Myanmar’s Cyber Security Bill

Myanmar’s military junta has drafted a draconian cyber security bill that has caused alarm among human rights campaigners and business groups for granting authorities sweeping powers over the Internet. The 36 pages outlining the proposed laws were given to mobile operators and telecoms license holders for comment just over a week after the army overthrew the elected government of Aun San Suu Kyi.  

Protests against the coup were held in Myanmar with tens of thousands marching in the the country’s largest city, YangonProtesters have accused the junta of drafting the Bill to restrict the mobilisation of its opponents. 

Protests against the coup in Myanmar are continuing, with thousands of people demonstrating outside China’s embassy in Yangon over allegations Beijing is supporting the junta and rumours that Chinese internet specialists had been flown in to help implement a controversial new cyber security law. 

President Biden has announced that the US is cutting off the generals’ access to $1bn (£720m) in funds in the US and the EU foreign policy chief, Josep Borrell, has also warned the bloc could impose fresh sanctions on Myanmar’s military.

Opponents of the coup have called on state civil servants and workers in  other industries to boycott work and put pressure on the junta in a statement claiming that the bill “violates human rights including the rights to freedom of expression, data protection and privacy, and other democratic principles and human rights in the online space”. The bill was an attempt “by the current military regime to oppress those who are against its rule, and to restrict the mobilisation and momentum of online resistance, we strongly condemn this action by the current military regime in accordance with our democratic principles”.

Law students have gone into the streets in university cities like Mandalay, joining young lawyers in shows of strength that echo the crowds of young people from the 1988 Revolution.

Using communications tools that were not then invented, protesters have appealed to international public  opinion public on social media, deploying video and graphics and using Twitter, Instagram, WhatsApp, Signal and a range of other apps on their mobile phones to make statements over the Internet criticising the new military government.  

Channel News Asia:      Jurist:        Telegraph:       Guardian:         Financial Times

You Might Also Read: 

Myanmar’s New Military Rulers Block Facebook:

 

« 3D Secure Authentication: What Is it, And Why Do I Need It?
Spotless Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

European Organisation for Security (EOS)

European Organisation for Security (EOS)

EOS represents all domains of security solutions and services.providers including ICT information and communications technologies.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

AmWINS Group

AmWINS Group

AmWINS are a global specialty insurance distributor with expertise in property, casualty and professional lines including cyber liability.

Vumetric Cybersecurity

Vumetric Cybersecurity

Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services.

TryHackMe

TryHackMe

TryHackMe is an online platform that teaches cyber security through short, gamified real-world labs. We have content for both complete beginners and seasoned hackers.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.