Beyond Algorithms: Shaping Malaysia’s Ethical Approach to Artificial Intelligence

Beyond Algorithms: Shaping Malaysia’s Ethical Approach to Artificial Intelligence

by Thulasy Suppiah, Managing Partner of Suppiah & Partners

Artificial Intelligence (AI) has transformed our lives with its convenience, seamlessly carrying out tasks that once required human intelligence. From auto-correcting sentences to producing creative content, AI has become an invisible force embedded into everyday activities. While AI systems hold immense promise, they differ fundamentally from traditional software due to their unique ability to learn, adapt, and evolve — creating new ethical challenges we must address.

According to Eleanor Manley, AI and Deep Learning Consultant and Co-founder of Metta Space, no one fully understands how deep learning AI works, not even its creators. In her TEDx talk, “Why AI Can’t Be Ethical – Yet”, she states: “For us to keep using AI, we need to trust it. And right now, we can’t, because we simply don’t understand enough about how it works.”

 

However, it is worth considering that not every technology requires users to understand its mechanics in order to trust it. Everyday technologies such as WiFi or GPS function reliably without most users needing to comprehend the underlying systems. What matters more is ensuring trustworthy outcomes, not necessarily full public comprehension.

Given the profound potential impact of AI, a key question arises: how do we ensure that AI decisions align with national values, corporate responsibility, and broader societal norms?

Before we answer, it is useful to reflect that sectors like healthcare and finance have successfully used ethical standards to guide growth and benefit humanity. Bioethics in medicine and fiduciary duties in finance have helped build trust, accountability, and resilience — lessons that AI governance can learn from.

Learning from Established Ethical Frameworks

Thankfully, several comprehensive frameworks are already in place to guide ethical AI development:

  • The UNESCO Recommendation on the Ethics of Artificial Intelligence (2022) serves as a global benchmark, offering universal principles for responsible AI.

  • The ASEAN Guide on AI Governance and Ethics (2024) provides region-specific guidance, reflecting the unique challenges and priorities of Southeast Asia.

  • Malaysia’s own National Guidelines on AI Governance and Ethics (2024), issued by the Ministry of Science, Technology and Innovation (MOSTI), adapt these global and regional standards to suit our local context and national values.

Five Pillars for Malaysia’s Ethical AI Approach:

Human-Centricity


AI should enhance, not replace, humanity. Human dignity, agency, and well-being must remain the central focus. Individuals must retain control over decisions that significantly impact their lives.

Fairness and Non-Discrimination

AI systems must be developed and monitored to prevent biases and ensure equitable outcomes for all Malaysians.

Transparency and Explainability

Trust relies on understanding. AI systems should be designed to be interpretable, with users able to understand how major decisions are made and to challenge unfair outcomes. Black-box models that erode trust should be avoided.

Privacy and Security


Strong protections must be in place for personal data. Privacy safeguards and cybersecurity measures are non-negotiable in maintaining trust.

Accountability, Reliability, Safety and Control

Clear responsibility lines must exist for AI outcomes. Developers and deployers must be identifiable and accountable, with mechanisms to ensure AI operates reliably, predictably, and safely.

Global Regulation in Action: The EU AI Act

Meanwhile, the European Union AI Act is the first major regulatory effort to comprehensively govern AI, potentially setting a global standard. It places most responsibilities on developers and deployers of high-risk AI systems — which include AI used in critical areas such as healthcare, law enforcement, infrastructure, and employment.

Additionally, developers of General Purpose AI (GPAI) models — such as ChatGPT and Midjourney — must comply with specific obligations:

  • Provide technical documentation,
  • Publish summaries of training content,
  • Comply with the EU Copyright Directive, which ensures that AI does not unlawfully exploit copyrighted works.

These obligations are significant because they aim to improve transparency, protect human creators, and ensure that AI models do not become unchecked sources of misinformation or harm.

The Act also mandates systemic risk evaluations, adversarial testing, and incident reporting — ultimately benefiting users by building safer, more predictable, and less biased AI systems.

Creativity and Intellectual Property: A New Frontier

As for creative industries, the Kellogg Institute of Management rightly points out that the legal profession must rethink and update intellectual property (IP) laws. Current laws often struggle to address the blurred boundaries between human and machine-generated work.
Yet this is easier said than done: legal frameworks move slowly, while technology evolves rapidly. This gap raises important questions: can the law ever keep pace with AI innovation? And if not, can ethical principles fill the void until the law catches up?

Ethics may thus serve as a critical stopgap — guiding AI’s responsible development even in areas where formal laws remain unsettled.

Rethinking Leadership in an AI Era

The Kellogg Institute also calls on business leaders to move beyond simply reacting to consumer demands — which often favour short-term convenience over long-term wellbeing. Instead, it urges leaders to adopt a forward-looking mindset, much like Henry Ford once did by envisioning mass automobile use before there was widespread demand.
In the context of AI, this means scrutinising both the large costs and broad benefits across multiple stakeholders — consumers, creators, workers, and society at large. The call to action is clear: “Let’s start the dialogue now — before AI does it for us.”

Conclusion

By embracing ethical principles and frameworks early, Malaysia can unlock AI’s transformative potential while safeguarding the dignity, rights, and wellbeing of all its citizens. But success depends on continuous collaboration — among industries, academia, civil society, and everyday consumers — and a shared commitment to ethical awareness as technology continues to evolve at unprecedented speed.

© 2025 Suppiah & Partners. All rights reserved. The contents of this newsletter are intended for informational purposes only and do not constitute legal advice.

More Newsletter

[Feature Article] The Star Newspaper: Are Our Children Ready for the AI Revolution?

Are Our Children Ready for the AI Revolution?

Published by The Star on 25 Apr 2025

by Thulasy Suppiah, Managing Partner

The disturbing news from a Malaysian school, where a student allegedly used artificial intelligence to create and distribute explicit deepfakes of schoolmates, is a stark wake-up call. While shocking, this incident is sadly not isolated. Reports from South Korea show deepfake-related digital sex crimes more than tripled last year, overwhelmingly targeting young people – a chilling indicator of a rapidly escalating global problem fueled by increasingly powerful and accessible AI.

We cannot simply ban these technologies; AI is becoming deeply integrated into our world, and its capabilities are expanding daily. The critical issue is not access, but understanding. Are our young people, who are readily adopting these tools, truly aware of the profound harm they can inflict? Do they grasp the ethical implications and potential legal consequences of manipulating someone’s image, particularly for creating non-consensual explicit content?

This situation demands a societal response as serious and sustained as our long-standing campaigns against smoking, drug abuse, or bullying. It’s not enough to simply react after harm is done. We urgently need comprehensive educational initiatives within schools to teach the responsible and ethical use of AI. Young people must understand how easily these tools can be misused and the devastating impact such actions have on the lives and well-being of their peers.
Furthermore, the responsibility extends beyond the classroom. Parents need to be more vigilant and engaged in monitoring their children’s online activities and AI usage. Perhaps this incident also forces us all to reconsider the images we share so freely on social media, now that they can be easily downloaded and weaponised through AI with malicious intent.

Finally, our legal and regulatory frameworks must evolve rapidly. While existing laws are being applied, we need clearer, specific measures to address the unique challenges posed by AI misuse, offering stronger protections, especially for minors who are disproportionately targeted.
Such incidents are painful reminders that powerful tools can be used irresponsibly. As AI continues its advance, proactive education, increased parental awareness, and updated regulations are not just options – they are essential to safeguarding our communities, particularly our children, from this emerging digital threat

© 2025 Suppiah & Partners. All rights reserved. The contents of this newsletter are intended for informational purposes only and do not constitute legal advice.

More Featured Articles

[Feature Article] The Star Newspaper: Fundamental Questions on Art and AI

Fundamental Questions on Art and AI

Published by The Star on 4 Apr 2025

by Thulasy Suppiah, Managing Partner

The accelerating power of artificial intelligence to generate creative content is forcing us to confront fundamental questions about art, originality and the future of human creativity. The recent viral wave of AI-generated images mimicking Studio Ghibli’s iconic style, facilitated by tools like ChatGPT, serves as a vivid, and perhaps unsettling, example of this burgeoning reality. The public fascination was undeniable, showcasing AI’s impressive ability to replicate a deeply loved aesthetic. But it immediately sparked debate.

For many artists and admirers, including figures like Ghibli’s Hayao Miyazaki who values the human touch, seeing a unique style reproduced algorithmically feels inherently problematic. It raises crucial questions about copyright infringement through AI training data, the potential dilution of distinct artistic voices, and where homage ends and imitation begins. Arguments that new technologies always face initial resistance, and eventually become accepted tools, certainly hold historical weight. Digital tools, once novel, are now integral to animation and many art forms, offering efficiencies that artists themselves leverage. Economic realities often necessitate adapting to technological advancements.

But the sheer speed and mimicry capability of modern generative AI present a different scale of challenge. This isn’t just about automating laborious tasks; it’s about replicating the very essence of artistic style. How do we value human creativity, skill and years of developed craft when AI can produce a stylistic facsimile in moments? As AI models become increasingly sophisticated, capable of mimicking countless other artists and styles, the Ghibli example surely won’t be the last such controversy. The path forward requires careful navigation. Ignoring the potential legal and ethical pitfalls is risky, yet overly restrictive regulation could stifle the genuine innovation AI might offer.

Perhaps models involving collaboration and fair compensation, such as licensing agreements between AI developers and original creators whose styles significantly inform the AI’s output, could offer a more equitable approach by ensuring the artists are able to monetise their creations.

This isn’t just about one studio or one AI tool. It’s about establishing principles for how AI and human creativity will coexist. As AI continues its rapid advance, we urgently need a broader societal dialogue to develop frameworks that foster responsible innovation while respecting and protecting the artists who inspire it.

© 2025 Suppiah & Partners. All rights reserved. The contents of this newsletter are intended for informational purposes only and do not constitute legal advice.

More Featured Articles

[Feature Article] Turbulence Ahead: Securing Our Skies in the Cyber Age

Turbulence Ahead: Securing Our Skies in the Cyber Age

Published by The Star on 27 Mar 2025

by Thulasy Suppiah, Managing Partner

The recent cyberattack targeting Malaysia Airports Holdings Berhad (MAHB), revealed by Prime Minister Anwar Ibrahim along with a hefty US$10 million ransom demand, is a stark reminder of the growing threats facing our aviation sector. While the Prime Minister’s decisive rejection of the ransom is commendable, the incident itself underscores a critical vulnerability: our skies, and the complex systems that manage them, are increasingly in the crosshairs of cybercriminals.

This isn’t just a Malaysian problem; it’s a global epidemic hitting the aviation industry. Consider the chaos at Japan Airlines following a cyberattack late in 2024, disrupting flights and stranding passengers. Then there were the disruptions at Indonesian airports just last June. And who could forget the widespread IT outage linked to CrowdStrike earlier that same year? Though not malicious, it grounded thousands of flights worldwide, starkly highlighting our critical dependence on interconnected digital systems. This vulnerability isn’t new either; cast your mind back to the massive data breach at Cathay Pacific back in 2018. The pattern is undeniable: these aren’t isolated incidents, but clear warning signs of systemic vulnerability across the global aviation network.

Why the surge? As airports, airlines, and air navigation systems embrace digital transformation – cloud computing, IoT integration, AI automation – their “attack surface” expands dramatically. This makes them irresistible targets for everyone from cybercrime syndicates seeking ransom to state-sponsored groups engaging in espionage, and even hacktivists looking to cause disruption. The very technologies designed to improve efficiency are creating new avenues for attack. The numbers paint a concerning picture. Industry data suggests the travel sector is already one of the most targeted, facing a high volume of cyberattacks. Experts predict this trend will only escalate in the coming years, with more sophisticated ransomware and supply chain attacks on the horizon.

We simply cannot afford to be reactive, waiting for the next major breach or disruption to occur. Prime Minister Anwar Ibrahim is right to call for increased resources and technological sophistication for our relevant agencies like the police and Bank Negara Malaysia to enhance cybersecurity preparedness. This proactive stance is essential. We need sustained investment in building robust defenses before disaster strikes.

This means adopting cutting-edge solutions. Experts recommend investing in AI-driven threat detection, implementing zero-trust security architectures (which assume no user or device is automatically trustworthy), leveraging real-time threat intelligence, and constantly adapting our security strategies to counter evolving tactics. We must foster a culture of cybersecurity awareness across the entire aviation ecosystem.

Protecting our airports and airlines isn’t just about preventing flight delays or financial losses; it’s fundamentally about national security, economic stability, and passenger safety. The digital threats are evolving at lightning speed; our defenses must evolve even faster. Let’s ensure Malaysia is prepared for the turbulence ahead.

© 2025 Suppiah & Partners. All rights reserved. The contents of this newsletter are intended for informational purposes only and do not constitute legal advice.

More Featured Articles

[Feature Article] Malaysia and Arm: Will This Chip Partnership Succeed?

Malaysia and Arm: Will This Chip Partnership Succeed?

Published on 23 March 2025

by Thulasy Suppiah, Managing Partner

Published by The Star on 20 Feb 2025

Malaysia’s ambitious partnership with Arm Holdings, aiming to catapult our nation into the ranks of chip designers, has sparked both excitement and a healthy dose of skepticism. While the government touts this US$250 million deal as a game-changer, the devil, as always, is in the details. And, at the moment, those details are remarkably murky.

The goal is laudable: to move Malaysia up the semiconductor value chain, from assembling and testing chips to designing them. Arm, a global leader in chip architecture, provides the blueprints, and we, theoretically, provide the innovation. But this isn’t our first rodeo. In 2007, a similar attempt to develop local chip production, involving a US$50-60 million investment in Japanese technology, ended in failure. Are we doomed to repeat the past?

This time, the government has secured seven specific IP licenses from Arm. While this is a significant step, questions remain about the selection process for these licenses. Greater transparency regarding the strategic rationale behind these specific acquisitions would be valuable for both the industry and the public. Understanding which capabilities these licenses unlock will be key to maximizing their potential.

Furthermore, a clear and well-defined implementation plan is crucial. While the ambition is clear, the specific roles and responsibilities of various government agencies involved, and the mechanisms for private sector collaboration, need further clarification. Without this clarity, there is a risk that this substantial investment might not deliver the desired outcomes.

The Arm partnership has the potential to be transformative. It could attract investment, create high-skilled jobs, and position Malaysia as a significant player in the global semiconductor market. The potential impact on our growing AI and data centre industries is also significant. But potential is not enough. We can look to the success of other nations that strategically used foreign direct investment (FDI) as a catalyst, not just for attracting capital, but for actively building capabilities within their local companies. These successful examples demonstrate that a well-managed partnership can indeed elevate a nation’s technological standing.

We need more than just press releases and optimistic projections. We need a transparent strategy, clear accountability, and meaningful engagement with industry stakeholders. The government must clearly articulate how this partnership will benefit Malaysian companies, how the acquired licenses will be utilized, and how success will be measured. Only then can we determine if this ambitious chip dream will become a reality or just another expensive lesson learned.

© 2025 Suppiah & Partners. All rights reserved. The contents of this newsletter are intended for informational purposes only and do not constitute legal advice.

More Featured Articles

Leveraging AI for Improved Road Care and Safety

Leveraging AI for Improved Road Care and Safety

By Thulasy Suppiah, Managing Partner of Suppiah & Partners, and Ramakrishna Damodharan of Robomy Sdn Bhd (https://robo.my/) a company which has developed AI solutions for road and highway maintenance and management.

While Peninsula Malaysia boasts excellent connectivity through its network of roads and expressways, some sectors are poorly maintained. Between 2022 and July 2024, the Road Accident Management System (RAMS) under the Works Ministry reported 181 road accidents caused by potholes, including 23 fatal ones. Of 223 accidents recorded in Selangor between 2018 and 2020 due to poor road conditions, 148 resulted in death.

In April last year, the Johor Baru Sessions court awarded RM721,000 to a 49-year-old man who suffered injuries when his motorcycle hit a pothole in 2021. This incident highlighted failures of state-appointed private companies to fulfil their road maintenance duties. Infrastructure management can be challenging, and traditional methods of road inspection, tedious and time consuming. Solutions are usually reactive. They result in bad road-patching practices, the use of inferior materials and ignore issues caused by water flow. 

Robomy, an AI R&D firm, emphasises that if properly executed, the use of AI in road infrastructure management could transform road safety in Malaysia. Through data analytics, computer vision, and advanced sensor technologies, AI-powered road assessment systems can provide real-time insights by processing large datasets within minutes. For instance, Robomy’s proprietary solution, Robolyze, is designed to monitor road conditions, detect defects such as potholes, cracks, and sunken patches, and even predict potential hazards. This provides proactive, cost-efficient solutions to inspect, monitor, and maintain roads. An important AI feature is its predictive capability, enabling strategic and preventive maintenance. Predictive analytics, a core component of one of Robomy’s products, allows early detection of road deterioration, optimising maintenance schedules, and reducing repair costs. This approach prevents catastrophic failures.

As our cities grow and road networks expand, the need for smart, innovative technologies to maintain road infrastructure efficiently has never been greater. AI can perform this role. In Singapore where manpower is limited, AI powered solutions help detect potholes, water ponding, slanted lamp posts, damaged traffic signs or grille covers, and broken manholes. Machine learning automatically detects defects from smartphone footage, grades their severity and highlights those in need of repairs. As a result, Singapore has one of the best maintained road networks in the world.

Robomy has brought similar innovations to Malaysia. Robolyze is tailored to address local challenges such as tropical weather impacts, varying road construction standards, and diverse urban-rural landscapes. It integrates cutting-edge AI capabilities, and allows real-time data processing directly from sensors and cameras installed on vehicles or road infrastructure.

 

This reduces reliance on centralized data centers, enhances response times, and ensures continuous monitoring even in remote areas.

As more organisations and state entities look to deploy AI in road infrastructure management, there are important legal considerations. Advancements in machine learning, computer vision, and use of autonomous vehicles and sensor technology raise issues related to data privacy, algorithmic transparency, liability and ethics.

While Malaysia has no clear AI regulatory framework or policy yet, stakeholders are required to analyse existing laws and regulations governing AI applications across various sectors.

The Ministry of Science, Technology, and Innovation (MOSTI) is responsible for establishing AI governance and launched the National Artificial Intelligence Roadmap 2021–2025 to address risks associated with AI; and in December 2024, the government established the National AI Office (NAIO) to drive AI-based digital transformation.

Meanwhile, the Ministry of Communications, as the implementer of the Communication and Multimedia Act (CMA), holds the legislative power and governs activities in digital spaces in addition to the hardware that enables their functions.

The Cyber Security Act 2024 addresses the management of cyber security threats and incidents related to the National Critical Information Infrastructure (NCII). This is particularly relevant as AI-driven road infrastructure applications—such as pothole management systems—require access to government-maintained databases, including mapping systems, traffic flow data, and road maintenance records at both Federal and State levels. Ensuring secure and authorized access to these databases is crucial to prevent cyber threats that could compromise public safety.

From a contractual standpoint, AI-powered road management solutions must align with the Contracts Act 1950, particularly in defining liability, accountability, and transparency in AI decision-making. Key legal considerations include the enforceability of AI-generated contracts, the attribution of liability for erroneous AI-driven maintenance recommendations, and the need to ensure fairness in automated decision-making processes, such as prioritizing road repairs without bias or undue influence.

Furthermore, AI-powered pothole detection and predictive maintenance systems process vast amounts of personal data, including vehicle movement patterns, dashcam feeds, and geolocation data. The Personal Data Protection Act 2010 (PDPA) remains the primary legislation regulating the processing of personal data in commercial transactions in Malaysia.

Any entity deploying AI in road infrastructure must comply with the seven Personal Data Protection Principles, ensuring data security, informed consent, and lawful processing of personal information. Compliance with these legal frameworks is essential to ensure AI-driven road infrastructure applications operate transparently, fairly, and within Malaysia’s regulatory landscape.

AI is set to transform road infrastructure by enabling smarter, more efficient, and proactive maintenance solutions. From detecting potholes before they become hazards to optimizing repair schedules based on real-time data, AI enhances road safety and resource management. By integrating AI into road care, authorities and stakeholders can reduce costs, minimize disruptions, and improve overall road conditions for the public. At the same time, the legal landscape must evolve to support this shift—ensuring clear contractual frameworks with AI solution providers, addressing accountability in automated decision-making, and mitigating risks such as data security concerns. With the right balance of innovation and regulatory safeguards, AI-driven road infrastructure can pave the way for safer, more sustainable transportation networks.

© 2025 Suppiah & Partners. All rights reserved. The contents of this newsletter are intended for informational purposes only and do not constitute legal advice.

More Newsletter

Charting a Course for an Inclusive Digital Malaysia

Ethical AI: Charting a Course for an Inclusive Digital Malaysia

By Thulasy Suppiah, Managing Partner of Suppiah & Partners

Malaysia’s burgeoning AI landscape, from data centres to rapidly developing technologies, holds immense promise. Realising this potential, however, requires navigating complex challenges – infrastructure needs, skills gaps, and data security concerns, among others. Critically, we must also address the ethical dimensions of AI, ensuring this powerful technology serves all Malaysians equitably. We can chart a more inclusive, ethical, and prosperous digital future by focusing on a core set of guiding principles, adopted and applied appropriately across all levels of our society.

Fortunately, Malaysia doesn’t need to reinvent the wheel. Robust ethical frameworks for AI already exist. The UNESCO Recommendation on the Ethics of Artificial Intelligence provides a global blueprint, while the ASEAN Guide on AI Governance and Ethics offers a practical, regional perspective. MOSTI’s own National Guidelines on AI Governance and Ethics tailors these principles to our Malaysian context. Building upon these solid foundations, the following ethical pillars should guide our national approach, embraced by all stakeholders:

FOUNDATIONS OF ETHICAL AI – THREE KEY SOURCES

WHAT FRAMEWORKS CAN GUIDE ETHICAL AI DISCUSSIONS IN MALAYSIA?

[2022] UNESCO RECOMMENDATION ON THE ETHICS OF ARTIFICIAL INTELLIGENCE

A global framework that promotes fairness, transparency, and accountability while providing guidelines to protect human dignity and fundamental rights.

[2024] ASEAN GUIDE ON AI GOVERNANCE AND ETHICS

A region-specific guide that aligns AI practices with Southeast Asian values and offers practical steps for ethical AI governance and deployment.

[2024] MALAYSIA’S NATIONAL GUIDELINES ON AI GOVERNANCE AND ETHICS (MOSTI)

A local framework that adapts international principles to Malaysia’s context, offering voluntary guidance on ethical AI practices.

MALAYSIA’S ETHICAL AI PILLARS

WHAT CORE PRINCIPLES THAT CAN GUIDE MALAYSIA’S AI JOURNEY?

HUMAN-CENTRICITY

AI should serve humanity, not replace it. This fundamental principle emphasizes prioritising human well-being, dignity, and agency. We must ensure AI systems enhance human capabilities, not diminish them, and that individuals retain control over decisions that significantly impact their lives.

FAIRNESS & NON-DISCRIMINATION

AI systems must be free from bias, ensuring equitable outcomes for all Malaysians. This requires careful attention to data quality, algorithmic design, and ongoing monitoring to prevent perpetuating or exacerbating existing inequalities.

TRANSPARENCY & EXPLAINABILITY

Trust is built on understanding. AI systems should be understandable, allowing individuals to comprehend how decisions are made and providing avenues to challenge those outcomes. "Black box" algorithms erode trust and should be avoided if possible.

PRIVACY & SECURITY

Protecting personal data in our increasingly data-driven world is paramount. Robust data security measures and strict adherence to privacy regulations are non-negotiable.

ACCOUNTABILITY, RELIABILITY, SAFETY, AND CONTROL

Clear lines of responsibility are essential, encompassing the reliability and safety of AI systems. When AI systems cause harm, those responsible must be identifiable and held accountable. This necessitates robust oversight mechanisms and a commitment to building systems that operate as intended, minimising unintended consequences.

By embracing these ethical principles, Malaysia can unlock the transformative potential of AI while safeguarding the well-being of all its citizens. This is not solely the government’s responsibility; it requires continuous dialogue, collaboration, and a shared commitment to ethical awareness across all sectors – from industry and academia to civil society and individual citizens. Only through this collective effort can we ensure that AI contributes to a more just and prosperous future for all Malaysians.

© 2025 Suppiah & Partners. All rights reserved. The contents of this newsletter are intended for informational purposes only and do not constitute legal advice.

More Newsletter

[Feature Article] A Greener Cloud for Malaysia?

A Greener Cloud for Malaysia?

Published by The Star on 6 Mar 2025

by Thulasy Suppiah, Managing Partner

Data centers are the backbone of our digital world, but their insatiable hunger for energy presents a growing challenge for Malaysia. As our nation becomes a data center hub, attracting significant investment and promising economic growth, we must confront a critical question: how can we power this digital revolution sustainably?

Data centers are energy intensive, consuming far more power per square foot than typical commercial buildings. This poses a significant strain on our energy resources, particularly as demand continues to surge. Research from Kenanga projects data center electricity demand in Malaysia could exceed a staggering 5,000MW by 2035—equivalent to 20% of our total generating capacity. This projection highlights the potential for data centers to become a major consumer of electricity, raising concerns about our ability to meet this growing demand sustainably.

While the economic benefits of data centers are undeniable, we cannot afford to ignore their environmental impact. Attracting investment should not come at the expense of our long-term sustainability goals. A balanced approach is required, one that prioritizes both economic growth and environmental responsibility.

What concrete steps can we take? Firstly, the industry must embrace energy efficiency. This means implementing advanced cooling technologies, optimizing server utilization, and leveraging AI-powered energy management systems. We also need to accelerate the integration of renewable energy sources, exploring innovative solutions like incorporating data centers into smart grids, enabling them to act as energy storage facilities.

Secondly, we need a more comprehensive approach to environmental impact assessments. Current assessments often overlook the long-term effects of data center construction and the considerable carbon footprint of server production. We need robust regulations that address these often-hidden environmental costs, including responsible resource management and e-waste recycling.

Finally, and perhaps most importantly, we need collaboration. Government agencies, energy providers, data center operators, and environmental experts must work together to develop a sustainable framework for data center growth in Malaysia. While the Malaysian Investment Development Authority (MIDA) Guideline for Sustainable Development of Data Centres provides a solid framework, continued efforts are needed to ensure its effective implementation and to foster a collaborative approach to sustainable data center development in Malaysia. This framework should include clear guidelines, incentives for sustainable practices, and transparent reporting of energy consumption and emissions.

Malaysia has the potential to become a regional leader in sustainable data center development. However, this requires a shift in mindset. We must move beyond simply attracting investment and focus on building a truly sustainable digital ecosystem. By prioritizing energy efficiency, renewable energy integration, and responsible environmental practices, we can power the digital future without compromising the health of our planet.

© 2025 Suppiah & Partners. All rights reserved. The contents of this newsletter are intended for informational purposes only and do not constitute legal advice.

More Featured Articles

[BM] Pemakluman Perkhidmatan Masyarakat

Pemakluman Perkhidmatan Masyarakat

SCAM: Cara-Cara Untuk Tidak Tertipu (Dengan Pengetahuan Undang-Undang)

Makluman khidmat masyarakat ini dibawakan kepada anda oleh: Suppiah & Partners

Apakah scam?

Skim penipuan yang direka untuk menipu seseorang. Biasanya, matlamat utama penipu adalah keuntungan kewangan atau maklumat peribadi.

Menurut Gogolook, syarikat teknologi amanah terkemuka, Malaysia kehilangan sejumlah RM 54 Bilion (3% daripada KDNK Malaysia) akibat penipuan dalam setahun. Penyelidikan menunjukkan kira-kira 70% mangsa penipuan tidak melaporkan kes mereka kepada pihak berkuasa.

Bagaimanakah scam selalunya dilakukan?

E-MEL

Anda mungkin menganggap e-mel yang anda terima hanyalah e-mel biasa, tetapi dalam dunia digital hari ini, anda boleh terjebak dengan penipuan hanya dengan membalas e-mel anda.

E-mel scam ini selalunya kelihatan seperti e-mel biasa yang anda terima setiap hari, tetapi sebenarnya maklumat peribadi anda seperti butiran perbankan, kata laluan atau data peribadi yang lain sedang dicuri.

Salah satu jenis e-mel scam yang biasa digunakan adalah ‘email phishing’. E-mel jenis ini berpura-pura menjadi organisasi yang sah, menggesa anda untuk bertindak balas dengan cepat.

Contoh:

  1. E-mel Phishing daripada “Bank”
    E-mel yang mendakwa ia daripada bank akan menggesa anda untuk klik pautan bagi melindungi akaun anda atau akaun anda akan disekat.
  2. KWSP atau Penipuan Bayaran Balik Cukai
    E-mel atau panggilan palsu yang menyatakan anda layak untuk pengeluaran KWSP atau bayaran balik cukai LHDN, meminta anda memberikan butiran peribadi.
  3. Penipuan Cinta
    Penipu pada aplikasi temu janji atau media sosial berpura-pura menjalinkan hubungan sebelum meminta wang kerana “kecemasan keluarga” atau alasan lain.

Cara-cara mengesan scam

  1. Semak Alamat E-mel (Spoofing)
    Scammer sering menggunakan alamat e-mel palsu atau mencurigakan yang kelihatan serupa dengan alamat e-mel sebenar. Sentiasa semak e-mel pengirim dengan teliti. Jika ia daripada bank atau syarikat, sahkan e-mel rasmi di laman web mereka. Jika ia daripada seseorang yang anda kenali, hubungi mereka untuk mengesahkan.

    E-mel yang sah:
    moneybank@gmail.com
    E-mel penipu:
    m0neybank@gmail.com

  2. Mendesak
    E-mel penipuan selalunya cuba untuk membuat anda panik. Mereka mungkin mengatakan akaun anda akan dikunci atau anda mesti bertindak segera. Ini adalah helah untuk membuat anda bertindak tanpa berfikir. Pastikan anda bertenang dan sahkan informasi sebelum melakukan apa-apa.
  3. Invois Palsu dan Permintaan Pembayaran
    Tujuan utama scammer adalah wang. Berhati-hati dengan e-mel yang meminta pembayaran atau invois. Sentiasa semak semula sebelum membuat sebarang pemindahan wang.
  4. Bahasa dan Tatabahasa yang lemah
    Organisasi yang sah akan menggunakan tatabahasa dan bahasa profesional yang betul dalam e-mel mereka. E-mel penipuan selalunya mempunyai kesilapan menaip, frasa pelik atau ayat janggal—sesuatu yang orang ramai cenderung untuk terlepas pandang.

PANGGILAN TELEFON

Scam melalui panggilan telefon dibuat untuk menipu seseorang untuk mendedahkan maklumat sensitif mereka.

Pada masa yang maju ini, setiap rekayat di Malaysia pasti pernah mendapat panggilan scam.

Panggilan ini boleh datang melalui telefon peribadi anda atau pun telefon pejabat anda.

Penipu biasanya mendapat nombor telefon anda daripada kebocoran data, laman web syarikat anda atau platform media sosial seperti Facebook atau LinkedIn.

Contoh:

Panggilan telefon daripada nombor yang tidak dikenali memberitahu tentang aktiviti haram yang dipautkan ke nombor telefon anda.

  1. Panggilan Telefon daripada “Pegawai Bank”
    Pemanggil yang berpura-pura menjadi wakil bank, memberi amaran kepada anda tentang transaksi yang tidak dibenarkan dan meminta butiran perbankan anda untuk “menyelesaikan isu.”
  2. Panggilan Polis atau SPRM Palsu
    Pemanggil yang berpura-pura menjadi polis, SPRM atau Bank Negara, mendakwa anda terlibat dalam jenayah dan mesti memindahkan wang untuk “tujuan penyiasatan.”
  3. Penipuan Amal Jariah
    Mesej atau panggilan meminta derma untuk badan amal yang menggunakan cerita emosi untuk menekan orang ramai supaya memindahkan wang.

Cara-cara mengesan scam

  1. Nombor Tidak Diketahui
    Scammer biasanya membuat panggilan daripada nombor yang anda tidak kenali. Mereka melakukan ini untuk mengelakkan pengesanan dan diblok. Berhati-hati jika anda menerima panggilan daripada nombor yang tidak dikenali.
  2. Menyamar sebagai Organisasi
    SebenarPenipu sering berpura-pura menjadi daripada organisasi yang dipercayai seperti LHDN atau bank kerana orang ramai lebih cenderung mempercayainya. Jika anda menerima panggilan yang mendakwa sebagai daripada syarikat atau badan kerajaan, sahkan ia sebelum berkongsi sebarang butiran.
  3. Mewujudkan Rasa Terdesak
    Mereka akan cuba membuat anda panik dengan mengatakan terdapat masalah—seperti transaksi yang mencurigakan, bil tidak dibayar atau masalah undang-undang. Matlamat mereka adalah untuk menekan anda supaya bertindak balas dengan cepat tanpa berfikir.
  4. Meminta Maklumat Peribadi
    Syarikat yang sah tidak akan meminta butiran perbankan anda, kata laluan atau OTP melalui telefon. Jika pemanggil meminta ini, ia adalah satu penipuan. Tutup telefon segera.
  5. Gunakan Aplikasi ID Pemanggil
    Alat yang berguna untuk membantu mengenal pasti nombor yang tidak dikenali ialah aplikasi Whoscall, yang boleh anda muat turun pada telefon anda. Ia membantu mengesan dan menyekat kemungkinan panggilan penipuan.

WHATSAPP

Anda tidak perlu memberikan seseorang nombor telefon anda untuk mereka memilikinya.

Hampir semua rakyat Malaysia menggunakan aplikasi WhatsApp untuk berbual tentang hal-hal peribadi, kerja, atau komunikasi bersama universiti kerana ia adalah percuma, cekap dan mudah untuk digunakan. Ini merupakan sebab utama sasaran scammer.

Scammer sering mendapat nombor telefon daripada kebocoran data atau platform media sosial seperti Facebook atau LinkedIn.

Contoh:

Mesej yang dihantar daripada nombor yang tidak dikenali tentang memenangi hadiah atau mesej daripada orang tersayang yang meminta bantuan.

  1. Penipuan Penghantaran Bungkusan
    Mesej atau panggilan yang mendakwa bungkusan anda tersekat di kastam atau memerlukan bayaran tambahan sebelum ia boleh dikeluarkan.
  2. Penipuan Tawaran Kerja
    Mesej yang menawarkan pekerjaan bergaji tinggi dengan kerja minimum, memerlukan anda membayar “yuran pemprosesan” terlebih dahulu.
  3. WhatsApp di hijack
    Seorang penipu yang berpura-pura menjadi rakan atau ahli keluarga, meminta kod pengesahan yang dihantar ke telefon anda untuk mendapatkan akses ke akaun WhatsApp anda.

Cara-cara mengesan scam

  1. Mesej dari nombor yang tidak diketahui
    Scammer sering menghubungi anda daripada nombor yang tidak dikenali. Jika anda menerima mesej daripada nombor yang tidak dikenali, berhati- hati— terutamanya jika mereka meminta butiran peribadi atau wang.
  2. Mewujudkan rasa terdesak
    Scammer akan cuba membuat anda panik dengan mengatakan sesuatu yang mendesak— seperti masalah dengan akaun bank anda, hadiah yang mesti anda tuntut dengan segera, atau rakan yang menghadapi masalah. Mereka mahu anda bertindak pantas tanpa berfikir.
  3. Menyamar sebagai seseorang yang anda kenali
    Helah biasa mereka ialah berpura-pura menjadi rakan atau ahli keluarga yang telah “menukar nombor telefon mereka.” Mereka mungkin meminta wang atau maklumat sensitif. Sentiasa sahkan dengan menghubungi rakan tersebut secara langsung sebelum membalas.
  4. Panduan scam WhatsApp
    WhatsApp sediakan sumber rasmi tentang cara mengenali dan mengelakkan scam.

Anda boleh mengetahui tentang mesej yang mencurigakan, fail palsu dan petua untuk kekal selamat di sini:

https://faq.whatsapp.com/2286952358121083

Bagaimanakah Cara Untuk Mengelakkan Scam (Organisasi)

Latihan Pekerja
Cara terbaik untuk mencegah penipuan adalah melalui latihan yang betul. Syarikat harus mendidik pekerja tentang mengenali dan bertindak balas terhadap scam.

Mengadakan Bengkel Anti-Scam
Anjurkan bengkel di mana ahli profesional, seperti peguam atau wakil daripada NSRC, boleh mengajar pekerja cara mengenal pasti dan mengendalikan scam. Contoh praktikal dan kajian kes kehidupan sebenar boleh menjadikan pembelajaran lebih berkesan.

Peringatan
Orang ramai cenderung lupa dari semasa ke semasa. Oleh itu, peringatan harus kerap diberi. Gunakan e-mel atau media sosial syarikat untuk memastikan pekerja mengetahui taktik scam terkini.

Galakkan Budaya Berhati-hati
Biasakan pekerja untuk mengesahkan permintaan luar biasa, terutamanya yang melibatkan pembayaran atau maklumat peribadi. Semakan semula dengan jabatan berkaitan boleh mengelakkan kerugian besar.

Perkara yang Perlu Dilakukan Jika E-mel atau Identiti Organisasi Anda Disalahgunakan Oleh Scammer

Bertenang dan Bertindak Pantas
Menjadi sasaran scammer boleh meresahkan, tetapi panik tidak akan membantu. Perkara utama ialah bertindak balas dengan pantas dan berkesan.

Laporkan Dengan Segera
Jika e-mel atau identiti organisasi anda telah disalahgunakan dalam scam, ambil tindakan segera:

  • Hubungi talian hotline bank anda (tersedia 24/7) jika butiran kewangan terlibat.
  • Hubungi Pusat Tindak Balas Penipuan Nasional (NSRC) di 997 untuk mendapatkan bimbingan.
  • Ikut arahan mereka, yang mungkin termasuk memfailkan laporan polis.

Makluman Pekerja dan Pelanggan
Scammer boleh sambung menyasarkan organisasi anda, jadi adalah penting untuk memaklumkan kepada orang lain:

  • Beritahu HR untuk mengeluarkan amaran dalaman kepada pekerja.
  • Terbitkan notis awam di laman web dan media sosial untuk memberi amaran kepada pelanggan.
  • Nasihatkan pekerja supaya lebih berhati-hati dengan e-mel atau panggilan yang mencurigakan.

Dapatkan Nasihat Undang-undang
Jika anda tidak pasti bagaimana untuk mengendalikan keadaan, minta nasihat peguam. Peguam dapat membimbing anda tentang langkah yang perlu dilakukan, seperti mengambil tindakan undang-undang terhadap penipu atau melaksanakan langkah keselamatan siber yang lebih kukuh.

Apa yang tidak patut dilakukan?

Jangan panik
Perkara paling buruk yang boleh anda lakukan adalah panik. Apabila kita tertekan, kita tidak berfikir dengan jelas, dan itulah yang dimahukan oleh scammer. Tarik nafas dalam-dalam dan balas dengan berhati-hati.

Jangan Terlibat dengan scammer
Sesetengah orang, terutamanya individu yang lebih muda, mungkin menganggap ia menyeronokkan untuk bertindak balas dengan scammer. Tetapi scammer yang mahir pasti akan dapat mengekstrak maklumat tanpa anda sedari. Tindakan paling selamat adalah mengabaikan dan menyekat mereka.

Jangan berdiam diri
Ramai orang berasa malu, takut akan akibatnya, atau menganggap tiada peluang untuk memulihkan kerugian mereka selepas discam. Tetapi membuat laporan adalah penting—bukan sahaja untuk potensi pemulihan tetapi juga untuk memberi amaran kepada orang lain dan menghalang scam tersebut daripada berulang.


Dengan mengambil langkah yang betul dan menyebarkan kesedaran, anda boleh membantu melindungi diri anda dan organisasi anda.

Apakah Undang-undang yang Boleh Melindungi Anda?

  1. Akta Komunikasi dan Multimedia 1998 (CMA)
    Seksyen 233: Menangani penggunaan tidak wajar kemudahan atau perkhidmatan rangkaian. Ia menjenayahkan tindakan seperti menggunakan perkhidmatan rangkaian untuk menghantar kandungan palsu, tidak senonoh, lucah atau menyinggung perasaan dengan niat untuk menjengkelkan, menyalahgunakan, mengancam atau mengganggu orang lain.
    Penalti: Pesalah boleh didenda sehingga RM50,000, penjara sehingga setahun, atau kedua-duanya sekali.
  2. Akta Perlindungan Data Peribadi 2010 (PDPA)
    Tujuan: Mengawal pemprosesan data peribadi dalam transaksi komersial, memastikan privasi dan perlindungan data.
    Penalti: Ketidakpatuhan boleh mengakibatkan denda antara RM100,000 hingga RM500,000, penjara satu hingga tiga tahun, atau kedua-duanya sekali.
  3. Akta Jenayah Komputer 1997 (CCA)
    Seksyen 3: Menjenayah akses tanpa kebenaran kepada bahan komputer, biasanya dirujuk sebagai “penggodaman.”
    Seksyen 5: Menangani pengubahsuaian tanpa kebenaran kandungan komputer, seperti memperkenalkan perisian hasad atau virus.
    Penalti: Individu yang disabitkan kesalahan boleh didenda sehingga RM50,000, penjara sehingga lima tahun, atau kedua-duanya sekali.
  4. Kanun Keseksaan
    Seksyen 416: Meliputi “penipuan dengan penyamaran,” yang terpakai pada penipuan pancingan data yang mana individu menipu orang lain dengan berpura-pura menjadi orang lain.
    Penalti: Boleh dihukum penjara sehingga lima tahun, denda, atau kedua-duanya sekali. Undang-undang ini secara kolektif bertujuan untuk melindungi rakyat Malaysia daripada pelbagai bentuk jenayah siber. Jika anda percaya anda telah disasarkan atau terjejas oleh penipuan siber, adalah penting untuk melaporkan kejadian itu kepada pihak berkuasa yang berkaitan dengan segera.

Perkara yang Perlu Dilakukan Jika Anda Discam

Jika anda ditarget oleh scammer, mengambil tindakan pantas boleh membantu anda meminimumkan kerosakan dan meningkatkan peluang baikpulih. Berikut ialah perkara yang perlu anda lakukan:

Bertenang dan Proses Situasi Tersebut
Jangan panik. Scammer bergantung pada ketakutan dan kekeliruan untuk memanipulasi mangsa. Luangkan masa untuk memproses apa yang telah berlaku.

Laporkan Kejadian dengan Segera
Jika terdapat penglibatan wang, hubungi talian hotline bank anda dengan segera untuk menyekat transaksi dan melindungi akaun anda.
Hubungi Pusat Tindak Balas Scam Nasional (NSRC) di 997, yang beroperasi setiap hari dari 8 pagi hingga 8 malam, untuk bantuan dalam melaporkan dan mengendalikan kes scam.
Failkan laporan polis di balai polis terdekat untuk mendokumentasikan scam tersebut dan menyokong sebarang kemungkinan siasatan.

Lindungi Maklumat Peribadi Anda
Jika anda berkongsi butiran sensitif seperti kata laluan atau maklumat perbankan, tukar kata laluan anda dengan segera dan aktifkan pengesahan dua faktor (2FA) untuk keselamatan tambahan.
Beritahu majikan anda jika e-mel kerja atau butiran syarikat anda telah terjejas.

Beri Amaran kepada Orang Lain
Maklumkan kepada rakan sekerja dan pelanggan jika nama, e-mel atau organisasi anda telah disalahgunakan dalam scam untuk mengelakkan mangsa selanjutnya.
Keluarkan makluman kepada syarikat anda dan notis awam di laman web dan media sosial anda jika perlu.

Dapatkan Nasihat Undang-undang
Sesetengah scam mungkin melibatkan pencurian identiti, penipuan atau penyalahgunaan maklumat syarikat. Jika anda tidak pasti tentang langkah seterusnya atau memerlukan panduan tentang tindakan undang-undang, nasihat daripada paguam adalah langkah yang paling baik.

Kami dari Suppiah & Partners bersedia untuk membantu anda. Hubungi kami untuk mendapatkan nasihat undang-undang pakar dan tindakan terbaik untuk melindungi hak anda daripada insiden tersebut.

Mengambil tindakan segera boleh membuat perubahan dalam mencegah kerugian selanjutnya dan melindungi diri anda atau organisasi anda. Sentiasa berwaspada dan sentiasa sahkan sebelum membalas mesej atau panggilan yang mencurigakan.

Rujukan

  1. Akta Komunikasi dan Multimedia 1998: Akta untuk mengadakan peruntukan tentang dan mengawal selia
    industri komunikasi dan multimedia yang menjurus ke arah percantuman dan perkara-perkara yang
    bersampingan dengannya.
  2. Akta Perlindungan Data Peribadi 2010: Akta untuk mengawal selia pemprosesan data peribadi dalam
    transaksi komersial dan untuk mengadakan peruntukan bagi perkara-perkara yang berkaitan dan
    bersampingan dengannya.
  3. Akta Jenayah Komputer 1997: Akta untuk mengadakan peruntukan bagi kesalahan berhubungan dengan
    penyalahgunaan komputer.
  4. Kanun Keseksaan: Akta berkenaan dengan kesalahan-kesalahan jenayah.
  5. Statistik Scam: https://www.malaymail.com/news/malaysia/2024/10/03/scam-epidemic-malaysians-lose
    us128b-annually-equivalent-to-3pc-of-gdp-amid-rising-ai-threats/152485
  6. Scoop: https://www.scoop.my/news/246047/agong-wants-to-combat-red-tape-culture/

© 2025 Suppiah & Partners. Semua hak terpelihara. Kandungan surat berita ini bertujuan untuk tujuan maklumat sahaja dan tidak membentuk nasihat undang-undang.

Lihat Lebihan Artikel

[EN] Community / Public Service Alert

Community / Public Service Alert

SCAM: The Art of Not Getting Fooled (With Legal Know-How)

This community service alert is brought to you by: Suppiah & Partners

What Are “Scams”?

Scams are fraudulent schemes designed to deceive someone. Usually, the scammer’s main goal is monetary gain or personal information.

According to Gogolook, the leading trust tech company, Malaysia is losing a total of RM 54 Billion (3% of Malaysia’s GDP) to scams in a year. Research indicates some 70% of scam victims do not report their cases to authorities.

How Are Scams Usually Carried Out?

EMAILS

You might think the emails you receive are just regular emails, but in today’s digital world, you could fall for a scam just by replying.

Scam emails often look like normal emails you get every day, but they are actually trying to steal your personal information—such as your banking details, passwords, or other private data.

One common type of scam email is a phishing email. These emails pretend to be from a legitimate organization, urging you to respond quickly.

Examples:

  1. Phishing Emails from “Banks”
    An email claiming to be from your bank, urging you to click a link to secure your account or risk it being restricted.
  2. EPF or Tax Refund Scams
    Fake emails or calls claiming you are eligible for an EPF withdrawal or an LHDN tax refund, asking you to provide personal details.
  3. Love or Romance Scam
    Scammers on dating apps or social media pretending to form a relationship before asking for money due to a “family emergency” or other excuses.

How can we spot them?

  1. Check the Email Address (Spoofing)
    Scammers often use fake or suspicious email addresses that look similar to real ones. Always check the sender’s email carefully. If it’s from a bank or company, verify the official email on their website. If it’s from someone you know, call them to confirm.

    Legitimate Email:
    moneybank@gmail.com
    Scammer email:
    m0neybank@gmail.com

  2. Sense of Urgency
    Scam emails often try to make you panic. They might say your account will be locked or that you must act immediately. This is a trick to make you act without thinking. Stay calm and verify before doing anything.
  3. Fake Invoices and Payment Requests
    Many scammers are after one thing—money. Be extra cautious with emails asking for payments or invoices. Always double-check before making any transfers.
  4. Poor Language and Grammar
    Legitimate organizations use proper grammar and professional language in their emails. Scam emails often have typos, weird phrasing, or awkward sentences—something people tend to overlook.

PHONE CALLS

Scam phone calls are made to trick people into revealing their sensitive information.

By now, almost everyone has received a scam call at least once in their life.

These calls can come through your personal phone or even your office phone.

Scammers usually get your phone number from data leaks, your company’s website, or social media platforms like Facebook or LinkedIn.

Examples:

A phone call from an unknown number calling about an illegal activity linked to your phone number.

  1. Phone Calls from “Bank Officers” 
    A caller pretending to be from your bank, warning you about unauthorized transactions and asking for your banking details to “fix the issue.”
  2. Fake Police or MACC Calls
    A caller pretending to be from the police, MACC, or Bank Negara, claiming you are involved in a crime and must transfer money for “investigation purposes.”
  3. Fake Charity Scams
    Messages or calls asking for donations for a supposed charity, often using emotional stories to pressure people into transferring money.

How can we spot them?

  1. Unknown Numbers
    Scammers usually call from numbers you don’t recognize. They do this to avoid detection and blocking. If you receive a call from an unfamiliar number, be cautious.
  2. Impersonating
    Real Organizations
    Scammers often pretend to be from trusted organizations like LHDN or banks because people are more likely to believe them. If you get a call claiming to be from a company or government body, verify it before sharing any details.
  3. Creating a Sense of Urgency
    They will try to make you panic by saying there’s a problem—like suspicious transactions, unpaid bills, or legal trouble. Their goal is to pressure you into reacting quickly without thinking.
  4. Asking for Personal Information
    Legitimate companies will never ask for your banking details, passwords, or OTP over the phone. If a caller requests this, it’s a scam. Hang up immediately.
  5. Use Caller ID Apps
    A useful tool to help identify unknown numbers is the Whoscall app, which you can download on your phone. It helps detect and block potential scam calls.

WHATSAPP

You don’t have to give someone your phone number for them to have it.

Almost all Malaysians use WhatsApp for personal chats, work, or even university communication because it’s free, efficient, and easy to use. That’s exactly why scammers target it.

Scammers often get phone numbers from data leaks or social media platforms like Facebook or LinkedIn.

Examples:

A message sent from an unknown number about winning a prize or a message from a loved one asking for help.

  1. Parcel Delivery Scams
    A message or call claiming your parcel is stuck at customs or needs additional payment before it can be released.
  2. Job Offer Scams
    Messages offering high-paying jobs with minimal work, requiring you to pay a “processing fee” upfront.
  3. WhatsApp Hijacking
    A scammer pretending to be a friend or family member, asking for a verification code sent to your phone to gain access to your WhatsApp account.

How can we spot them?

  1. Messages from Unknown Numbers
    Scammers often contact you from numbers you don’t recognize. If you receive a message from an unknown number, be cautious—especially if they ask for personal details or money.
  2. Creating a Sense of Urgency
    Scammers try to make you panic by saying something urgent—like a problem with your bank account, a prize you must claim immediately, or a friend in trouble. They want you to act fast without thinking.
  3. Impersonating Someone You Know
    A common trick is pretending to be a friend or family member who has “changed their number.” They might ask for money or sensitive information. Always verify by calling the person directly before responding.
  4. WhatsApp Scam Awareness Guides
    WhatsApp provides official resources on how to recognize and avoid scams. You can learn about suspicious messages, fake files, and tips for staying safe here:

    https://faq.whatsapp.com/2286952358121083

 

How To Avoid Scams (for Employees in Organisations)?

Employee Training
The best way to prevent scams is through proper training. Companies should educate employees on recognizing and responding to scams.

Conduct Anti-Scam Workshops
Organize workshops where professionals, such as lawyers or representatives from NSRC, can teach employees how to identify and handle scams. Practical examples and real-life case studies can make learning more effective.

Regular Reminders
People tend to forget over time, so it’s important to send regular reminders. Use emails, internal newsletters, or the company’s social media to keep employees aware of the latest scam tactics.

Encourage a Culture of Caution
Make it a habit for employees to verify unusual requests, especially those involving payments or personal information. A simple double-check with the relevant department can prevent major losses.

What to Do if Your Organization’s Email or Identity Is Misused in a Scam

Stay Calm and Act Quickly
Being targeted by a scam can be distressing, but panicking won’t help. The key is to respond swiftly and effectively.

Report It Immediately
If your organization’s email or identity has been misused in a scam, take immediate action:

  • Contact your bank’s hotline (available 24/7) if financial details were involved.
  • Call the National Scam Response Centre (NSRC) at 997 for guidance.
  • Follow their instructions, which may include filing a police report.

Alert Employees and Clients
Scammers may continue targeting your organization, so it’s crucial to inform others:

  • Notify HR to issue an internal alert to employees.
  • Publish a public notice on your website and social media to warn clients.
  • Advise employees to be extra cautious about suspicious emails or calls.

Seek Legal Advice
If you’re unsure how to handle the situation, consult a lawyer. Legal counsel can guide you on necessary steps, such as taking legal action against fraudsters or implementing stronger cybersecurity measures.

What Not To Do?

Don’t Panic
The worst thing you can do is panic. When we’re stressed, we don’t think clearly, and that’s exactly what scammers want. Take a deep breath and respond carefully.

Don’t Engage with Scammers
Some people, especially younger individuals, may think it’s fun to play along when they recognize a scam. But experienced scammers are skilled at extracting information without you even realizing it. The safest approach is to ignore and block them.

Don’t Stay Silent
Many people feel embarrassed, afraid of consequences, or assume there’s no chance of recovering their losses after being scammed. But reporting is crucial—not only for potential recovery but also to warn others and prevent the scam from happening again.

By taking the right steps and spreading awareness, you can help protect yourself and others.

Are There Laws to Protect You?

  1. Communications and Multimedia Act 1998 (CMA)
    Section 233: Addresses the improper use of network facilities or services. It criminalizes actions such as using network services to transmit false, indecent, obscene, or offensive content with the intent to annoy, abuse, threaten, or harass others.
    Penalties: Offenders may face fines up to RM50,000, imprisonment for up to one year, or both.
  2. Personal Data Protection Act 2010 (PDPA)
    Purpose: Regulates the processing of personal data in commercial transactions, ensuring data privacy and protection.
    Penalties: Non-compliance can result in fines ranging from RM100,000 to RM500,000, imprisonment for one to three years, or both.
  3. Computer Crimes Act 1997 (CCA)
    Section 3: Criminalizes unauthorized access to computer material, commonly referred to as “hacking.”
    Section 5: Addresses unauthorized modification of computer contents, such as introducing malware or viruses.
    Penalties: Convicted individuals may face fines up to RM50,000, imprisonment for up to five years, or both.
  4. Penal Code
    Section 416: Covers “cheating by impersonation,” applicable to phishing scams where individuals deceive others by pretending to be someone else.
    Penalties: Punishable by imprisonment of up to five years, a fine, or both.

These laws collectively aim to protect Malaysians from various forms of cybercrime. If you believe you’ve been targeted or affected by a cyber scam, it’s crucial to report the incident to the relevant authorities promptly.

What to Do If You (Individual) Fall Victim to a Scam

If you’ve been targeted by a scam, taking quick action can help minimize the damage and improve your chances of recovery. Here’s what you should do:

Stay Calm and Assess the Situation

  • Do not panic. Scammers rely on fear and confusion to manipulate victims. Take a moment to evaluate what has happened.

Report the Incident Immediately

  • If money was involved, contact your bank’s hotline immediately to block transactions and secure your account.
  • Call the National Scam Response Centre (NSRC) at 997, available daily from 8 AM to 8 PM, for assistance in reporting and handling scam cases.
  • File a police report at your nearest police station to document the scam and support any potential investigation.

Secure Your Personal Information

  • If you shared sensitive details like passwords or banking information, change your passwords immediately and enable two-factor authentication (2FA) for added security.
  • Notify your employer if your work email or company details were compromised.

Warn Others

  • Inform colleagues and clients if your name, email, or organization has been misused in a scam to prevent further victims.
  • Issue an internal alert within your company and a public notice on your website and social media if necessary.

Seek Legal Advice

  • Some scams may involve identity theft, fraud, or misuse of company information. If you’re unsure about your next steps or need guidance on legal action, consulting a lawyer is highly recommended.
  • Suppiah & Partners is here to assist you. Contact us for expert legal advice and the best course of action to protect your rights and recover from the incident.

Taking immediate action can make a difference in preventing further losses and protecting yourself or your organization. Stay alert and always verify before responding to suspicious messages or calls.

References

  1. Communications and Multimedia Act 1998: An act to provide for and to regulate the
    converging communications and multimedia industries, and for incidental matters.
  2. Personal Data Protection Act 2010: An Act to regulate the processing of personal data in
    commercial transactions and to provide for matters connected therewith and incidental
    thereto.
  3. Computer Crimes Act 1997: An Act to provide for offences relating to the misuse of
    computers.
  4. Penal Code: An Act relating to criminal offences.
  5. Scam statistics: https://www.malaymail.com/news/malaysia/2024/10/03/scam-epidemic-malaysians-lose-us128b-annually-equivalent-to-3pc-of-gdp-amid-rising-ai-threats/152485
  6. Scoop: https://www.scoop.my/news/246047/agong-wants-to-combat-red-tape-culture/

© 2025 Suppiah & Partners. All rights reserved. The contents of this newsletter are intended for informational purposes only and do not constitute legal advice.

More Featured Articles