Myanmar’s Cyber Security Bill

Myanmar’s military junta has drafted a draconian cyber security bill that has caused alarm among human rights campaigners and business groups for granting authorities sweeping powers over the Internet. The 36 pages outlining the proposed laws were given to mobile operators and telecoms license holders for comment just over a week after the army overthrew the elected government of Aun San Suu Kyi.  

Protests against the coup were held in Myanmar with tens of thousands marching in the the country’s largest city, YangonProtesters have accused the junta of drafting the Bill to restrict the mobilisation of its opponents. 

Protests against the coup in Myanmar are continuing, with thousands of people demonstrating outside China’s embassy in Yangon over allegations Beijing is supporting the junta and rumours that Chinese internet specialists had been flown in to help implement a controversial new cyber security law. 

President Biden has announced that the US is cutting off the generals’ access to $1bn (£720m) in funds in the US and the EU foreign policy chief, Josep Borrell, has also warned the bloc could impose fresh sanctions on Myanmar’s military.

Opponents of the coup have called on state civil servants and workers in  other industries to boycott work and put pressure on the junta in a statement claiming that the bill “violates human rights including the rights to freedom of expression, data protection and privacy, and other democratic principles and human rights in the online space”. The bill was an attempt “by the current military regime to oppress those who are against its rule, and to restrict the mobilisation and momentum of online resistance, we strongly condemn this action by the current military regime in accordance with our democratic principles”.

Law students have gone into the streets in university cities like Mandalay, joining young lawyers in shows of strength that echo the crowds of young people from the 1988 Revolution.

Using communications tools that were not then invented, protesters have appealed to international public  opinion public on social media, deploying video and graphics and using Twitter, Instagram, WhatsApp, Signal and a range of other apps on their mobile phones to make statements over the Internet criticising the new military government.  

Channel News Asia:      Jurist:        Telegraph:       Guardian:         Financial Times

You Might Also Read: 

Myanmar’s New Military Rulers Block Facebook:

 

« 3D Secure Authentication: What Is it, And Why Do I Need It?
Spotless Data »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

Northwave

Northwave

Northwave offers an Intelligent combination of cyber security services to protect your information.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.

Aeris

Aeris

Aeris IoT Watchtower is the world’s first fully integrated cyber security solution for cellular IoT devices.