SlideShare a Scribd company logo
1 of 19
Download to read offline
Open Internet
and Singapore
BENJAMIN ANG
SENIOR FELLOW, CENTRE OF EXCELLENCE FOR NATIONAL SECURITY
NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
Open for Competition
Mobile Data Usage 2Q12-1Q16
148.4% mobile penetration
Total Wireless Broadband 2013-2016
Net Neutrality is not a problem –
no complaints received so far
1. No blocking of legitimate Internet content
2. Comply with competition & interconnection rules
3. Provide Information Transparency
4. Meet Minimum QoS standards
5. Niche or differentiated Internet services allowed
(Infocomm Development Agency – Decision on Net Neutrality 2011)
Racial Riots in Singapore - 1964
Access should be denied …
… to content that "undermines public order and the nation's
security, denigrates race and religion, or erodes moral
values.“
… includes "pornography, deviant sexual practices, sexual
violence, child pornography, [and] bestiality.“
◦ Ministry of Information, Communications and the Arts,
Censorship Review Committee: Report of 2003 26
Symbolic Filtering
Singapore filters Internet content to promote social values
and maintain national unity,
denying access to objectionable material, (pornography and
content encouraging ethnic or religious strife)
Symbolic Filtering
Media Development Authority (MDA) blocks a symbolic list
of 100 Web sites (primarily pornography) as a symbol of the
state’s disapproval
Licensing and Regulation
INTERNET SERVICE PROVIDERS
◦ Need a license to offer services in
Singapore
◦ Need to comply with the Internet
Code of Practice, which "outlines
what the community regards as
offensive or harmful to Singapore's
racial and religious harmony.“
ONLINE NEWS SITES *
◦ Must be licensed
◦ Must remove objectionable content
within 24 hours of being notified by
MDA
 * (>50,000 unique visits from
Singapore each month, and report on
news or current events)
Sedition Act
Offence to do anything with a seditious tendency s3.—(1)
(a) to bring into hatred or contemptor to excite disaffection against the Government;
(b) to excite the citizens of Singapore or the residents in Singapore to attempt to
procure in Singapore, the alteration, otherwise than by lawful means, of any matter as
by law established;
(c) to bring into hatred or contemptor to excite disaffection against the
administrationof justice in Singapore;
(d) to raise discontent or disaffection amongst the citizens of Singapore or the
residents in Singapore;
(e) to promote feelings of ill-will and hostility betweendifferent races or classes of the
population of Singapore.
Contempt of Court
Computer Misuse and Cybersecurity Act
15A.—(1) Where the Minister is satisfied that it is necessary for
the purposes of preventing, detecting or countering any threat
to the national security, essential services or defence of
Singapore or foreign relations of Singapore, … can order …
(2) (a) Power to search and decrypt computers under Criminal
Procedure Code;
(b) provide any information (relating to computers)—
(c) providing real-time information
Defamation Law
The plaintiff will succeed if he/she can show that the
statement
◦ would lower his reputation
◦ referred to him/her
◦ was published to at least one other person
◦ (no need to prove falsehood or malice)
15
• “Where Your CPF
Money Is Going:
Learning From the
City Harvest Trial”
• “Below is the chart that
Channel NewsAsia
had created to show
the relations of Kong
Hee and his five
deputies, and the
funds that they have
misappropriated.”
16
• “Meanwhile,
something bears an
uncanny
resemblance to how
the money is being
misappropriated.”
Open for Everyone
open platform,
allowing any of us to innovate,
create new services and tools,
share freely and widely, and
access all of the products and services that others have
made available
Open for Opportunity
opportunity for students, entrepreneurs, creators, and
inventors
to explore, try and test new ideas and new business models
without asking permission from any established gatekeeper
Open as defined by Society
freedom is not anarchy; it exists within the rule of law.
Societies impose legal restrictions in order to promote
particular community norms.
Antisocial behavior does not become acceptable simply
because it is “on the Internet”

More Related Content

What's hot

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom House
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa ICT4Democracy in East Africa
 
The Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaThe Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaSharala Axryd
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
Lim Jus394 Chinese
Lim Jus394 ChineseLim Jus394 Chinese
Lim Jus394 Chinesemerlyna
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Brett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new normBrett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new normGlobal Utmaning
 
The Future of Net Neutrality: What's at stake for Canadians
The Future of Net Neutrality: What's at stake for CanadiansThe Future of Net Neutrality: What's at stake for Canadians
The Future of Net Neutrality: What's at stake for CanadiansCybera Inc.
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordCreative Commons Korea
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Denis Gursky Internet Censorship in Ukraine
Denis Gursky Internet Censorship in UkraineDenis Gursky Internet Censorship in Ukraine
Denis Gursky Internet Censorship in UkraineDenis Gursky
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the StateGraham Smith
 
Drugs & the Dark Net
Drugs & the Dark NetDrugs & the Dark Net
Drugs & the Dark NetTim Bingham
 
Why the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UIDWhy the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UIDAnupam Saraph
 

What's hot (20)

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
The Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaThe Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News Saga
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
Lim Jus394 Chinese
Lim Jus394 ChineseLim Jus394 Chinese
Lim Jus394 Chinese
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Brett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new normBrett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new norm
 
The Future of Net Neutrality: What's at stake for Canadians
The Future of Net Neutrality: What's at stake for CanadiansThe Future of Net Neutrality: What's at stake for Canadians
The Future of Net Neutrality: What's at stake for Canadians
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Internet
InternetInternet
Internet
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan Crawford
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Denis Gursky Internet Censorship in Ukraine
Denis Gursky Internet Censorship in UkraineDenis Gursky Internet Censorship in Ukraine
Denis Gursky Internet Censorship in Ukraine
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
 
Drugs & the Dark Net
Drugs & the Dark NetDrugs & the Dark Net
Drugs & the Dark Net
 
Why the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UIDWhy the United Kingdom scrapped its UID
Why the United Kingdom scrapped its UID
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 

Viewers also liked

5 steps to prevent project group meltdown
5 steps to prevent project group meltdown5 steps to prevent project group meltdown
5 steps to prevent project group meltdownBenjamin Ang
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsBenjamin Ang
 
Intellectual property in music (Copyright and Creative Commons)
Intellectual property in music (Copyright and Creative Commons)Intellectual property in music (Copyright and Creative Commons)
Intellectual property in music (Copyright and Creative Commons)Benjamin Ang
 
Election Blogging and Social Media 2015
Election Blogging and Social Media 2015Election Blogging and Social Media 2015
Election Blogging and Social Media 2015Benjamin Ang
 
Copyright for Artists - including Creative Commons
Copyright for Artists - including Creative CommonsCopyright for Artists - including Creative Commons
Copyright for Artists - including Creative CommonsBenjamin Ang
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Benjamin Ang
 
Copyright for Artists 2015
Copyright for Artists 2015Copyright for Artists 2015
Copyright for Artists 2015Benjamin Ang
 
3 types of legal technology that work (2016)
3 types of legal technology that work (2016)3 types of legal technology that work (2016)
3 types of legal technology that work (2016)Benjamin Ang
 
WSQ Professional Conversion Programme
WSQ Professional Conversion ProgrammeWSQ Professional Conversion Programme
WSQ Professional Conversion ProgrammeNUS-ISS
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBIBenjamin Ang
 
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Benjamin Ang
 
Election Blogging and Free Speech (Internet Society Singapore)
Election Blogging and Free Speech (Internet Society Singapore)Election Blogging and Free Speech (Internet Society Singapore)
Election Blogging and Free Speech (Internet Society Singapore)Benjamin Ang
 
The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?Benjamin Ang
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
 
INTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAWINTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAWKaryll Mitra
 

Viewers also liked (16)

5 steps to prevent project group meltdown
5 steps to prevent project group meltdown5 steps to prevent project group meltdown
5 steps to prevent project group meltdown
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation Aspects
 
Intellectual property in music (Copyright and Creative Commons)
Intellectual property in music (Copyright and Creative Commons)Intellectual property in music (Copyright and Creative Commons)
Intellectual property in music (Copyright and Creative Commons)
 
Election Blogging and Social Media 2015
Election Blogging and Social Media 2015Election Blogging and Social Media 2015
Election Blogging and Social Media 2015
 
Copyright for Artists - including Creative Commons
Copyright for Artists - including Creative CommonsCopyright for Artists - including Creative Commons
Copyright for Artists - including Creative Commons
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
 
Copyright for Artists 2015
Copyright for Artists 2015Copyright for Artists 2015
Copyright for Artists 2015
 
3 types of legal technology that work (2016)
3 types of legal technology that work (2016)3 types of legal technology that work (2016)
3 types of legal technology that work (2016)
 
WSQ Professional Conversion Programme
WSQ Professional Conversion ProgrammeWSQ Professional Conversion Programme
WSQ Professional Conversion Programme
 
Cybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBICybersecurity and Legal lessons after Apple v FBI
Cybersecurity and Legal lessons after Apple v FBI
 
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)
 
Election Blogging and Free Speech (Internet Society Singapore)
Election Blogging and Free Speech (Internet Society Singapore)Election Blogging and Free Speech (Internet Society Singapore)
Election Blogging and Free Speech (Internet Society Singapore)
 
The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
INTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAWINTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAW
 

Similar to Open internet in singapore

Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Transnational Crime.pptx
Transnational Crime.pptxTransnational Crime.pptx
Transnational Crime.pptxPiodosRostom
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Luca De Biase
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsGener Luis Morada
 
#VisionMaharashtra : Development Agenda Maha Nisschayy 2014
#VisionMaharashtra :  Development Agenda Maha Nisschayy 2014#VisionMaharashtra :  Development Agenda Maha Nisschayy 2014
#VisionMaharashtra : Development Agenda Maha Nisschayy 2014Sardar Sanjay Matkar
 
Report on new it bill cirminalization of foe in social media by shreedeep r...
Report on new it bill cirminalization of foe in social media   by shreedeep r...Report on new it bill cirminalization of foe in social media   by shreedeep r...
Report on new it bill cirminalization of foe in social media by shreedeep r...Shreedeep Rayamajhi
 
The Struggle for Digital Democracy in Indonesia
The Struggle for Digital Democracy in IndonesiaThe Struggle for Digital Democracy in Indonesia
The Struggle for Digital Democracy in IndonesiaDamar Juniarto
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
CPA Democracy and AI.pptx
CPA Democracy and AI.pptxCPA Democracy and AI.pptx
CPA Democracy and AI.pptxChris Marsden
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
The Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptxThe Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptxCarloCimacio
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationShashank Motepalli
 

Similar to Open internet in singapore (20)

HRC Res A 1
HRC Res A 1HRC Res A 1
HRC Res A 1
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Blogging & Law
Blogging & LawBlogging & Law
Blogging & Law
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Transnational Crime.pptx
Transnational Crime.pptxTransnational Crime.pptx
Transnational Crime.pptx
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
 
#VisionMaharashtra : Development Agenda Maha Nisschayy 2014
#VisionMaharashtra :  Development Agenda Maha Nisschayy 2014#VisionMaharashtra :  Development Agenda Maha Nisschayy 2014
#VisionMaharashtra : Development Agenda Maha Nisschayy 2014
 
Report on new it bill cirminalization of foe in social media by shreedeep r...
Report on new it bill cirminalization of foe in social media   by shreedeep r...Report on new it bill cirminalization of foe in social media   by shreedeep r...
Report on new it bill cirminalization of foe in social media by shreedeep r...
 
The Struggle for Digital Democracy in Indonesia
The Struggle for Digital Democracy in IndonesiaThe Struggle for Digital Democracy in Indonesia
The Struggle for Digital Democracy in Indonesia
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
CPA Democracy and AI.pptx
CPA Democracy and AI.pptxCPA Democracy and AI.pptx
CPA Democracy and AI.pptx
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
The Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptxThe Law that protect the cyberspace.pptx
The Law that protect the cyberspace.pptx
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet Regulation
 

More from Benjamin Ang

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfBenjamin Ang
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfBenjamin Ang
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Benjamin Ang
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfBenjamin Ang
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfBenjamin Ang
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Benjamin Ang
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesBenjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Benjamin Ang
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic viewBenjamin Ang
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Benjamin Ang
 

More from Benjamin Ang (20)

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 

Recently uploaded

一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 

Recently uploaded (20)

一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 

Open internet in singapore

  • 1. Open Internet and Singapore BENJAMIN ANG SENIOR FELLOW, CENTRE OF EXCELLENCE FOR NATIONAL SECURITY NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
  • 3. Mobile Data Usage 2Q12-1Q16 148.4% mobile penetration
  • 5. Net Neutrality is not a problem – no complaints received so far 1. No blocking of legitimate Internet content 2. Comply with competition & interconnection rules 3. Provide Information Transparency 4. Meet Minimum QoS standards 5. Niche or differentiated Internet services allowed (Infocomm Development Agency – Decision on Net Neutrality 2011)
  • 6. Racial Riots in Singapore - 1964
  • 7. Access should be denied … … to content that "undermines public order and the nation's security, denigrates race and religion, or erodes moral values.“ … includes "pornography, deviant sexual practices, sexual violence, child pornography, [and] bestiality.“ ◦ Ministry of Information, Communications and the Arts, Censorship Review Committee: Report of 2003 26
  • 8. Symbolic Filtering Singapore filters Internet content to promote social values and maintain national unity, denying access to objectionable material, (pornography and content encouraging ethnic or religious strife)
  • 9. Symbolic Filtering Media Development Authority (MDA) blocks a symbolic list of 100 Web sites (primarily pornography) as a symbol of the state’s disapproval
  • 10. Licensing and Regulation INTERNET SERVICE PROVIDERS ◦ Need a license to offer services in Singapore ◦ Need to comply with the Internet Code of Practice, which "outlines what the community regards as offensive or harmful to Singapore's racial and religious harmony.“ ONLINE NEWS SITES * ◦ Must be licensed ◦ Must remove objectionable content within 24 hours of being notified by MDA  * (>50,000 unique visits from Singapore each month, and report on news or current events)
  • 11. Sedition Act Offence to do anything with a seditious tendency s3.—(1) (a) to bring into hatred or contemptor to excite disaffection against the Government; (b) to excite the citizens of Singapore or the residents in Singapore to attempt to procure in Singapore, the alteration, otherwise than by lawful means, of any matter as by law established; (c) to bring into hatred or contemptor to excite disaffection against the administrationof justice in Singapore; (d) to raise discontent or disaffection amongst the citizens of Singapore or the residents in Singapore; (e) to promote feelings of ill-will and hostility betweendifferent races or classes of the population of Singapore.
  • 13. Computer Misuse and Cybersecurity Act 15A.—(1) Where the Minister is satisfied that it is necessary for the purposes of preventing, detecting or countering any threat to the national security, essential services or defence of Singapore or foreign relations of Singapore, … can order … (2) (a) Power to search and decrypt computers under Criminal Procedure Code; (b) provide any information (relating to computers)— (c) providing real-time information
  • 14. Defamation Law The plaintiff will succeed if he/she can show that the statement ◦ would lower his reputation ◦ referred to him/her ◦ was published to at least one other person ◦ (no need to prove falsehood or malice)
  • 15. 15 • “Where Your CPF Money Is Going: Learning From the City Harvest Trial” • “Below is the chart that Channel NewsAsia had created to show the relations of Kong Hee and his five deputies, and the funds that they have misappropriated.”
  • 16. 16 • “Meanwhile, something bears an uncanny resemblance to how the money is being misappropriated.”
  • 17. Open for Everyone open platform, allowing any of us to innovate, create new services and tools, share freely and widely, and access all of the products and services that others have made available
  • 18. Open for Opportunity opportunity for students, entrepreneurs, creators, and inventors to explore, try and test new ideas and new business models without asking permission from any established gatekeeper
  • 19. Open as defined by Society freedom is not anarchy; it exists within the rule of law. Societies impose legal restrictions in order to promote particular community norms. Antisocial behavior does not become acceptable simply because it is “on the Internet”