SlideShare a Scribd company logo
Myanmar Digital Rights Forum 2019
Data Protection: balancing convenience, privacy and security
Date: 19th January 2019 Place: Yangon
U Yan Naung Soe
Assistant Director
Department of Information Technology and Cyber Security
Government’s policy and plans on data protection, transfer and storage
1. Objectives of Presentation
2. ICT Status in Myanmar
3. Organization Structure of Telecom Sector and ITCS
4. Vision, Mission, Duties and NCSC’s Awareness Program
5. ICT Laws in Myanmar
6. Does Myanmar need Cyber Law?
7. Myanmar Cyber Law (Draft)
8. Challenges
9. Conclusion
2
Outlines of Presentation
qTo share Government’s policy and plans on data
protection, transfer and storage
1. Objectives of Presentation
3
2. ICT Status of Myanmar
4
• In Myanmar internet service was introduced in 2000.
• Four Nation wide Integrated Telecom Operators in Myanmar
Ø MPT-KSGM JO
Ø Telenor Myanmar Ltd
Ø Ooredoo Myanmar Ltd
ØMytel
• Telephone Density 110%, Smart Phone Usage 80%
• Mobile Network Coverage 85 ~ 90 %
• More than seven International Internet Gateways.
• International Internet Backbone Capacity is more than 350 Gbps.
• ISP (MPT KSGM, TML, OML, Yatanarpon, MyanmarNet, 5BB, Fortune,
Skynet, Frontier, etc.)
Posts & Telecom
Dept (Regulator)
Dept of Information
Technology and
Cyber Security
Ministry of Transport and Communications (MoTC)
Deputy Minister 1
Myanmar Telecom
(Telecom Operator)
Myanmar Posts
(Postal & Telegraph
Service)
Transport Sector (Road/ Railway/
Maritime/ Air Transports) Communications Sector
Deputy Minister 2
3. Organization Structure of MOTC (Comm: Sector)
5
Admin &
Finance
Dept
Training
Center
E-Govt
Dept
Legal, IR &
Information
National Cyber
Security Center
(NCSC)
Satellite
Comm:
Dept
Operations Dept
Information
Security Dept
Security
Audit Dept
mmCERT
Information Technology and Cyber Security Department
6
3. Organization Structure of ITCSD
qTo monitor, observe, audits, alert, analyze, prevent and
provide the technical advisory concern with cyber
security, cyber incidents and cyber threats.
7
4. Vision and Mission of NCSC
qTo create the environment where all ministries can
provide online services securely and all citizens can
access E-government services safely.
Vision of NCSC
Mission of NCSC
vDuties and responsibilities of Operation Department are to
monitor the cyber security of IXP, ISP, .mm domain, govern-
ment websites and critical information infrastructure.
vDuties and responsibilities of mmCERT are to disseminate
security information and advisories, to provide technical
assistance to the necessary organizations such as
Government agencies, ISP and finance sectors, emergency
response plan, research & development, to develop web
engineering and to cooperate with law enforcement
organizations to track and trace cyber crimes .
8
4. Duties and Responsibilities of NCSC
NCSC’s Awareness Program
9
NCSC’s Awareness Program
10
§ mmCERT participated ACID (ASEAN CERT Incident Drill) and APCERT
Drill
§ NCSC trained staffs in local and international cyber security trainings
§ Cyber Security Fundamental Courses were opened annually in ITCSD
Training Center
§ NCSC holds Coordination Meetings for Cyber Security
NCSC’s Capacity Building and Awareness Raising Program
11
v NCSC conducted Cyber Security Awareness Program in ICT Exhibition
(2017, 2018)
v NCSC conducted Myanmar Cyber Security Competition (2018)
v NCSC participated in Myanmar Youth Development Festival (2018) for
cyber security awareness
v Myanmar also participated the 9th Singapore Cyber Conquest in
September 2018.
v US-UAGO Transnational Crime Program (2018)
v Cyber BayKin (with Australia Embassy and MOTC) (2018) 12
NCSC’s Capacity Building and Awareness Raising Program
E-Government Conference and ICT Exhibition (2017)
13
E-Government Conference and ICT Exhibition (2017)
14
Cyber Security Awareness at University of IT (2017)
15
Cyber Security Challenge Competition (2018)
16
17
Myanmar Youth Development Festival (2018)
18
Myanmar Youth Development Festival (2018)
19
9th Singapore Cyber Conquest (2018 Oct)
US-UAGO Transnational Crime Program (2018)
20
Cyber Bay Kin: Secure a Digital Myanmar (2018 )
21
22
Coordination Meetings for Cyber Security
v Computer Science Development Law (1996)
v Electronics Transaction Law (2004)
v Telecommunications Law (2013)
v Cyber Law (Draft)
5. ICT Laws in Myanmar
23
qICT sector is developing very fast in Myanmar.
qE-Government Services are accelerating.
qOnline shopping is popular among youths.
qE-Commerce becomes booming in Myanmar.
qMore cyber attacks and incidents occurs in Myanmar.
qCyber Crimes are rising in Myanmar.
qExisting Laws can’t solve all the cyber related crimes.
qMost of ASEAN member states enacted cyber law.
6.Does Myanmar need Cyber Law ?
24
v Department of Information Technology & Cyber Security
v Posts & Telecommunication Department
v MOHA / Myanmar Police Force
v Union Attorney General Office
v Ministry of Education/ University of Computer Studies
v Myanmar Computer Federation (MCF)
v Civil Society Organizations (CSO)
Concerning Stakeholders of Cyber Law Drafting
25
v Budapest Convention on Cyber Crime
v India IT Act 2000
v Singapore Cyber Act 2018
v Japan Cyber Law
Cyber Law shall cover the following area:
1. Cyber Security & Cyber Crime
2. E-Governance
3. E-Commerce
Reference and Coverage of Cyber Law
26
qDefinitions
qObjectives
qCyber Security Committee
qLicensing of Cyber Security Service Provider
qCritical Information Infrastructure Protection
qPersonnel Data Protection
qResponse and Investigation of Cyber Security Threats and Incidents
qSocial Media
qE-Governance
qE-Commerce
qOffences
qGeneral
7. Myanmar Cyber Law (Draft)
27
üLack of Cyber Security Master Plan, Law and Regulation,
üInsufficient human resources in terms of quality and quantity.
üLimited budget to implement the cyber security infrastructure.
üLack of public’s awareness for cyber security and data protection.
üNot clearly defined the roles and responsibilities between NCSC and
Cyber Crime Division of Myanmar Police Force.
8. Challenges
28
9. Conclusion
29
§ Knowledge sharing between inter ministries and CSO.
§ Capacity Building (Local & International)
§ Cooperation and coordination between inter ministries and CSO.
§ Cyber Security and Cyber Crime Awareness Raising Programs
§ Implement the necessary cyber security systems at Telecom Operators,
ISP and Data Centers
§ 24x7 monitoring the cyber attacks and incidents
§ Cooperation with local, regional and international organizations
Thank you so much.
30
yannaungsoe@ncsc.gov.mm

More Related Content

What's hot

Cybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentationCybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentation
Monchai Phaichitchan
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
EUBrasilCloudFORUM .
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
Graham Mann
 
Success Factors for Digital Transformation in Banking
Success Factors for Digital Transformation in BankingSuccess Factors for Digital Transformation in Banking
Success Factors for Digital Transformation in Banking
Tata Consultancy Services
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
gbsmith5
 
Case Study: Loan default prediction
Case Study: Loan default predictionCase Study: Loan default prediction
Case Study: Loan default prediction
ALTEN Calsoft Labs
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
Nathan Desfontaines
 
Fighting Financial Crime with Artificial Intelligence
Fighting Financial Crime with Artificial IntelligenceFighting Financial Crime with Artificial Intelligence
Fighting Financial Crime with Artificial Intelligence
DataWorks Summit
 
The Future of Fintech in Southeast Asia
The Future of Fintech in Southeast AsiaThe Future of Fintech in Southeast Asia
The Future of Fintech in Southeast Asia
Finch Capital
 
Starling Bank - A Cloud Bank
Starling Bank - A Cloud BankStarling Bank - A Cloud Bank
Starling Bank - A Cloud Bank
Amazon Web Services
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
eteshagarwal1
 
India Stack - Towards Presence-less, paperless and cashless service delivery....
India Stack - Towards Presence-less, paperless and cashless service delivery....India Stack - Towards Presence-less, paperless and cashless service delivery....
India Stack - Towards Presence-less, paperless and cashless service delivery....
ProductNation/iSPIRT
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In Databricks
Databricks
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 
Overview of Recorded Future Intel Cards
Overview of Recorded Future Intel CardsOverview of Recorded Future Intel Cards
Overview of Recorded Future Intel Cards
Recorded Future
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
ankit panigrahy
 
Payment Gateway by iPay88
Payment Gateway by iPay88Payment Gateway by iPay88
Payment Gateway by iPay88
sitecmy
 
State of fintech report
State of fintech reportState of fintech report
State of fintech report
PAYFORT
 
Loan prediction
Loan predictionLoan prediction
Loan prediction
Akshay Jadhav
 

What's hot (20)

Cybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentationCybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentation
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Success Factors for Digital Transformation in Banking
Success Factors for Digital Transformation in BankingSuccess Factors for Digital Transformation in Banking
Success Factors for Digital Transformation in Banking
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Case Study: Loan default prediction
Case Study: Loan default predictionCase Study: Loan default prediction
Case Study: Loan default prediction
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
 
Fighting Financial Crime with Artificial Intelligence
Fighting Financial Crime with Artificial IntelligenceFighting Financial Crime with Artificial Intelligence
Fighting Financial Crime with Artificial Intelligence
 
The Future of Fintech in Southeast Asia
The Future of Fintech in Southeast AsiaThe Future of Fintech in Southeast Asia
The Future of Fintech in Southeast Asia
 
Starling Bank - A Cloud Bank
Starling Bank - A Cloud BankStarling Bank - A Cloud Bank
Starling Bank - A Cloud Bank
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
India Stack - Towards Presence-less, paperless and cashless service delivery....
India Stack - Towards Presence-less, paperless and cashless service delivery....India Stack - Towards Presence-less, paperless and cashless service delivery....
India Stack - Towards Presence-less, paperless and cashless service delivery....
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In Databricks
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Overview of Recorded Future Intel Cards
Overview of Recorded Future Intel CardsOverview of Recorded Future Intel Cards
Overview of Recorded Future Intel Cards
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
 
Payment Gateway by iPay88
Payment Gateway by iPay88Payment Gateway by iPay88
Payment Gateway by iPay88
 
State of fintech report
State of fintech reportState of fintech report
State of fintech report
 
Loan prediction
Loan predictionLoan prediction
Loan prediction
 

Similar to Data Protection: balancing convenience, privacy and security

The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
Fahmi Albaheth
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
vikawotar
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdf
Fiyona Nourin
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
Directorate of Information Security | Ditjen Aptika
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Benjamin Ang
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
Remmy Nweke, mNGE, mNUJ, mGOCOP
 
The Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanThe Present and the Future ISAC in Taiwan
The Present and the Future ISAC in Taiwan
APNIC
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
Khalizan Halid
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
Yuri Anisimov
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
dotZADNA
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
ITU
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
Chintan Pathak
 

Similar to Data Protection: balancing convenience, privacy and security (20)

The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdf
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
 
The Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanThe Present and the Future ISAC in Taiwan
The Present and the Future ISAC in Taiwan
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 

More from Ethical Sector

Verbit - The State of Inclusivity, A Global Perspective
Verbit - The State of Inclusivity, A Global PerspectiveVerbit - The State of Inclusivity, A Global Perspective
Verbit - The State of Inclusivity, A Global Perspective
Ethical Sector
 
Acoustic Protocol 2021
Acoustic Protocol 2021Acoustic Protocol 2021
Acoustic Protocol 2021
Ethical Sector
 
Skillset
SkillsetSkillset
Skillset
Ethical Sector
 
Labour Issues in the Telecom Sector: Myanmar Labour Laws and Reform Plans
Labour Issues in the Telecom Sector: Myanmar Labour Laws and Reform PlansLabour Issues in the Telecom Sector: Myanmar Labour Laws and Reform Plans
Labour Issues in the Telecom Sector: Myanmar Labour Laws and Reform Plans
Ethical Sector
 
Community Grievance Management Experiences
Community Grievance Management ExperiencesCommunity Grievance Management Experiences
Community Grievance Management Experiences
Ethical Sector
 
Community Outreach (SLO)
Community Outreach (SLO)Community Outreach (SLO)
Community Outreach (SLO)
Ethical Sector
 
Workplace Safety in Telecom Industry
Workplace Safety in Telecom IndustryWorkplace Safety in Telecom Industry
Workplace Safety in Telecom Industry
Ethical Sector
 
Health and Safety in Myanmar
Health and Safety in MyanmarHealth and Safety in Myanmar
Health and Safety in Myanmar
Ethical Sector
 
Workshop on Safety and Labour Issues in the Myanmar Telecoms Sector
Workshop on Safety and Labour Issues in the Myanmar Telecoms SectorWorkshop on Safety and Labour Issues in the Myanmar Telecoms Sector
Workshop on Safety and Labour Issues in the Myanmar Telecoms Sector
Ethical Sector
 
Virtual Roundtable Discussion with CSOs on Extractives and Inclusive Business
Virtual Roundtable Discussion with CSOs on Extractives and Inclusive BusinessVirtual Roundtable Discussion with CSOs on Extractives and Inclusive Business
Virtual Roundtable Discussion with CSOs on Extractives and Inclusive Business
Ethical Sector
 
AirQualityAsia
AirQualityAsiaAirQualityAsia
AirQualityAsia
Ethical Sector
 
Health and Pollution Action Planning (HPAP)
Health and Pollution Action Planning (HPAP)Health and Pollution Action Planning (HPAP)
Health and Pollution Action Planning (HPAP)
Ethical Sector
 
HPAP - Health and Pollution Action Plan
HPAP - Health and Pollution Action PlanHPAP - Health and Pollution Action Plan
HPAP - Health and Pollution Action Plan
Ethical Sector
 
Dr. Dewi Aryani : Raising Awareness Towards Pollution and its Impact to Human...
Dr. Dewi Aryani : Raising Awareness Towards Pollution and its Impact to Human...Dr. Dewi Aryani : Raising Awareness Towards Pollution and its Impact to Human...
Dr. Dewi Aryani : Raising Awareness Towards Pollution and its Impact to Human...
Ethical Sector
 
How are Persons with Disabilities in Myanmar Experiencing Covid-19, Including...
How are Persons with Disabilities in Myanmar Experiencing Covid-19, Including...How are Persons with Disabilities in Myanmar Experiencing Covid-19, Including...
How are Persons with Disabilities in Myanmar Experiencing Covid-19, Including...
Ethical Sector
 
Launch of the 2020 Pwint Thit Sa Report research phase
Launch of the 2020 Pwint Thit Sa Report research phaseLaunch of the 2020 Pwint Thit Sa Report research phase
Launch of the 2020 Pwint Thit Sa Report research phase
Ethical Sector
 
2020 Pwint Thit Sa - Webinar
2020 Pwint Thit Sa - Webinar2020 Pwint Thit Sa - Webinar
2020 Pwint Thit Sa - Webinar
Ethical Sector
 
Business & Digital Rights (Myanmar Business Associations Status)
Business & Digital Rights (Myanmar Business Associations Status)Business & Digital Rights (Myanmar Business Associations Status)
Business & Digital Rights (Myanmar Business Associations Status)
Ethical Sector
 
4b steve crown mdrf 2020
4b steve crown mdrf 20204b steve crown mdrf 2020
4b steve crown mdrf 2020
Ethical Sector
 
3e myanmar consumers u nion mdrf2020
3e myanmar consumers u nion mdrf20203e myanmar consumers u nion mdrf2020
3e myanmar consumers u nion mdrf2020
Ethical Sector
 

More from Ethical Sector (20)

Verbit - The State of Inclusivity, A Global Perspective
Verbit - The State of Inclusivity, A Global PerspectiveVerbit - The State of Inclusivity, A Global Perspective
Verbit - The State of Inclusivity, A Global Perspective
 
Acoustic Protocol 2021
Acoustic Protocol 2021Acoustic Protocol 2021
Acoustic Protocol 2021
 
Skillset
SkillsetSkillset
Skillset
 
Labour Issues in the Telecom Sector: Myanmar Labour Laws and Reform Plans
Labour Issues in the Telecom Sector: Myanmar Labour Laws and Reform PlansLabour Issues in the Telecom Sector: Myanmar Labour Laws and Reform Plans
Labour Issues in the Telecom Sector: Myanmar Labour Laws and Reform Plans
 
Community Grievance Management Experiences
Community Grievance Management ExperiencesCommunity Grievance Management Experiences
Community Grievance Management Experiences
 
Community Outreach (SLO)
Community Outreach (SLO)Community Outreach (SLO)
Community Outreach (SLO)
 
Workplace Safety in Telecom Industry
Workplace Safety in Telecom IndustryWorkplace Safety in Telecom Industry
Workplace Safety in Telecom Industry
 
Health and Safety in Myanmar
Health and Safety in MyanmarHealth and Safety in Myanmar
Health and Safety in Myanmar
 
Workshop on Safety and Labour Issues in the Myanmar Telecoms Sector
Workshop on Safety and Labour Issues in the Myanmar Telecoms SectorWorkshop on Safety and Labour Issues in the Myanmar Telecoms Sector
Workshop on Safety and Labour Issues in the Myanmar Telecoms Sector
 
Virtual Roundtable Discussion with CSOs on Extractives and Inclusive Business
Virtual Roundtable Discussion with CSOs on Extractives and Inclusive BusinessVirtual Roundtable Discussion with CSOs on Extractives and Inclusive Business
Virtual Roundtable Discussion with CSOs on Extractives and Inclusive Business
 
AirQualityAsia
AirQualityAsiaAirQualityAsia
AirQualityAsia
 
Health and Pollution Action Planning (HPAP)
Health and Pollution Action Planning (HPAP)Health and Pollution Action Planning (HPAP)
Health and Pollution Action Planning (HPAP)
 
HPAP - Health and Pollution Action Plan
HPAP - Health and Pollution Action PlanHPAP - Health and Pollution Action Plan
HPAP - Health and Pollution Action Plan
 
Dr. Dewi Aryani : Raising Awareness Towards Pollution and its Impact to Human...
Dr. Dewi Aryani : Raising Awareness Towards Pollution and its Impact to Human...Dr. Dewi Aryani : Raising Awareness Towards Pollution and its Impact to Human...
Dr. Dewi Aryani : Raising Awareness Towards Pollution and its Impact to Human...
 
How are Persons with Disabilities in Myanmar Experiencing Covid-19, Including...
How are Persons with Disabilities in Myanmar Experiencing Covid-19, Including...How are Persons with Disabilities in Myanmar Experiencing Covid-19, Including...
How are Persons with Disabilities in Myanmar Experiencing Covid-19, Including...
 
Launch of the 2020 Pwint Thit Sa Report research phase
Launch of the 2020 Pwint Thit Sa Report research phaseLaunch of the 2020 Pwint Thit Sa Report research phase
Launch of the 2020 Pwint Thit Sa Report research phase
 
2020 Pwint Thit Sa - Webinar
2020 Pwint Thit Sa - Webinar2020 Pwint Thit Sa - Webinar
2020 Pwint Thit Sa - Webinar
 
Business & Digital Rights (Myanmar Business Associations Status)
Business & Digital Rights (Myanmar Business Associations Status)Business & Digital Rights (Myanmar Business Associations Status)
Business & Digital Rights (Myanmar Business Associations Status)
 
4b steve crown mdrf 2020
4b steve crown mdrf 20204b steve crown mdrf 2020
4b steve crown mdrf 2020
 
3e myanmar consumers u nion mdrf2020
3e myanmar consumers u nion mdrf20203e myanmar consumers u nion mdrf2020
3e myanmar consumers u nion mdrf2020
 

Recently uploaded

一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
ahcitycouncil
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 

Recently uploaded (20)

一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 

Data Protection: balancing convenience, privacy and security

  • 1. Myanmar Digital Rights Forum 2019 Data Protection: balancing convenience, privacy and security Date: 19th January 2019 Place: Yangon U Yan Naung Soe Assistant Director Department of Information Technology and Cyber Security Government’s policy and plans on data protection, transfer and storage
  • 2. 1. Objectives of Presentation 2. ICT Status in Myanmar 3. Organization Structure of Telecom Sector and ITCS 4. Vision, Mission, Duties and NCSC’s Awareness Program 5. ICT Laws in Myanmar 6. Does Myanmar need Cyber Law? 7. Myanmar Cyber Law (Draft) 8. Challenges 9. Conclusion 2 Outlines of Presentation
  • 3. qTo share Government’s policy and plans on data protection, transfer and storage 1. Objectives of Presentation 3
  • 4. 2. ICT Status of Myanmar 4 • In Myanmar internet service was introduced in 2000. • Four Nation wide Integrated Telecom Operators in Myanmar Ø MPT-KSGM JO Ø Telenor Myanmar Ltd Ø Ooredoo Myanmar Ltd ØMytel • Telephone Density 110%, Smart Phone Usage 80% • Mobile Network Coverage 85 ~ 90 % • More than seven International Internet Gateways. • International Internet Backbone Capacity is more than 350 Gbps. • ISP (MPT KSGM, TML, OML, Yatanarpon, MyanmarNet, 5BB, Fortune, Skynet, Frontier, etc.)
  • 5. Posts & Telecom Dept (Regulator) Dept of Information Technology and Cyber Security Ministry of Transport and Communications (MoTC) Deputy Minister 1 Myanmar Telecom (Telecom Operator) Myanmar Posts (Postal & Telegraph Service) Transport Sector (Road/ Railway/ Maritime/ Air Transports) Communications Sector Deputy Minister 2 3. Organization Structure of MOTC (Comm: Sector) 5
  • 6. Admin & Finance Dept Training Center E-Govt Dept Legal, IR & Information National Cyber Security Center (NCSC) Satellite Comm: Dept Operations Dept Information Security Dept Security Audit Dept mmCERT Information Technology and Cyber Security Department 6 3. Organization Structure of ITCSD
  • 7. qTo monitor, observe, audits, alert, analyze, prevent and provide the technical advisory concern with cyber security, cyber incidents and cyber threats. 7 4. Vision and Mission of NCSC qTo create the environment where all ministries can provide online services securely and all citizens can access E-government services safely. Vision of NCSC Mission of NCSC
  • 8. vDuties and responsibilities of Operation Department are to monitor the cyber security of IXP, ISP, .mm domain, govern- ment websites and critical information infrastructure. vDuties and responsibilities of mmCERT are to disseminate security information and advisories, to provide technical assistance to the necessary organizations such as Government agencies, ISP and finance sectors, emergency response plan, research & development, to develop web engineering and to cooperate with law enforcement organizations to track and trace cyber crimes . 8 4. Duties and Responsibilities of NCSC
  • 11. § mmCERT participated ACID (ASEAN CERT Incident Drill) and APCERT Drill § NCSC trained staffs in local and international cyber security trainings § Cyber Security Fundamental Courses were opened annually in ITCSD Training Center § NCSC holds Coordination Meetings for Cyber Security NCSC’s Capacity Building and Awareness Raising Program 11
  • 12. v NCSC conducted Cyber Security Awareness Program in ICT Exhibition (2017, 2018) v NCSC conducted Myanmar Cyber Security Competition (2018) v NCSC participated in Myanmar Youth Development Festival (2018) for cyber security awareness v Myanmar also participated the 9th Singapore Cyber Conquest in September 2018. v US-UAGO Transnational Crime Program (2018) v Cyber BayKin (with Australia Embassy and MOTC) (2018) 12 NCSC’s Capacity Building and Awareness Raising Program
  • 13. E-Government Conference and ICT Exhibition (2017) 13
  • 14. E-Government Conference and ICT Exhibition (2017) 14
  • 15. Cyber Security Awareness at University of IT (2017) 15
  • 16. Cyber Security Challenge Competition (2018) 16
  • 17. 17 Myanmar Youth Development Festival (2018)
  • 18. 18 Myanmar Youth Development Festival (2018)
  • 19. 19 9th Singapore Cyber Conquest (2018 Oct)
  • 20. US-UAGO Transnational Crime Program (2018) 20
  • 21. Cyber Bay Kin: Secure a Digital Myanmar (2018 ) 21
  • 23. v Computer Science Development Law (1996) v Electronics Transaction Law (2004) v Telecommunications Law (2013) v Cyber Law (Draft) 5. ICT Laws in Myanmar 23
  • 24. qICT sector is developing very fast in Myanmar. qE-Government Services are accelerating. qOnline shopping is popular among youths. qE-Commerce becomes booming in Myanmar. qMore cyber attacks and incidents occurs in Myanmar. qCyber Crimes are rising in Myanmar. qExisting Laws can’t solve all the cyber related crimes. qMost of ASEAN member states enacted cyber law. 6.Does Myanmar need Cyber Law ? 24
  • 25. v Department of Information Technology & Cyber Security v Posts & Telecommunication Department v MOHA / Myanmar Police Force v Union Attorney General Office v Ministry of Education/ University of Computer Studies v Myanmar Computer Federation (MCF) v Civil Society Organizations (CSO) Concerning Stakeholders of Cyber Law Drafting 25
  • 26. v Budapest Convention on Cyber Crime v India IT Act 2000 v Singapore Cyber Act 2018 v Japan Cyber Law Cyber Law shall cover the following area: 1. Cyber Security & Cyber Crime 2. E-Governance 3. E-Commerce Reference and Coverage of Cyber Law 26
  • 27. qDefinitions qObjectives qCyber Security Committee qLicensing of Cyber Security Service Provider qCritical Information Infrastructure Protection qPersonnel Data Protection qResponse and Investigation of Cyber Security Threats and Incidents qSocial Media qE-Governance qE-Commerce qOffences qGeneral 7. Myanmar Cyber Law (Draft) 27
  • 28. üLack of Cyber Security Master Plan, Law and Regulation, üInsufficient human resources in terms of quality and quantity. üLimited budget to implement the cyber security infrastructure. üLack of public’s awareness for cyber security and data protection. üNot clearly defined the roles and responsibilities between NCSC and Cyber Crime Division of Myanmar Police Force. 8. Challenges 28
  • 29. 9. Conclusion 29 § Knowledge sharing between inter ministries and CSO. § Capacity Building (Local & International) § Cooperation and coordination between inter ministries and CSO. § Cyber Security and Cyber Crime Awareness Raising Programs § Implement the necessary cyber security systems at Telecom Operators, ISP and Data Centers § 24x7 monitoring the cyber attacks and incidents § Cooperation with local, regional and international organizations
  • 30. Thank you so much. 30 yannaungsoe@ncsc.gov.mm