2020 8th International Conference on Information Technology and Multimedia (ICIMU) 2020
DOI: 10.1109/icimu49871.2020.9243493
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain and the Personal Data Protection Act 2010 (PDPA) in Malaysia

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…Blockchain is a decentralized and distributed digital ledger, enabling secure and trustful peer-to-peer transactions. It is the underlying technology for cryptocurrencies such as Bitcoin and also the basis for the tokenized economy, publicly referred to Web 3 [49]. The most prominent blockchains such as Bitcoin or Ethereum are public and permissionless.…”
Section: Blockchain Platform Typesmentioning
confidence: 99%
“…Blockchain is a decentralized and distributed digital ledger, enabling secure and trustful peer-to-peer transactions. It is the underlying technology for cryptocurrencies such as Bitcoin and also the basis for the tokenized economy, publicly referred to Web 3 [49]. The most prominent blockchains such as Bitcoin or Ethereum are public and permissionless.…”
Section: Blockchain Platform Typesmentioning
confidence: 99%
“…Most data privacy laws such as PDPA apply when necessary to process personal data (Baskaran, 2020). Furthermore, data stored in the ECF platform during the registration process of ECF investor account are also subject to PDPA 2010.…”
Section: Data Protection and Privacy Of Equity Crowdfunding Investors...mentioning
confidence: 99%
“…Everyone, including businesses and governments, should use it to manage our data and safeguard us from data breaches. Moreover, personal data protection known as the personal information privacy or personal data security where it is a set of principles that regulates on how sensitive data should be acquired and processed [7]. Personal data protection also ensures the data is accessed by those who have the authorization which will prevent it being misused [8].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Table 1 summarizes the definition of those seven principles. Moreover, personal data can be classified into two category which are Personal Data and Sensitive Personal Data to [7]. Data users are required to take specified actions to protect the user's data during the process from being manipulated, lost, misused, or even revealed.…”
Section: Literature Reviewmentioning
confidence: 99%