Myanmar’s Cyber Security Bill

Myanmar’s military junta has drafted a draconian cyber security bill that has caused alarm among human rights campaigners and business groups for granting authorities sweeping powers over the Internet. The 36 pages outlining the proposed laws were given to mobile operators and telecoms license holders for comment just over a week after the army overthrew the elected government of Aun San Suu Kyi.  

Protests against the coup were held in Myanmar with tens of thousands marching in the the country’s largest city, YangonProtesters have accused the junta of drafting the Bill to restrict the mobilisation of its opponents. 

Protests against the coup in Myanmar are continuing, with thousands of people demonstrating outside China’s embassy in Yangon over allegations Beijing is supporting the junta and rumours that Chinese internet specialists had been flown in to help implement a controversial new cyber security law. 

President Biden has announced that the US is cutting off the generals’ access to $1bn (£720m) in funds in the US and the EU foreign policy chief, Josep Borrell, has also warned the bloc could impose fresh sanctions on Myanmar’s military.

Opponents of the coup have called on state civil servants and workers in  other industries to boycott work and put pressure on the junta in a statement claiming that the bill “violates human rights including the rights to freedom of expression, data protection and privacy, and other democratic principles and human rights in the online space”. The bill was an attempt “by the current military regime to oppress those who are against its rule, and to restrict the mobilisation and momentum of online resistance, we strongly condemn this action by the current military regime in accordance with our democratic principles”.

Law students have gone into the streets in university cities like Mandalay, joining young lawyers in shows of strength that echo the crowds of young people from the 1988 Revolution.

Using communications tools that were not then invented, protesters have appealed to international public  opinion public on social media, deploying video and graphics and using Twitter, Instagram, WhatsApp, Signal and a range of other apps on their mobile phones to make statements over the Internet criticising the new military government.  

Channel News Asia:      Jurist:        Telegraph:       Guardian:         Financial Times

You Might Also Read: 

Myanmar’s New Military Rulers Block Facebook:

 

« 3D Secure Authentication: What Is it, And Why Do I Need It?
Spotless Data »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

SecurityHQ

SecurityHQ

SecurityHQ (formerly known as Si Consult) is a Global Managed Security Service Provider (MSSP) that monitors networks 24/7, to ensure complete visibility and protection against your cyber threats.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.

CommScope

CommScope

CommScope is pushing the boundaries of technology to create the world’s most advanced wired and wireless networks.