This document summarizes concerns about recent draft digital economy legislation in Thailand. It discusses concerns that the legislation could undermine separation of powers and transparency, and potentially infringe on civil liberties. Key points include:
- The new Digital Economy Promotion Office could both set policy and compete with private operators, creating conflicts of interest.
- A new Digital Economy Fund lies outside the parliamentary budget process and could give grants totaling billions of baht with limited oversight.
- Revisions to the Computer Crimes Act may still be used against online speech and increase surveillance powers of authorities.
- Changes to the NBTC Law could strip independence of the telecom regulator and prolong government control over spectrum allocation, undermining competition
"Bite-sized" updates from TRPC on tech-related developments in APAC. In telecoms, South Korea appears to be the first country in APAC to allow 6GHz Wi-Fi. OTT services continue to be scrutinised, with Australia and Japan casting an eye on misinformation and slander efforts. In FSI, South Korea will be hoping to expand the use of big data, while Australia is relaxing rules on regulatory sandbox participation.
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
APNIC General Counsel Craig Ng discusses legal cooperation to overcome jurisdictional and territorial limits in cybercrime investigations at the 33rd TWNIC IP OPM in Taipei, Taiwan, on 5 December 2019.
"Bite-sized" updates from TRPC on tech-related developments in APAC. In telecoms, South Korea appears to be the first country in APAC to allow 6GHz Wi-Fi. OTT services continue to be scrutinised, with Australia and Japan casting an eye on misinformation and slander efforts. In FSI, South Korea will be hoping to expand the use of big data, while Australia is relaxing rules on regulatory sandbox participation.
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
APNIC General Counsel Craig Ng discusses legal cooperation to overcome jurisdictional and territorial limits in cybercrime investigations at the 33rd TWNIC IP OPM in Taipei, Taiwan, on 5 December 2019.
Presentation on Access to Information and the effect of the draft law on the private sector, given by Ms. Gaëlle Kibranian in the framework of the conference "Tools for Transparency: Corporate Governance and Access to Information" held on May 26, 2009.
What Financial Institution Cyber Regs Tell the Infrastructure SectorCBIZ, Inc.
Information security is a threat for every business, but it’s particularly disruptive to the nation’s infrastructure systems. Infrastructure companies should monitor how mandatory rules play out for financial institutions. If the regulatory efforts are successful in reducing the number of financial institution cyber incidents, state and federal regulators may turn their attention to other industries.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Introduction to the Freedom of Information and Data Protection Act Trinidad a...EquiGov Institute
This presentation serves as an introduction to the operations and provisions f the Freedom of Information Act and the Data Protection Act in Trinidad and Tobago
Right to Information is an act of the Parliament of India which sets out the rules and procedures regarding citizens' right to information. It replaced the former Freedom of Information Act, 2002.
Freedom of Information - Implementation and Statutory Provisions of the Act (...EquiGov Institute
This Presentation seeks to highlight the implementation of the Freedom of Information Act in Trinidad and Tobago, Outline the Statutory Provisions that exist and note some of the challenges faced in implementing and operation the Act.
'Cyber Crime ACT 2015' is Nugget 4 in the series 'Cyber Security Awareness Month 2017' It is important that you understand the direction and view of the Government in Cyber Crime. Remember Cyber Security is everyone's responsibility.
The Prevention of Electronic Crimes Act 2016 being new cyber crimes law in Pakistan provide a comprehensive mechanism to prevent and apprehend the cyber crimes.
This presentation on The RTI Act 2005 is for general understanding of the netizens. The act was enacted to upheld Transparency & Accountability in Public offices.
Presentation by Keita Nishiyama at the OECD Global Conference on Governance Innovation which took place in Paris on 13-14 January 2020. Further information is available at http://www.oecd.org/gov/regulatory-policy/oecd-global-conference-on-governance-innovation.htm.
Presentation on Access to Information and the effect of the draft law on the private sector, given by Ms. Gaëlle Kibranian in the framework of the conference "Tools for Transparency: Corporate Governance and Access to Information" held on May 26, 2009.
What Financial Institution Cyber Regs Tell the Infrastructure SectorCBIZ, Inc.
Information security is a threat for every business, but it’s particularly disruptive to the nation’s infrastructure systems. Infrastructure companies should monitor how mandatory rules play out for financial institutions. If the regulatory efforts are successful in reducing the number of financial institution cyber incidents, state and federal regulators may turn their attention to other industries.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Introduction to the Freedom of Information and Data Protection Act Trinidad a...EquiGov Institute
This presentation serves as an introduction to the operations and provisions f the Freedom of Information Act and the Data Protection Act in Trinidad and Tobago
Right to Information is an act of the Parliament of India which sets out the rules and procedures regarding citizens' right to information. It replaced the former Freedom of Information Act, 2002.
Freedom of Information - Implementation and Statutory Provisions of the Act (...EquiGov Institute
This Presentation seeks to highlight the implementation of the Freedom of Information Act in Trinidad and Tobago, Outline the Statutory Provisions that exist and note some of the challenges faced in implementing and operation the Act.
'Cyber Crime ACT 2015' is Nugget 4 in the series 'Cyber Security Awareness Month 2017' It is important that you understand the direction and view of the Government in Cyber Crime. Remember Cyber Security is everyone's responsibility.
The Prevention of Electronic Crimes Act 2016 being new cyber crimes law in Pakistan provide a comprehensive mechanism to prevent and apprehend the cyber crimes.
This presentation on The RTI Act 2005 is for general understanding of the netizens. The act was enacted to upheld Transparency & Accountability in Public offices.
Presentation by Keita Nishiyama at the OECD Global Conference on Governance Innovation which took place in Paris on 13-14 January 2020. Further information is available at http://www.oecd.org/gov/regulatory-policy/oecd-global-conference-on-governance-innovation.htm.
Explore the Power of Transparency: Right to Information (RTI)
Delve into the fundamental right that empowers citizens to access information held by public authorities. This presentation sheds light on the essence of the Right to Information Act, its significance in fostering transparency, and its role in shaping accountable governance.
Discover the ins and outs of RTI, from its historical context to its modern-day implications. Uncover how this pivotal legislation acts as a catalyst for accountability, encouraging citizen engagement and ensuring responsive governance.
Join us on a journey through the nuances of RTI, understanding its applications, impact, and the power it bestows upon citizens to question, seek, and receive information from public bodies.
Empower yourself with knowledge and learn how the Right to Information fosters a more informed and participative society, transforming the landscape of governance for the better."
Visiting researcher lecture on AI legislation and smart governance at the Department of Middle Eastern Studies College of Humanities and Social Sciences, Hamad Bin Khalifa University.
12 March 2023
TPP and Digital Rights: Indonesian Perspective OverviewICT Watch
This is a very brief review of Trans Pacific Partnership (TPP) from Indonesian perspective, focused on 2 provision that related to the digital rights, e-commerce and intellectual property.
Summary of the 5 TPP's Impacts:
Cross-border Data Transfer
- TPP: restriction of cross-border digital data transfer is not allowed
- standard for data and personal information?
- Jurisdiction? Bilateral /multilateral agreement?
Data Center Territory
- TPP: computing facility / data center localization is not allowed
- Indonesian Government Regulation No. 82/2012?
- Localization = trade barrier? Market (traffic) domination?
Copyrighted Digital Content
- TPP: immediate remove/disable digital content of the copyright infringement
- Liability of service providers? User-generated content?
- Regulation? Procedure? How about fair-use?
Trade Secret in Computer System
- TPP: unauthorized access of trade secret in a computer system is a criminal
- Revelation of a corporate wrongdoing is criminal?
- New threat for whistleblower, journalist or netizen who tell the truth?
Internet Access for Consumer
- TPP: Consumer’s Internet access subject to “reasonable network management”
- Justification for “reasonable”? Unjustifiable discriminatory?
- Limitation of “network management” practice? Net neutrality?
e-Transmission Custom Duties
- TPP: custom duties on electronic transmission is not allowed
- Global operators’ revenues are stagnating, operating and capital expenditures are increasing. Meanwhile, the “over-the-top” (OTT) players that piggyback free on telecom systems are gaining in number and popularity, making the traditional operators’ task that much more difficult* ?
- Taxing of over-the-top (OTT) services? Digital products?
Compiled by ICT Watch - Indonesia.
*) http://www.strategyand.pwc.com/perspectives/2015-telecommunications-trends
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Terrance Tong
China’s recent cybersecurity laws have been cited by the government as internet and personal data protection milestones, while being viewed with suspicion by foreign multinationals as potentially increasing compliance costs. The one certain thing is that the Chinese government
is succeeding in exercising more control and oversight over cyberspace.
The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implication...Aggregage
In this session with Elizabeth “Paige” Baumann, she'll cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, current implications of the act, and what impacts the act has for the future of banking and finance.
Presentation given at Bangkok Sustainable Banking Forum 2019, 13 August 2019. Sarinee Achavanuntakul, Fair Finance Thailand (สฤณี อาชวานันทกุล, แนวร่วมการเงินที่เป็นธรรมประเทศไทย)
"Pursuing retail banking with social responsibility" by Sarinee Achavanuntakul. Presented at Sustainable Banking Conference, Bangkok, Thailand, 23 July 2018
how can I sell pi coins after successfully completing KYCDOT TECH
Pi coins is not launched yet in any exchange 💱 this means it's not swappable, the current pi displaying on coin market cap is the iou version of pi. And you can learn all about that on my previous post.
RIGHT NOW THE ONLY WAY you can sell pi coins is through verified pi merchants. A pi merchant is someone who buys pi coins and resell them to exchanges and crypto whales. Looking forward to hold massive quantities of pi coins before the mainnet launch.
This is because pi network is not doing any pre-sale or ico offerings, the only way to get my coins is from buying from miners. So a merchant facilitates the transactions between the miners and these exchanges holding pi.
I and my friends has sold more than 6000 pi coins successfully with this method. I will be happy to share the contact of my personal pi merchant. The one i trade with, if you have your own merchant you can trade with them. For those who are new.
Message: @Pi_vendor_247 on telegram.
I wouldn't advise you selling all percentage of the pi coins. Leave at least a before so its a win win during open mainnet. Have a nice day pioneers ♥️
#kyc #mainnet #picoins #pi #sellpi #piwallet
#pinetwork
how to swap pi coins to foreign currency withdrawable.DOT TECH
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the contact information for my personal pi vendor.
Telegram: @Pi_vendor_247
how to sell pi coins effectively (from 50 - 100k pi)DOT TECH
Anywhere in the world, including Africa, America, and Europe, you can sell Pi Network Coins online and receive cash through online payment options.
Pi has not yet been launched on any exchange because we are currently using the confined Mainnet. The planned launch date for Pi is June 28, 2026.
Reselling to investors who want to hold until the mainnet launch in 2026 is currently the sole way to sell.
Consequently, right now. All you need to do is select the right pi network provider.
Who is a pi merchant?
An individual who buys coins from miners on the pi network and resells them to investors hoping to hang onto them until the mainnet is launched is known as a pi merchant.
debuts.
I'll provide you the Telegram username
@Pi_vendor_247
Even tho Pi network is not listed on any exchange yet.
Buying/Selling or investing in pi network coins is highly possible through the help of vendors. You can buy from vendors[ buy directly from the pi network miners and resell it]. I will leave the telegram contact of my personal vendor.
@Pi_vendor_247
USDA Loans in California: A Comprehensive Overview.pptxmarketing367770
USDA Loans in California: A Comprehensive Overview
If you're dreaming of owning a home in California's rural or suburban areas, a USDA loan might be the perfect solution. The U.S. Department of Agriculture (USDA) offers these loans to help low-to-moderate-income individuals and families achieve homeownership.
Key Features of USDA Loans:
Zero Down Payment: USDA loans require no down payment, making homeownership more accessible.
Competitive Interest Rates: These loans often come with lower interest rates compared to conventional loans.
Flexible Credit Requirements: USDA loans have more lenient credit score requirements, helping those with less-than-perfect credit.
Guaranteed Loan Program: The USDA guarantees a portion of the loan, reducing risk for lenders and expanding borrowing options.
Eligibility Criteria:
Location: The property must be located in a USDA-designated rural or suburban area. Many areas in California qualify.
Income Limits: Applicants must meet income guidelines, which vary by region and household size.
Primary Residence: The home must be used as the borrower's primary residence.
Application Process:
Find a USDA-Approved Lender: Not all lenders offer USDA loans, so it's essential to choose one approved by the USDA.
Pre-Qualification: Determine your eligibility and the amount you can borrow.
Property Search: Look for properties in eligible rural or suburban areas.
Loan Application: Submit your application, including financial and personal information.
Processing and Approval: The lender and USDA will review your application. If approved, you can proceed to closing.
USDA loans are an excellent option for those looking to buy a home in California's rural and suburban areas. With no down payment and flexible requirements, these loans make homeownership more attainable for many families. Explore your eligibility today and take the first step toward owning your dream home.
If you are looking for a pi coin investor. Then look no further because I have the right one he is a pi vendor (he buy and resell to whales in China). I met him on a crypto conference and ever since I and my friends have sold more than 10k pi coins to him And he bought all and still want more. I will drop his telegram handle below just send him a message.
@Pi_vendor_247
how can i use my minded pi coins I need some funds.DOT TECH
If you are interested in selling your pi coins, i have a verified pi merchant, who buys pi coins and resell them to exchanges looking forward to hold till mainnet launch.
Because the core team has announced that pi network will not be doing any pre-sale. The only way exchanges like huobi, bitmart and hotbit can get pi is by buying from miners.
Now a merchant stands in between these exchanges and the miners. As a link to make transactions smooth. Because right now in the enclosed mainnet you can't sell pi coins your self. You need the help of a merchant,
i will leave the telegram contact of my personal pi merchant below. 👇 I and my friends has traded more than 3000pi coins with him successfully.
@Pi_vendor_247
How to get verified on Coinbase Account?_.docxBuy bitget
t's important to note that buying verified Coinbase accounts is not recommended and may violate Coinbase's terms of service. Instead of searching to "buy verified Coinbase accounts," follow the proper steps to verify your own account to ensure compliance and security.
where can I find a legit pi merchant onlineDOT TECH
Yes. This is very easy what you need is a recommendation from someone who has successfully traded pi coins before with a merchant.
Who is a pi merchant?
A pi merchant is someone who buys pi network coins and resell them to Investors looking forward to hold thousands of pi coins before the open mainnet.
I will leave the telegram contact of my personal pi merchant to trade with
@Pi_vendor_247
What price will pi network be listed on exchangesDOT TECH
The rate at which pi will be listed is practically unknown. But due to speculations surrounding it the predicted rate is tends to be from 30$ — 50$.
So if you are interested in selling your pi network coins at a high rate tho. Or you can't wait till the mainnet launch in 2026. You can easily trade your pi coins with a merchant.
A merchant is someone who buys pi coins from miners and resell them to Investors looking forward to hold massive quantities till mainnet launch.
I will leave the telegram contact of my personal pi vendor to trade with.
@Pi_vendor_247
The secret way to sell pi coins effortlessly.DOT TECH
Well as we all know pi isn't launched yet. But you can still sell your pi coins effortlessly because some whales in China are interested in holding massive pi coins. And they are willing to pay good money for it. If you are interested in selling I will leave a contact for you. Just telegram this number below. I sold about 3000 pi coins to him and he paid me immediately.
Telegram: @Pi_vendor_247
how to sell pi coins in all Africa Countries.DOT TECH
Yes. You can sell your pi network for other cryptocurrencies like Bitcoin, usdt , Ethereum and other currencies And this is done easily with the help from a pi merchant.
What is a pi merchant ?
Since pi is not launched yet in any exchange. The only way you can sell right now is through merchants.
A verified Pi merchant is someone who buys pi network coins from miners and resell them to investors looking forward to hold massive quantities of pi coins before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...Quotidiano Piemontese
Turin Startup Ecosystem 2024
Una ricerca de il Club degli Investitori, in collaborazione con ToTeM Torino Tech Map e con il supporto della ESCP Business School e di Growth Capital
Introduction to Indian Financial System ()Avanish Goel
The financial system of a country is an important tool for economic development of the country, as it helps in creation of wealth by linking savings with investments.
It facilitates the flow of funds form the households (savers) to business firms (investors) to aid in wealth creation and development of both the parties
What website can I sell pi coins securely.DOT TECH
Currently there are no website or exchange that allow buying or selling of pi coins..
But you can still easily sell pi coins, by reselling it to exchanges/crypto whales interested in holding thousands of pi coins before the mainnet launch.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and resell to these crypto whales and holders of pi..
This is because pi network is not doing any pre-sale. The only way exchanges can get pi is by buying from miners and pi merchants stands in between the miners and the exchanges.
How can I sell my pi coins?
Selling pi coins is really easy, but first you need to migrate to mainnet wallet before you can do that. I will leave the telegram contact of my personal pi merchant to trade with.
Tele-gram.
@Pi_vendor_247
what is the future of Pi Network currency.DOT TECH
The future of the Pi cryptocurrency is uncertain, and its success will depend on several factors. Pi is a relatively new cryptocurrency that aims to be user-friendly and accessible to a wide audience. Here are a few key considerations for its future:
Message: @Pi_vendor_247 on telegram if u want to sell PI COINS.
1. Mainnet Launch: As of my last knowledge update in January 2022, Pi was still in the testnet phase. Its success will depend on a successful transition to a mainnet, where actual transactions can take place.
2. User Adoption: Pi's success will be closely tied to user adoption. The more users who join the network and actively participate, the stronger the ecosystem can become.
3. Utility and Use Cases: For a cryptocurrency to thrive, it must offer utility and practical use cases. The Pi team has talked about various applications, including peer-to-peer transactions, smart contracts, and more. The development and implementation of these features will be essential.
4. Regulatory Environment: The regulatory environment for cryptocurrencies is evolving globally. How Pi navigates and complies with regulations in various jurisdictions will significantly impact its future.
5. Technology Development: The Pi network must continue to develop and improve its technology, security, and scalability to compete with established cryptocurrencies.
6. Community Engagement: The Pi community plays a critical role in its future. Engaged users can help build trust and grow the network.
7. Monetization and Sustainability: The Pi team's monetization strategy, such as fees, partnerships, or other revenue sources, will affect its long-term sustainability.
It's essential to approach Pi or any new cryptocurrency with caution and conduct due diligence. Cryptocurrency investments involve risks, and potential rewards can be uncertain. The success and future of Pi will depend on the collective efforts of its team, community, and the broader cryptocurrency market dynamics. It's advisable to stay updated on Pi's development and follow any updates from the official Pi Network website or announcements from the team.
5. Source: WEF, Delivering Digital Infrastructure, 2014
Important factors in digital economy development
5
6. ที่มา: WEF, Delivering Digital Infrastructure, 2014
WEF recommendations for developing digital
infrastructure
6
7. What should be Thai government’s “First
Principles” for digital economy
• Government plays only “facilitator” role
– No conflict of interest with private players
– Clear separation of powers and roles: Policy Maker /
Regulator / Operator
• Create a level playing field, encourage start-ups,
no (crony-style) favors to incumbents or inefficient
State-owned Enterprises (SoEs)
• Avoid technological lock-in situations, e.g. allow
industry / market consensus for standards
• Dramatically improve security of gov’t networks
7
8. What should be Thai government’s “First
Principles” for digital economy (cont.)
• Use a participatory and transparent process for
major legislation and measures
• Build “trust” (necessary for digital economy!) for
both operators and users
– Strict definitions of “cybersecurity” that do not infringe
upon freedom of expression, e.g. follow “necessary
and proportionate” principle
– Strong privacy protection & consumer protection
– Clear accountability & due process, e.g. court warrants
for user data
– No onerous or vague burdens for intermediaries 8
15. (Some) concerns over draft DE laws (1)
• DE Development Law (new)
– DE Promotion Office (new entity) can both write
policies (“digital economy promotion strategic plan”)
and compete with private operators
– Digital Economy Fund (new entity) will have funding
from: 25% of spectrum auction proceeds from National
Broadcasting Telecommunications Commission (NBTC),
25% of NBTC’s income, and Universal Service
Obligation (USO) fund – proceeds can be as high as 11
billion Baht: can give grant or lend to anyone
according to criteria by DE Committee lies
completely outside parliament’s budgetary process
15
17. (Some) concerns over draft DE laws (2)
• Computer Crimes Act (revised)
– Can still be abused to prosecute speech (Section 14:
“entering false computer data into the computer
system”), although original intent was against phishing
– New wording makes it crime to enter false computer
information “that is likely to harm public safety,
economic security, public service, or national basic
infrastructure” (in addition to content deemed harmful
to national security or causing mass panic) – this is
extremely vaguely worded. Better to define “critical
infrastructure” as per international standards
17
18. (Some) concerns over draft DE laws (3)
• Computer Crimes Act (revised) (cont.)
– Safe harbor added for intermediaries for the first time
(Section 15), but still does not distinguish between
mere conduits, cache, and host
– Safe harbor language mandates penalty for any
intermediary that “collaborates, consents, or is
accomplice to” crimes in the law – “consent” on the
Internet is almost impossible to establish
– Uses “notice and takedown” not “notice and notice”
– Burden of proof rests on intermediary, not on
prosecutor: contradicts criminal law principle
18
19. (Some) concerns over draft DE laws (4)
• Computer Crimes Act (revised) (cont.)
– Traffic retention: increased maximum from 1 to 2 years
– Gives DE Minister the authority to mandate criteria,
timing, and means to “prevent the dissemination or
erase computer information” – this implies power to
commit surveillance & hacking!
– Sets up “computer information screening committee”
by order of DE Minister (2 out of 5 must be from
related private sector) – this committee has authority
to ask court permission to remove “computer
information that contravenes public order or public
morals” that is against any law (Section 20)
19
20. (Some) concerns over draft DE laws (5)
• NBTC Law (revised)
– Strip NBTC’s independence – put under DE Committee
– Mandates NBTC to “allocate sufficient spectrum for
public service provided by the state” – this may
prolong or make impossible spectrum re-allocation
(back from the hands of government agencies,
including the army). Also, locks ‘public service’ in the
hands of SoE only.
– No need for spectrum to be auctioned; beauty contests
allowed – back to the ‘dark age’ of crony capitalism?
– NBTC must “compensate” government agencies for
spectrum re-allocation – this is actually their “duty”!
20