Personal data privacy is a crucial aspect of information management. Strategic information management must consider the data security and must take all the necessary practices to ensure personal data protected in a closed or open network environment. Data privacy legislation has been formulated by the government to ensure the ethics of handling sensitive information such as personal, banking and another aspect of information like health and medical information must be according to law stipulated by the acts. Malaysia as a growing electronic government provider in the region has adopted several legislation to ensure the enforcement of the data protection achieved the international standard to ensure global recognition especially by international business in enhancing foreign direct investment (FDI) and to protect local enterprises.
Bygrave, L.A (2010), ‘Privacy and Data Protection in an International Perspective’, Scandinavian Studies in Law, Vol. 56, pp. 165-200.
Gutwirth, S, (2002) Privacy and the Information Age, Lanham/Boulder/NewYork/Oxford/Rowman & Littlefield Publ.
Miltgen, H.C.L. & Smith. J. (2015), Exploring information privacy regulation, risks, trust, and behavior, Information & Management, (52)6, 741-759
Judith, D.C (2018), "Privacy", The Stanford Encyclopedia of Philosophy (Spring 2018 Edition), Edward N. Zalta (ed.), retrienved from https://plato.stanford.edu/archives/spr2018/entries/privacy/ on 11thNovember 2018
Dhillon, G., Oliveira, T., & Syed, R. (2018), Value-based information privacy objectives for Internet Commerce, Computers in Human Behavior, (87),292-307, https://doi.org/10.1016/j.chb.2018.05.043.
Herring, J. (2016), Medical Law and Ethics, London, Oxford University Press
Fletcher, K. (2001), Privacy: The Achilles' heel of the new marketing;. Interactive Marketing. (3)2 . 141-153 retrieved online at https://link.springer.com/content/pdf/10.1057/palgrave.im.4340123.pdf on 11 November 2018.
Alshehri, M. & Drew. S (2010), Implementation of e-Government: Advantages
and Challenges IASK E- ALT2010 CONFERENCE PROCEEDINGS. Retrieved at https://core.ac.uk/download/pdf/143886366.pdf on 11 September 2018
Mason, R. O. (1986). Four Ethical Issues of the Information Age.
MIS Quarterly, 10, 5-12. http://dx.doi.org/10.2307/248873
Mittal, Prashant (2009) Programme Management Managing Multiple Projects Successfully, India: GlobalIndia Pubns.
Ahmad, M. & Othman, R. (2006) Implementation of Electronic Government In Malaysia: The Status And Potential For Bettewr Service To The Public In Public Sector ICT Management Review, Oct 2006- Mar 2007 (1) 1, 2-9
Daniel, J.S. (2008). Understanding Privacy. Cambridge, Massachusetts: Harvard University Press. Warren and Brandeis (1890) “The Right to Privacy”, Harvard Law Review Vol. IV, December 15, 1890 No. 5, retrievehttp://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html on11 November 2018.
MCMC, Our Responsibility. Retrieved online https://www.mcmc.gov.my/about-us/our-responsibility on 11 November 2018
In-Text Citation: (Hamzah, Ahmad, Hussin, & Ibrahim, 2018)
To Cite this Article: Hamzah, M. A., Ahmad, A. R., Hussin, N., & Ibrahim, Z. (2018). Personal Data Privacy Protection: A Review on Malaysia’s Cyber Security Policies. International Journal of Academic Research in Business and Social Sciences, 8(12), 1475–1483.
Copyright: © 2018 The Author(s)
Published by Human Resource Management Academic Research Society (www.hrmars.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode