Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
Internet Rights are Human Rights Case BookletRajat Kumar
The IRHR Curriculum is a series of training modules concerned with the relationship between human rights, ICTs and the internet. These modules are intended to help those who work on human rights and/or ICTs, stakeholders with an interest in the issues and students, to understand ways in which the internet is affecting the enjoyment and protection of rights – now and in the future – and explore how these affect their work and lives.
The Internet has become closely associated with freedom of expression and the global economy. Today, it plays a direct or indirect role in almost every aspect of life. Yet many fear the Internet as we have come to know it is at risk, with restrictions forcing fragmentation along political, corporate, or cultural lines. Despite growing concerns about the future of the Internet, discussion surrounding online freedom remains largely mired in a handful of issues: the necessity and appropriateness of government surveillance in the United States, digital privacy in Europe, and censorship in authoritarian states such as China. However, between them, the United States, Europe, and China account for less than half of the world’s Internet users. For much of the rest of the world, any discussion of Internet freedom falls at the complex intersection of political and social liberties, nation-building, security threats, economic development, and resource constraints.
Asia’s biggest developing democracies - India, Indonesia, Bangladesh, the Philippines, and Thailand - account for a quarter of the world’s people, but only about one-tenth of the global online population. The policy decisions these states make going forward will be of considerable importance for the future of the Internet and offer some useful lessons about the limitations and vulnerabilities of the global Internet freedom agenda as it is currently being pursued by the United States and Europe.
From a survey of these countries’ experiences, six broad conclusions or principles can be drawn. First, the online world is an outgrowth of the offline world, rather than a distinct phenomenon. Internet policy cannot be considered in a vacuum, or divorced from other relevant aspects of public policy, such as security, economic policy, or governance. Second, laws, norms, and cultural attitudes related to Internet use vary widely, even among democracies. A one-size-fits-all approach to Internet freedom will not work and may even prove counterproductive. Third, online freedoms and greater security are not inherently at odds with one another in open societies. Discourse that presents a false choice between security and freedom is harmful for both, as well as for state legitimacy and economic growth.
Fourth, while much discussion of Internet freedom frames the issue as a conflict between governments, corporations, and civil society, each sector is divided on the merits of unfettered Internet freedom. Fifth, current legislation pertaining to the Internet in many democratic countries is deeply flawed, even in the context of their own constitutional rights pertaining to freedom of expression. By and large, Internet-related legislation is vague, making implementation arbitrary, and undermining public trust in state institutions. And sixth, users are often not adequately informed of the privileges and restrictions associated with Internet use in their native countries. Policies and initiat
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
In compliance with the Budapest Convention, the CCA has recognised almost all the cyber-crime offences that are provided in the convention. Mere fact that the legal system recognises certain cyber-offences or that it provides a special mechanism to conduct investigations does not render the legislative framework effective. For the legislative framework to be considered effective, it should be capable of achieving the objective for which it was established. Accordingly, the effectiveness of the contemporary legislative framework shall be assessed based on its success in identifying and preventing cyber-crimes, conducting investigations, enforcing the enacted laws and in protecting human rights and liberties which are the objectives behind the enforcement of the cyber-crime legislative framework.
Indonesia Netizen Facts (July - September 2016)ICT Watch
Indonesia Netizen Facts (July - September 2016). For Bahasa Indonesia, read here http://www.slideshare.net/internetsehat/netizen-indonesia-kini-juli-september2016
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
The research paper attempts to provide a definition on cyber-crimes and has also identified few types of cyber-crimes that have been internationally recognized.
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
Internet Rights are Human Rights Case BookletRajat Kumar
The IRHR Curriculum is a series of training modules concerned with the relationship between human rights, ICTs and the internet. These modules are intended to help those who work on human rights and/or ICTs, stakeholders with an interest in the issues and students, to understand ways in which the internet is affecting the enjoyment and protection of rights – now and in the future – and explore how these affect their work and lives.
The Internet has become closely associated with freedom of expression and the global economy. Today, it plays a direct or indirect role in almost every aspect of life. Yet many fear the Internet as we have come to know it is at risk, with restrictions forcing fragmentation along political, corporate, or cultural lines. Despite growing concerns about the future of the Internet, discussion surrounding online freedom remains largely mired in a handful of issues: the necessity and appropriateness of government surveillance in the United States, digital privacy in Europe, and censorship in authoritarian states such as China. However, between them, the United States, Europe, and China account for less than half of the world’s Internet users. For much of the rest of the world, any discussion of Internet freedom falls at the complex intersection of political and social liberties, nation-building, security threats, economic development, and resource constraints.
Asia’s biggest developing democracies - India, Indonesia, Bangladesh, the Philippines, and Thailand - account for a quarter of the world’s people, but only about one-tenth of the global online population. The policy decisions these states make going forward will be of considerable importance for the future of the Internet and offer some useful lessons about the limitations and vulnerabilities of the global Internet freedom agenda as it is currently being pursued by the United States and Europe.
From a survey of these countries’ experiences, six broad conclusions or principles can be drawn. First, the online world is an outgrowth of the offline world, rather than a distinct phenomenon. Internet policy cannot be considered in a vacuum, or divorced from other relevant aspects of public policy, such as security, economic policy, or governance. Second, laws, norms, and cultural attitudes related to Internet use vary widely, even among democracies. A one-size-fits-all approach to Internet freedom will not work and may even prove counterproductive. Third, online freedoms and greater security are not inherently at odds with one another in open societies. Discourse that presents a false choice between security and freedom is harmful for both, as well as for state legitimacy and economic growth.
Fourth, while much discussion of Internet freedom frames the issue as a conflict between governments, corporations, and civil society, each sector is divided on the merits of unfettered Internet freedom. Fifth, current legislation pertaining to the Internet in many democratic countries is deeply flawed, even in the context of their own constitutional rights pertaining to freedom of expression. By and large, Internet-related legislation is vague, making implementation arbitrary, and undermining public trust in state institutions. And sixth, users are often not adequately informed of the privileges and restrictions associated with Internet use in their native countries. Policies and initiat
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
In compliance with the Budapest Convention, the CCA has recognised almost all the cyber-crime offences that are provided in the convention. Mere fact that the legal system recognises certain cyber-offences or that it provides a special mechanism to conduct investigations does not render the legislative framework effective. For the legislative framework to be considered effective, it should be capable of achieving the objective for which it was established. Accordingly, the effectiveness of the contemporary legislative framework shall be assessed based on its success in identifying and preventing cyber-crimes, conducting investigations, enforcing the enacted laws and in protecting human rights and liberties which are the objectives behind the enforcement of the cyber-crime legislative framework.
Indonesia Netizen Facts (July - September 2016)ICT Watch
Indonesia Netizen Facts (July - September 2016). For Bahasa Indonesia, read here http://www.slideshare.net/internetsehat/netizen-indonesia-kini-juli-september2016
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
The research paper attempts to provide a definition on cyber-crimes and has also identified few types of cyber-crimes that have been internationally recognized.
In this modern era of technology, social media is becoming an important component of daily life and the majority of the youth today prefer to communicate their ideas, thoughts, and opinions through it. There are different social media platforms that allow users to access social news, blogs, vlogs, and others in an easy manner. Some of the social media networking sites used extensively include Instagram, Twitter, and Facebook.
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...linda gichohi
This Article entails the Legal Channels and Kenyan laws in place to protect Online-Gender Based Violence Survivors and ways to prevent and respond to OGBV.
Digital security law security of individual or governmentM S Siddiqui
The subject again seems complicated further complicate as cyber security is often conflated with cybercrime, or confused with related but distinct concepts such as cyber-resilience, cyber-warfare and cyber-defense. However, it is taken to mean the protection of digital information systems against attack, either by states or individual hackers.
The proposed law apparently drafted to protect the national interest from possible acts of citizens. It has mixed up the security of individual and nation.
Indonesia 2014 National ID-IGF Dialogue ResumeID-IGF
The 2014 National ID-IGF Dialogue is a discussion and dialogue-based forum facilitated by experts and practitioners of Internet governance sub-fields. There were 4 baskets discussed in this event: Infrastructure, Economy, Law and Socio-Culture. In each session, the elaboration of Internet governance issues will take place in the form of discussions and dialogue in order to draw a general framework of ideas for better Internet governance among Indonesian stakeholders. The results of the forum will be delivered as the Indonesian Internet community’s input for the 9th Global Internet Governance Forum (IGF) in Istanbul, Turkey, which will be held from September 2nd to 5th, 2014.
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...Samuel Barros
What is the Marco Civil da Internet? This law establishes principles, guarantees and rights for Internet users: citizens, companies and government. Among other topics, this legislation establishes principles for freedom of speech, privacy protection, log file and network neutrality.
Similar to Internet Shutdown in Indonesia: Report 2020 (20)
Per 2 Januari 2024 telah disahkan Perubahan Kedua UU ITE, yaitu Undang-Undang Nomor 1 Tahun 2024. Untuk memudahkan melihat perubahannya, berikut adalah perbandingan UU ITE 2024 dengan versi UU ITE 2008 dan 2016.
Situasi kerentanan kebebasan berekspresi termasuk jurnalis dalam konteks digitalDamar Juniarto
Dalam konteks digital, kerja-kerja jurnalis menghadapi sejumlah tantangan baru yang menambah kerentanan. Presentasi ini mengungkap apa saja situasi terkini yang dihadapi jurnalis dan media di Indonesia.
Digital Domination in Indonesia and policy challenges on platformization and ...Damar Juniarto
Presented during 2022 Policy and Internet Conference, where I share my perspective on the impact of platformization and increased datafication from within their region (Indonesia, Southeast Asia, Global respectively) and the implications on internet freedom within societies that rely so heavily on increased plaformization and datafication.
Refleksi pelaksanaan pemerintahan terbuka di indonesiaDamar Juniarto
Disampaikan saat FGD Pemerintahan Digital: Menuju Tata Kelola Pengambilan Kebijakan yang Terbuka dan Partisipatoris. FGD ini dijalankan oleh Konsorsium Riset UGM, UI, dan UNHAS untuk memahami implementasi pemerintahan digital dan tata kelola pengambilan kebijakan yang difasilitasi oleh teknologi informasi dan komunikasi di Indonesia.
Damar Juniarto mempresentasikan refleksi atas pelaksanaan Pemerintahan Terbuka di Indonesia selama ini dan apa yang menjadi hambatan dan memberikan sejumlah rekomendasi yang diperlukan.
The Gray Area: Article and News Examination towards Informed DecisionsDamar Juniarto
Presented in “MIL Empowerment Amidst Infodemic: A Webinar on Responsible ASEANetizenship towards Digital Environmentalism”
Date: July 31, 2020
Time: 2:00-5:00PM PST
Serangan Digital yang Terjadi di IndonesiaDamar Juniarto
Dipresentasikan dalam diskusi daring "Serangan Siber di Indonesia: Apa yang Perlu Diketahui?" yang diselenggarakan program magister Universitas Atma Jaya Yogyakarta, 29 Juli 2020.
Pengekangan Kebebasan Ekspresi Online di Asia TenggaraDamar Juniarto
Dipresentasikan dalam acara "Membincang Demokrasi dan HAM di Asia" yang diselenggarakan oleh Asia Democracy Network, INFID dan Human Rights Working Group Indonesia, 29 Juni 2018.
Di mana konteks urgensi perlindungan data privasi warga di tengah kepungan data-driven marketing dan regulasi registrasi SIM Card menggunakan NIK dan KK?
Dipresentasikan dalam Diskusi Publik Urgensi dan Harapan Publik pada UU Perlindungan Data Pribadi di Perpustakaan Nasional, 13 Maret 2018.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
2. SAFEnet is a network of digital rights defenders in Southeast Asia which was
established on 27 June 2013 in Bali, Indonesia. The establishment of SAFEnet was
motivated by the widespread criminalization of netizens because of its expression
on the Internet after the enactment of Law No. 11 of 2008 concerning Information
and Electronic Transactions (UU ITE). This prompted a number of bloggers,
journalists, Internet governance experts, and activists to form this association.
After previously only focusing on advocating freedom of expression on the Internet,
in 2018 SAFEnet began to widen the issue of advocacy towards the fulfilment of
digital rights
safenet.or.id
F/TW/IG/YT: @safenetvoice
3. Digital rights are human rights. Digital rights are the rights that guarantee every citizen
to access, use, create, and distribute digital media.
Right to Access
Includes freedom of access to the
Internet, such as the availability
of infrastructure, ownership and
control of Internet service
providers, digital inequality,
equality of access between
genders, screening and blocking,
free from internet shutdown.
Right to Express
Includes guarantees of diversity
in content, freedom of
expression, and use of the
Internet in mobilizing civil
society.
Right on Safety
Includes being free from mass
tapping and unlawful
surveillance, protection of
privacy, to being safe from
digital/cyber attacks.
OUR STANDPOINT
4. FRAMEWORKS
Freedom of information is
a fundamental human right.
ARTICLE 19 UDHR:
Everyone has the right to freedom of opinion and
expression; this right includes freedom to hold
opinions without interference and to seek, receive and
impart information and ideas through any media and
regardless of frontiers.
ARTICLE 19 ICCPR:
1. Everyone shall have the right to hold opinions
without interference.
2. Everyone shall have the right to freedom of
expression; this right shall include freedom to seek,
receive and impart information and ideas of all kinds,
regardless of frontiers, either orally, in writing or in
print, in the form of art, or through any other media of
his choice.
5. RESTRICTION
Freedom of expression is not absolute and
every system of law provides for some
limitations on it.
ARTICLE 19 (3) ICCPR
The exercise of the rights provided for in paragraph 2 of this
article carries with it special duties and responsibilities. It may
therefore be subject to certain restrictions, but these shall
only be such as are provided by law and are necessary:
(a) For respect of the rights or reputations of others;
(b) For the protection of national security or of public order
(order public), or of public health or morals.
A strict three-part test from independent courts for legality,
legitimacy and proportionality.
Test 1: “provided by law”
The government must follow a written law that is clear and
not ambiguous. Otherwise, people won’t know when and
how they might be accused of doing something wrong.
Test 2: “(a) For respect of the rights or reputations of others;
(b) For the protection of national security or of public order
(ordre public), or of public health or morals.”
These are the only legitimate grounds for restricting speech.
Test 3: “necessary”
Restrictions should be applied only when really necessary.
Source: Toby Mendel, Restricting Freedom of Expression: Standards and Principles,
Center for Law and Democracy, 2015
6. INTERNET SHUTDOWN
An internet shutdown happens when someone — usually a government — intentionally disrupts the
internet or mobile apps to control what people say or do.
Shutdowns are also sometimes called “blackouts” or “kill switches.”
“An internet shutdown is an intentional disruption of
internet or electronic communications, rendering them
inaccessible or effectively unusable, for a specific
population or within a location, often to exert control over
the flow of information.”
7. INTERNET SHUTDOWN VERSUS THE WORLD
Over the past 4 years, Internet
shutdowns have become one of the
defining tools of government
repression in the 21st century.
0
50
100
150
200
250
2016 2017 2018 2019
Times
8. • Internet shutdowns are an extension of traditional forms of
censorship.
• Internet shutdowns are hurting democracy and economy, rather
than creating stability.
WHAT OTHER IMPACTS?
1. The digital economy also shuts down.
2. Affecting hospital from ordering new medicine, and prevented
people from using WhatsApp to call for medical assistance.
3. Online public services also shuts down.
4. The number of VPN/Virtual Private Networks users arise.
5. The intensity of violence arise.
NEW FORM OF CENSORSHIP
9. INTERNET SHUTDOWN IN INDONESIA
In Indonesia, the government shutdown the internet 3
times in 2019 in response to social conflicts.
1. 22 – 25 May 2019 : bandwith throttling
to slowing down image and video in
WhatsApp and social media platform in
Jakarta.
2. 19 August – 8 September 2019 :
bandwith throttling for 2 days, continue
with internet shutdown in Papua and West
Papua.
3. 23 – 28 September 2019: internet
shutdown in Wamena, Papua.
10. BANDWITH THROTTLING
JAKARTA: MAY 22-25, 2019
Press Release No.
105/HM/KOMINFO/
05/2019
Press Release No.
106/HM/KOMINFO
/05/2019
Press Release No.
107/HM/KOMINF
O/05/2019
Press Release No.
108/HM/KOMINFO/
05/2019
Wed, 22 May 2019
12.00 WIB
Wed, 22 May 2019
15.00 WIB
Sat, 25 May 2019
15.00 WIB
Monday, 27 May 2019
MICT: Take down content
and social media account
that spreading hoaxes.
MICT: Hoaxes first appear
in FB/IG, then spread using
messaging apps like
Whatsapp. MICT can’t
close WA numbers.
MICT: Don’t use VPN.
Please report hoaxes to
hotline channel.
MICT: Take down 551 FB accounts,
848 TW accounts, 640 YT accounts, 1
website, 1 Linkedin account.
Closes 61.000 WA numbers.
11. ON MAY PROTESTS
IN JAKARTA
Source: NETBLOCKS https://netblocks.org/reports/indonesia-blocks-social-media-as-election-
protests-escalate-XADE7LBg
Source: OONI
Blocking of WhatsApp, Facebook Messenger, &
Telegram by means of DNS on some ISPs.
12. IMPACTS ON E-COMMERCE
The Institute for Development of Economics and Finance (Indef) estimates
losses for three days restricting access to social media around Rp 681 billion.
The calculation, as many as 66% of online buying and selling transactions occur on social media platforms
such as Instagram, Facebook and Whatsapp. Only 16% of transactions go through the marketplace, based
on Ideas 2017 research.
The value of eCommerce transactions based on Indef's research in 2019 is estimated at US $ 8.7 billion or
Rp 126 trillion. Divided by 365 days, an average of Rp 345 billion per day.
As a result, the potential loss of buying and selling online by limiting access to social media per day is 66%
of 345 billion, namely Rp 227 billion. So three days of blocking, traders lost Rp 681 billion.
13. EVALUATION
• Economy losses around Rp681 billions
• No significant impact on social media traffic.
• Significant impact only on WhatsApp traffic.
• VPN is now widely known by internet users in Indonesia to bypass current and
future limitation by the government.
14. INTERNET SLOWDOWN – SHUTDOWN
PAPUA & WEST PAPUA: AUGUST 19 – SEPTEMBER 8, 2019
Press Release No.
154/HM/KOMINFO
/08/2019
Press Release No.
155/HM/KOMINFO/
08/2019
Press Release No.
159/HM/KOMINF
O/08/2019
Press Release No.
170/HM/KOMINF
O/09/2019
Press Release No.
173/HM/KOMINF
O/09/2019
Mon, 19 Aug 2019 Wed, 21 Aug 2019 Friday, 23 Aug 2019
MICT: Temporary
slowing down internet
access to combat
hoaxes.
MICT: Internet shutdown in
Papua and West Papua to
handle national security
situation
MICT: Continue to internet
blockage until situation in
Papua and West Papua back
to normal.
Wed, 4 Sep 2019
MICT: MICT open some
areas in Papua (19) and
West Papua (10), while
others still having internet
shutdown.
Sat, 7 Sep 2019
MICT: On Friday, 6 Sep
2019 22.30 local time,
MICT open Nabire and
Dogiyai, but still close 8
areas in Papua and 3 areas
in West Papua.
15. ON AUGUST SOCIAL UNREST
IN PAPUA AND WEST PAPUA
Source: NETBLOCKS https://netblocks.org/reports/internet-disrupted-in-papua-indonesia-amid-mass-protests-and-calls-for-independence-eBOgrDBZ
16. IMPACTS
SME’s online can’t do their business.
No public services: Balai Layanan Pengadaan Barang dan Jasa
can’t access LPSE.ATM can’t connect to server.
No news is a good news?
BUSINESS
JOURNALISM
PUBLIC
SERVICES
ECONOMY
HEALTHCARE
17. 7 FINDINGS SO FAR
1. Based on request (in)formal by other stakeholders. Internet slowdown is based on
request by police. Data blockade/shutdown is based on request by security sectors.
2. MICT based on Article 40 ITE Law and Telco Law. Article 40 UU ITE is only giving
authority to MICT for restricting illegal content, (muatan melanggar hukum), not to
cut the internet access.
3. No clear mechanism for bandwith throttling and internet shutdown.
4. No Standard Operating Procedures (SOPs) for both internet shutdown in May and
August 2019.
5. There is Extra Ordinary Situation but with no clear meaning.
6. No mitigation plan for covering public services.
7. Unclear estimation date for the shutdown.
18. PATHWAY TO JUSTICE
Online Petition
• Launch on
August 21,
2019
• 31,343
signatures
Somation Letter
• Sent on
August 23 &
26, 2019
• Objection
letter submit
to MICT on
September 4,
2019
Law Suit
• Submit law
suit on 21
November
2019
• Registration
Number 230
/ G / 2019 /
PTUN-JKT
Next?
• Result in
June 3, 2020
• Till June 18,
2020 there is
possibility of
appeal
process.
21/08/2019. 23/08/2019. 26/08/2019. 21/11/2019. 03/06/2020.
19. PTUN JAKARTA
Plaintiff’s Petitum
1. To grant the Plaintiff's claim for the whole;
2. States the Government Actions undertaken by DEFENDANT I and
DEFENDANT II took the form of:
a) Throttling or slowing down of access / bandwidth in some regions of the
Province
West Papua and Papua Province on August 19, 2019 since 13.00
WIT (Eastern Indonesia Time) until 20.30 WIT.
b) Blocking of data services and / or terminating internet access
comprehensive in Papua Province (29 Cities / Regencies) and West Papua
Province (13 Cities / Regencies) Dated August 21, 2019 until at least on
September 4, 2019 at 23:00 WIT;
c) Extend the blocking of data services and / or terminate internet access in 4
Cities / Regencies in Papua Province (ie Jayapura City, Jayapura Regency,
Mimika Regency, and Jayawijaya Regency) and 2 Cities / Regencies in West
Papua Province (ie Manokwari City and City of Sorong) since 04
September2019 23.00 West Indonesia Time until 09 September 2019 18.00
West Indonesia Time / 20.00 West Indonesia Time;
is an Unlawful Act by a Government Agency and / or Official, the Acts of the
DEFENDANTS a quo are deemed to be defective in authority, procedure and
substance;
3. Oblige the Defendants not to carry out a quo-like Government Actions in the
future;
4. Punish the Defendant to pay the costs incurred in this case.
Court Decision
1. Grant the plaintiff’s claim
2. State the actions of the government carried out by DEFENDANT I and
DEFENDANT II in the form of :
1) Throttling government action or the slowing down of access / bandwidth in
several areas of West Papua Province and Papua Province on August 19, 2019
from 13.00 Eastern Indonesian Time to 20.30 Eastern Indonesian Time
2) Government actions, namely blocking data services and / or terminating
internet access completely in Papua Province (29 cities / districts) and West
Papia Province (13 cities / districts) dated August 21 until at least on
September 4, 2019 at 23:00 WIT .
3) Government actions namely extending the blocking of data services and / or
terminating internet access in 4 cities / districts in Papua Province (ie Jayapura
City, Jayapura Regency, Mimika Regency, and Jayawijaya Regency) and 2 cities
/ districts in West Papua Province (ie Kota Manokwari and Kota Sorong) from
September 4, 2019 at 23:00 Eastern Indonesian Time to September 9, 2019 at
18:00 Western Indonesia Time / 20:00 Eastern Indonesian Time
were an unlawful act by a government agency and / or official.
3. Punish Defendant I and Defendant II for paying jointly costs of Rp. 457,000
20. ACHIEVEMENTS
1. From LEGAL perspective: The internet shutdown practices are
against the law and therefore no legal basis to be implemented
again.
2. From JUSTICE perspective: The people of Papua who suffered
from the internet shutdown practices in 2019 could make
compensation claims to the parties responsible.
3. From SOLIDARITY perspective: The result from Indonesia court
against internet shutdown in Papua and West Papua received
strong response from the Myanmar civil society to pressure the
Myanmar government to stop internet shutdowns in Rakhine
and Chin areas.
21. WHAT NEXT?
• It can happen not only in Jakarta and Papua. Maybe elsewhere in future, as long as there is a
(in)formal request and an extra ordinary situation.
• No guarantees of written SOPs in near future.
• Combatting hoaxes with internet slowdown/shutdown become an instant solution to quell
unrest and suppress the spread of rumours and hoaxes.
• There is no empirical evidence that proves this tactic is effective to tackle hoaxes. Rumours
and disinformation continue to spread with or without access to digital communication
networks, whose primary role is that of accelerators of information diffusion.
• Claims over success over shading the negative impact of internet slowdown/shutdown for
posing a threat to human rights around the world. They harm everyone: businesses,
emergency services, journalism, human rights defenders, and communities.
• Time to revise Article 40 UU ITE