SlideShare a Scribd company logo
1 of 57
Download to read offline
MAPPING STAKEHOLDERS, DECISION-MAKERS,
AND IMPLEMENTERS IN THAILAND’S CYBER POLICY
Internet Policy and Advocacy: Research Methods
Workshop for South and Southeast Asia Actors

10 April 2017 @ National Law University, Delhi

#AsiaInternetPolicy
@bact

Arthit Suriyawongkul
Thai Netizen Network
OUTLINE
➤ Visualizing power relations of
actors (data from Bills)
➤ Case: Personal Data Protection
Committee
➤ Case: NSRA’s Cybersecurity
Proposal
➤ Case: New digital regulation
structures (Digital Economy
Agenda)
➤ Case: Online media regulation
after the 2014 Coup
➤ Case: Computer-related Crime
Act Amendment / Campaign
➤ Looking for relationships between entities in the document,
conversations, etc.
➤ Actor1 —Action—> Actor2 (Noun1 —Verb—> Noun2)





➤ A Director shall be appointed by the Board





➤ This can also be draw by tools like Gephi and NodeXL
DRAWING POWER RELATIONS
Noun1 Noun2
Verb
Board Director
appoints
PERSONAL

DATA PROTECTION
COMMITTEE
Personal Data

Protection Committee
Personal Data
Protection Bill
Establish
PERSONAL DATA PROTECTION BILL (DEFINITION — SEC.5, 6)
➤ Section 5 — In this Act, […]
➤ “Committee” means the Personal Data Protection Committee;
➤ “Office” means the National Cybersecurity Agency;
➤ “Secretary-General” means the Secretary-General of the National
Cybersecurity Agency;
➤ “Minister” means the minister having the charge and control of
the execution of this Act.

➤ Section 6 — The Minister of Digital Economy and Society shall
have the charge and control of the execution of this Act.
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Personal Data
Protection Bill
In charge of
Establish
PERSONAL DATA PROTECTION BILL (COMMITTEE — SEC.7)
➤ Section 7 — There shall be a committee called “Personal Data
Protection Committee”, consisting of:
➤ (1) a Chairperson appointed by the Cabinet from the persons having
distinguished knowledge, skills, and experience in the field of
personal data protection, or information and communication
technology, or any other field that is relevant and useful for the
protection of personal data;
➤ (2) 4 ex officio members consisting of the Permanent Secretary of the Office
of the Prime Minister, the Permanent Secretary of the Ministry of Digital
Economy and Society, the Permanent Secretary of the Ministry of Interior, and
the Secretary-General of the National Security Council;
➤ (3) not more than 4 qualified members, appointed by the Cabinet
[…]
Cabinet
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Personal Data
Protection Bill
In charge of
Establish
Appoint

PERSONAL DATA PROTECTION BILL (COMMITTEE — SEC.7 CONT.)
➤ The Secretary-General shall ex officio be member and secretary and
shall have the power to appoint assistant secretary as deemed
necessary.
➤ The rules and procedures on the selection of persons to be
appointed as Chairman and qualified members, including the
selection of persons to replace the qualified members who
vacate office before the expiration of the term under section
10, shall be as prescribed by the Rules issued by the Minister.
➤ The Office shall perform the duties as the secretariat office for the
Committee established under this Act […]
Cabinet
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretary
Ex officio

member
Personal Data
Protection Bill
In charge of
Establish
Appoint

PERSONAL DATA PROTECTION BILL (CHAIRPERSON — SEC.10)
➤ Section 10 — In addition to vacating office upon the
expiration of the term under section 9, the Chairperson or a
member vacates office upon:
➤ (1) death;
➤ (2) resignation;
➤ (3) being dismissed by the Cabinet due to negligence in the
performance of duty, disgraceful behavior, or incapability;
➤ (4) being disqualified or under any of the prohibitions under
section 8.
Cabinet
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretary
Ex officio

member
Personal Data
Protection Bill
In charge of
Establish
Appoint

Terminate
This National Cybersecurity Agency
is to be established by another law.
National

Cybersecurity Agency
CYBERSECURITY (DEFINITION — SEC.3, 4)
➤ Section 3 — In this Act:
➤ “Secretary-General” means Secretary-General of the National
Cybersecurity Agency.
➤ “Office” means the National Cybersecurity Agency.

➤ Section 4 — The Prime Minister shall have charge and control
of the execution of this Act.
Cabinet
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretary
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Appoint

Terminate
Establish
CYBERSECURITY (COMMITTEE — SEC.6)
➤ Section 6 — There shall be a committee called the “National
Cybersecurity Committee” (NCSC) consisting of:
➤ (1) Minister of Digital Economy and Society as Chairperson;
➤ (2) Secretary-General of the National Security Council, Permanent Secretary
of the Ministry of Digital Economy and Society, Permanent Secretary of the
Ministry of Defense, Commander of the Technological Crime Suppression
Division of the Royal Thai Police as 4 ex officio members;
➤ (3) Not more than 7 qualified members appointed by the Cabinet […];
➤ The Secretary-General shall ex officio be member and secretary, and
assistant secretary shall be appointed as deemed necessary.
➤ The selection of the qualified members in paragraph 1 shall comply
with the Procedures specified by the Cabinet […]
Cabinet
National

Cybersecurity Agency
Secretary-
General
National

Cybersecurity Committee
Chair
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretariat Office
Secretary Secretary
Ex officio

member
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Establish
Appoint

Terminate
Establish
Ex officio

member
CYBERSECURITY (SECRETARY-GENERAL — SEC.21)
➤ Section 21 — There shall be a Secretary-General who is directly
reported to the Chairperson of the NCSC as regards the operation
of the Office and supervises the Officials and employees of the
Office.
➤ As regards activities dealing with third parties, the Secretary-
General shall represent the Office. […]
➤ The Committee shall have the power to nominate, appoint and
remove the Secretary-General.
Cabinet
National

Cybersecurity Agency
Secretary-
General
National

Cybersecurity Committee
Chair
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretariat Office
Secretary Secretary
Ex officio

member
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Establish
Appoint

Terminate
Establish
Nominate

Appoint

Terminate
Reported to
Ex officio

member
Cabinet
National

Cybersecurity Agency
Secretary-
General
National

Cybersecurity Committee
Chair
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Under
Secretariat Office
Secretariat Office
Secretary Secretary
Ex officio

member
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Establish
Appoint

Terminate
Establish
Nominate

Appoint

Terminate
Reported to
Ex officio

member
(REPEAT)
Personal Data

Protection Committee
Personal Data
Protection Bill
Establish
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Personal Data
Protection Bill
In charge of
Establish
Cabinet
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Personal Data
Protection Bill
In charge of
Establish
Appoint

Cabinet
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretary
Ex officio

member
Personal Data
Protection Bill
In charge of
Establish
Appoint

Cabinet
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretary
Ex officio

member
Personal Data
Protection Bill
In charge of
Establish
Appoint

Terminate
Cabinet
National

Cybersecurity Agency
Secretary-
General
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretary
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Appoint

Terminate
Establish
Cabinet
National

Cybersecurity Agency
Secretary-
General
National

Cybersecurity Committee
Chair
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretariat Office
Secretary Secretary
Ex officio

member
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Establish
Appoint

Terminate
Establish
Ex officio

member
Cabinet
National

Cybersecurity Agency
Secretary-
General
National

Cybersecurity Committee
Chair
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Secretariat Office
Secretariat Office
Secretary Secretary
Ex officio

member
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Establish
Appoint

Terminate
Establish
Nominate

Appoint

Terminate
Reported to
Ex officio

member
Cabinet
National

Cybersecurity Agency
Secretary-
General
National

Cybersecurity Committee
Chair
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Under
Secretariat Office
Secretariat Office
Secretary Secretary
Ex officio

member
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Establish
Appoint

Terminate
Establish
Nominate

Appoint

Terminate
Reported to
Ex officio

member
Cabinet
National

Cybersecurity Agency
Secretary-
General
National

Cybersecurity Committee
Chair
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Under
Secretariat Office
Secretariat Office
Secretary Secretary
Ex officio

member
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Establish
Appoint

Terminate
Establish
Nominate

Appoint

Terminate
Reported to
Ex officio

member
Tightly knitted,
concentrated
NOT-SO-INDEPENDENT DATA PROTECTION COMMITTEE
➤ Network of powers go more on the left (cybersecurity) side
➤ What if the conflicted parties included a member of the
Cabinet (or the Government in general)?
➤ the Cabinet can terminate the term of the Data Protection Committee’s Chairperson; the whole
Committee is under Digital Ministry structure
➤ What if Cybersecurity Committee has different opinion from
the Data Protection Committee? Will Cybersecurity Agency
staffs, who got assigned to work for Data Protection
Committee, still supporting the matter?
➤ the staffs have to report to the Secretary-General, which in turn directly report to Cybersecurity
Committee Chairperson; and Data Protection Committee depends on resources from
Cybersecurity Agency
➤ Sometimes those two Committees’ mandates can be conflicted
NEW CYBERSECURITY
PROPOSAL

FROM NATIONAL REFORM
STEERING ASSEMBLY
Cabinet
National

Cybersecurity Agency
Secretary-
General
National

Cybersecurity Committee
Chair
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Under
Secretariat Office
Secretariat Office
Secretary Secretary
Ex officio

member
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Establish
Appoint

Terminate
Ref: Personal Data Protection Bill (reviewed by
the Council of State - Sep 2015) / Cybersecurity
Bill (approved in principle by Cabinet - Jan
2015) / National Reform Steering AgencyEstablish
Nominate

Appoint

Terminate
Council of State rev. Sep 2015
Reported to
Ex officio

member
Cabinet
National

Cybersecurity Agency
Secretary-
General
National

Cybersecurity Committee
Chair
Minister of Digital
Economy & Society
Digital
Min
Personal Data

Protection Committee
Chair
Ex officio

member
Under
Secretariat Office
Secretariat Office
Secretary Secretary
Ex officio

member
Ex officio

member
Cybersecurity
Bill
Personal Data
Protection Bill
Prime
Minister
In charge of
In
charge
of
Establish
Establish
Appoint

Terminate
Ref: Personal Data Protection Bill (reviewed by
the Council of State - Sep 2015) / Cybersecurity
Bill (approved in principle by Cabinet - Jan
2015) / National Reform Steering AgencyEstablish
Nominate

Appoint

Terminate
Ministry of
Defense
Defense
Min
Vice Chair
Ex officio

member
NRSA Proposal Nov 2016
Reported to
LESS POWER FOR THE DATA PROTECTION COMMITTEE
➤ Relatively to the National Cybersecurity Committee
➤ Getting worse that the original bills
➤ If the NCSC is chaired by the Prime Minister
➤ If the Ministry of Defense is also one of the two vice chairs
➤ Militarized-Cybersecurity Mechanism vs Resourceless Data
Protection Committee
➤ Looks like data protection mechanism is structurally designed
to fail
NEW DIGITAL
REGULATION
STRUCTURES
DIGITAL BILLS (2014-)
1. Ministry of Digital for Economy and Society Bill+
2. National Digital Committee for Economy and Society Bill*+
3. Digital Economy Promotion Bill*+
4. Digital Development for Economy and Society Fund Bill*+
5. Broadcasting and Telecommunication Regulator Bill (amendment)+
6. Computer-related Crime Bill (amendment)+
7. Cybersecurity Bill
8. Personal Data Protection Bill
9. Electronic Transaction Bill (amendment)
10.Electronic Transaction Development Agency Bill (amendment)
(+ = passed, * = merged together)
NEW STRUCTURES OF DIGITAL DEPARTMENTS
Showing new bodies to be created by proposed bills and changing relationships between Ministry of Digital
Economy and Society (MDES, formerly Ministry of ICT), National Digital Economy and Society
Committee (NDESC, new), and the National Broadcasting and Telecommunications Commission (NBTC).
MDES NBTCNDESC
Digital
Development
Fund
THAILAND

MEDIA REGULATIONS
AFTER THE 2014 COUP
MICT Order No.
163/2014

Appointment of
Working Group

for Online Media
Monitoring System
Testing
➤ to test SSL encrypted
online media
monitoring system
➤ to coordinate with
international internet
gateways
NCPO Annc.
12/2014

Social media
provider to stop
anti-NCPO content
NCPO Annc.
14/2014 Prohibits
media to interview
civil servants, indi
bodies, academics
NCPO Annc.
17/2014

ISP to monitor and
censor content that
may cause unrest
NCPO Annc.
18/2014 Prohibits 7
types of information
on media
NCPO Annc.
26/2014

Setting up Online
Social Media
Monitoring
Working Group,
to monitor/block
online content
NCPO Annc.
22/2014 (amended
with 34/2014)

MICT is under
NCPO Security
Cluster
NCPO Annc. 80/2014 (amend
Broadcasting and Telecom
Commission Act) Add Defense
Min. Perma. Sec. to committee
of R&D Fund, reduce number of
expert committee members
from 5 to 2 (w/o specifying
areas of expertise)
NCPO Annc. 97/2014
(amended with Annc.
103/2014) Prohibits 7 types
of information: False info
that may incite monarchy,
national security, official
secret, confusing news,
criticism of NCPO, etc.
NCPO Annc.
23/2014
Conditions to air
analog TV/radio
NCPO Annc.
27/2014
Conditions to air
digital/cable/
satellite TV
NCPO Annc.
79/2014
Conditions to air
experimental
(community) radio
NCPO Chief Order
41/2016
NBTC can shut
media down w/o
criminal/civil/
admin liability
NCPO Order
(Specific) 12/2014
Appoint Information
Publicity Monitoring
Committee
members

(5 media types)
Info Publicity
Monitoring Committee
Order 3/2014

Appoint Online
Media Monitoring
Working Group
NCPO Annc.
33/2014

Prohibits court, indi
bodies, local admin.
to express opinions
MICT Order 163/2014
Set up Working Group
to test encryption
(SSL) circumvention
equip., coord. net
gateways
Charter Sec.279

All annc./orders of NCPO/NCPO
Chief are legal and constitutional
under new Constitution. To amend,
it must be passed by the National
Assembly. (Senate 200; Parliament 500)
Charter Sec.269

First 5 years will have 250
Senate members. All
selected by NCPO. (From a list
proposed a NCPO-appointed committee)
CCA Draft (Apr2016) S.20 Para 5

Ministerial reg. for suppression/
deletion of data, according to
changing tech (encryption)
Adapted from a table by POSTgraphics / from Pirongrong Ramasoota. Media tremble at NBTC's Section 44 powers.

Bangkok Post. 16 Jul 2016 http://www.bangkokpost.com/opinion/opinion/1037021/media-tremble-at-nbtcs-section-44-powers
Section 37 of the

2008 Broadcasting Act
(pre-2014 coup)
• Inciting the abolishment
of constitutional
monarchy
• Bearing negative
consequences for
national security, public
order, or good morals
• Containing obscene or
pornographic content
that may risk the mental
or physical health of the
people
Section 3 (1-7) of

NCPO Announcement No. 97/2014

(post-2014 coup)
1. False statements that could defame or incite hatred of
the monarchy, the heir-apparent, or any member of the
royal family
2. Information deemed detrimental to national security,
including those that are defamatory to other people
3. Criticism of the NCPO, its official or related people
4. Confidential information (in all forms) of state agencies
5. Information the could lead to confusion, conflict, or
social divisions
6. Incitement of unrest or resistance against the
government or the NCPO
7. Threat to harm any person that could lead to panic or
fear among the public
Peace and Order Division Public Administration Division
Security Cluster
Ministries of Defence,
Interior, Foreign Affairs,
ICT
Information
Operations /

Public Relations
Media Monitoring
Office of the Secretary-General of the National Council for Peace and Order
Ministry of Foreign Affairs. One month progress report of NCPO.

http://www.mfa.go.th/main/en/media-center/3756/47354-One-month-progress-report-of-NCPO.html
ประกาศคสช. 22+34/2557

ให้กระทรวงไอซีทีอยู่ใต้

กลุ่มงานความมั่นคงของคสช.

NCPO Annc. 22+34/2014

Ministry of ICT under

NCPO Security Cluster
CAMPAIGN AGAINST

“SINGLE GATEWAY”

(COMPUTER-RELATED CRIME
ACT AMENDMENT)
COMPUTER-RELATED CRIME BILL (DATA BLOCKING/REMOVAL — SEC.20)
➤ […] When the Court issues a warrant to suppress the
distribution or to remove such data per Paragraph One or
Two, the competent official may suppress the distribution or
remove the computer data themselves or instruct the service
provider to suppress the distribution or remove the computer
data in their behalf. The Minister may determine the procedure,
duration and guidelines for the service provider to suppress the
distribution or remove the computer data, and they shall be made
compatible to each other and in response to the changing
technology, except when the Court makes any exemption. […]
2007 Computer-related Crime Act CCA Amendment Draft (2017 Act) Rationale
Section 20 Section 14 to amend Section 20
2007 Computer-related Crime Act CCA Amendment Draft (2017 Act) Rationale
In order to successfully suppress
the dissemination of data that
is encrypted by SSL technology,
which designed to increase
communication safety on the
internet and has public-key
encryption, it is necessary to
has special methods and tools.
2007 Computer-related Crime Act CCA Amendment Draft (2017 Act) Rationale
Desire to circumvent encryption is shown in a presentation
on the amendment of Computer-related Crime Act by the
Ministry of ICT to National Legislative Assembly.
➤ End-to-end encryption makes
it difficult to get meaningful
access to data-in-transit.
➤ Hacking Team’s
Remote Control System
(RCS) can do just that.
➤ Another option is to go to
one of the ends, to get
access to data-at-rest.
CONTENT MONITORING — POINTS OF CONTROL
(online intermediary)
(transmission/device level)
(individual content providers—users)
The deeper layer the control digging down, the more
collateral damage, the more innocent people got affected.
➤ Content
regulation
turns
Surveillance
➤ Web 2.0: Lots of
content creators
— govt can’t
afford to control
at Content level
➤ Intermediary
liability
introduced —
but it only
works within
jurisdiction
➤ The control is
moving towards
Network level,
interference
One who wants data.
One who approves.
One who process the request.
All-in-One.
LIVE BROADCASTING OF THE HEARING
➤ Invited-only “public hearing”
from the National Legislative
Assembly
➤ Live commentary from a cafe
in downtown Bangkok
➤ “Ministerial Announcement”,
legislative power in CCA and
separation of powers
explained
➤ Using materials and
explanations from previous
examples
ONLINE CAMPAIGN https://change.org/singlegatewayreturn
THANK YOU
@bact

arthit@thainetizen.org

More Related Content

Similar to Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber Policy

Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)
Lance Michalson
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Lance Michalson
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
segughana
 
#CyberSafeLambeth
#CyberSafeLambeth#CyberSafeLambeth
#CyberSafeLambeth
The Integrate Agency CIC
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
Yury Chemerkin
 

Similar to Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber Policy (20)

Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)
 
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
Niche Konsult Limited Section By Section Analysis Of Cyber Security And Infor...
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Cybersecurity commission-report-final-post
Cybersecurity commission-report-final-postCybersecurity commission-report-final-post
Cybersecurity commission-report-final-post
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
 
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR  DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2
 
#CyberSafeLambeth
#CyberSafeLambeth#CyberSafeLambeth
#CyberSafeLambeth
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
"Legal tips and compliance requirements" - Anastasia Botsi, ICT Legal
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 

More from Arthit Suriyawongkul

กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
Arthit Suriyawongkul
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Arthit Suriyawongkul
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัล
Arthit Suriyawongkul
 

More from Arthit Suriyawongkul (20)

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationships
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคม
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัล
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on Thailand
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in Thailand
 
Thailand on LINE
Thailand on LINEThailand on LINE
Thailand on LINE
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days Later
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
 
เร็วขึ้น ดีขึ้น มากขึ้น ด้วยข้อมูลเปิด
เร็วขึ้น ดีขึ้น มากขึ้น ด้วยข้อมูลเปิดเร็วขึ้น ดีขึ้น มากขึ้น ด้วยข้อมูลเปิด
เร็วขึ้น ดีขึ้น มากขึ้น ด้วยข้อมูลเปิด
 

Recently uploaded

Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
PoojaGadiya1
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
Airst S
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 

Recently uploaded (20)

A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 

Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber Policy

  • 1. MAPPING STAKEHOLDERS, DECISION-MAKERS, AND IMPLEMENTERS IN THAILAND’S CYBER POLICY Internet Policy and Advocacy: Research Methods Workshop for South and Southeast Asia Actors
 10 April 2017 @ National Law University, Delhi
 #AsiaInternetPolicy @bact
 Arthit Suriyawongkul Thai Netizen Network
  • 2. OUTLINE ➤ Visualizing power relations of actors (data from Bills) ➤ Case: Personal Data Protection Committee ➤ Case: NSRA’s Cybersecurity Proposal ➤ Case: New digital regulation structures (Digital Economy Agenda) ➤ Case: Online media regulation after the 2014 Coup ➤ Case: Computer-related Crime Act Amendment / Campaign
  • 3. ➤ Looking for relationships between entities in the document, conversations, etc. ➤ Actor1 —Action—> Actor2 (Noun1 —Verb—> Noun2)
 
 
 ➤ A Director shall be appointed by the Board
 
 
 ➤ This can also be draw by tools like Gephi and NodeXL DRAWING POWER RELATIONS Noun1 Noun2 Verb Board Director appoints
  • 5. Personal Data
 Protection Committee Personal Data Protection Bill Establish
  • 6. PERSONAL DATA PROTECTION BILL (DEFINITION — SEC.5, 6) ➤ Section 5 — In this Act, […] ➤ “Committee” means the Personal Data Protection Committee; ➤ “Office” means the National Cybersecurity Agency; ➤ “Secretary-General” means the Secretary-General of the National Cybersecurity Agency; ➤ “Minister” means the minister having the charge and control of the execution of this Act.
 ➤ Section 6 — The Minister of Digital Economy and Society shall have the charge and control of the execution of this Act.
  • 7. National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Personal Data Protection Bill In charge of Establish
  • 8. PERSONAL DATA PROTECTION BILL (COMMITTEE — SEC.7) ➤ Section 7 — There shall be a committee called “Personal Data Protection Committee”, consisting of: ➤ (1) a Chairperson appointed by the Cabinet from the persons having distinguished knowledge, skills, and experience in the field of personal data protection, or information and communication technology, or any other field that is relevant and useful for the protection of personal data; ➤ (2) 4 ex officio members consisting of the Permanent Secretary of the Office of the Prime Minister, the Permanent Secretary of the Ministry of Digital Economy and Society, the Permanent Secretary of the Ministry of Interior, and the Secretary-General of the National Security Council; ➤ (3) not more than 4 qualified members, appointed by the Cabinet […]
  • 9. Cabinet National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Personal Data Protection Bill In charge of Establish Appoint

  • 10. PERSONAL DATA PROTECTION BILL (COMMITTEE — SEC.7 CONT.) ➤ The Secretary-General shall ex officio be member and secretary and shall have the power to appoint assistant secretary as deemed necessary. ➤ The rules and procedures on the selection of persons to be appointed as Chairman and qualified members, including the selection of persons to replace the qualified members who vacate office before the expiration of the term under section 10, shall be as prescribed by the Rules issued by the Minister. ➤ The Office shall perform the duties as the secretariat office for the Committee established under this Act […]
  • 11. Cabinet National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretary Ex officio
 member Personal Data Protection Bill In charge of Establish Appoint

  • 12. PERSONAL DATA PROTECTION BILL (CHAIRPERSON — SEC.10) ➤ Section 10 — In addition to vacating office upon the expiration of the term under section 9, the Chairperson or a member vacates office upon: ➤ (1) death; ➤ (2) resignation; ➤ (3) being dismissed by the Cabinet due to negligence in the performance of duty, disgraceful behavior, or incapability; ➤ (4) being disqualified or under any of the prohibitions under section 8.
  • 13. Cabinet National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretary Ex officio
 member Personal Data Protection Bill In charge of Establish Appoint
 Terminate
  • 14. This National Cybersecurity Agency is to be established by another law. National
 Cybersecurity Agency
  • 15. CYBERSECURITY (DEFINITION — SEC.3, 4) ➤ Section 3 — In this Act: ➤ “Secretary-General” means Secretary-General of the National Cybersecurity Agency. ➤ “Office” means the National Cybersecurity Agency.
 ➤ Section 4 — The Prime Minister shall have charge and control of the execution of this Act.
  • 16. Cabinet National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretary Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Appoint
 Terminate Establish
  • 17. CYBERSECURITY (COMMITTEE — SEC.6) ➤ Section 6 — There shall be a committee called the “National Cybersecurity Committee” (NCSC) consisting of: ➤ (1) Minister of Digital Economy and Society as Chairperson; ➤ (2) Secretary-General of the National Security Council, Permanent Secretary of the Ministry of Digital Economy and Society, Permanent Secretary of the Ministry of Defense, Commander of the Technological Crime Suppression Division of the Royal Thai Police as 4 ex officio members; ➤ (3) Not more than 7 qualified members appointed by the Cabinet […]; ➤ The Secretary-General shall ex officio be member and secretary, and assistant secretary shall be appointed as deemed necessary. ➤ The selection of the qualified members in paragraph 1 shall comply with the Procedures specified by the Cabinet […]
  • 18. Cabinet National
 Cybersecurity Agency Secretary- General National
 Cybersecurity Committee Chair Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretariat Office Secretary Secretary Ex officio
 member Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Establish Appoint
 Terminate Establish Ex officio
 member
  • 19. CYBERSECURITY (SECRETARY-GENERAL — SEC.21) ➤ Section 21 — There shall be a Secretary-General who is directly reported to the Chairperson of the NCSC as regards the operation of the Office and supervises the Officials and employees of the Office. ➤ As regards activities dealing with third parties, the Secretary- General shall represent the Office. […] ➤ The Committee shall have the power to nominate, appoint and remove the Secretary-General.
  • 20. Cabinet National
 Cybersecurity Agency Secretary- General National
 Cybersecurity Committee Chair Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretariat Office Secretary Secretary Ex officio
 member Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Establish Appoint
 Terminate Establish Nominate
 Appoint
 Terminate Reported to Ex officio
 member
  • 21. Cabinet National
 Cybersecurity Agency Secretary- General National
 Cybersecurity Committee Chair Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Under Secretariat Office Secretariat Office Secretary Secretary Ex officio
 member Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Establish Appoint
 Terminate Establish Nominate
 Appoint
 Terminate Reported to Ex officio
 member
  • 23. Personal Data
 Protection Committee Personal Data Protection Bill Establish
  • 24. National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Personal Data Protection Bill In charge of Establish
  • 25. Cabinet National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Personal Data Protection Bill In charge of Establish Appoint

  • 26. Cabinet National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretary Ex officio
 member Personal Data Protection Bill In charge of Establish Appoint

  • 27. Cabinet National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretary Ex officio
 member Personal Data Protection Bill In charge of Establish Appoint
 Terminate
  • 28. Cabinet National
 Cybersecurity Agency Secretary- General Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretary Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Appoint
 Terminate Establish
  • 29. Cabinet National
 Cybersecurity Agency Secretary- General National
 Cybersecurity Committee Chair Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretariat Office Secretary Secretary Ex officio
 member Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Establish Appoint
 Terminate Establish Ex officio
 member
  • 30. Cabinet National
 Cybersecurity Agency Secretary- General National
 Cybersecurity Committee Chair Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Secretariat Office Secretariat Office Secretary Secretary Ex officio
 member Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Establish Appoint
 Terminate Establish Nominate
 Appoint
 Terminate Reported to Ex officio
 member
  • 31. Cabinet National
 Cybersecurity Agency Secretary- General National
 Cybersecurity Committee Chair Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Under Secretariat Office Secretariat Office Secretary Secretary Ex officio
 member Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Establish Appoint
 Terminate Establish Nominate
 Appoint
 Terminate Reported to Ex officio
 member
  • 32. Cabinet National
 Cybersecurity Agency Secretary- General National
 Cybersecurity Committee Chair Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Under Secretariat Office Secretariat Office Secretary Secretary Ex officio
 member Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Establish Appoint
 Terminate Establish Nominate
 Appoint
 Terminate Reported to Ex officio
 member Tightly knitted, concentrated
  • 33. NOT-SO-INDEPENDENT DATA PROTECTION COMMITTEE ➤ Network of powers go more on the left (cybersecurity) side ➤ What if the conflicted parties included a member of the Cabinet (or the Government in general)? ➤ the Cabinet can terminate the term of the Data Protection Committee’s Chairperson; the whole Committee is under Digital Ministry structure ➤ What if Cybersecurity Committee has different opinion from the Data Protection Committee? Will Cybersecurity Agency staffs, who got assigned to work for Data Protection Committee, still supporting the matter? ➤ the staffs have to report to the Secretary-General, which in turn directly report to Cybersecurity Committee Chairperson; and Data Protection Committee depends on resources from Cybersecurity Agency ➤ Sometimes those two Committees’ mandates can be conflicted
  • 35. Cabinet National
 Cybersecurity Agency Secretary- General National
 Cybersecurity Committee Chair Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Under Secretariat Office Secretariat Office Secretary Secretary Ex officio
 member Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Establish Appoint
 Terminate Ref: Personal Data Protection Bill (reviewed by the Council of State - Sep 2015) / Cybersecurity Bill (approved in principle by Cabinet - Jan 2015) / National Reform Steering AgencyEstablish Nominate
 Appoint
 Terminate Council of State rev. Sep 2015 Reported to Ex officio
 member
  • 36. Cabinet National
 Cybersecurity Agency Secretary- General National
 Cybersecurity Committee Chair Minister of Digital Economy & Society Digital Min Personal Data
 Protection Committee Chair Ex officio
 member Under Secretariat Office Secretariat Office Secretary Secretary Ex officio
 member Ex officio
 member Cybersecurity Bill Personal Data Protection Bill Prime Minister In charge of In charge of Establish Establish Appoint
 Terminate Ref: Personal Data Protection Bill (reviewed by the Council of State - Sep 2015) / Cybersecurity Bill (approved in principle by Cabinet - Jan 2015) / National Reform Steering AgencyEstablish Nominate
 Appoint
 Terminate Ministry of Defense Defense Min Vice Chair Ex officio
 member NRSA Proposal Nov 2016 Reported to
  • 37. LESS POWER FOR THE DATA PROTECTION COMMITTEE ➤ Relatively to the National Cybersecurity Committee ➤ Getting worse that the original bills ➤ If the NCSC is chaired by the Prime Minister ➤ If the Ministry of Defense is also one of the two vice chairs ➤ Militarized-Cybersecurity Mechanism vs Resourceless Data Protection Committee ➤ Looks like data protection mechanism is structurally designed to fail
  • 39. DIGITAL BILLS (2014-) 1. Ministry of Digital for Economy and Society Bill+ 2. National Digital Committee for Economy and Society Bill*+ 3. Digital Economy Promotion Bill*+ 4. Digital Development for Economy and Society Fund Bill*+ 5. Broadcasting and Telecommunication Regulator Bill (amendment)+ 6. Computer-related Crime Bill (amendment)+ 7. Cybersecurity Bill 8. Personal Data Protection Bill 9. Electronic Transaction Bill (amendment) 10.Electronic Transaction Development Agency Bill (amendment) (+ = passed, * = merged together)
  • 40. NEW STRUCTURES OF DIGITAL DEPARTMENTS Showing new bodies to be created by proposed bills and changing relationships between Ministry of Digital Economy and Society (MDES, formerly Ministry of ICT), National Digital Economy and Society Committee (NDESC, new), and the National Broadcasting and Telecommunications Commission (NBTC). MDES NBTCNDESC Digital Development Fund
  • 42. MICT Order No. 163/2014
 Appointment of Working Group
 for Online Media Monitoring System Testing ➤ to test SSL encrypted online media monitoring system ➤ to coordinate with international internet gateways
  • 43. NCPO Annc. 12/2014
 Social media provider to stop anti-NCPO content NCPO Annc. 14/2014 Prohibits media to interview civil servants, indi bodies, academics NCPO Annc. 17/2014
 ISP to monitor and censor content that may cause unrest NCPO Annc. 18/2014 Prohibits 7 types of information on media NCPO Annc. 26/2014
 Setting up Online Social Media Monitoring Working Group, to monitor/block online content NCPO Annc. 22/2014 (amended with 34/2014)
 MICT is under NCPO Security Cluster NCPO Annc. 80/2014 (amend Broadcasting and Telecom Commission Act) Add Defense Min. Perma. Sec. to committee of R&D Fund, reduce number of expert committee members from 5 to 2 (w/o specifying areas of expertise) NCPO Annc. 97/2014 (amended with Annc. 103/2014) Prohibits 7 types of information: False info that may incite monarchy, national security, official secret, confusing news, criticism of NCPO, etc. NCPO Annc. 23/2014 Conditions to air analog TV/radio NCPO Annc. 27/2014 Conditions to air digital/cable/ satellite TV NCPO Annc. 79/2014 Conditions to air experimental (community) radio NCPO Chief Order 41/2016 NBTC can shut media down w/o criminal/civil/ admin liability NCPO Order (Specific) 12/2014 Appoint Information Publicity Monitoring Committee members
 (5 media types) Info Publicity Monitoring Committee Order 3/2014
 Appoint Online Media Monitoring Working Group NCPO Annc. 33/2014
 Prohibits court, indi bodies, local admin. to express opinions MICT Order 163/2014 Set up Working Group to test encryption (SSL) circumvention equip., coord. net gateways Charter Sec.279
 All annc./orders of NCPO/NCPO Chief are legal and constitutional under new Constitution. To amend, it must be passed by the National Assembly. (Senate 200; Parliament 500) Charter Sec.269
 First 5 years will have 250 Senate members. All selected by NCPO. (From a list proposed a NCPO-appointed committee) CCA Draft (Apr2016) S.20 Para 5
 Ministerial reg. for suppression/ deletion of data, according to changing tech (encryption)
  • 44. Adapted from a table by POSTgraphics / from Pirongrong Ramasoota. Media tremble at NBTC's Section 44 powers.
 Bangkok Post. 16 Jul 2016 http://www.bangkokpost.com/opinion/opinion/1037021/media-tremble-at-nbtcs-section-44-powers Section 37 of the
 2008 Broadcasting Act (pre-2014 coup) • Inciting the abolishment of constitutional monarchy • Bearing negative consequences for national security, public order, or good morals • Containing obscene or pornographic content that may risk the mental or physical health of the people Section 3 (1-7) of
 NCPO Announcement No. 97/2014
 (post-2014 coup) 1. False statements that could defame or incite hatred of the monarchy, the heir-apparent, or any member of the royal family 2. Information deemed detrimental to national security, including those that are defamatory to other people 3. Criticism of the NCPO, its official or related people 4. Confidential information (in all forms) of state agencies 5. Information the could lead to confusion, conflict, or social divisions 6. Incitement of unrest or resistance against the government or the NCPO 7. Threat to harm any person that could lead to panic or fear among the public
  • 45. Peace and Order Division Public Administration Division Security Cluster Ministries of Defence, Interior, Foreign Affairs, ICT Information Operations /
 Public Relations Media Monitoring Office of the Secretary-General of the National Council for Peace and Order Ministry of Foreign Affairs. One month progress report of NCPO.
 http://www.mfa.go.th/main/en/media-center/3756/47354-One-month-progress-report-of-NCPO.html ประกาศคสช. 22+34/2557
 ให้กระทรวงไอซีทีอยู่ใต้
 กลุ่มงานความมั่นคงของคสช.
 NCPO Annc. 22+34/2014
 Ministry of ICT under
 NCPO Security Cluster
  • 47. COMPUTER-RELATED CRIME BILL (DATA BLOCKING/REMOVAL — SEC.20) ➤ […] When the Court issues a warrant to suppress the distribution or to remove such data per Paragraph One or Two, the competent official may suppress the distribution or remove the computer data themselves or instruct the service provider to suppress the distribution or remove the computer data in their behalf. The Minister may determine the procedure, duration and guidelines for the service provider to suppress the distribution or remove the computer data, and they shall be made compatible to each other and in response to the changing technology, except when the Court makes any exemption. […]
  • 48. 2007 Computer-related Crime Act CCA Amendment Draft (2017 Act) Rationale Section 20 Section 14 to amend Section 20
  • 49. 2007 Computer-related Crime Act CCA Amendment Draft (2017 Act) Rationale In order to successfully suppress the dissemination of data that is encrypted by SSL technology, which designed to increase communication safety on the internet and has public-key encryption, it is necessary to has special methods and tools.
  • 50. 2007 Computer-related Crime Act CCA Amendment Draft (2017 Act) Rationale
  • 51. Desire to circumvent encryption is shown in a presentation on the amendment of Computer-related Crime Act by the Ministry of ICT to National Legislative Assembly.
  • 52. ➤ End-to-end encryption makes it difficult to get meaningful access to data-in-transit. ➤ Hacking Team’s Remote Control System (RCS) can do just that. ➤ Another option is to go to one of the ends, to get access to data-at-rest.
  • 53. CONTENT MONITORING — POINTS OF CONTROL (online intermediary) (transmission/device level) (individual content providers—users) The deeper layer the control digging down, the more collateral damage, the more innocent people got affected. ➤ Content regulation turns Surveillance ➤ Web 2.0: Lots of content creators — govt can’t afford to control at Content level ➤ Intermediary liability introduced — but it only works within jurisdiction ➤ The control is moving towards Network level, interference
  • 54. One who wants data. One who approves. One who process the request. All-in-One.
  • 55. LIVE BROADCASTING OF THE HEARING ➤ Invited-only “public hearing” from the National Legislative Assembly ➤ Live commentary from a cafe in downtown Bangkok ➤ “Ministerial Announcement”, legislative power in CCA and separation of powers explained ➤ Using materials and explanations from previous examples