This is a very brief review of Trans Pacific Partnership (TPP) from Indonesian perspective, focused on 2 provision that related to the digital rights, e-commerce and intellectual property.
Summary of the 5 TPP's Impacts:
Cross-border Data Transfer
- TPP: restriction of cross-border digital data transfer is not allowed
- standard for data and personal information?
- Jurisdiction? Bilateral /multilateral agreement?
Data Center Territory
- TPP: computing facility / data center localization is not allowed
- Indonesian Government Regulation No. 82/2012?
- Localization = trade barrier? Market (traffic) domination?
Copyrighted Digital Content
- TPP: immediate remove/disable digital content of the copyright infringement
- Liability of service providers? User-generated content?
- Regulation? Procedure? How about fair-use?
Trade Secret in Computer System
- TPP: unauthorized access of trade secret in a computer system is a criminal
- Revelation of a corporate wrongdoing is criminal?
- New threat for whistleblower, journalist or netizen who tell the truth?
Internet Access for Consumer
- TPP: Consumer’s Internet access subject to “reasonable network management”
- Justification for “reasonable”? Unjustifiable discriminatory?
- Limitation of “network management” practice? Net neutrality?
e-Transmission Custom Duties
- TPP: custom duties on electronic transmission is not allowed
- Global operators’ revenues are stagnating, operating and capital expenditures are increasing. Meanwhile, the “over-the-top” (OTT) players that piggyback free on telecom systems are gaining in number and popularity, making the traditional operators’ task that much more difficult* ?
- Taxing of over-the-top (OTT) services? Digital products?
Compiled by ICT Watch - Indonesia.
*) http://www.strategyand.pwc.com/perspectives/2015-telecommunications-trends
IGF 2013 Bali Narrative and Financial Report by ID-IGFID-IGF
This report describes the preparation process, the results, and the lessons learned from the 8th Internet Governance Forum (IGF) that was held in Bali, Indonesia, from October 22 to 25, 2013. The 8th IGF was organized and funded by various groups to represent the spirit of the multistakeholder approach. Moreover, to embody a transparent and accountable multistakeholder process as an aim of the 8th IGF, this report is intended to be available for the public, in general, and for donors and other relevant stakeholders in particular. This report was primarily developed from the reflections of the stakeholders involved in the organizing process of the 2013 IGF. Additionally, the report draws upon official documents from the ID-IGF and IGF websites to provide a more comprehensive picture about the 2013 IGF. The links to these documents are included in the footnotes for further reading. The 8th IGF was organized and funded by multi-stakeholder cooperation from the beginning to the end. Thus, the most valuable lessons for the 2013 IGF organizing committee came from the challenges in working with a multi-stakeholder platform. To resolve conflicts and ensure effective communication, the 2013 IGF committee members worked together to ensure the broad inclusion of stakeholders, a shared sense of stewardship, productive consensus building, and strategic engagement of media
channels. By including government, private sector, and civil society representative in its organizing process, the 2013 IGF encouraged all stakeholders to be financially and managerially transparent and accountable in order to develop a relationship of trust among each other and with the public. Overall, the 2013 IGF is aimed at enhancing Internet governance at local, regional and global levels. The organizers of the 2013 IGF wish that the multi-stakeholder
collaboration will continue to serve as a sustainable and relevant platform in the future towards transparent, accountable, professional, and egalitarian internet governance in Indonesia and globally.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
IGF 2013 Bali Narrative and Financial Report by ID-IGFID-IGF
This report describes the preparation process, the results, and the lessons learned from the 8th Internet Governance Forum (IGF) that was held in Bali, Indonesia, from October 22 to 25, 2013. The 8th IGF was organized and funded by various groups to represent the spirit of the multistakeholder approach. Moreover, to embody a transparent and accountable multistakeholder process as an aim of the 8th IGF, this report is intended to be available for the public, in general, and for donors and other relevant stakeholders in particular. This report was primarily developed from the reflections of the stakeholders involved in the organizing process of the 2013 IGF. Additionally, the report draws upon official documents from the ID-IGF and IGF websites to provide a more comprehensive picture about the 2013 IGF. The links to these documents are included in the footnotes for further reading. The 8th IGF was organized and funded by multi-stakeholder cooperation from the beginning to the end. Thus, the most valuable lessons for the 2013 IGF organizing committee came from the challenges in working with a multi-stakeholder platform. To resolve conflicts and ensure effective communication, the 2013 IGF committee members worked together to ensure the broad inclusion of stakeholders, a shared sense of stewardship, productive consensus building, and strategic engagement of media
channels. By including government, private sector, and civil society representative in its organizing process, the 2013 IGF encouraged all stakeholders to be financially and managerially transparent and accountable in order to develop a relationship of trust among each other and with the public. Overall, the 2013 IGF is aimed at enhancing Internet governance at local, regional and global levels. The organizers of the 2013 IGF wish that the multi-stakeholder
collaboration will continue to serve as a sustainable and relevant platform in the future towards transparent, accountable, professional, and egalitarian internet governance in Indonesia and globally.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Network neutrality has been at the center of intense political discussions about Internet regulation. Net neutrality is the principle that all content on the Internet should be equally available to users without discrimination by service providers. Establishing legal protections for net neutrality is a necessary component to providing equitable access to online educational materials and services.
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
It involves 12 countries: the US, Japan, Malaysia, Vietnam, Singapore, Brunei, Australia, New Zealand, Canada, Mexico, Chile and Peru.
The pact aims to deepen economic ties between these nations, slashing tariffs and fostering trade to boost growth.
Member countries are also hoping to foster a closer relationship on economic policies and regulation.
The agreement could create a new single market something like that of the EU.
Pretty big indeed. The 12 countries have a collective population of about 800 million - almost double that of the European Union's single market. The 12-nation would-be bloc is already responsible for 40% of world trade.
The deal is a remarkable achievement given the very different approaches and standards within the member countries, including environmental protection, workers' rights and regulatory coherence - not to mention the special protections that some countries have for certain industries
This discussion on Trans Pacific Partnership. This presentation will look at Trade, Government Policies, comments from media, trade association as well as government leaders.
2018 National Dialog. Internet of Trust; Security, Freedom and sovereignityID IGF
The ID-IGF National Dialog 2018 was held successfull. Many young or Millenial were attend the event. As there were new chapter of Youth ID-IGF were also begin into seperate baskets discussion. Hopefully, ID-IGF could make National Dialog next year, and keept teh youth ID-IGF into part of the event.
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Network neutrality has been at the center of intense political discussions about Internet regulation. Net neutrality is the principle that all content on the Internet should be equally available to users without discrimination by service providers. Establishing legal protections for net neutrality is a necessary component to providing equitable access to online educational materials and services.
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
It involves 12 countries: the US, Japan, Malaysia, Vietnam, Singapore, Brunei, Australia, New Zealand, Canada, Mexico, Chile and Peru.
The pact aims to deepen economic ties between these nations, slashing tariffs and fostering trade to boost growth.
Member countries are also hoping to foster a closer relationship on economic policies and regulation.
The agreement could create a new single market something like that of the EU.
Pretty big indeed. The 12 countries have a collective population of about 800 million - almost double that of the European Union's single market. The 12-nation would-be bloc is already responsible for 40% of world trade.
The deal is a remarkable achievement given the very different approaches and standards within the member countries, including environmental protection, workers' rights and regulatory coherence - not to mention the special protections that some countries have for certain industries
This discussion on Trans Pacific Partnership. This presentation will look at Trade, Government Policies, comments from media, trade association as well as government leaders.
Dr. Alejandro Diaz Bautista, Nafta Renegotiation, NAFTA at 15, UAM Economics ...guest9057bc
“Regional Economic Growth in North America: the Effects of the Renegotiation of the NAFTA Agreement”.
Alejandro Díaz-Bautista, Ph.D.
Professor of Economics and Researcher at
Colegio de la Frontera Norte (COLEF)
Visiting Research Fellow ,
Center for U.S.-Mexican Studies, UCSD.
adiazbau@hotmail.com
March 13, 2009, 11:15 - 11:45.
Conference at
Universidad Autonoma Metropolitana, Mexico City.
kartu status adalah perangkat untuk melatih kemampuan peserta workshop internetsehat dalam hal memilah dan memilih mana status media sosial yang pantas/tidakpantas diposting. Kartu status digunakan dalam kegiatan workshop internetsehat di kalangan pelajar.
Siapa saja boleh mengunduh, memodifikasi, dan menyebarkan kartu status untuk kepentingan literasi digital dan non-komersial.
file download lainnya: bit.ly/kartustatus
Canada's involvement in trans-pacific trade partnershipnikita kozlov
Canada's involvement in trans-pacific trade partnership. Presentation. Information was taken from special book about Canada in Trans-Pacific Trade Partnership...
Entry of E-commerce in the business scenario has changed the rules of the game and it has affected the economic relations between and within different countries and companies.
Hence, it becomes very important to create a policy and regulatory environment that favors the development of e-commerce and harmonizes national approaches in diverse areas such as telecommunications, trade, intellectual property, privacy etc.
So, here we’ll discuss about legal and policy issues which are associated with e-commerce along with the laws and environments effective to deal with them, with special reference to the laws applicable in India.
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
In today’s digital environment, devices are able to interconnect and react to contextual data more than ever before: artificial intelligence is beginning to coordinate how data collected from sensors and de-vices within the network is analysed, and device ecosystems are replacing standalone devices to deliver solutions to the user. In this paper, the researcher explores current implementations of IoT that have led to positive outcomes for the user; but also, the challenges that remain in today’s applications. Moreover, ex-ploring these current barriers may be able to infer future applications capable of being deployed on a global scale
TRPC director Dr. John Ure's presented on "Preparing for tomorrow: Regulation in a data-drive connected world" at Session 2: "The changing rules of the game" at the Inaugural ICT Regulators' Leadership Retreat, that took place in Singapore from 18 to 20 March 2015, organized by the Telecommunication Development Bureau (BDT) and the Infocomm Development Authority of Singapore (IDA).
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects various non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the future challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations, procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the unfolding changes brought by IOT will also help in its growth.
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
The evolution of the Internet of Things is significantly a
ected by legal restrictions imposed for personal data handling, such as the European General Data Protection Regulation (GDPR).
The main purpose of this regulation is to provide people in the digital age greater control over their personal data, with their freely given, specific, informed and unambiguous consent to collect and process the data concerning them. ADVOCATE is an advanced framework that fully complies with the requirements of GDPR, which, with the extensive use of blockchain and artificial intelligence technologies, aims to provide an environment that will support users in maintaining control of their personal data in the IoT ecosystem. This paper proposes and presents the Intelligent Policies Analysis Mechanism (IPAM) of the ADVOCATE framework, which, in an intelligent and fully automated manner, can identify conflicting rules or consents of the user, which may lead to the collection of personal data that can be used for profiling. In order to clearly identify and implement IPAM, the problem of recording user data from smart entertainment devices using Fuzzy Cognitive Maps (FCMs) was simulated. FCMs are an intelligent decision-making system that simulates the processes of a complex system, modeling the correlation base, knowing the behavioral and balance specialists of the system. Respectively, identifying conflicting rules that can lead to a profile, training is done using Extreme Learning Machines (ELMs), which are highly ecient neural systems of small and flexible architecture that can work optimally in complex environments.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
E commerce negotiation at mc11 and s&d treatmentM S Siddiqui
The proposals includes following conditional ties of No Customs Duties/Non Discrimination, Enabling Cross-Border Data Flows, Enabling Cross-Border Data Flows, Promoting a Free and Open Internet, No Localisation Barriers, No Technology Issues, Protecting critical source code, Free technology choice, No Safeguarding Network Competition etc.
Presentation by Keita Nishiyama at the OECD Global Conference on Governance Innovation which took place in Paris on 13-14 January 2020. Further information is available at http://www.oecd.org/gov/regulatory-policy/oecd-global-conference-on-governance-innovation.htm.
Analyzing Role of Big Data and IoT in Smart CitiesIJAEMSJORNAL
Big data and Internet of Things (IoT) technologies have evolved and expanded tremendously and hence play a major role in building feasible initiatives for smart city development. IoT and big data form a perfect blend in bringing an interesting and novel challenge to attain futuristic smart cities. These new challenges mainly focus on business and technology related issues that help smart cities to formulate their principles, vision, & requirements of smart city applications. In this paper, the role of big data and IoT technologies with respect to smart cities is analyzed. The benefits that smart cities will have from big data and IoT are also discussed. Various challenges faced by smart cities in general related to big data and IoT have also been described here. Moreover, the future statistics of IoT and big data with respect to smart cities is also deliberated.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
The technical foundation of a new, decentralized and distributed data economy
The recent ruling of Italian State Court to fine Facebook established that consumers’ data has economic value and represents a counter-performance for online services offered by digital platforms. This enables consumers with bargaining power, involving them into the data monetization cycle. However, only by ensuring consumers’ ownership rights over their data can this data be monetized in a straightforward manner. In fact, as a consequence of the widespread adoption of connected devices generating continuous flows of data, the focus should shift from the concept of Data Privacy – protection of data sets from access by unauthorised parties – to the concept of Data Ownership – freely granting and revoking data access to legitimate parties.
Consumers’ data is the new oil yet Privacy Laws regarding sharing data with third parties limit Data Monetization opportunities. The reason why compliance is difficult is of a technical nature: all current data sharing platforms are centralized and have exclusive control over third party access to consumers’ data. By decentralizing data access control and putting it back into the hands of legal data owners, Companies can create their own Data Streams Marketplaces involving customers and business partners in a data monetization cycle that is GDPR compliant by design.
Aktivasi 2FA di Media Sosial Lewat PonselICT Watch
Autentikasi Dua Faktor atau Two Factor Authentication (2FA) adalah sebuah metoda untuk menambahkan lapisan keamanan pada akun media sosial kita, selain password
Salah satu contohnya adalah dengan mengirimkan kode khusus melalui SMS ke nomor telepon selular setiap kali ada upaya untuk login ke akun medsos yang kita miliki.
Mengaktifkan 2FA akan mempersulit pihak lain untuk dapat masuk dan mengambil alih / meretas akun kita
Tantangan Perlindungan Privasi dan Keterbukaan InformasiICT Watch
Tantangan Perlindungan Privasi. Indonesia cukup tertinggal dalam diskursus perlindungan hak atas privasi terutama jika melihat kerangka legislasi dari perlindungan hak atas privasi, baik dari segi waktu maupun variasi perlindungannya. Walaupun perlindungan privasi sebenarnya sudah dikenal lama di Indonesia Setidaknya Kitab Undang – Undang Hukum Pidana memuat beberapa pasal tindak pidana yang terkait dengan privasi seperti larangan untuk membuka surat – surat, juga larangan memasuki tanah/properti pribadi, dan tindak pidana lain yang terkait dengan kejahatan jabatan.
Perlindungan Hak Atas Privasi di InternetICT Watch
Perlindungan Hak Atas Privasi di Internet. Isu mengenai pentingnya perlindungan hak atas privasi di Indonesia mulai menguat seiring dengan makin meningkatnya jumlah pengguna telepon seluler dan internet dalam beberapa tahun terakhir. Sejumlah kasus yang mencuat, terutama yang memiliki keterkaitan dengan kebocoran data pribadi seseorang, yang berbuntut pada aksi penipuan, kian menguatkan wacana perihal urgensi penguatan perlindungan hak atas privasi.
Perlindungan Data Pribadi di Indonesia. Usulan Pelembagaan Kebijakan dari Perspektif Hak Asasi Manusia. Meningkatnya pemanfaatan teknologi internet, selain membuka banyak kesempatan dan peluang pengembangan, termasuk kemudahan dalam pertukaran informasi, pada sisi lain juga telah membuka kerawanan baru terjadinya intervensi terhadap privasi. Peredaran data dalam format digital yang tidak lagi mengenal batas ruang dan teritorial menjadikan semakin mudahnya data‐data pribadi seseorang terpapar atau dipindahtangankan secara semena‐mena, tanpa kontrol dari pemilik data.
Privasi dan Keamanan Internet
Kerahasiaan pribadi atau keleluasaan pribadi (Bahasa Inggris: privacy) adalah kemampuan satu atau sekelompok individu untuk menutup atau melindungi kehidupan dan urusan personalnya dari publik, atau untuk mengontrol arus informasi mengenai diri mereka.
Privasi dan Perlindungan Data Pribadi.
Kerahasiaan pribadi atau keleluasaan pribadi (Bahasa Inggris: privacy) adalah kemampuan satu atau sekelompok individu untuk menutup atau melindungi kehidupan dan urusan personalnya dari publik, atau untuk mengontrol arus informasi mengenai diri mereka.
Privasi 101 Panduan Memahami Privasi dan Perlindungan DataICT Watch
Privasi 101 Panduan Memahami Privasi, Perlindungan Data dan Surveilans Komunikasi.
Kerahasiaan pribadi atau keleluasaan pribadi (Bahasa Inggris: privacy) adalah kemampuan satu atau sekelompok individu untuk menutup atau melindungi kehidupan dan urusan personalnya dari publik, atau untuk mengontrol arus informasi mengenai diri mereka.
Untuk file versi pptx (245 MB), pdf (10 MB) dan video clip terkait, silakan unduh di https://s.id/litdigictw | Informasi lebih lanjut silakan hubungi email info@ictwatch.id
Presentasi ini bebas digunakan dengan lisensi Creative Commons BY-NC-SA.
Literasi Digital Cerdas Paham Daring ICT Watch Hoax Hoaks UU ITE Informasi Transaksi Elektronik Ujaran Kebencian Perlindung Anak Child Online Protection Data Pribadi Online Privasi Internet Sehat Indonesia
Peta Jalan Perlindungan Anak Indonesia di Internet (Sebuah Pengantar)ICT Watch
Dokumentasi #LiveStreaming Rilis Peta Jalan Perlindungan Anak Indonesia di Internet https://www.youtube.com/watch?v=Hv161zrCMuo
Peta Jalan Perlindungan Anak Indonesia di Internet (Sebuah Pengantar).
I. LATAR BELAKANG 1
II. KOMITMEN GLOBAL SEBAGAI PEDOMAN DASAR 3
A. Landasan Hukum Dan Kebijakan 5
B. Mekanisme Pelaporan 7
C. Perhatian Utama Dalam Skala Nasional 11
D. Program Pendidikan Dan Kesadaran Masyarakat 12
III. ANAK DAN AKTIVITAS DI DUNIA MAYA 13
A. Aktivitas Anak Online Di Indonesia 16
B. Perangkat Yang Digunakan Saat Berinternet 17
C. Motivasi Menggunakan Internet Dan Aktivitas Online 17
IV. KONTEN YANG MENYALAHGUNAKAN ANAK 19
A. Definisi 19
B. Naungan Hukum 22
C. Kajian Regional 23
D. Ketersediaan Alat Dan Instrumen Untuk Investigasi 25
E. Pelatihan Penggunaan Alat Dan Membangun Awareness
(Terhadap Konten Yang Menyalahgunakan Anak) 27
F. Format/Prosedur Pelaporan 29
G. Strategi (Termasuk Hukum) Berkaitan Dengan
Pengurangan Konten Yang Menyalahgunakan Anak 30
V. DAFTAR PRIORITAS NASIONAL DALAM HAL PERLINDUNGAN
ANAK DI RANAH MAYA 34
A. Peta Komprehensif Kebijakan Yang Sudah Tersedia Terkait
Perlindungan Anak Di Ranah Maya 34
B. Fokus Utama Perlindungan Anak Di Ranah Maya Dalam
Skala Nasional 36
C. Program Dan Aktivitas Pemberdayaan Dan
Pendidikan Publik 36
D. Usulan Alur Mekanisme Pelaporan Yang Spesifik 38
E. Pemberdayaan Anak
Dinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITEICT Watch
Dinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITE. Silakan baca juga artikel "Jangan Mau Dibohongi Pake UU ITE!" http://internetsehat.id/2016/12/jangan-mau-dibohongi-pake-uu-ite/
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
7. But, TPP is a closed-door negotiation!
image:statusmind.com
8. TPP Final Texts
Final Texts:
- https://ustr.gov/trade-agreements/free-trade-
agreements/trans-pacific-partnership/tpp-full-text
- https://wikileaks.org/tpp-final
image:iese.edu
9. 1. Cross-border Data Transfer (TPP e-Commerce, Article 14.11.2)
– TPP: restriction of cross-border digital data transfer is not allowed
– Standard for data and personal information?
– Jurisdiction? Bilateral /multilateral agreement?
2. Data Center Territory (TPP e-Commerce, Article 14.13.2)
– TPP: computing facility / data center localization is not allowed
– Indonesian Government Regulation No. 82/2012?
– Localization = trade barrier? Market (traffic) domination?
3. Copyrighted Digital Content (TPP Intellectual Property, Article 18.82.3)
– TPP: immediate remove/disable digital content of the copyright infringement
– Liability of service providers? User-generated content?
– Regulation? Procedure? How about fair-use?
4. Trade Secret in Computer System (TPP Intellectual Property, Article 18.78.2)
– TPP: unauthorized access of trade secret in a computer system is a criminal
– Revelation of a corporate wrongdoing is criminal?
– New threat for whistleblower, journalist or netizen who tell the truth?
5. Internet Access for Consumer (TPP e-Commerce, Article 14.10)
– TPP: Consumer’s Internet subject to “reasonable network management”
– Justification for “reasonable”? Unjustifiable discriminatory?
– Limitation of “network management” practice? Net neutrality?
6. e-Transmission Custom Duties (TPP e-Commerce, Article 14.3)
– TPP: custom duties on electronic transmission is not allowed
– Global operators’ revenues are stagnating, operating and capital expenditures are increasing. Meanwhile,
the “over-the-top” (OTT) players that piggyback free on telecom systems are gaining in number and
popularity, making the traditional operators’ task that much more difficult* ?
– Taxing of over-the-top (OTT) services? Digital products?
*) http://www.strategyand.pwc.com/perspectives/2015-telecommunications-trends
Full Presentation: http://bit.ly/tpp4id or http://s.id/tpp4id
Summary of the 6 TPP’s Impacts on Digital Rights from
Indonesian Perspective (Brief Overview)
10. TPP e-Commerce, Article 14.11.2:
“Each Party shall allow the cross-border
transfer of information by electronic means,
including personal information, when this
activity is for the conduct of the business of
a covered person.”
#1 | Case : Cross Border Data Transfer
image:internet
11. #1 | Note: Data Needs Safe Environment
Global trends #3 to create opportunities to transform Southeast Asia by 2030
(McKinsey, Nov 2014)
“Establish a policy framework for data
collection and sharing as well as online
privacy. Capturing the value of big data, the
Internet of Things, and the cloud depends
on creating a safe and predictable
environment for data collection, storage,
and usage across business entities and even
across country borders. (McKinsey, Nov 2014)
12. Protecting personal data online is key for the data driven
economy, since it will increase trust in the internet, and greater
trust will foster more use. Data flows nowadays are global, and
privacy regimes need to be interoperable with one another to
really enable the internet to be an engine of innovation and
economic growth. (World Development Report, Jan 2016)
#1 | Note: Protecting Data is a Key
13. TPP signatories would still be free to restrict cross-border
data flows* as long as the restriction reasonably relates to:
1. Legitimate public policy objective.
Fact: Indonesia does not have Personal Data
Protection and/or Privacy Law/Bill yet.
2. Not applied in an arbitrary or unjustifiable
discriminatory or a disguised restriction on trade.
Fact: Should comply with the General
Agreement on Trade in Services (GATS) / WTO.
#1 | Note: Restriction OK, but…
*) TPP e-Commerce, Article 14.11.3
14. #1 | Note: Benefit for (US) Data Services
“Our member companies, the leading
developers of software, hardware, and
data services, will benefit particularly
from the right of free transfer of data, and
the freedom to locate computing facilities
based on business decisions, not
protectionist policies.“ (BSA, May 2016)
Logo of several BSA member:
15. #1 | Impact: Standard & Jurisdiction?
A country that has such laws will find it challenging to enforce
data standards on a company resident in a country that does not.
In addition, some companies may rely on the lack of a physical
presence in a particular jurisdiction in order to argue that they
need not comply with the privacy and other consumer protection
laws of that country. (Public Citizen, Nov 2015)
16. TPP e-Commerce, Article 14.13.2:
“No Party shall require a covered person to
use or locate computing facilities in that
Party’s territory as a condition for conducting
business in that territory.”
#2 | Case: Data Center Territory
image:internet
17. TPP signatories would still be free* to request data center
localization as long as the request reasonably relates to:
Legitimate public policy objective.
Fact: Indonesia has Regulation of the
Government of the Republic of Indonesia
number 82/2012, concerning Electronic
System and Transaction Operation
Not applied in an arbitrary or unjustifiable
discriminatory or a disguised restriction on trade.
Fact: Should comply with the General
Agreement on Trade in Services (GATS) / WTO.
#2 | Note: Localization OK, but…
*) TPP e-Commerce, Article 14.13.3
18. #2 | Note: Indonesian Regulation(s)
• Regulation of the Government of the Republic of
Indonesia number 82/2012, concerning Electronic
System and Transaction Operation, article 43.1.b:
“The Electronic Transactions in the territory of the
Republic of Indonesia shall: perform transactions
data storage in domestically”
• Draft of MCIT Ministerial Decree concerning
Personal Data Protection in the Electronic System:
“Data center and disaster recovery center of
electronic system operator for public service used to
process the Personal Data Protection shall be placed
in the territory of the Republic of Indonesia”
19. United States Trade Representative, “2016 National Trade
Estimate Report on Foreign Trade Barriers” (page 231):
• The Indonesian government has signaled plans to enact a
personal data protection regulation under Regulation 82/2012,
and may pursue national legislation on personal data protection
in 2016, both of which could further define requirements for
data localization.
• A local data center requirement could prevent service suppliers
from fully leveraging the economies of scale from existing data
centers and discourage future investment in Indonesia.
• Furthermore, such a requirement could inhibit the cross-border
data flows that are essential to electronic commerce.
• The U.S. Government continues to engage the Indonesian
government on this issue.
#2 | Note: Localization = Barrier?
20. ‘‘Bipartisan Congressional Trade Priorities and Accountability Act of 2015’’.
- SEC. 102. Trade Negotiating Objectives
- (b) Principal Trade Negotiating Objectives
- (9) LOCALIZATION BARRIERS TO TRADE
“The principal negotiating objective of the United States with respect to
localization barriers is to eliminate and prevent measures that require
United States producers and service providers to locate facilities, intellectual
property, or other assets in a country as a market access or investment
condition, including indigenous innovation measures.”
#2 | Note: What Congress Said
In the United States, Congress should be asked for approval after the TPP
Agreement is signed by the President, pursuant to the requirements set
forth under the Trade Promotion Authority (TPA).
21. #2 | Impact: Domination & Market?
“The country distribution of major data centers clearly reflects two things the
US dominance of cloud and internet technologies; and the scale and unique
characteristics of the Chinese market. The ranking also reflects the relative
importance of smaller countries that are often used as regional hubs – Hong
Kong, Singapore…” (Sinergy Research Group, Oct 2015)
22. TPP Intellectual Property, Article 18.82.3:
“Requirement for Internet Service Providers to
expeditiously remove or disable access to
material residing on their networks or
systems upon obtaining actual knowledge of
the copyright infringement…..”
#3 | Case: Copyrighted Digital Content
image:wikimedia
23. #3 | Impact: UGC & Liability?
images:internet
*) UGC = User-Generated Content
24. TPP Intellectual Property, Article 18.78.2:
“Each Party shall provide for criminal procedures
and penalties for one or more of the following:
– the unauthorized and willful access to a trade secret held in
a computer system;
– the unauthorized and willful misappropriation (unlawful
acquisition) of a trade secret, including by means of a
computer system; or
– the fraudulent disclosure, or alternatively, the unauthorized
and willful disclosure, of a trade secret, including by means
of a computer system.”
#4 | Case: Trade Secret in Computer System
image:internet
25. #4 | Impact: Threats for the Truth?
(TPP) Creates New Threats for Journalists and Whistleblowers.
Dangerously vague text on the misuse of trade secrets, which could
be used to enact harsh criminal punishments against anyone who
reveals or even accesses information through a "computer system"
that is allegedly confidential.
TPP Could Criminalize Journalism and Whistleblowing.
TPP’s trade secrets provisions could make it a crime for people to
reveal corporate wrongdoing “through a computer system.” The
language is dangerously vague, and enables signatory countries to
enact rules that would ban reporting on timely, critical issues
affecting the public. (May 2015, 250+ Tech Companies and Digital Rights
Groups signed a letter to Congress).
26. #5 | Case: Internet Access for Consumer
TPP e-Commerce, Article 14.10:
“Subject to applicable policies, laws and
regulations, the Parties recognize the benefits
of consumers in their territories having the
ability to: (a) access and use services and
applications of a consumer’s choice available
on the Internet, subject to reasonable
network management.”
image:internet
27. #5 | Note: Open Discrimination
“The provision doesn’t advance anything for countries that
don’t have net neutrality regulation. It also fails to effectively
address existing net neutrality challenges, because it may only
apply to situations where access to applications or services are
blocked. It may not include situations where traffic is
unjustifiably degraded or discriminated against in an economic
sense, or where a service provider prioritizes certain services,
giving them significant advantages over competitors. Due to
these shortcomings, the TPP’s open access framework leaves
open an entire universe of discriminatory and innovation
harming activity that traffic carriers can leverage and which
regulators have found objectionable.” (Nov, 2015)
28. “A network management is a practice that has a primarily
technical network management justification, but does not
include other business practices. A network management
practice is reasonable if it is primarily used for and tailored to
achieving a legitimate network management purpose.
Reasonable network management is an exception to the no-
blocking rule, no-throttling rule, and no-unreasonable
interference/disadvantage standard, but not to the rule against
paid prioritization, because it does not a network management
practice and not primarily a technical purpose”. (FCC, Mar 2016)
#5 | Note: “Reasonable” according to FCC
“Protecting and Promoting the Open Internet”
31. #6 | Case: e-Transmission Customs Duties
TPP e-Commerce, Article 14.3:
1. No Party shall impose customs duties on
electronic transmissions, including content
transmitted electronically, between a person
of one Party and a person of another Party.
2. For greater certainty, paragraph 1 shall not
preclude a Party from imposing internal
taxes, fees or other charges on content
transmitted electronically, provided that
such taxes, fees or charges are imposed in a
manner consistent with this Agreement.
35. 1. Cross-border Data Transfer (TPP e-Commerce, Article 14.11.2)
– TPP: restriction of cross-border digital data transfer is not allowed
– Standard for data and personal information?
– Jurisdiction? Bilateral /multilateral agreement?
2. Data Center Territory (TPP e-Commerce, Article 14.13.2)
– TPP: computing facility / data center localization is not allowed
– Indonesian Government Regulation No. 82/2012?
– Localization = trade barrier? Market (traffic) domination?
3. Copyrighted Digital Content (TPP Intellectual Property, Article 18.82.3)
– TPP: immediate remove/disable digital content of the copyright infringement
– Liability of service providers? User-generated content?
– Regulation? Procedure? How about fair-use?
4. Trade Secret in Computer System (TPP Intellectual Property, Article 18.78.2)
– TPP: unauthorized access of trade secret in a computer system is a criminal
– Revelation of a corporate wrongdoing is criminal?
– New threat for whistleblower, journalist or netizen who tell the truth?
5. Internet Access for Consumer (TPP e-Commerce, Article 14.10)
– TPP: Consumer’s Internet subject to “reasonable network management”
– Justification for “reasonable”? Unjustifiable discriminatory?
– Limitation of “network management” practice? Net neutrality?
6. e-Transmission Custom Duties (TPP e-Commerce, Article 14.3)
– TPP: custom duties on electronic transmission is not allowed
– Global operators’ revenues are stagnating, operating and capital expenditures are increasing. Meanwhile,
the “over-the-top” (OTT) players that piggyback free on telecom systems are gaining in number and
popularity, making the traditional operators’ task that much more difficult* ?
– Taxing of over-the-top (OTT) services? Digital products?
*) http://www.strategyand.pwc.com/perspectives/2015-telecommunications-trends
Full Presentation: http://bit.ly/tpp4id or http://s.id/tpp4id
Summary of the 6 TPP’s Impacts on Digital Rights from
Indonesian Perspective (Brief Overview)
38. e-mail: donnybu[at]ictwatch.id
blog: donnybu.com
twitter: @donnybu
mobile: +62-818-930932
• Daily Activities :
ICT Watch, Executive Director
ICT Lecturer (NIDN: 0306117401)
Fellow Researcher of Citizen Lab - Toronto University and
Global Partners Digital - London
Former of : Journalist, Editor and VP at Detikcom Online Media
• Formal Educations :
University of Indonesia, Communication Management
Gunadarma University, Computer Science
• Brief CV : http://bit.ly/dbu-cv
Brief Biodata