AN OVERVIEW OF THE CYBER SECURITY ACT 2024

Introduction

On 26th August 2024, the Cyber Security Act 2024 (Act 854) (“the Act”) came into force after being published in gazette on 26th June 2024.

The Act was enacted to enhance the national cyber security by providing for the establishment of the National Cyber Security Committee (“the NACSC”), duties and powers of the Chief Executive (“the Chief Executive”) of the National Cyber Security Agency (“the NACSA”), functions and duties of the national critical information infrastructure sector leads (“the Sector Lead”) and National Critical Information Infrastructure Entities (“the Entity”) and the management of cyber security threats and cyber security incidents to national critical information infrastructures, to regulate the cyber security service providers through licensing, and to provide for related matters.

There are several regulations issued that operate together with the Act:

  1. Cyber Security Regulations (Duration for Cybersecurity Risk Assessment and Audit) 2024.

  2. Cyber Security Regulations (Cybersecurity Incident Notification) 2024.

  3. Cyber Security Regulations (Licensing of Cybersecurity Service Providers) 2024

  4. Cyber Security Regulations (Offence Compounding) 2024.

Collectively, hereinafter will be referred to as the Regulations (“the Regulations”).

Background

Prior to the Act’s implementation, cyber security governance in Malaysia was less integrated in the sense that there are various governing statutes depending on the different aspects of cyber law. Legislations such as Personal Data Protection Act 2010, the Communications and Multimedia Act 1998, the Computer Crimes Act 1997 and the Penal Code prescribe certain conduct constituting offences. Additionally, policies to cater specific industry players were also introduced such as the Guidelines on Technology Risk Management issued by the Securities Commission Malaysia and Risk Management in Technology Policy Document issued by the Central Bank of Malaysia.

Fast forward, the Act was passed at the Parliament following three readings dated 25th and twice on 27th March 2024 respectively. Some of the concerns raised by the Members of Parliament are on the liability of directors and agents for offences committed by their subagent or employee which may trigger the doctrine of vicarious liability. This is following the offences prescribed by the Act are strict liability in nature hence do not require proof of mens rea. Nevertheless, the Minister of Digital, Yang Berhormat Tuan Gobind Singh Deo in response assured that a prior investigation will be conducted in determining whether the impugned conduct falls within the provision. In essence, a prosecution in all circumstances including under the Act shall be conducted in accordance with due process as prescribed by the existing procedural laws.

The Act was also pledged to not be granting full immunity to the government in regards to offences relating to cyber security as they may still be subject to other legislations. Nonetheless, the enforcement and effectiveness of the Act is yet to be tested but worth looking out for.

Similar legislation was introduced in Singapore in 2018 which further expanded its scope with the passing of the Cyber Security (Amendment) Bill on 7th May 2024. Three new types of entities besides owners of critical information infrastructure (“CII”) are recognised that are the high risk temporary system, organisations handling sensitive information impacting national interest and digital infrastructure service providers.

Division

The Act is divided into several parts as follows:

Part

Arrangement

I.

Preliminary

II.

National Cyber Security Committee (NACSC)

III.

Duties and Powers of Chief Executive

IV.

National Critical Information Infrastructure Sector Lead and National Critical Information Infrastructure Entity

V.

Code of Practice

VI.

Cyber Security Service Provider

VII.

Cyber Security Incident

VIII.

Enforcement

IX.

General

Schedule - List of National Critical Information Infrastructure Sector

Part I - Preliminary
(Section 1 - 4)

This part sets out the commencement date of the Act, the definition, bindingness on the state and federal government and interpretation of terms used therein.

Unlike the Personal Data Protection Act 2010, the Act binds both the state and federal government, but excludes them from liability to prosecution for any offence under the Act.

It also sets out the application of the Act, which is extra-territorial in nature where it catches an offender regardless of nationality and citizenship and the place of commission will be deemed as within Malaysia. However, this would only be applicable to offences affecting the National Critical Information Infrastructure (“the NCII”) that is either wholly or partly in Malaysia.

For the purpose of the Act, the term national critical information infrastructure is defined as:

“A computer or computer system which the disruption to or destruction of the computer or computer system would have a detrimental impact on the delivery of any service essential to the security, defence, foreign relations, economy, public health, public safety or public order of Malaysia, or on the ability of the Federal Government or any of the State Governments to carry out its function effectively.”

Part II - National Cyber Security Committee
(Section 5 - 9)

This part provides for the establishment of the National Cyber Security Committee (“the Committee”) that is chaired by the Prime Minister and assisted by the Chief Executive who will act as the secretary to the Committee.

The Committee comprises stakeholders from various ministries such as finance, foreign affairs, defence, home affairs, communications and digital related matters. The line up also includes the heads of enforcement bodies. Further, the same part stipulates functions of the Committee, procedures to convene meetings, authority to invite other attendees and establish subcommittees.

Part III - Duties and Powers of Chief Executive
(Section 10 - 14)

This part provides the duties and authorities conferred to the Chief Executive.

Such duties and powers include to advise, make recommendations to the Committee, implement policies, coordinate the implementation, collect data received from the Sector Lead, Entities and make evaluation from it. Further, the duty extends to disseminate such findings back to the NCII, issue directives to the Sector Leads, Entities or carry out any other duties imposed under the Act or as directed by the Committee.

Part IV - National Critical Information Infrastructure (NCII) Sector Lead and National Critical Information Infrastructure (NCII) Entity
(Section 15 - 24)

Distinction must be made between the NCII Sector Lead and Entity which are as follows:

National Critical Information Infrastructure (NCII) Sector Lead

National Critical Information Infrastructure (NCII) Entity

Appointment

Appointment by the minister responsible for cyber security upon recommendation by the Chief Executive.

  • Each sector listed in the Schedule will have its own Sector Lead.

  • A Sector Lead is appointed among Government Entity

  • A Sector Lead may also be designated as Entity by the Chief Executive if it owns or operates a NCII.

Through designation under Section 17 by the Sector Lead.

Functions / Duties

Section 16

  1. To designate a national critical information infrastructure entity under section 17;

  2. To prepare a code of practice as required under section 25;

  3. To implement the decisions of the

  4. Committee and directives under this Act;

  5. To monitor and ensure that actions required of and duties imposed on the national critical information infrastructure entities under this Act are carried out by the national critical information infrastructure entities;

  6. To prepare and maintain guidelines on best practices in relation to cyber security management;

  7. To prepare and submit to the Chief Executive a situational report whether on its own initiative or as required by the Chief Executive where a cyber security threat or cyber security incident has affected a national critical information infrastructure within its national critical information infrastructure sector; and

  8. To carry out such other functions under this Act.

Section 20

  • To provide information relating to the NCII.

Section 21

  • To implement code of practice.

Section 22

  • To conduct cyber security risk assessment and audit.

Section 23

  • To give notification on cyber security incident.

Revocation

If no longer owns or operates a NCII.

Cyber Security Exercise

Will be conducted by the Chief Executive for the purpose of assessing readiness of the Entity in responding to any cyber security threat or incident.

Non-compliance to directions by the Chief Executive in regards to the cyber security exercise is an offence with penalty of fine not exceeding one hundred thousand ringgit.

Part V - Code of Practice
(Section 25 - 26)

This part provides details on the duty of the NCII Sector Lead to prepare a code of practice which contains the measures, standards and processes in ensuring the cyber security of a NCII is within the sector for which it is appointed.

In furtherance to that, any directions given by the NCII Sector Lead to the NCII Entity must be consistent with the code of practice prepared.

Part VI - Cyber Security Service Provider
(Section 27 - 34)

This part sets out the requirements, procedures for application, renewal, assignment, revocation for licensing as cyber security service provider and further imposes duty on a licensee to keep records of persons engaging for such service, rendering the service on behalf of licensee and details of the type of cyber security provided.

However, this part is not applicable in the case where the service is provided by a company to its related company. For example, company A is a holding company that offers cyber security service as its main business and rendered such service to its subsidiary, company B. A licence is not required in this circumstance.

Part VII - Cyber Security Incident
(Section 35)

“Cyber security incident” is interpreted as an act or activity carried out on or through a computer or computer system, without lawful authority, that jeopardises or adversely affects the cyber security of that computer or computer system or another computer or computer system;

This part sets out the procedure for when a cyber security incident related to NCII has or might have occurred which in brief is as follows:

  1. The Chief Executive will instruct authorised officers to investigate

  2. Authorised officers will notify the Chief Executive on findings of occurrence or nonoccurrence of cyber security incident

    1. In the event a cyber security incident has not occurred, the Chief Executive will notify the Entity concerned to dismiss the matter

    2. In the event of a cyber security incident has occurred, the Chief Executive will issue a directive to the Entity concerned on measures necessary to respond or recover and to prevent such incident from occurring in the future.

Part VIII - Enforcement
(Section 36 - 52)

This part sets out the procedural aspects of the enforcement of the Act while providing authorisation of public officers in the course of enforcing the Act.

The summary of the enforcement part is as follows:

Authorised Officer

Source of Authority

By the Minister in writing, will provide authorisation to any public officer to exercise powers of enforcement under the Act

Proof of Authority

Issuance of authority card signed by the Minister

Powers granted

  1. Power to investigate and powers possessed by of a police officer in relation to investigation as provided in the Criminal Procedure Code

  2. Power to conduct search and seizure on items, persons and premises related with the investigation

  3. Power to conduct search and seizure without warrant

    • Provided he has reasonable cause to believe delay in obtaining a warrant would adversely affect the investigation or cause the evidence to be tampered, removed, damaged or destroyed.

  4. Power to access computerised data

    • Including necessary password, encryption code, decryption code, software or hardware and other means enabling comprehension of such computerised data.

  5. Power to require attendance or person acquainted with the case

  6. Power to examine person acquainted with the case

Additional Powers Granted

For the purpose of execution under the Act:

  1. Power to require production, inspect, examine and make copy of any computer, book, record, computerised data, document or other article

  2. Power to require the production of any identification document from any person in relation to any act or offence under the Act

  3. Power to make such inquiries as may be necessary to ascertain whether the provisions of this Act have been complied with

Seized Items

List

A list of seized items must be prepared and delivered to the owner of the items or premise or persons acting on behalf at the premise.

Cost of Holding

The cost of holding the seized items will be a debt due to the Federal Government in the event the person under investigation is convicted of such offence

Release

Upon referring to the Deputy Public Prosecutor, any authorised officer may release the seized items if the thing or matter is not liable to forfeiture and required for the purpose of proceeding under the Act.

A record in writing affecting the release must be made and a copy of it is sent to the Deputy Public Prosecutor as soon as practicable

Forfeiture

Any items seized is liable to forfeiture

When no prosecution is initiated in regards to the seized item and a notice regarding such is served, the owner within the period of a month from the service can claim the items through written notice to authorised officers in possession of items. Upon expiry of the period, the items will be deemed to be forfeited

Further, an order can be made by a Magistrate to forfeit items that were the subject matter of or used in the commission of any offence under the Act

Any forfeited items shall be regarded as the property of the Federal Government

Irrecoverability of Cost / Damage

No person in regards to the seized items is entitled to recover costs of proceeding or damages or other relief unless such seizure was made without reasonable cause

Admissibility of Statement as Evidence

Usage in Impeachment

The statement made by the witness may be used against him to impeach his credit in the manner provided by the Evidence Act 1950

Usage as Defence in Trial

The statement made by the witness may be admitted as evidence in support of his defence during the course of trial

Usage in Prosecution Case

The statement made by the witness may be used as evidence in the prosecution case against him if he is charged with any offence related with the making or contents related to the statement made

Obstruction

Any person who assaults, impedes, obstructs or interferes with or refuses access to any premises or computerised data in the course of performance of duties under the Act will constitute offence under the Act.

Part IX - General
(Section 53 - 64)

This general part of the Act can be summarised as follows:

Appeal

Any person aggrieved by decision of the Chief Executive regarding:

  1. Refusal to issue licence under the Act

  2. (b) Revocation or suspension of licence

May submit an appeal in writing to the Minister in charge of cyber security within 30 days after being informed of such refusal, revocation or suspension.

Service of Document

The Chief Executive in regards to the submission of informations, documents or particulars for the purpose of the Act may:

  1. Allow submission by way of electronic medium or transmission

  2. Stipulate the conditions and specifications for such submission

  3. Provide acknowledgement of receipt for such submission

Obligation of Secrecy

Prohibits disclosure of any information obtained by authorised persons in the course of duties either during or after tenureship or employment.

Exception may applies to disclosure made for any purposes under this Act or proceedings under any written law or when authorised by the Committee

Protection Against Suit & Legal Proceedings

Provides protections against action, suit, prosecution or proceedings for personnel below:

  1. The Minister

  2. Any member of the Committee

  3. The Chief Executive

Exception may applies when it can be proven that the act, neglect or default was done or omitted in bad faith without reasonable cause

Prosecution

Prosecution for any offence under this Act can only be instituted with written consent of the Public Prosecutor

Liability

Companies, directors, employees etc.

Provides liability of director, compliance officer, partner, officers or employees working for entities below, in the event the entities are found guilty of any offence under the Act:

  1. Companies

  2. Limited Liability Partnership

  3. Firm

  4. Society

  5. Body of persons responsible for management of any affairs of company (f) Body of persons assisting in management

Key Principles:

  1. The director or employee may be charged severally or jointly in the same proceeding with the employer or company, etc.

  2. The director or employee, as an individual shall be deemed guilty and liable to the same punishment or penalty that the employer or company is found guilty

  3. Exceptions can be made if the director or employee proves:

    1. The offence was committed without his knowledge; or

    2. The offence was committed:

      • Without his consent

      • He had taken all reasonable precautions

      • He had exercised due diligence to prevent such commission

Employer, Principal etc.

Provides liability of employers, principals and agent who appoints sub-agent in the event an offence under the Act is committed by:

  1. Employees in the course of employment

  2. Agents when acting on behalf of principal

  3. Employees of an agent

Power of the Minister

To Exempt

Exempt any person or class of persons from any or all provisions of the Act

To Amend Schedule

Amend the Schedule of the Act upon recommendation by the Chief Executive

To Make Regulations

Make regulations necessary to carry into effect the provisions in the Act

To Make Regulations on Compounding of Offences

Make regulations that prescribe:

  1. Any offence under the Act that may be compounded; and

  2. Method and procedure for compounding such offence

In practice, any person who has committed a compoundable offence under the Act may be offered by the Deputy Public Prosecutor, an Offer to Compound Offences

Following that, any person that has been compounded under the same provision:

  1. No longer be subject to prosecution for the compounded offence

  2. Entitled to release of seized items in connection of the compounded offence

As of 29th August, a regulation has been issued which provides the list of compoundable offences under the First Schedule of the regulation which as follows:

Provision - Compoundable Offence

Section 20 (6) - Failure to provide information regarding national critical information infrastructure

Section 20 (7) - Failure of Sector Lead to notify the Chief Executive on any informations received regarding the national critical information infrastructure

Section 22 (7) - Failure of Entity to conduct a cyber security risk assessment and cause for carrying out of an audit

Section 22 (8) - Failure of Entity to comply with directions of the Chief Executive in regards to cyber security risk assessment and audit

Section 24 (4) - Failure of Entity to comply with directions of the Chief Executive in regards to cyber security exercise

Section 32 (3) - Failure of licensee to keep and maintain records required

Saving

Any measures, standards and processes which have been:

  1. Implemented to ensure the cyber security of a NCII; and

  2. Imposed on any government entity / person under Directive of National Security No.26

Will continue to remain in force so long it is consistent with provisions of the Act until it is revoked under the National Security Council Act 2016.

Schedule

The Schedule provides for the list of sectors under the NCII which are as below:

Bil

Sector

1.

Government

2.

Banking and Finance

3.

Transportation

4.

Defence and national security

5.

Information, communication and digital

6.

Healthcare services

7.

Water, sewerage and waste management

8.

Energy

9.

Agriculture and plantation

10.

Trade, industry and economy

11.

Science, technology and innovation

Conclusion

All in all, the Cyber Security Act 2024 represents a significant legislative development on the country’s cybersecurity framework while focusing on the safeguarding of national critical information against threats across regions. With the digital world continuing to shift at a great pace, it certainly calls for greater security standards and accountability in dealing with the national critical information. This includes requirements for audit, risk assessments, incident reporting, licensing and compliance with established security protocols.

While the Act and Regulations provide a strong foundation, certain nuanced aspects still require further refinement in subsidiary legislation, guidelines, and codes of practice. It is essential for Sector Leads to closely collaborate with their respective Entities to develop codes of practice that are not only robust but also tailored to address specific vulnerabilities within their sectors. This collaborative approach, along with NACSA’s willingness to assist Entities in complying with the Act, will be crucial in ensuring that cybersecurity measures remain appropriate and proportionate to the evolving threat landscape.

Besides imposing certain obligations on the stakeholders, the Act provides certain conducts and omissions that may amount to offences hence subject to penalties. The summary of offence and consequences under the Act is as follows:

Provision

Offence

Consequences

Section 14 (6)

Failure to provide information based on direction of the Chief Executive

Fine not exceeding RM200,000 or imprisonment for a term not exceeding three years or to both

Section 14 (7)

Failure to state and identify according to best knowledge and belief, the location and person that may have possession over information directed to be produced by the Chief Executive

Fine not exceeding RM200,000 or imprisonment for a term not exceeding three years or to both

Section 20 (6)

Failure to provide information regarding national critical information infrastructure

Fine not exceeding RM100,000 or imprisonment for a term not exceeding two years or to both

Section 20 (7)

Failure of Sector Lead to notify the Chief Executive on any informations received regarding the national critical information infrastructure

Fine not exceeding RM100,000

Section 21 (5)

Failure of Entity to implement code of practice

Fine not exceeding RM500,000 or imprisonment for a term not exceeding ten years or to both

Section 22 (7)

Failure of Entity to conduct a cyber security risk assessment and cause for carrying out of an audit

Fine not exceeding RM200,000 or imprisonment for a term not exceeding three years or to both

Section 22 (8)

Failure of Entity to comply with directions of the Chief Executive in regards to cyber security risk assessment and audit

Fine not exceeding RM100,00

Section 23 (2)

Failure of Entity to notify the Chief Executive and Sector Lead if a cyber security incident have or might have occurred

Fine not exceeding RM500,000 or imprisonment for a term not exceeding ten years or to both

Section 24 (4)

Failure of Entity to comply with directions of Chief Executive in regards to cyber security exercise

Fine not exceeding RM100,000

Section 25 (6)

Failure of Sector Lead to prepare a code of practice

Fine not exceeding RM100,000

Section 27 (5)

Provide cyber security service without licence

Fine not exceeding RM500,000 or imprisonment for a term not exceeding ten years or to both

Section 31 (3)

Non-compliance of conditions to licensing imposed by the Chief Executive

Fine not exceeding RM100,000 or imprisonment for a term not exceeding two years or to both

Section 32 (3)

Failure of licensee to maintain and keep records

Fine not exceeding RM100,000 or imprisonment for a term not exceeding two years or to both

Section 35 (5)

Non-compliance of directives issued by the Chief Executive in regards to cyber security incident

Fine not exceeding RM200,000 or imprisonment for a term not exceeding three years or to both

Section 48 (2)

Failure or refusal of person acquainted to case under investigation to attend before the authorised officer making such order

Magistrate will issue a warrant to secure the attendance as ordered

Section 55 (2)

Failure to abide by obligation of secrecy

Fine not exceeding RM1,000 or imprisonment for a term not exceeding two years or to both

Section 63 (3)

Failure to comply regulations made by the Minister under Section 63 (1) and (2)

Fine not exceeding RM200,000 or imprisonment for a term not exceeding three years of to both

The Law is stated as at 18 October 2024

Written By: Naielah Nafisah Binti Muhammad Zarkashi, intern

Supervised By: Haiqal and Ainul Azam

For further clarification, please contact us at 03-2171 1484 or at mail@azamlaw.com.

REFERENCES

19 Penyata Rasmi Dewan Rakyat Parlimen Kelima Belas Penggal Ketiga Mesyuarat Pertama 36–99 (2024). Retrieved September 27, 2024, from https://www.parlimen.gov.my/hansard-dewan-rakyat.html?uweb=dr&lang=en.

Cyber Security Act 2014

Cyber Security Regulations (Duration for Cybersecurity Risk Assessment and Audit) 2024.

Cyber Security Regulations (Cybersecurity Incident Notification) 2024.

Cyber Security Regulations (Licensing of Cybersecurity Service Providers) 2024

Cyber Security Regulations (Offence Compounding) 2024.


  1. General (14)
  2. COVID-19 & MCO (9)
  3. Competition Law (2)
  4. Islamic Banking and Finance (2)
  5. Funds and Asset Management (3)
  6. Intellectual Property Rights (5)
  7. Case Commentaries (8)
  8. External Publications (4)
  9. Gallery (6)
For further clarification of any of the above articles, please contact us at mail@azamlaw.com