysia except those specifically exempted. GST is also charged on importation of goods and services into Malaysia. All provisions of services whether it originates in the country or imported from other countries also fall under the scope of GST. These include services provided via the internet. In Malaysia, a person who is registered under the GST Act 2014 is known as a “registered person”. A registered person is required to charge GST (“output tax”) on his taxable supply

Taxation on the Internet Read More »

Keeping Copyright Relevant In The Digital Age

Keeping Copyright Relevant In The Digital Age

We live in an age where information and communications technology (ICT) has brought much improvement to human life. The digital revolution has revolutionised the way we live, study, work and play. Today’s computers and smartphones have enabled us to communicate with each other easily and obtain information from the Internet effortlessly. We can also use these electronic devices to take and share photos instantly, stream videos online and listen to music wherever and whenever we want. Parliament has enacted a series of cyber laws to address the various issues that may arise from the use of ICT. One of them is the Copyright (Amendment) Act 2012 (Amendment Act) which came into force on March 1, 2012. KEY FEATURES OF THE AMENDMENT ACT The Amendment Act aims to fulfil the requirements that will allow Malaysia to accede to the WIPO Copyright Treaty and WIPO Phonograms and Performance Treaty as well as to keep the Copyright Act 1987 abreast with new developments and international standards. (1) Notification of copyright Under the Amendment Act, the owner or licensee of a copyrighted work may notify the Controller of Copyright (controller) of the copyright in the work by providing the prescribed particulars and paying a fee. Notification is not mandatory. Upon notification, the particulars of the work such as the personal particulars of the copyright owner, a statutory declaration that the applicant is the owner, the category, title, name of the owner, date and place of the first publication of the work, will be recorded and maintained on the Register of Copyright. An advantage of notifying the copyright to the controller is that the certificate of notification issued by the controller constitutes prima facie evidence of the owner’s claim to the copyright and is admissible in court. This will assist copyright owners in discharging the burden of establishing their claim of copyright in a work, which is often a daunting task. (2) Anti-camcording It is now an offence for any person who operates an audiovisual recording device in a screening room (such as a cinema or theatre) to record any film in whole or in part. Anyone who attempts to do so commits an offence. (3) Circumvention of technological protection measures The Amendment Act makes it an offence for anyone to circumvent, or cause or authorise anyone to circumvent, technological protection measures used by copyright owners to protect their works, such as passwords, encryption, access codes, and watermarking. Such technological protection measures are necessary to prevent copying and restrict access to copyright works. It is also an offence for anyone to manufacture, import, distribute or possess any technology, device or component which is used, designed or produced for the purpose of enabling or facilitating the circumvention of technological protection measures. (4) Liabilities of service providers The Amendment Act also introduces new liabilities for service providers. “Service providers” are persons who provide services relating to, or connection for the access, transmission or routing of, data. It includes providers and operators of facilities for online services and network access and is arguably wide enough to cover Internet service providers and website operators. The Amendment Act exempts a service provider from liability for copyright infringement for certain activities such as transmitting, routing or providing connections of an electronic copy of the work through its primary networks or system caching, as parliament recognises that these activities are necessary to provide efficient access to data. A copyright owner whose work has been infringed on a network may request the service provider to remove or disable access to the infringing electronic copy on the network. The service provider must then remove or disable access to the infringing copy within 48 hours. The person whose electronic copy of the work was removed or to which access has been disabled may issue a counter notification to the service provider to request that the copy or access to it is restored on the network. The service provider must promptly provide the owner with a copy of the counter notification and inform him that the removed copy or access to it will be restored in 10 days unless confirmation is given by the owner that he has filed an injunction against the issuer of the counter notification stopping him from infringing activity on the network. The Amendment Act requires the copyright owner and the issuer of the counter notification to compensate the service provider for any loss incurred by complying with their notifications. CONCLUSION The Amendment Act keeps copyright law relevant in the ICT age. It demonstrates the government’s commitment to ensuring stronger protection for copyright owners and is a practical approach to combating copyright piracy in modern Malaysia. ***** About the author: This article was written by Edwin Lee Yong Cieh, Partner of LPP Law – law firm in Kuala Lumpur, Malaysia (+6016 928 6130, [email protected]). Feel free to contact him if you have any queries. This article was first published in CHIP Magazine Malaysia. The view expressed in this article is intended to provide a general guide to the subject matter and does not constitute professional legal advice. You are advised to seek proper legal advice for your specific situation.

Keeping Copyright Relevant In The Digital Age Read More »

Special Cyber Court and E-Court

Special Cyber Court and E-Court

Special Cyber Court The number of cybercrime cases in Malaysia has increased at an average of 10,000 cases reported every year. It was reported that in 2015 alone, CyberSecurity Malaysia received 3,752 cases of online fraud and hacking along with a staggering figure of 191,096 reports of malicious malware and botnet infections. CyberSecurity Malaysia believes that there are many more cases that may have gone unreported or unnoticed by the victims. From the statistics garnered, an average of 30 Malaysian Internet users fall victim to cybercrimes every day, and fraud and intrusion cases appear to be the most common offences faced by Malaysians. According to a UK based market research firm Juniper Research, global cybercrime losses are projected to reach USD 2 Trillion by 2019. Based on statistics given by the Malaysian Government, Malaysia lost RM179.3 million to cybercrime in 2015. In light of the increasing threat in cybercrime and the need for effectively dealing with cybercrime cases, the Government has announced the establishment of the Special Cyber Court. The 1st Special Cyber Court, based at the Kuala Lumpur Court Complex came into operation on 1 September 2016. Owing to the high rates of cybercrime in other States, subsequent phases will see the establishment of Special Cyber Courts in Selangor and Johor, followed by the remaining States within the next couple of years. Functions of Special Cyber Court The purpose of this initiative is to provide the judicial system with sufficient and adequate means of handling cybercrime offences, such as hacking, online fraud/scamming, botnet attacks, online defamation, sedition and harassment, web-defacement, theft of online information, cyber gambling and pornography, etc. The Special Cyber Court will deploy specialised and trained judges to hear cases relating to cybercrime and other computer related civil matters. The Special Cyber Court is expected to function in the same way as other special courts such as those that are already in place to deal with intellectual property, corruption, environmental as well as anti-profiteering matters. Interestingly, in the same statement that was released regarding the establishment of the Special Cyber Court, a statement was also made that the Government will also set up a special team to assist the authorities in tracing slanderous and seditious statements made on social media and on the Internet. The combination of these two messages suggests that anti-government sentiment in the form of statements on social media is one of the drivers behind the establishment of the Special Cyber Court. The Special Cyber Court is already in operation and it currently hears cases related to cybercrime. Its ambit will ultimately extend to civil and tort related matters as well, as per the Practice Direction No.5 of 2016 issued by the Chief Registrar of the Federal Court of Malaysia. The first judge to sit in the Special Cyber Court is Tuan Zaman bin Mohamad Noor. Benefits of Special Cyber Court The establishment of the Special Cyber Court will hopefully help expedite disposal of cybercrime cases, strengthen the legal institutions in Malaysia as well as reduce cybercrimes. The Special Cyber Court will be equipped with appropriate tools and equipment to handle evidence gathered in cybercrime cases. Judges, prosecutors and other relevant stakeholders will be given training to ensure that they are equipped with the necessary IT knowledge and skills which will help them in understanding the complex subject matter of cybercrime. Way forward for Special Cyber Court The Government’s initiative in introducing the Special Cyber Court to combat the rising trend of cybercrimes is indeed commendable and marks a step in the right direction. To ensure the successful implementation of the Special Cyber Court, it is hoped that the Government will: put in place the necessary legal frameworks (processes, procedures and practices) to enable and support the establishment of the Special Cyber Court; make amendments to certain cyber laws on the practices and procedures for handling cybercrime cases, electronic and digital forensics evidence; train judges, prosecutors, lawyers and other relevant stakeholders in the field of cybercrime and computer forensics so that they can understand the nuances and issues pertaining to detection, investigation, prosecution of cybercrimes and have better appreciation and analysis of the evidence and submissions presented in courts; and conduct case studies and analysis to learn the lessons and past experiences of cyber court in other jurisdictions. The introduction of the Special Cyber Court marks a significant milestone for Malaysia, as it is the first specialised court in this region designed to only handle cybercrime cases. It shows the Government’s commitment in fighting cybercrimes, and we hope that with this initiative, the public awareness towards protecting themselves from cybercrime threats will also increase. Electronic Court While cyber court is still a very new concept, many countries including Malaysia have introduced electronic court (“E-Court”). Essentially, E-Court utilises supportive technology to facilitate the day-in day-out functions of a court. The aim of the system is to efficiently speed up the disposal of cases using technology. The shift towards computerisation of the courts system in Malaysia began in 2009 and the E-Court system was fully implemented in main Court Complexes in Kuala Lumpur, Shah Alam, Ipoh, Penang, Johor Bharu, Sabah, Sarawak and Putrajaya in March 2011. To date, more than one million cases and six million documents have been filed online via the E-Court system. 4 Types of Mechanism The E-Court system in Malaysia currently has 4 types of mechanism, as follows: Video Conferencing System (VCS); Case Management System (CMS); Community and Advocate Portal System (CAP); and Case Recording and Transcribing (CRT). The E-Court system as a whole aims to use technology to address problems which have plagued the judicial system for years. Since the introduction of the E-Court system, 80% of the pending cases were reduced in the first 12 months. It also recorded a 50% reduction in days required for trial, judgment, filing and service. The E-Court system enables courts and lawyers to be more efficient in observing a strict schedule and effective case management system. E-Court also presents a huge step towards

Special Cyber Court and E-Court Read More »

Can WhatsApp Group Admins Be Liable Under the Law

Can WhatsApp Group Admins Be Liable Under the Law?

Some months ago, our Deputy Communications and Multimedia Minister Datuk Jailani Johari was quoted as saying that admins of group chat/messaging applications (such as WhatsApp, WeChat, Telegram, Viber, etc.) can be held responsible for offences (such as spreading of fake news, libel, fraud, exposure of classified information) committed by users in the group chat under the Communications and Multimedia Act 1998 (“CMA”). The Malaysian Communications and Multimedia Commission has even published an advisory note for group chat admins which sets out the Dos’ and Don’ts as a group chat admin. Some of the rules are such as requiring admins to comment on posts to ensure discussions stay on track; check posts regularly; consider removing or blocking those who persist in making inappropriate posts, etc. When the news first broke out, it sparked a lot of discussions on the social media and the news was even covered by foreign media, with many questioned the motive behind such move and the effectiveness of such enforcement if it ever happens. In fact, a disclaimer notice by WhatsApp group admins was making its round in many group chats that reads as follows: “I and other group admins do not allow or support any form of WhatsApp messages that display information that is pornographic, incorrect, libellous, seditious, false or inappropriate and as determined in accordance with/ by the Communication and Multimedia Act 1998. All WhatsApp messages displayed by individuals or myself in this group are not my responsibility, it is the responsibility of every individual in this group.” Putting aside whether the above disclaimer notice has any legal effect or not, one question that came to everyone’s mind was, can a WhatsApp group admin go to jail because of a message sent by a member in the group? The Deputy Minister did not specify clearly which provision under the CMA will such action be taken, but I believe he was referring to Section 233(1) of the CMA. Section 233(1) of the CMA reads as follows: (1) A person who – (a) by means of any network facilities or network service or applications service knowingly initiates the transmission of, any comment, request, suggestion or other communication which is obscene, indecent, false, menacing or offensive in character with intent to annoy, abuse, threaten or harass another person; or (b) initiates a communication using any applications service, whether continuously, repeatedly or otherwise, during which communication may or may not ensue, with or without disclosing his identity and with intent to annoy, abuse, threaten or harass any person at any number or electronic address, commits an offence. Whoever that commits the above offence can be fined up to RM50,000 and/or jailed up to 1 year. There are two important elements that must be fulfilled in order for the prosecution to use Section 233 against an offender, namely “knowingly initiates” and “with intent to commit an offence”. What that means is that the offensive message must have been knowingly initiated by the sender who had the intention to send out such a message. A group chat admin plays the role as an organiser of the group chat, not as a moderator. All messages sent in a group chat are transmitted instantaneously. It is not like the message will have to be first approved by the group chat admin before it goes online. Hence, if a user within the group sends out an offensive message, the group chat admin has no power to delete or cancel that message before it reaches everyone in the group. When that happens, how can the admin be responsible for a message not initiated by him and without his intention? A High Court judge in New Delhi in the case of Ashish Bhalla vs Suresh Chawdhury & Ors made the following remarks: “I am unable to understand as to how the Administrator of a Group can be held liable for defamation even if any, by the statements made by a member of the Group. To make an Administrator of an online platform liable for defamation would be like making the manufacturer of the newsprint on which defamatory statements are published liable for defamation. When an online platform is created, the creator thereof cannot expect any of the members thereof to indulge in defamation and defamatory statements made by any member of the group cannot make the Administrator liable therefor. It is not as if without the Administrator’s approval of each of the statements, the statements cannot be posted by any of the members of the Group on the said platform.” Based on the above analysis, it is my humble opinion that the proposal to take legal action against group chat admins is not a viable option. The authorities should instead go after the sender of the message, as displayed in the cases below: Muslim Ahmad was convicted under Section 233 CMA for making offensive comments “damn your sultan”, “your sultan kantoi”, “what’s the kantoi with your sultan” against the then Sultan of Perak on the Internet. Rutinin Suhaimin was convicted under Section 233 CMA for posting a derogatory statement “Sultan Perak sudah gilaaaaaaa!!!!!!!” on the Sultan Perak’s website. Ahmad Abd Jalil was convicted under Section 233 CMA for saying “Sultan Johor kulitnya putih seperti kulit babi” on his Facebook’s account. A man in Johor Bahru who goes by the name of Pa Ya was arrested for uploading a crude photo insulting the Prime Minister in a WhatsApp group. A man in Penang was arrested for writing a malicious statement about the Sultan of Johor through WhatsApp. Many of these messaging apps encrypt the messages, so it is unlikely that the law enforcement authorities are able to read your messages on these messaging apps. The authorities would usually take actions only upon receiving complaints against the contents where the complainants show screenshots of the contents to the authorities. The authorities may also request these messaging apps to provide assistance provided certain conditions are met. ***** About the author: This article was written by Edwin Lee Yong

Can WhatsApp Group Admins Be Liable Under the Law? Read More »

Responsibilities of Executor:

  • Apply for and extract the grant of probate.
  • Make arrangements for the funeral of the deceased.
  • Collect and make an accurate inventory of the deceased’s assets.
  • Settling the debts and obligations of the deceased.
  • Distributing the assets.

Note for Digital Executor:
If you wish to leave your digital assets to certain people in your Will, there are important steps that need to be taken to ensure that your wishes can be carried out:

  • Keep a note of specific instructions on how to access your username and password of your digital asset.
  • You are advised to store these private and confidential information in a USB stick, password management tool or write them down.
  • Please inform your executor or a trusted person of the whereabouts of the tools so that they will have access to your digital asset.