SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Information Laws

in Mekong Countries
Mekong ICT Camp 2015
@bact
Arthit Suriyawongkul
Foundation for Internet and Civic Culture
Influences to Public Policy
Market
TechnologyLaw
Norms
?
Do laws affects these
initiatives?
Open Data
Social Media
Wireless Network
Which laws affects these
initiatives?
Open Data
Freedom of Information Law, State Secrets Law, Budget
Law, Copyright Law
Social Media
Cybercrime Law, Defamation Law, Blasphemy Law
Wireless Network
Radio Frequency Regulations, Cybersecurity Law
Think about information flow
Data Protection & Network Security
Freedom of
Information
State
Secrets
National Security
Copyright
Budget Press Freedom
Intermediary Liability
Defamation
Radio
Spectrum
& Infras
Archive
Information Laws / Policies
Freedom of Information
Privacy / Data Protection
Cybercrime (Traditional)
Cybercrime (New)
Cybersecurity
Copyright
Encryption
SIM card registration
Radio frequency
allocation and
licensing
Intermediary liability
Lawful interception
Data Protection
Key is “Consent”
Collection
Use / Process
Publication / Share
Intermediary Liability
Don’t shoot the messenger.
Or to shoot?
WIFI (2.4 GHz & 5 GHz)
Source:
- List of WLAN channels

- en.wikipedia.org
- “Designing a Dual-Band Wireless Network” 

- metageek.com
Frequency Allocation
Source: “Digital dividend scheme switched” - BBC News
FOI in Mekong Countries
Cambodia - “Access to Information Bill” (drafting since 2007)
1995 Law on the Press and 2005 Archives Law have some provisions on right
to information, not in effect in practice. [Cambodian Center for Human Rights]
Laos - HELP ME
Myanmar
1923 State Official Secrets Act, 1923 Evidence Act, and 2014 Electronic
Transactions Act restrict access to information. [Open Myanmar Initiative]
Thailand - 1997 Official Information Act
Vietnam - “Access to Information Bill” (since 2009) Ministry of Justice [Article 19]
Regional Influences
APEC (APEC Privacy Framework)
ASEAN ICT Masterplan 2011-2015 -> 2016-2020
ASEAN Human Rights Declaration
Trans-Pacific Partnership (on copyright, privacy, cross-
border data transfer)
EU Data Protection Directive
Know the rules to protect yourself and
your community, but not let them limit
your imagination.
http://mekongict.org

Más contenido relacionado

La actualidad más candente

CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
segughana
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorship
merlyna
 

La actualidad más candente (20)

CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
General Elder- Homeland Security Presentation
General Elder- Homeland Security PresentationGeneral Elder- Homeland Security Presentation
General Elder- Homeland Security Presentation
 
Regulations and consumer protection in a converged environment
Regulations and consumer protection in a converged environmentRegulations and consumer protection in a converged environment
Regulations and consumer protection in a converged environment
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorship
 
Ciberseguridad (Jornada TIC 2020)
Ciberseguridad (Jornada TIC 2020)Ciberseguridad (Jornada TIC 2020)
Ciberseguridad (Jornada TIC 2020)
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Lecture7
Lecture7Lecture7
Lecture7
 
Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet Governance
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
 
An Introduction to Net Neutrality
An Introduction to Net NeutralityAn Introduction to Net Neutrality
An Introduction to Net Neutrality
 
NETWORK NEUTRALITY
NETWORK NEUTRALITYNETWORK NEUTRALITY
NETWORK NEUTRALITY
 
Mousa
MousaMousa
Mousa
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Why Digital Forensics as a Career?
Why Digital Forensics as a Career? Why Digital Forensics as a Career?
Why Digital Forensics as a Career?
 
Session 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip PaulwellSession 1.1 Honourable Phillip Paulwell
Session 1.1 Honourable Phillip Paulwell
 

Destacado

Gregynog 2011 Becoming an Information Professional
Gregynog 2011 Becoming an Information ProfessionalGregynog 2011 Becoming an Information Professional
Gregynog 2011 Becoming an Information Professional
Nia Williams
 
BURMA IN TRANSITION-http://www.opensocietyfoundations.org/voices/burma-transi...
BURMA IN TRANSITION-http://www.opensocietyfoundations.org/voices/burma-transi...BURMA IN TRANSITION-http://www.opensocietyfoundations.org/voices/burma-transi...
BURMA IN TRANSITION-http://www.opensocietyfoundations.org/voices/burma-transi...
MYO AUNG Myanmar
 
Powering ASEAN's growth. A look at the trends that will impact the use of pow...
Powering ASEAN's growth. A look at the trends that will impact the use of pow...Powering ASEAN's growth. A look at the trends that will impact the use of pow...
Powering ASEAN's growth. A look at the trends that will impact the use of pow...
Tim Hill
 
Tripwire Enterprise 8.3 Professional
Tripwire Enterprise 8.3 ProfessionalTripwire Enterprise 8.3 Professional
Tripwire Enterprise 8.3 Professional
Steven Ostrov
 
Enterprise Architecture Professional Journal Volume II April 2014
Enterprise Architecture Professional Journal Volume II April 2014Enterprise Architecture Professional Journal Volume II April 2014
Enterprise Architecture Professional Journal Volume II April 2014
Enterprise Architecture Professional Journal
 

Destacado (20)

From Point A to Point B: Gaining Momentum through Transitions & New Types of...
From Point A to Point B:  Gaining Momentum through Transitions & New Types of...From Point A to Point B:  Gaining Momentum through Transitions & New Types of...
From Point A to Point B: Gaining Momentum through Transitions & New Types of...
 
Professional development in challenging times
Professional development in challenging timesProfessional development in challenging times
Professional development in challenging times
 
Gregynog 2011 Becoming an Information Professional
Gregynog 2011 Becoming an Information ProfessionalGregynog 2011 Becoming an Information Professional
Gregynog 2011 Becoming an Information Professional
 
Disruptive Technology
Disruptive TechnologyDisruptive Technology
Disruptive Technology
 
NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations
 
Embracing government-2-0-leading-trans-formative-change-in-the-public-sector
Embracing government-2-0-leading-trans-formative-change-in-the-public-sectorEmbracing government-2-0-leading-trans-formative-change-in-the-public-sector
Embracing government-2-0-leading-trans-formative-change-in-the-public-sector
 
Leverage your career competencies to map out your route to personal and profe...
Leverage your career competencies to map out your route to personal and profe...Leverage your career competencies to map out your route to personal and profe...
Leverage your career competencies to map out your route to personal and profe...
 
Enhance your aged infrastructure without impacting operations
Enhance your aged infrastructure without impacting operationsEnhance your aged infrastructure without impacting operations
Enhance your aged infrastructure without impacting operations
 
The Enterprise Network's Role in Business Resilience
The Enterprise Network's Role in Business ResilienceThe Enterprise Network's Role in Business Resilience
The Enterprise Network's Role in Business Resilience
 
Enterprise Architecture Professional Journal Volume I March 2014
Enterprise Architecture Professional Journal Volume I March 2014Enterprise Architecture Professional Journal Volume I March 2014
Enterprise Architecture Professional Journal Volume I March 2014
 
Mekong ict june 2010
Mekong ict june  2010Mekong ict june  2010
Mekong ict june 2010
 
Idc mobility event - Compuware slides
Idc mobility event - Compuware slidesIdc mobility event - Compuware slides
Idc mobility event - Compuware slides
 
Cloud the new disruptive technology v2 by Raymond
Cloud   the new disruptive technology v2 by RaymondCloud   the new disruptive technology v2 by Raymond
Cloud the new disruptive technology v2 by Raymond
 
BURMA IN TRANSITION-http://www.opensocietyfoundations.org/voices/burma-transi...
BURMA IN TRANSITION-http://www.opensocietyfoundations.org/voices/burma-transi...BURMA IN TRANSITION-http://www.opensocietyfoundations.org/voices/burma-transi...
BURMA IN TRANSITION-http://www.opensocietyfoundations.org/voices/burma-transi...
 
Powering ASEAN's growth. A look at the trends that will impact the use of pow...
Powering ASEAN's growth. A look at the trends that will impact the use of pow...Powering ASEAN's growth. A look at the trends that will impact the use of pow...
Powering ASEAN's growth. A look at the trends that will impact the use of pow...
 
Tripwire Enterprise 8.3 Professional
Tripwire Enterprise 8.3 ProfessionalTripwire Enterprise 8.3 Professional
Tripwire Enterprise 8.3 Professional
 
Channel Models For Cloud Computing - REV 2 - (0.90))
Channel Models For Cloud Computing - REV 2 - (0.90))Channel Models For Cloud Computing - REV 2 - (0.90))
Channel Models For Cloud Computing - REV 2 - (0.90))
 
pendidikan ict di asia oleh gwang jo kim unesco
 pendidikan ict di asia oleh gwang jo kim unesco pendidikan ict di asia oleh gwang jo kim unesco
pendidikan ict di asia oleh gwang jo kim unesco
 
Myanmar eiti annual activity report july 2015 ‐june 2016 meiti ( myanmar extr...
Myanmar eiti annual activity report july 2015 ‐june 2016 meiti ( myanmar extr...Myanmar eiti annual activity report july 2015 ‐june 2016 meiti ( myanmar extr...
Myanmar eiti annual activity report july 2015 ‐june 2016 meiti ( myanmar extr...
 
Enterprise Architecture Professional Journal Volume II April 2014
Enterprise Architecture Professional Journal Volume II April 2014Enterprise Architecture Professional Journal Volume II April 2014
Enterprise Architecture Professional Journal Volume II April 2014
 

Similar a Information Laws in Mekong Countries

Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
vafopoulos
 

Similar a Information Laws in Mekong Countries (20)

Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 

Más de Arthit Suriyawongkul

กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
Arthit Suriyawongkul
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Arthit Suriyawongkul
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัล
Arthit Suriyawongkul
 

Más de Arthit Suriyawongkul (20)

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationships
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคม
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัล
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on Thailand
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in Thailand
 
Thailand on LINE
Thailand on LINEThailand on LINE
Thailand on LINE
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days Later
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
 
เร็วขึ้น ดีขึ้น มากขึ้น ด้วยข้อมูลเปิด
เร็วขึ้น ดีขึ้น มากขึ้น ด้วยข้อมูลเปิดเร็วขึ้น ดีขึ้น มากขึ้น ด้วยข้อมูลเปิด
เร็วขึ้น ดีขึ้น มากขึ้น ด้วยข้อมูลเปิด
 

Último

一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 

Último (20)

8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 

Information Laws in Mekong Countries

  • 1. Information Laws
 in Mekong Countries Mekong ICT Camp 2015 @bact Arthit Suriyawongkul Foundation for Internet and Civic Culture
  • 2. Influences to Public Policy Market TechnologyLaw Norms ?
  • 3. Do laws affects these initiatives? Open Data Social Media Wireless Network
  • 4. Which laws affects these initiatives? Open Data Freedom of Information Law, State Secrets Law, Budget Law, Copyright Law Social Media Cybercrime Law, Defamation Law, Blasphemy Law Wireless Network Radio Frequency Regulations, Cybersecurity Law
  • 5. Think about information flow Data Protection & Network Security Freedom of Information State Secrets National Security Copyright Budget Press Freedom Intermediary Liability Defamation Radio Spectrum & Infras Archive
  • 6. Information Laws / Policies Freedom of Information Privacy / Data Protection Cybercrime (Traditional) Cybercrime (New) Cybersecurity Copyright Encryption SIM card registration Radio frequency allocation and licensing Intermediary liability Lawful interception
  • 7. Data Protection Key is “Consent” Collection Use / Process Publication / Share
  • 8. Intermediary Liability Don’t shoot the messenger. Or to shoot?
  • 9. WIFI (2.4 GHz & 5 GHz) Source: - List of WLAN channels
 - en.wikipedia.org - “Designing a Dual-Band Wireless Network” 
 - metageek.com
  • 10. Frequency Allocation Source: “Digital dividend scheme switched” - BBC News
  • 11. FOI in Mekong Countries Cambodia - “Access to Information Bill” (drafting since 2007) 1995 Law on the Press and 2005 Archives Law have some provisions on right to information, not in effect in practice. [Cambodian Center for Human Rights] Laos - HELP ME Myanmar 1923 State Official Secrets Act, 1923 Evidence Act, and 2014 Electronic Transactions Act restrict access to information. [Open Myanmar Initiative] Thailand - 1997 Official Information Act Vietnam - “Access to Information Bill” (since 2009) Ministry of Justice [Article 19]
  • 12. Regional Influences APEC (APEC Privacy Framework) ASEAN ICT Masterplan 2011-2015 -> 2016-2020 ASEAN Human Rights Declaration Trans-Pacific Partnership (on copyright, privacy, cross- border data transfer) EU Data Protection Directive
  • 13. Know the rules to protect yourself and your community, but not let them limit your imagination.