Myanmar Government’s policy and plans on data protection, transfer and storage
Presentation at Myanmar Digital Rights Forum 2019
Read more: https://www.myanmar-responsiblebusiness.org/news/digital-rights-forum-2019-report.html
Banks are facing a world where profit is being compressed by:
• Historically low interest rates
• COVID-19 related credit losses
• Patchy economic recovery
• Fintech competition
The good news? Research shows that elevating their operational maturity helps banks outmaneuver the threats that tomorrow poses.
A two-tier model for CBDC would empower public-private partnerships and enable Digital Cash to be designed by central banks but distributed by commercial FI’s. Digital currencies, denominated in the domestic unit of account, would be privately issued and managed, although fully backed with central bank reserves and monitored centrally.
A talk presented at IEEE ComSoc workshop on Evolution of Data-centers in the context of 5G.
Discuss about what is edge computing and management issues in Edge Computing
HUMAN RIGHTS UNDER THREAT: FREEDOM OF EXPRESSION AND INFORMATION, FREEDOM OF ASSEMBLY, RIGHT TO PRIVACY, FREEDOM OF MOVEMENT, FREEDOM OF THOUGHT, FREEDOM OF ASSEMBLY
AI powered Decision Making in Banks - How Banks today are using Advanced analytics in credit Decisioning, enhancing customer life time value, lower operating costs and stronger customer acquisition
Banks are facing a world where profit is being compressed by:
• Historically low interest rates
• COVID-19 related credit losses
• Patchy economic recovery
• Fintech competition
The good news? Research shows that elevating their operational maturity helps banks outmaneuver the threats that tomorrow poses.
A two-tier model for CBDC would empower public-private partnerships and enable Digital Cash to be designed by central banks but distributed by commercial FI’s. Digital currencies, denominated in the domestic unit of account, would be privately issued and managed, although fully backed with central bank reserves and monitored centrally.
A talk presented at IEEE ComSoc workshop on Evolution of Data-centers in the context of 5G.
Discuss about what is edge computing and management issues in Edge Computing
HUMAN RIGHTS UNDER THREAT: FREEDOM OF EXPRESSION AND INFORMATION, FREEDOM OF ASSEMBLY, RIGHT TO PRIVACY, FREEDOM OF MOVEMENT, FREEDOM OF THOUGHT, FREEDOM OF ASSEMBLY
AI powered Decision Making in Banks - How Banks today are using Advanced analytics in credit Decisioning, enhancing customer life time value, lower operating costs and stronger customer acquisition
Congresso Sociedade Brasileira de Computação CSBC2016 Porto Alegre (Brazil)
Workshop on Cloud Networks & Cloudscape Brazil
Sergio Takeo Kofuji, Assistant Professor at the University of São Paulo, Coordinator to FI WARE LAB in University of São Paulo, Brazil
The European Commission, in a recent communication (April 19th), has identified 5G and Internet of Things (IoT) amongst the ICT standardisation priorities for the Digital Single Market (DSM). This session will discuss the emergence of the mobile edge computing paradigm to reduce the latency for processing near the source large quantities of data and the need of the emerging 5G technology to satisfy the requirements of different verticals. Mobile Edge Clouds have the potential to provide an enormous amount of resources, but it raises several research challenges related to the resilience, security, data portability and usage due to the presence of multiple trusted domains, as well as energy consumption of battery powered devices. Large and centralized clouds have been deployed and have shown how this paradigm can greatly improve performance and flexibility while reducing costs. However, there are many issues requiring solutions that are user and context aware, dynamic, and with the capability to handle heterogeneous demands and systems. This is a challenge triggered by the Internet of Things (IoT) scenario, which strongly requires cloud-based solutions that can be dynamically located and managed, on demand and with self-organization capabilities to serve the purposes of different verticals.
Today's customers are fundamentally different from customers of past years as they are harder to acquire, retain, and delight because of the explosion in digital technologies consumers use day to day. New digital experiences are forcing banks to play catch-up and match the innovative and engaging interactions and products — such as mobile payments — that non-banks are offering to those same customers. This IDC research, sponsored by TCS Digital Software & Solutions Group, revealed three key themes for digital transformation in the banking industry.
What is Predictive Analytics?
Predictive Analytics is the stream of the advanced analytics which utilizes diverse techniques like data mining, predictive modelling, statistics, machine learning and artificial intelligence to analyse current data and predict future.
To Know more: https://goo.gl/zAcnCR
LOAN DEFAULT PREDICTION – A CASE STUDY
Content Covered in this video:
Business Problem & Benefits
The Risk - LOAN DEFAULT PREDICTION
Data Analysis Process
Data Processing
Predictive Analysis Process
Tools & Technology
Fighting Financial Crime with Artificial IntelligenceDataWorks Summit
How can we take the state of the art in deep learning and AI research, and transplant it into a large bank to deliver useful results which impact the general public? To answer this broad-reaching question, we take the viewer through a solution Think Big Analytics recently deployed at a major European bank for fraud detection, using state of the art AI techniques and a near-real time open-source architecture. We show how financial transactions can be transposed into a form where the latest AI techniques in image recognition can be leveraged, in surprisingly novel ways. We have been able to more accurately detect fraud and reduce financial crime, cutting losses and improving customer experience. We describe some architectures which can be used to do this in production, at scale, in global financial institutions.
Speaker:
Tim Seears, Director of Data Science, Think Big Analytics, a Teradata Company
The Future of Fintech in Southeast AsiaFinch Capital
Finch Capital worked together with MDI Ventures and Dealroom to map the local FinTech ecosystem in Southeast Asia. We are sharing local funding and M&A data as well as our thoughts on the developments that shape local growth of Fintech companies
India Stack - Towards Presence-less, paperless and cashless service delivery....ProductNation/iSPIRT
IndiaStack has the potential to revolutionize the way government services of the future are delivered in a large country like India. The nation is looking for “a transition from technology-poor to innovation-rich society” and entrepreneurs have a good role to play. The problems (read opportunities) in financial services, healthcare and education are all so large that only the right technology and entrepreneurial brainpower can cost-effectively solve them. Solving these scale problems should mean great business sense too.
Credit Card Fraud Detection Using ML In DatabricksDatabricks
In the Credit Card Companies, illegitimate credit card usage is a serious problem which results in a need to accurately detect fraudulent transactions vs non-fraudulent transactions. All organizations can be hugely impacted by fraud and fraudulent activities, especially those in financial services. The threat can originate from internal or external, but the effects can be devastating – including loss of consumer confidence, incarceration for those involved, even up to downfall of a corporation. Despite regular fraud prevention measures, these are constantly being put to the test in an attempt to beat the system.
Fraud detection is a task of predicting whether a card has been used by the cardholder. One of the methods to recognize fraud card usage is to leverage Machine Learning (ML) models. In order to more dynamically detect fraudulent transactions, one can train ML models on a set of dataset including credit card transaction information as well as card and demographic information of the owner of the account. This will be our goal of the project while leveraging Databricks.
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.
Viewers will learn:
• Current trends in Cyber attacks
• FFIEC Cyber Assessment Toolkit
• NIST Cybersecurity Framework principles
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
About the Presenter:
Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention
Recorded Future Intel Cards provide actionable threat intelligence data neatly curated by investigation topic and presented in a comprehensive single view, saving analysts time otherwise spent connecting the dots themselves. The six Intel Card types are IP Address, Domain, Hash, Vulnerability, Malware, and Threat Actor.
SITEC eCommerce Class 4
Title: Online Payment
Presenter: Chan Kok Long, Executive Director (iPay88)
Date: 11 August 2015
Venue: The Canvas @ Damansara Perdana
Diving deep into literally millions of interactions and conversations with different networks such as Facebook, Twitter and Instagram, blogs, forums and news sites in order to bring you analytical info about how social media affects different sectors like:Sharing Economy, Banking and Finance, Ecommerce, Telecom and Fintech.
Loan Prediction system is a system which provides you a interface for loan approval to the applicants application of loan. Applicants provides the system about their personal information and according to their information system gives his status of availability of loan.
A look at why Caribbean cyber security is important, Caribbean experiences achieving cyber security, why an effective strategy is critical and the importance of an effective Information Governance strategy.
Congresso Sociedade Brasileira de Computação CSBC2016 Porto Alegre (Brazil)
Workshop on Cloud Networks & Cloudscape Brazil
Sergio Takeo Kofuji, Assistant Professor at the University of São Paulo, Coordinator to FI WARE LAB in University of São Paulo, Brazil
The European Commission, in a recent communication (April 19th), has identified 5G and Internet of Things (IoT) amongst the ICT standardisation priorities for the Digital Single Market (DSM). This session will discuss the emergence of the mobile edge computing paradigm to reduce the latency for processing near the source large quantities of data and the need of the emerging 5G technology to satisfy the requirements of different verticals. Mobile Edge Clouds have the potential to provide an enormous amount of resources, but it raises several research challenges related to the resilience, security, data portability and usage due to the presence of multiple trusted domains, as well as energy consumption of battery powered devices. Large and centralized clouds have been deployed and have shown how this paradigm can greatly improve performance and flexibility while reducing costs. However, there are many issues requiring solutions that are user and context aware, dynamic, and with the capability to handle heterogeneous demands and systems. This is a challenge triggered by the Internet of Things (IoT) scenario, which strongly requires cloud-based solutions that can be dynamically located and managed, on demand and with self-organization capabilities to serve the purposes of different verticals.
Today's customers are fundamentally different from customers of past years as they are harder to acquire, retain, and delight because of the explosion in digital technologies consumers use day to day. New digital experiences are forcing banks to play catch-up and match the innovative and engaging interactions and products — such as mobile payments — that non-banks are offering to those same customers. This IDC research, sponsored by TCS Digital Software & Solutions Group, revealed three key themes for digital transformation in the banking industry.
What is Predictive Analytics?
Predictive Analytics is the stream of the advanced analytics which utilizes diverse techniques like data mining, predictive modelling, statistics, machine learning and artificial intelligence to analyse current data and predict future.
To Know more: https://goo.gl/zAcnCR
LOAN DEFAULT PREDICTION – A CASE STUDY
Content Covered in this video:
Business Problem & Benefits
The Risk - LOAN DEFAULT PREDICTION
Data Analysis Process
Data Processing
Predictive Analysis Process
Tools & Technology
Fighting Financial Crime with Artificial IntelligenceDataWorks Summit
How can we take the state of the art in deep learning and AI research, and transplant it into a large bank to deliver useful results which impact the general public? To answer this broad-reaching question, we take the viewer through a solution Think Big Analytics recently deployed at a major European bank for fraud detection, using state of the art AI techniques and a near-real time open-source architecture. We show how financial transactions can be transposed into a form where the latest AI techniques in image recognition can be leveraged, in surprisingly novel ways. We have been able to more accurately detect fraud and reduce financial crime, cutting losses and improving customer experience. We describe some architectures which can be used to do this in production, at scale, in global financial institutions.
Speaker:
Tim Seears, Director of Data Science, Think Big Analytics, a Teradata Company
The Future of Fintech in Southeast AsiaFinch Capital
Finch Capital worked together with MDI Ventures and Dealroom to map the local FinTech ecosystem in Southeast Asia. We are sharing local funding and M&A data as well as our thoughts on the developments that shape local growth of Fintech companies
India Stack - Towards Presence-less, paperless and cashless service delivery....ProductNation/iSPIRT
IndiaStack has the potential to revolutionize the way government services of the future are delivered in a large country like India. The nation is looking for “a transition from technology-poor to innovation-rich society” and entrepreneurs have a good role to play. The problems (read opportunities) in financial services, healthcare and education are all so large that only the right technology and entrepreneurial brainpower can cost-effectively solve them. Solving these scale problems should mean great business sense too.
Credit Card Fraud Detection Using ML In DatabricksDatabricks
In the Credit Card Companies, illegitimate credit card usage is a serious problem which results in a need to accurately detect fraudulent transactions vs non-fraudulent transactions. All organizations can be hugely impacted by fraud and fraudulent activities, especially those in financial services. The threat can originate from internal or external, but the effects can be devastating – including loss of consumer confidence, incarceration for those involved, even up to downfall of a corporation. Despite regular fraud prevention measures, these are constantly being put to the test in an attempt to beat the system.
Fraud detection is a task of predicting whether a card has been used by the cardholder. One of the methods to recognize fraud card usage is to leverage Machine Learning (ML) models. In order to more dynamically detect fraudulent transactions, one can train ML models on a set of dataset including credit card transaction information as well as card and demographic information of the owner of the account. This will be our goal of the project while leveraging Databricks.
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.
Viewers will learn:
• Current trends in Cyber attacks
• FFIEC Cyber Assessment Toolkit
• NIST Cybersecurity Framework principles
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
About the Presenter:
Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention
Recorded Future Intel Cards provide actionable threat intelligence data neatly curated by investigation topic and presented in a comprehensive single view, saving analysts time otherwise spent connecting the dots themselves. The six Intel Card types are IP Address, Domain, Hash, Vulnerability, Malware, and Threat Actor.
SITEC eCommerce Class 4
Title: Online Payment
Presenter: Chan Kok Long, Executive Director (iPay88)
Date: 11 August 2015
Venue: The Canvas @ Damansara Perdana
Diving deep into literally millions of interactions and conversations with different networks such as Facebook, Twitter and Instagram, blogs, forums and news sites in order to bring you analytical info about how social media affects different sectors like:Sharing Economy, Banking and Finance, Ecommerce, Telecom and Fintech.
Loan Prediction system is a system which provides you a interface for loan approval to the applicants application of loan. Applicants provides the system about their personal information and according to their information system gives his status of availability of loan.
A look at why Caribbean cyber security is important, Caribbean experiences achieving cyber security, why an effective strategy is critical and the importance of an effective Information Governance strategy.
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Protection against the dangers of cyberspace, support for innovation in cyberspace and the growth of the emirate and its economic prosperity, are the motives of Dubai cyber security strategy.
This presentation presentated by Mohd Shamir B Hasyim, Vice President Government and Multilateral Engagement, Cyber Security Malaysia, 10th September 2013 on #IISF2013
An Integrated Approach For Cyber Security And Critical Information Infrastructure Protection
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
Lecture on cybersecurity in ASEAN and Singapore
- Definitions of cybersecurity in ASEAN (vs western definitions)
- Cyber threat landscape in ASEAN / types of cyber incidents and cyber crime in ASEAN
Why ASEAN is vulnerable
- Characteristics of ASEAN in cyberspace
non-interference, sovereignty
non-attribution of cyber attackers
- ASEAN cooperation in cyberspace
AMCC (ASEAN Ministers Cyber Conference)
ACICE (ADMM Cyber Info Centre of Excellence)
INTERPOL
A presentation on:
Nigerian Students, Technology Education and Cyber Crime
By Remmy Nweke
Pioneer Branch Secretary,
Cyber Security Expert Association of Nigeria (CSEAN)
Lead Strategist/Group Executive Editor,
DigitalSENSE Africa Media Group
[DigitalSENSE Business News,, ITRealms,, NaijaAgroNet]
@ 2018 Safer Internet Day
organized by ICLDNG
----------------
Itolo Girl’s Senior Secondary School,
Itolo Street, Off Eric More Road, Surulere, Lagos
----------------
on Tuesday 6th February 2018
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
For all critical sectors to establish robust and systematic cyber risk management processes and capabilities
Systematic cyber risk management framework
risk assessments, vulnerability assessments and system reviews;
well-informed and conscious trade-offs in security, cost and functionality
sound systems and procedures to mitigate and manage these risks, including disaster recovery and business continuity plans;
effective implementation that encompasses awareness building and training across the organisation
continuous measurement of performance through process audits and cyber-security exercises.
Verbit - The State of Inclusivity, A Global PerspectiveEthical Sector
On 12 January, the Embassy of Israel in Myanmar in collaboration with the Myanmar Centre for Responsible Business (MCRB), Myanmar-Israel Chamber of Commerce, Industry and Innovation (MICCI), and Access Israel held a webinar to share experiences on the role of businesses in making their products and/or services more accessible and inclusive for persons with disabilities in Myanmar.
Read more: https://www.myanmar-responsiblebusiness.org/news/assistive-technologies-b2c-services.html
On 12 January, the Embassy of Israel in Myanmar in collaboration with the Myanmar Centre for Responsible Business (MCRB), Myanmar-Israel Chamber of Commerce, Industry and Innovation (MICCI), and Access Israel held a webinar to share experiences on the role of businesses in making their products and/or services more accessible and inclusive for persons with disabilities in Myanmar.
Read more: https://www.myanmar-responsiblebusiness.org/news/assistive-technologies-b2c-services.html
On 12 January, the Embassy of Israel in Myanmar in collaboration with the Myanmar Centre for Responsible Business (MCRB), Myanmar-Israel Chamber of Commerce, Industry and Innovation (MICCI), and Access Israel held a webinar to share experiences on the role of businesses in making their products and/or services more accessible and inclusive for persons with disabilities in Myanmar.
Read more: https://www.myanmar-responsiblebusiness.org/news/assistive-technologies-b2c-services.html
Labour Issues in the Telecom Sector: Myanmar Labour Laws and Reform PlansEthical Sector
MCRB with the support of mobile operators Telenor and Ooredoo and the participation of the Factories and General Labour Laws Inspection Department (FGLLID) of the Ministry of Labour, Immigration and Population (MOLIP), facilitated a peer-to-peer workshop on 7 October 2016 for mobile network operators and tier 1 and tier 2 subcontractors, and consultants.
Read more: https://www.myanmar-responsiblebusiness.org/news/discussion-issues-telecom-sector.html
Community Grievance Management ExperiencesEthical Sector
MCRB with the support of mobile operators Telenor and Ooredoo and the participation of the Factories and General Labour Laws Inspection Department (FGLLID) of the Ministry of Labour, Immigration and Population (MOLIP), facilitated a peer-to-peer workshop on 7 October 2016 for mobile network operators and tier 1 and tier 2 subcontractors, and consultants.
Read more: https://www.myanmar-responsiblebusiness.org/news/discussion-issues-telecom-sector.html
MCRB with the support of mobile operators Telenor and Ooredoo and the participation of the Factories and General Labour Laws Inspection Department (FGLLID) of the Ministry of Labour, Immigration and Population (MOLIP), facilitated a peer-to-peer workshop on 7 October 2016 for mobile network operators and tier 1 and tier 2 subcontractors, and consultants.
Read more: https://www.myanmar-responsiblebusiness.org/news/discussion-issues-telecom-sector.html
MCRB with the support of mobile operators Telenor and Ooredoo and the participation of the Factories and General Labour Laws Inspection Department (FGLLID) of the Ministry of Labour, Immigration and Population (MOLIP), facilitated a peer-to-peer workshop on 7 October 2016 for mobile network operators and tier 1 and tier 2 subcontractors, and consultants.
Read more: https://www.myanmar-responsiblebusiness.org/news/discussion-issues-telecom-sector.html
MCRB with the support of mobile operators Telenor and Ooredoo and the participation of the Factories and General Labour Laws Inspection Department (FGLLID) of the Ministry of Labour, Immigration and Population (MOLIP), facilitated a peer-to-peer workshop on 7 October 2016 for mobile network operators and tier 1 and tier 2 subcontractors, and consultants.
Read more: https://www.myanmar-responsiblebusiness.org/news/discussion-issues-telecom-sector.html
Workshop on Safety and Labour Issues in the Myanmar Telecoms SectorEthical Sector
MCRB with the support of mobile operators Telenor and Ooredoo and the participation of the Factories and General Labour Laws Inspection Department (FGLLID) of the Ministry of Labour, Immigration and Population (MOLIP), facilitated a peer-to-peer workshop on 7 October 2016 for mobile network operators and tier 1 and tier 2 subcontractors, and consultants.
Read more: https://www.myanmar-responsiblebusiness.org/news/discussion-issues-telecom-sector.html
Virtual Roundtable Discussion with CSOs on Extractives and Inclusive BusinessEthical Sector
On 26 November 2020, MCRB held its first virtual roundtable discussion series with Civil Society Organizations on “Extractives and Inclusive Business”.
Read more: https://www.myanmar-responsiblebusiness.org/news/virtual-roundtable-discussion-extractives-and-inclusive-business.html
On September 25, 2020, AirQualityAsia in cooperation with Green Economy Caucus (GEC), House of Representatives, Indonesia organized a webinar on the theme “Raising Awareness towards Pollution and Its Impacts to Human Health.”
Read more: https://www.airqualityasia.org/news/raising-awareness-towards-pollution.html
Health and Pollution Action Planning (HPAP)Ethical Sector
On September 25, 2020, AirQualityAsia in cooperation with Green Economy Caucus (GEC), House of Representatives, Indonesia organized a webinar on the theme “Raising Awareness towards Pollution and Its Impacts to Human Health.”
Read more: https://www.airqualityasia.org/news/raising-awareness-towards-pollution.html
On September 25, 2020, AirQualityAsia in cooperation with Green Economy Caucus (GEC), House of Representatives, Indonesia organized a webinar on the theme “Raising Awareness towards Pollution and Its Impacts to Human Health.”
Read more: https://www.airqualityasia.org/news/raising-awareness-towards-pollution.html
Dr. Dewi Aryani : Raising Awareness Towards Pollution and its Impact to Human...Ethical Sector
On September 25, 2020, AirQualityAsia in cooperation with Green Economy Caucus (GEC), House of Representatives, Indonesia organized a webinar on the theme “Raising Awareness towards Pollution and Its Impacts to Human Health.”
Read more: https://www.airqualityasia.org/news/raising-awareness-towards-pollution.html
How are Persons with Disabilities in Myanmar Experiencing Covid-19, Including...Ethical Sector
On 22 May, Hnin Wut Yee and Myint Naing Kyaw of MCRB participated in a webinar on Disability Inclusion in Crisis Response organised by the Myanmar Business Coalition for Gender Equality (BCGE) attended by around 50 participants, mainly from civil society organisations, with sign language interpretation.
Read more: https://www.myanmar-responsiblebusiness.org/news/persons-with-disabilities-covid-19.html
Launch of the 2020 Pwint Thit Sa Report research phaseEthical Sector
Companies in January received a letter to inform them of the methodology and timetable for the 2020 report. A workshop on Monday 3 February was held in Yangon attended by over 60 participants to explain the main changes and approach for the 2020 report, and answer initial queries.
Read more: https://www.myanmar-responsiblebusiness.org/pwint-thit-sa/2020.html
MCRB and Yever held a webinar on 14 May to explain the scoring process so far.
Read more: https://www.myanmar-responsiblebusiness.org/pwint-thit-sa/2020.html
Business & Digital Rights (Myanmar Business Associations Status)Ethical Sector
The Fourth Myanmar Digital Rights Forum took place on 28/29 February 2020 at Rose Garden Hotel, Yangon attended by over 350 participants, including senior government officials, MPs, civil society organisations, media, businesses and international human rights and digital rights experts and academics.
Read more: https://www.myanmar-responsiblebusiness.org/news/digital-rights-forum-2020.html
The Fourth Myanmar Digital Rights Forum took place on 28/29 February 2020 at Rose Garden Hotel, Yangon attended by over 350 participants, including senior government officials, MPs, civil society organisations, media, businesses and international human rights and digital rights experts and academics.
Read more: https://www.myanmar-responsiblebusiness.org/news/digital-rights-forum-2020.html
The Fourth Myanmar Digital Rights Forum took place on 28/29 February 2020 at Rose Garden Hotel, Yangon attended by over 350 participants, including senior government officials, MPs, civil society organisations, media, businesses and international human rights and digital rights experts and academics.
Read more: https://www.myanmar-responsiblebusiness.org/news/digital-rights-forum-2020.html
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
Russian anarchist and anti-war movement in the third year of full-scale warAntti Rautiainen
Anarchist group ANA Regensburg hosted my online-presentation on 16th of May 2024, in which I discussed tactics of anti-war activism in Russia, and reasons why the anti-war movement has not been able to make an impact to change the course of events yet. Cases of anarchists repressed for anti-war activities are presented, as well as strategies of support for political prisoners, and modest successes in supporting their struggles.
Thumbnail picture is by MediaZona, you may read their report on anti-war arson attacks in Russia here: https://en.zona.media/article/2022/10/13/burn-map
Links:
Autonomous Action
http://Avtonom.org
Anarchist Black Cross Moscow
http://Avtonom.org/abc
Solidarity Zone
https://t.me/solidarity_zone
Memorial
https://memopzk.org/, https://t.me/pzk_memorial
OVD-Info
https://en.ovdinfo.org/antiwar-ovd-info-guide
RosUznik
https://rosuznik.org/
Uznik Online
http://uznikonline.tilda.ws/
Russian Reader
https://therussianreader.com/
ABC Irkutsk
https://abc38.noblogs.org/
Send mail to prisoners from abroad:
http://Prisonmail.online
YouTube: https://youtu.be/c5nSOdU48O8
Spotify: https://podcasters.spotify.com/pod/show/libertarianlifecoach/episodes/Russian-anarchist-and-anti-war-movement-in-the-third-year-of-full-scale-war-e2k8ai4
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
What is the point of small housing associations.pptxPaul Smith
Given the small scale of housing associations and their relative high cost per home what is the point of them and how do we justify their continued existance
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
2024: The FAR - Federal Acquisition Regulations, Part 36
Data Protection: balancing convenience, privacy and security
1. Myanmar Digital Rights Forum 2019
Data Protection: balancing convenience, privacy and security
Date: 19th January 2019 Place: Yangon
U Yan Naung Soe
Assistant Director
Department of Information Technology and Cyber Security
Government’s policy and plans on data protection, transfer and storage
2. 1. Objectives of Presentation
2. ICT Status in Myanmar
3. Organization Structure of Telecom Sector and ITCS
4. Vision, Mission, Duties and NCSC’s Awareness Program
5. ICT Laws in Myanmar
6. Does Myanmar need Cyber Law?
7. Myanmar Cyber Law (Draft)
8. Challenges
9. Conclusion
2
Outlines of Presentation
3. qTo share Government’s policy and plans on data
protection, transfer and storage
1. Objectives of Presentation
3
4. 2. ICT Status of Myanmar
4
• In Myanmar internet service was introduced in 2000.
• Four Nation wide Integrated Telecom Operators in Myanmar
Ø MPT-KSGM JO
Ø Telenor Myanmar Ltd
Ø Ooredoo Myanmar Ltd
ØMytel
• Telephone Density 110%, Smart Phone Usage 80%
• Mobile Network Coverage 85 ~ 90 %
• More than seven International Internet Gateways.
• International Internet Backbone Capacity is more than 350 Gbps.
• ISP (MPT KSGM, TML, OML, Yatanarpon, MyanmarNet, 5BB, Fortune,
Skynet, Frontier, etc.)
5. Posts & Telecom
Dept (Regulator)
Dept of Information
Technology and
Cyber Security
Ministry of Transport and Communications (MoTC)
Deputy Minister 1
Myanmar Telecom
(Telecom Operator)
Myanmar Posts
(Postal & Telegraph
Service)
Transport Sector (Road/ Railway/
Maritime/ Air Transports) Communications Sector
Deputy Minister 2
3. Organization Structure of MOTC (Comm: Sector)
5
6. Admin &
Finance
Dept
Training
Center
E-Govt
Dept
Legal, IR &
Information
National Cyber
Security Center
(NCSC)
Satellite
Comm:
Dept
Operations Dept
Information
Security Dept
Security
Audit Dept
mmCERT
Information Technology and Cyber Security Department
6
3. Organization Structure of ITCSD
7. qTo monitor, observe, audits, alert, analyze, prevent and
provide the technical advisory concern with cyber
security, cyber incidents and cyber threats.
7
4. Vision and Mission of NCSC
qTo create the environment where all ministries can
provide online services securely and all citizens can
access E-government services safely.
Vision of NCSC
Mission of NCSC
8. vDuties and responsibilities of Operation Department are to
monitor the cyber security of IXP, ISP, .mm domain, govern-
ment websites and critical information infrastructure.
vDuties and responsibilities of mmCERT are to disseminate
security information and advisories, to provide technical
assistance to the necessary organizations such as
Government agencies, ISP and finance sectors, emergency
response plan, research & development, to develop web
engineering and to cooperate with law enforcement
organizations to track and trace cyber crimes .
8
4. Duties and Responsibilities of NCSC
11. § mmCERT participated ACID (ASEAN CERT Incident Drill) and APCERT
Drill
§ NCSC trained staffs in local and international cyber security trainings
§ Cyber Security Fundamental Courses were opened annually in ITCSD
Training Center
§ NCSC holds Coordination Meetings for Cyber Security
NCSC’s Capacity Building and Awareness Raising Program
11
12. v NCSC conducted Cyber Security Awareness Program in ICT Exhibition
(2017, 2018)
v NCSC conducted Myanmar Cyber Security Competition (2018)
v NCSC participated in Myanmar Youth Development Festival (2018) for
cyber security awareness
v Myanmar also participated the 9th Singapore Cyber Conquest in
September 2018.
v US-UAGO Transnational Crime Program (2018)
v Cyber BayKin (with Australia Embassy and MOTC) (2018) 12
NCSC’s Capacity Building and Awareness Raising Program
23. v Computer Science Development Law (1996)
v Electronics Transaction Law (2004)
v Telecommunications Law (2013)
v Cyber Law (Draft)
5. ICT Laws in Myanmar
23
24. qICT sector is developing very fast in Myanmar.
qE-Government Services are accelerating.
qOnline shopping is popular among youths.
qE-Commerce becomes booming in Myanmar.
qMore cyber attacks and incidents occurs in Myanmar.
qCyber Crimes are rising in Myanmar.
qExisting Laws can’t solve all the cyber related crimes.
qMost of ASEAN member states enacted cyber law.
6.Does Myanmar need Cyber Law ?
24
25. v Department of Information Technology & Cyber Security
v Posts & Telecommunication Department
v MOHA / Myanmar Police Force
v Union Attorney General Office
v Ministry of Education/ University of Computer Studies
v Myanmar Computer Federation (MCF)
v Civil Society Organizations (CSO)
Concerning Stakeholders of Cyber Law Drafting
25
26. v Budapest Convention on Cyber Crime
v India IT Act 2000
v Singapore Cyber Act 2018
v Japan Cyber Law
Cyber Law shall cover the following area:
1. Cyber Security & Cyber Crime
2. E-Governance
3. E-Commerce
Reference and Coverage of Cyber Law
26
27. qDefinitions
qObjectives
qCyber Security Committee
qLicensing of Cyber Security Service Provider
qCritical Information Infrastructure Protection
qPersonnel Data Protection
qResponse and Investigation of Cyber Security Threats and Incidents
qSocial Media
qE-Governance
qE-Commerce
qOffences
qGeneral
7. Myanmar Cyber Law (Draft)
27
28. üLack of Cyber Security Master Plan, Law and Regulation,
üInsufficient human resources in terms of quality and quantity.
üLimited budget to implement the cyber security infrastructure.
üLack of public’s awareness for cyber security and data protection.
üNot clearly defined the roles and responsibilities between NCSC and
Cyber Crime Division of Myanmar Police Force.
8. Challenges
28
29. 9. Conclusion
29
§ Knowledge sharing between inter ministries and CSO.
§ Capacity Building (Local & International)
§ Cooperation and coordination between inter ministries and CSO.
§ Cyber Security and Cyber Crime Awareness Raising Programs
§ Implement the necessary cyber security systems at Telecom Operators,
ISP and Data Centers
§ 24x7 monitoring the cyber attacks and incidents
§ Cooperation with local, regional and international organizations