iicfreport appendixa-e-final 10dec web

Upload: eddy-satriya

Post on 01-Jun-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    1/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    2/355

    !"#$%#$&

    !"#$%&" &"(()*" +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ,

    )$-.%!#"/*"&".0( ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1

    "2"$3045" (3&&)67 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 8

    9)$-*6%3./ %: 44$:++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ;

    %9

    (063$036" +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ==

    -"7 &4#"(0%."( +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ =?

    -"7 0@"&"( ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ =A

    !"#$%&"' )*+ ,+"+-&./ 0- 1%234 12563.&"' 7" 7"42"+/ 8888888888888888888888888888888888888888888888888888888888888888888888 9:

    ;+

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    3/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 2/A E2/2A95A41/ 95A2B N1@2D29K 4/ A29:3

    1F G34/? ./F19:5A41/ 5/0 (1::G/4>5A41/ O2>6/1=1?8 P.(OQ F19 :192 E910G>A4D2

    2>1/1:4> 5>A4D4A423K ./01/2345 3A4== =5?3 1G/A9423 0G2 A1 =4:4A5A41/3 4/

    >1//2>A41/ 3E220 5/0 =1>5= >1/A2/AB

    ,3 ./01/2345 65EA29K A6292 592 A92:2/01G3 1EE19AG/4A423 A1 G32

    50D5/>23 4/ A2>6/1=1?8 A1 02D2=1E 5 ;/1@=20?2R1/1:8B O62 4:E5>A 925>623

    F59 6/1=1?8 >5/ 62=E 4:E91D2 ?1D29/:2/A 329D4>23K

    20G>5A41/K 5/0 625=A6>592B O1 925=4I2 A6232 94A4>5= A1 02D2=1E 5 911383A2: @6292 4//1D5A41/ 5/0 2/A92E92/2G9364E >5/ A694D2B (1==56 53 A62 ./01/2345 .(O (1/3G=A5A4D2 S19G: P..(SQ 2/55/ 02D2=1E E91?92334D2 .(O E1=4>423 A65A @4== 62=E ./01/2345

    ?91@B

    ./ "LMTK A62 ..(S F1>G320 1/ 5 045=1?G2 51/340295A41/3K 5/0 =583 1GA

    /2JA 3A2E3 F19 A62 ..(S 4/ "LM$B ./ A62 >1:4/? 8259K @2 =11; F19@590 A1 02=4D294/? E1=4>8

    923G=A3

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    4/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    5/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    6/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; DA $)7&0(8 EFG$A@HI? *+-+6 >7%J1'.

    C0K+(8 C&-07()- 3)- F1'+317(+-&', >'2+=(-8 4-);)(&)'. >'2)'0=&1 >':0=(;0'(D))-2&'1(&', L)1-2 ELM4FI? D%-&= N+66. $K07(-+; C&-07()-. G=&1 417&3&7. 9$FG? 1'2

    C1:&2 $&)J.

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    7/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    8/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    9/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    10/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    11/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 62: 56 6A3 4/@54?

    238B/054? 507 84/E54 43;34 6/ 5@AB3;3 6A3 >A5237 8/54 /G @2356B08 5 I0/F437831E5>37

    3@/0/=: B0 ,07/03>B5C

    7&87.#(0# 9:1+8:1+; '&%1)1#/ 6A2/98A B079>62: @/0>94656B/0 B0 6A3 73;34/? 507

    43;3258B08 /0 3@6/2J> 3H3 507 B00/;56B/0 6/ /4;3 @A5443083> G5@37 B0 ,*+157/

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    12/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; DE 4+, F,G

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    13/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; ; 5?7 )C.E58(-' F(6?5?7(E; -'( A0& 0122.--(( 0'5.6 1@ B:>G0H &'(+122.--(( +12=6.3(3 I1/(6?2(?- 1@@.+.5C3 5- -'( 33.3-5?- 5?7 2(6.+5?

    0'528(6 1@ 0122(6+( J>20'52K A?71?(3.5L3 A& M &(C(+1??(+-./.-9 0122.--((;

    D>:&)N; 5?7 O>@@5.63; 53 S(CC 53 D.?.3-(63 @612 6(C(/5?- D.?.3-6.(3; -'61,I' -'( 0'5.625?

    1@ -'( :-((6.?I 0122.--((H

    -+./ 0&.#1,2

    &'( S16Q 3-6(523 56( 7.6(+-(7 89 -'( )*(+,-./( 0122.--(( 5?7 =61/.7( 5? 5/(?,( -1

    7.3+,33 .33,(3 .? 7(=-'H )5+' S16Q 3-6(52 .3 C(7 89 5 2(28(6 @612 B:>G0L3 A0&

    0122.--(( 5?7 S.CC =61/.7( 7(-5.C(7 .?=,-3 5?7 -.2(C9 ,=75-(3H V./(? -'5- -'.3 .3 5

    +1?3,C-5-./( @16,2; -'( 3+1=( 1@ (5+' S16Q 3-6(52 .3 1=(? 5?7 3,8W(+- -1 +'5?I(H A?

    #X"Y; -'( .7(?-.@.(7 S16Q 3-6(523 S(6(Z

    "#$%&'()*+ ,-./$0(.

    ?$+'$2)4 @((=.$A ,*)B(

    ,-1#-(/2/3/-$ 4)1'&/3'(/)-

    ?$+'$24 %&/$.

    56#*$/-$ 7/$/('& 8*#-9.

    ?$+'$2)4 C*B2()(>/A D-+.B(33

    )*52.?.?I C1+5C 5?7 IC185C

    6(I,C5-.1?3 5?7 8(3- =65+-.+(3

    -'5- 57/5?+( 3,3-5.?58C(; C1?I4

    -(62 I61S-' .? -'( A0& 3(+-16

    A7(?-.@9.?I 1==16-,?.-.(3 -1 I61S

    -'( C1+5C A0& .?7,3-69

    B=75-(3 1? IC185C .?7,3-69 -6(?73

    5?7 6(C(/5?+( -1 -'( A0&

    (+1393-(2 .? A?71?(3.5H

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    14/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 80AJ ,89 6D4@?062/A 08?0 M6@@ 6/519?A9 089 52D *25?@6P?062/J ,89 /993 721 >2K91/D9/0 @9?391A86< 6/

    A06D4@?06/> 6/K9A0D9/0 6/0919A0O

    o &D91>6/> Q6>60?@ ,19/3AJ ,19/3A 6/ )/32/9A6?NA 36>60?@ @?/3A5?

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    15/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    16/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; "''% DC4,(A-*

    ,-C(/- .55-22 /( @-.'/@5.,-E

    -*)5./?(

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    17/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; - 3 (3)35+- (-19--5 4313 &.21-+1*25 :-3,'.-, 354 18-

    4295,1.-3: -77-+1, 27 4313 )2+3)*@31*25 .-?'*.-:-51, 27 KCL= *5/-,1:-51,= 354

    9-)73.-; M8-.- 3),2 5--4, 12 (- 3 +)-3.-. )-B3) ,1354*5B 25 4313 +-51.-, *5

    E5425-,*3 354 :2.- +22.4*531*25 (-19--5 18- H*5*,1.6 27 N2::'5*+31*25 354

    E572.:31*25 M-+852)2B6 OHNEMP= 18- J*535+*3) G-./*+-, Q'182.*16 ORSTP= 354 218-.

    .-)31-4 B2/-.5:-51 *5,1*1'1*25,;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    18/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    19/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    20/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 0)+6 3.)4+,- .>+ +5'+ )4 .0-,0 +. 1'&,:>'0-

    F4-.4,1)'I1 (6?,0 13'(,B +5, K*.?'* ;6?,01,(>0)+6 L:,4-' MF9CK;LN 4,,-1 +. ?,

    '--0,11,- /)+5)4 '** 3)**'01 )4 F4-.4,1)'G *,:'* &0'0'*

    (+>0,1B ('3'()+6 ?>)*-)4:B '4- )4+,04'+).4'* (..3,0'+).47

    L&+,0 +5, 0,30,1,4+'+)@, 15'0,- ,2)1+)4: :.@,04

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    21/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; (/.I +. 1'( >(;/./1/+.

    0.> 2(,0.1/*2 +; O*:=(< )0FP5

    .#/012/%& %13 4(+/#35(%& 6#%75(#7- B'/)( A.>+.(2/0 '02 >(E()+?(> 1(*'./*0) 0.>

    ?-

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    22/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    23/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    24/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    25/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; + V-8,)'-. G)D*6*'8 )E V)'4H-+3 KWVVFLA 6)5,.* 9-16*'8+ -/*

    -' ,'2/*-+,'0.1 E*-+,5.* 9-16*'8 9.-8E)/6 E)/ )'.,'* 0))(+ -'( +*/D,2*+: W,D*' 83*

    3,03 6)5,.* 93)'* 9*'*8/-8,)' /-8* ,' &'()'*+,- -'( /=/-. 9)9=.-8,)'+> .,6,8*(

    931+,2-. -22*++ 8) 5-'C+ -'( )83*/ E,'-'2,-. ,'+8,8=8,)'+A 83* 9/)D,+,)' )E 6)5,.*

    7-..*8+ 51 8*.*2)66=',2-8,)' )9*/-8)/+ *T8*'(+ *42)66*/2* -'( E,'-'2,-. +*/D,2*+ 8)

    9/*D,)=+.1 ='5-'C*( &'()'*+,-'+:

    "XG-+8*/H-/( ;22*.*/-8*+

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    26/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    27/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 7-+,> &'?@5 8/ ) F828+)1E

    G0*>,*1,55E A0( H*,,/,* I0*1>J F,D,105 )/> K00159 :0*;5.0E 0/18/, )--,55 +0 *,1,D)/+

    )/> -07/+*3Q5 48/)/-, 8/40*()+80/B

    @QA0((,*-, 044,*5 ) 582/848-)/+ 0 7/8T7, -.)11,/2,5 8/ ,QA0((,*-, )>0E '?@5 /,,> 40* 6*0)>6)/> 5,*D8-,5 )*, /0+ )1:)35 5,*D,> 63

    +,1,-0((7/8-)+80/ 5,*D8-, ,*5B =/>05)+ 5.)*,> +.)+ 48R,> 5,*D8-,5 )*, 044,*,>

    +3>*,558/2 +., 48/,

    18/, 6,+:,,/ 5()11,* '?@5 )/> +., .82.Q,/> -0/57(,* ()*;,+B

    K.8*>E =/>0/,58)/ 6)/;59 *828> 5+)/>)*>5 8/ )*,)5 57-. )5 (,*-.)/+ 7/>,*:*8+8/2 18(8+5

    18/;)2,5 6,+:,,/ '?@ ,QA0((,*-, )-+8D8+8,5 )/> 6)/;5B K.85 85 ,R)-,*6)+,> 63 '?@5

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    28/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    29/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 934/+0' /' .->./39 4+ -(39/?/0: /4' 5>99 :-+@4< =+4(04/39A

    B38/0: 3 2(8(9+=(2 =36,(04 /02>'4-6 /' 3 ;(6 (03C9(- 4+ ()*+,,(-.( :-+@4-(-' -(..4'A

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    30/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; *@+/*(&) /( +0(*' '-B.*@+/$ B2(@$))$)

    >. 2'( RH@ 0++ 51*9;624 01( 1(/;+02(9 38 RH 9-1(62-B(4 ,'-6' 70.902( 2'02 *.6( 0

    51*9;62 3(01-./ 2'( JR 701G-./ -4 5+06(9 -. 2'( RH 701G(2@ 7(73(1 4202(4 4'0++

    51(4;7( 6*75+-0.6( ,-2' 2'( RH A-1(62-B(4 0.9 4'0++ .*2 51*'-3-2@ 1(421-62@ *1 -75(9(

    2'( 5+06(7(.2 *) 2'-4 51*9;62 *1 4(1B-6( -. 2'(-1 701G(2@ ;.+(44 2'(8 '0B( (B-9(.6( 2*

    2'( 6*.21018= >. 2'( H?@ 2(+(6*77;.-602-*. 51*9;624 ,-2' 0 A(6+0102-*. *) J*.)*17-28

    01( (:(752(9 )1*7 );12'(1 1(B-(, 38 2'( 1(/;+02*1=

    ?$)/

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    31/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    32/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; ?@#K LIM>NO34*.--3 5-+'0 %45* 57*D3' -7%- D73&

    2*9.43 -%B35 D3)3 )3'+,3'1 -73 57*)-6-3)2 4*55 .& 8*/3)&23&- )3/3&+35 D%5 P+.,Q40

    )3,*/3)3' .& -73 23'.+26-3)2 '+3 -* -73 8)*D-7 .& -73 -%B 9%53 RS.8+)3 $T:

    !"#$%& () *+","-. /0 12%3&- -/ %&4/5&% ,/6- -27 "8 .&2%6 0/,,/9"8# 28 2:;52,/%&1 -27 %&:$4-"/8

    !"##$%&'() +%$,-+,(- -./.0$#1.(& '( 2(-$(.3',

    U7.43 9)*%'9%&' .5 % Q30 3&%943) *C -73

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    33/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 3)/?

    @2*4 A 0:('3*0'1 2) .)/0)(123 3)/ +23)/=2/*4 3B32+3>+(- ( 3++0;3*(/ 90' >'03/>3)/ *0 3;;03)/=2/*4F2)*()12B( 3::+2;3*20)1?

    .) .)/0)(123- *4( ;&''()* @2FG2 >3)/=2/*4 21 +22+2*,

    09 +3*(1* @2FG2 *(;4)0+0D2(1 *43* 1&::0'* >3)/=2/*41 09 H5 678 3)/ I5 678 3)/

    :'2B3*( &1('1J 3;;(11 *0 (K:3)/(/ 9'(L&();, >3)/1 09 $M$5F$"$5 678 3)/ $HN5 O $N#$

    678? .) 0'/(' 90' .)/0)(123) ;0)1&3)/ )(*=0'P1 3)/ 1('B2;(1 *43*

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    34/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    35/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    36/355

    "#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 2(3 5&' EF$@-/*0$ D$$/*&= G %%,1

    BK-&$ 58J 5678C

    $%%&'()* (

    D*&-/$) >2(3 L2' EF$@-/*0$ D$$/*&= G %%,1

    BM@/(A$2 5J 5678C

    $%%&'()* &

    N-II.$3$&/+2O D+/$2*+.)

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    37/355

    "##$%&'( "!"#$"" $"&'$()*& +," "-+'./)-,0"*+ 12

    3*(1*"-)' 345 41*-6/+'+)7" 81$60 93348: 5"'0

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    38/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    39/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    40/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    41/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    42/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    43/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    44/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    45/355

    "##$%&'( )"#$%&'( )*+, -(& ./'0%' "''$2 3 4456

    789*#: -; ?

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    46/355

    1stExecutive MeetingIndonesia ICT Consultative Forum

    April 1st, 2014

    Welcoming Remarks

    Luky Eko Wuryanto, Deputy Minister for Infrastructure and Regional Planning,

    Coordinating Ministry for Economic Affairs (CMEA)

    ! Opened the forum, encouraging the sharing of perspectives, the involvement ofhigher officials and focused on outcomes that will result in concrete

    improvements

    Alex Feldman, President, US-ASEAN Business Council (USABC)

    USABC looks forward to an ongoing and long-term programme. Indonesia is one of the

    top five countries when it comes to tech use, including mobile technology, Facebook, and

    Twitter. The Indonesia ICT Consultative Forum aims to spur ICT in industry in

    Indonesia, as well as connect Indonesia to opportunities outside the country.

    2014 is a big year:! The Councils30thanniversary

    ! Indonesias Parliamentary Elections

    ! USABC is launching ASEAN Matters for America and American Matters

    for ASEAN

    ! USABCs CEO Missionto Vietnam and the Philippines, where CEOs will

    meet with the President and members of cabinet and leaders of businesscommunity. This follows a CEO Mission in 2013 to Indonesia and

    Malaysia.

    Indonesia is half the population of SE Asia and more than half of its economicactivity. As economic activity continues, ICT will play a critical role in growth

    and Indonesiassuccess. Getting policies right is critical to ensuring peoplebenefit and growth continues across the world. There are opportunities in the

    region, as demonstrated through entrepreneurs in the region making headlines

    through development of apps and games that are becoming some of the most

    popular in the world. Indonesia has a lot to gain in this sector, and there is greatexcitement for this new collaborative platform.

    Presentation on IICF Concept & Plan

    Eddy Satriya, Deputy Assistant for ICT and Utility, CMEA

    Purpose

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    47/355

    The Indonesia ICT Consultative Forum (IICF), an initiative started by the US-ASEAN

    Business Councils ICT Committee and Coordinating Ministry of Economic Affairs aimsto create a collaborative platform between government and industry to support

    Indonesias long-term policy of building a local ICT industry and toward fulfillment of a

    shared goal of creating an innovation and knowledge-based economy in Indonesia.

    Currently, every ministry has their own pilot projects involving ICT applications, thusthese experiences can be shared and learned from. The Forum will also serve to improve

    mutual understanding in the areas of innovation, investment and regulation and will assist

    in the development of future ICT policy in Indonesia.

    He welcomes comments on the draft decree and proposes that the forum name IICF can

    still change.

    Implementation

    Several objectives of the work streams include reducing coordination issues and

    providing timely information before policies are made. In addition, they can be used to

    promote local ICT industries.

    Structure

    The forum will be comprised of a "#$%&' ())%*%+, -&..%//## %$*,01%$2 '#3'#4#$/+/%5#4

    )'&. /6# 7&5#'$.#$/ &) 8$1&$#4%+9 +4 :#,, +4 /6# ;"#6&,1#'4?

    @6# "#$%&' ())%*%+, -&..%//## :%,, '#3&'/ )%$1%$24 /& /6# '#,#5+$/ A%$%4/#'4 &$

    *0''#$/ 8-@ %440#4 +4 %1#$/%)%#1 BC /6# DE#*0/%5# -&..%//##? ;$1#' /6# "#$%&'

    ())%*%+, -&..%//## %4 /6# DE#*0/%5# -&..%//## :6%*6 :%,, B# ,#1 BC *&F*6+%'4 )'&.;"

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    48/355

    Key purpose of the IICF is to ensure greaterpredictability, so that companies can

    see where the government is coming from and how the business community canhelp meet the common objective of a vibrant ICT sector in Indonesia.

    Shared objectivesGovernment and companies want the same thinga vibrant

    ICT sector. IICF envisions working toward shared objectives, not as individual

    companies or ministries, but as thought leaders toward development of an

    innovative, knowledge based community with local ICT industry development asan enabler to achieving this goal.

    WorkstreamsWorkstreams are tools to discuss relevant issues in depth and

    serve as a starting pointing. Given that this is a consultative forum, the scope is

    open and subject to change. Identified work streams are:

    ! Emerging Digital TrendsThe transformational nature of ICT is an

    enabler for economic growth. This includes new areas like: cloudcomputing and analytics, as well as others new styles of IT. These new

    trends need to be understood and regulatory frameworks need to bealigned with the new trends, thus providing an environment to expand

    business and create a knowledge base. To be led by Microsoft and

    Qualcomm.

    ! Incentivizing LocalizationThis workstream looks at how to increaseinvestment interest. There is a need to level playing field and remove

    barriers, but also incentives need to be in place encourage investments. In

    turn, greater ICT investment leads to job creation. To be led by Intel.

    ! Regulatory InsightsInitially, regulatory framework changes triggeredthe need for forum. IICF wants to understand challenges and looking

    forward to share best practices from other countries who are also creatinga domestic ICT industry. This information exchange helps address

    Indonesiasneeds and allows companies to be more effective. To be ledby Google.

    Outcomes -Today is an outcome. At a minimum, the outcome IICF hopes toachieve are regular dialogues to minimize surprise. Such that if new

    regulations come up, there is a chance for consultation to allow companies to

    prepare operations to remain in compliance of the new policies. Beyond

    sharing of information, there can be a sharing of best practices anddevelopment of a roadmap toward the vision to create a knowledge base.

    "#$%&'$# ()&* +,,- ./0)1-/2 3#%40- 5$$1$0/'0 (&) 678 /', 901:10-2 7;+5

    Last September during USABCs ICT Business Mission to Indonesia this Forum was

    )%'4/ *&$*#%5#1 %$ &'1#' /& *'#+/# + '&B04/ 8-@ #*&4C4/#.?

    PredictabilityA win-wincan be established using the input of governmentlocal incentives, timely regulation and using the expertise of companies.

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    49/355

    Outcomes: In addition to reporting our findings from the work streams, we

    should consider other measures of success including other metrics or mediainvolvement.

    Participation: Attendeesideas and interaction are welcome. Questions to

    consider: Which workstream is of most value? What topics would you like to

    hear from experts about?

    Work stream leaders presentation on objectives & plans

    Emerging Digital Trends - Ruben Hattari (Microsoft) and Nies Purwati (Qualcomm)

    Purpose: Provide updates to stakeholders on global industry trends;international best practices; case studies; government policies for long term

    growth in the ICT sector.

    Cloud technology: how it can help government and businesses, like SMEs.! Used in healthcare, politics and education to improve the sectors

    ! Important for SMEs in Indonesia given their desire for flexibility,collaboration, mobility and low costs. Also, considering around 90%

    of industries in Indonesia are SME, this amounts to a large number of

    companies.

    ! Broadband connectivity is difficult given Indonesias largeanddispersed geography/size, particularly in Eastern Indonesia where

    connectivity is needed.

    Concerns: cyber security, online privacy

    Potential technology, such as smart cities and smart phones, will be discussedin this workstream, as well as policy challenges that new technology creates.

    Incentivizing Localization, Deva Rachman (Intel)

    Local demand - The education sector has the biggest need for ICT industry

    Local government needs to add input but also the upcoming new government[national election coming up] requires leadership in this area as localizationneeds to be in line with Medium Term National Plan 2019.

    Regulatory Insights, Shinto Nugroho (Google)

    Regulatory insightGovernment needs to be in dialogue with private sectoras another source of information on how to make regulations that will

    continue to create jobs and opportunities. Companies can share their good and

    bad experiences in regards to the impact regulations had on the ICT sector.

    TimelinessGovernment needs robust regulations to help Indonesia buildhuman resources to increase competitiveness.

    Q & A

    Suggestion that high-level meetings be moved forward to allow

    recommendations for ICT industry to be put forward for the incoming

    government and ask for chance to present to the new leadership.

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    50/355

    Presentation: Cloud Computing and Its Impact on Our LivesSpeaker: Tony Seno Hartono, National Technology Officer, Microsoft

    Key points

    Cloud computing touches all aspects of our lifesocial, economic, political,healthcare

    Cloud technology provides choicesPrivate, Public, Hybrid (Public/Private)and Community clouds exist. Each option provides a different level of

    privacy.

    ! Clouds allow for automization, massive scalability and connectivity,

    which is relevant given Indonesias size/population/dispersed islands.

    Therefore, the Indonesia government should create positive policies forcloud computing given these important benefits.

    ! Allow software developers to use the online market to download and get

    revenue, or regional governments with no infrastructure to manage

    infrastructure using eservices.

    ISO 31,000 Risk Management framework can help make decisions aboutpublic/private cloud and when to use each. Some require services on premise,

    others off-premise or some in-between.

    Need to have back-up/baskets depending on expected service level agreement(SLA) and solutions need to be designed accordingly.

    Digital trends in Indonesia

    Young demographic in Indonesia - 54 million students = cloud computing

    opportunity.

    Population growth will increase internet use, particularly the 12-34 year oldsusers who are often with a higher education.

    Growth is primarily in mobile phones

    High social media use.

    Opportunities for cloud computing in education, healthcare, and politics

    Shared responsibility - Government and citizens working together providehighest ROI thus internet access should be shared responsibility betweengovernment and citizens.

    Challenge of internet connectivity

    !

    TV Band White SpacesUse unused frequency spectrum of TV fordata

    ! Potential to provide all citizens with free internet access to equalize

    access

    The power of cloud computing to transform government services such ashealthcare and education. Thus, we should maximize benefits of cloud

    computing.

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    51/355

    Open Discussion

    "#/: ,#*/',

    A%$%4/'C &) 8$104/'C H&*04#4 &$ 4/+'/F03 *&.3+$%#4 %$ 8-@

    Asks how to collaborate between the government and private sector on ICTissues.

    Proposes for next meetings:

    ! Look at how ICT has increased investment in Indonesia

    !

    Look at how to grow the local ICT industry. The benefits of cloudcomputing are known but the ministry struggles with how to support ICT

    growth and grab the local market.

    ! Proposes looking at practices to grow local ICT industry in other countrieslooking at bad practices and also incentives needed to support ICT.

    Workstream on incentivizing localization will address the creation of local

    demand and will bring best practices, case studies . (i.e. Vietnam). These case

    studies will be from closer to Indonesia and other emerging economies.

    .#>4)10-

    Concerns expressed regarding data security with cloud computing. Point of view

    that certain data may be considered strategic thus making data security andprotection very important.

    Security and privacy are important issues that must be addressed. However, this isa period of transitioning from data in a physical way to where data is on the cloud.

    There are different levels of data security and privacy such that government data

    is different and private. Today, data doesnt have boundaries such that data is anew form of currency. We need to think that data is accessible globally by banks

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    52/355

    or enterprises and need to maximize this digital economy, particularly to the

    benefit of SMEs to facilitate turning them into global players.

    Financing / SMEs

    Local industry needs to be supported, especially in ICT because it is hard forstart-ups to get funding from banking institutions. Start-ups usually get funding

    from venture capital firms and telcos.

    Investment is needed but also there are lots of SMEs who need coordinationunderMinistry of Industry and Communication. In this context, the ministry is

    concerned about security but cannot avoid new technologies so instead require

    assistance for training and education. Ministry is challenged by all the new

    concerns and balancing the need for technology with the need to comply to

    legislative measuresbecause this is the way forward.

    Financial services

    Bank of IndonesiaRecommends inviting Indonesia Financial Authority (OJK) to join

    IICF

    Regulates non-banks and banks.

    Given cross-over with financial services, Financial Services Committee should

    also be included.

    Infrastructure requirements

    KOMINFOThere is a need for a responsive regulatory environment and askswhat this new environment would look like. But also raises concern on what

    infrastructure is needed and the funding required; what infrastructure is needed to

    ensure is internet free and once it is built how to maintain good quality

    infrastructure and continuity of infrastructure operators.

    Need to collaborate with other systems like transport and logistics. However, itsalso important to consider the soft infrastructurei.e. human capital. Hard andsoft infrastructure are both needed. There is currently US government support for

    entrepreneurship support in Indonesia such that companies can help with

    training, entrepreneurship, and promotion of hackathons in tech space.

    Discussion of IICF Next Steps

    Workstream leaders will make respective work plans. Companies are encouragedto sign up, if they havent already. Also, there is a need to reach each out todifferent agencies so these meetings can be taking place on a regular working

    level.

    There is a need for case studies, experts and guest speakers to share moreinformation on this ICT transition in Indonesia.

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    53/355

    Appendix

    Resources

    Presentation: IICF Concept & Plan

    Draft decree

    Presentation: Cloud Computing and its Impact on Economy

    ASEAN Matters for America report

    Partners in Prosperity: US Investment in Indonesia

    Attendees

    GOI

    Luky Eko Wuryanto, Deputy Minister for Infrastructure and Regional Planning,CMEA

    Eddy Satriya, Deputy Assistant for ICT and Utility, CMEA

    Coordinating Ministry for Politics, Law and Security

    Ministry of Industry

    Ministry of Trade

    Fiscal Policy Agency, Ministry of Finance

    Ministry of Communication and Informatics

    Bank of Indonesia

    BKPM

    Ministry of Tourism and Creative Economy

    Partners

    Didie Soewondho, Vice Chairman of Telecommunication, InformationTechnology and Broadcasting, KADIN

    Eddy Thoyib, Executive Director, MASTEL

    Andrew White, Managing Director, AmCham Indonesia

    Sri Lakkundi, ICT Committee Co-Chair, AmCham Indonesia Jim Caruso, Economic Counselor, US Embassy

    Phil Nervig, Economic Officer, US Embassy

    USABC Members

    Nazrya Octora, Associate Consultant, APCO Worldwide

    Seow Hiong Goh, Executive Director, Global Policy & Government Affairs,Cisco Systems

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    54/355

    Satria Gunayoman, Consultant, Cisco Systems - HD Asia Advisory

    Shinto Nugroho, Head of Public Policy and Government Relations, GoogleIndonesia

    Agung Yudhawiranata, Analyst - Public Policy & Government Relations, GoogleIndonesia

    Suren Velappu , Director of Corporate Affairs, South East Asia, Hewlett-Packard

    Elizabeth Hernandez, Vice President of Corporate Affairs, Asia Pacific Japan,Hewlett-Packard

    Ananta Gondomono, Governmental Programs LeadIndonesia, IBM

    Darryn Lim, Director, Trade and Innovation Policy, Microsoft

    Nies Purwati, Director of Government AffairsIndonesia, QUALCOMM

    Claudia Chan, Head of Government Relations, Asia Pacific and Japan, Seagate

    Ruben Hattari, Director of Corporate Affairs-Indonesia, Microsoft

    Tony Seno, National Technology Officer, Microsoft

    Deva Rachman, Corporate Affairs Director, Intel Indonesia Corporation

    Arnold Djiwatampu, Motorola Solutions

    Alexander Feldman, President, US-ASEAN Business Council

    Kathy Santillo, Regional Managing Director, US-ASEAN Business Council

    Desi Indrimayutri, Senior Country Representative, US-ASEAN Business Council

    Shay Wester, Manager, US-ASEAN Business Council

    Caroline Tanjaya, Country Representative, US-ASEAN Business Council

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    55/355

    "##$%&'( )"#$%&'( )*+, -$. /0'1%' "''$3 4 5567

    89%$' -:; -

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    56/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    57/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    58/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    59/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    60/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    61/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    62/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    63/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    64/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    65/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    66/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    67/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    68/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    69/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    70/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    71/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    72/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    73/355

    "##$%&'( &"#$%&'( )*+, -*. /0'1%' "''$3 4 5567

    891&+:'* ;< ;=>?@

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    74/355

    !"#$% '(%)(*+#, '-! -)(+./0,0#1* 2)$.3 4''-25 6#(.0*+"#$%&'()* +,-./0% 1* 1234

    56 7(%%8.--* 56 700-89: ;09-0% 0? 1@

    -)7-",#$*% 89:

    A'') B(-%8)(* C0D$-) E&&8&-(9- F.% G;" (9' H-8?8-)* ;7AE

    B$%%09'%09 I0?(DD$* C8%0,-.% .F ;.%D.%(-0 EFF(8%& F.% EBAEJ* KL 0%9N09-R

    */,??. 4@A5

    "#0 GG;Q 8& (9 8ND.%-(9- D?(-F.%N F.% :.>0%9N09- (9' 89'$&-%) -. '0>0?.D ( N$-$(? $9'0%&-(9'89:

    89 -#0 (%0(& .F 899.>(-8.9* 89>0&-N09-* (9' %0:$?(-8.9V T#8,# 8& ,%8-8,(? 89 (,#80>89: -#0 (%0'

    ./W0,-8>0 .F /$8?'89: (9 899.>(-8>0* P9.T?0':0S/(&0' 0,.9.N) 89 G9'.90&8(R

    "#8& 8& -#0 -#8%' .$- .F F.$% F.%$N& -. /0 #0?' -#8& )0(%R "#0 D%0>8.$& &0&&8.9& #(>0 /009 >(?$(/?0

    -. .$% G;" ,.NN8--00 N0N/0%&* (9' T0 /0?80>0* F.% -#0 X.>0%9N09- .F G9'.90&8( (& T0??R 60 ?..P

    F.%T(%' -. ,.N89: /(,P 89 C0,0N/0% F.% -#0 F89(? F.%$N F.% -#8& )0(%R

    Our last session addressed the governments cyber security concerns and several private sector0UD0%-& (%0' 0U8&-89: &.?$-8.9& F.% '(-( D%.-0,-8.9* ,?.$' &0,$%8-)* &0,$%89: .9?890 /(9P89:

    -%(9&(,-8.9&* (9' F%($' D%0>09-8.9R "#0 :.>ernment officials sharing of regulatory measures

    intended to safeguard cyber security furthered private sectors understanding of certain

    %0:$?(-8.9&R

    In todays third IICF meeting, we hope to continue this constructive discussion about the

    '0>0?.DN09- .F F$-$%0 G;" D.?8,) 89 G9'.90&8(* D(%-8,$?(%?) 89 (%0(& .F 0S,.NN0%,0 (9' D%.N.-89:

    -%('0 (9' 89>0&-N09-R

    In todays forum, we hope to accomplish the following outcomes:

    8@ B#(%89: .F /0&- D%(,-8,0& (9' 8'09-8F)89: ,$%%09- /(%%80%& (9' .DD.%-$98-80& -. D%.N.-0

    G;" '0>0?.DN09-

    88@ G'09-8F) .DD.%-$98-80& F.% D$/?8,SD%8>(-0 D(%-90%D& -. (''%0&& :(D& (9' ,#(??09:0& 89

    -#0 89'$&-%)888@ C0-0%N890 F$-$%0 (%0(& .F T.%P (9' %0&0(%,# -#(- T8?? /0 $&0F$? 89 '0>0?.D89: D.?8,)

    89D$-& F.% -#0 89,.N89: 90T ('N898&-%(-8.9

    I8&8.9 of Indonesias ICT Ecosystem! #$/539(1&3* :2;5+ ,09 /) -0,#9.?.:)* -#0 G;" (%09( 8& ')9(N8, (9' ,#(9:0& %(D8'?)R "#8& 90,0&&8-(-0& ,.9&-(9-

    '8(?.:$0 /0-T009 :.>0%9N09- &-(P0#.?'0%& (9' D%8>(-0 &0,-.% %0D%0&09-(-8>0&V (9' N.%0 D?(-F.%N&

    F.% '8&,$&&8.9* &$,# (& -#0 GG;Q* (%0 900'0'R

    E %./$&- G;" A,.&)&-0N ,.ND%8&0& .F -#%00 P0) D8??(%&Y

    8@ G9F%(&-%$,-$%0

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    75/355

    "#$%&'%(& )* % +,- ,(%'.,# $/ 01, 234 )(&5*0#-6 35##,(0.-7 2(&$(,*)% $(.- 1%* 89:;< $/

    *=,>0#5? %..$>%0,& /$# @)#,.,** '#$%&'%(&6 A)01 B $=,#%0$#* )( 2(&$(,*)% %(& .)?)0,&

    '%(&@)&01 %C%).%'.,7 ?$#, *=,>0#5? (,,&* 0$ ', %..$>%0,& /$# '#$%&'%(& 0$

    %>>$??$&%0, 01, /$#,>%*0,& )(>#,%*, )( &,?%(&6

    ;%C)(D % #,D5.%0$#- =.%0/$#? 01%0 %..$@* 01, %>>,.,#%0)$( $/ 234 )(/#%*0#5>05#,

    &,C,.$=?,(0 )* ,**,(0)%.6

    ))E F%-?,(0 G-*0,?*

    F%-?,(0 *-*0,?* D$ ',-$(& ?$')., *,#C)>,* %(& ,C,( $//,# C$5>1,#*6 H( $=,#%0$# *5>1

    %* 2(&$*%0 1%* I897999 =%-?,(0 $50.,0* 01%0 =#$C)&, ,(0#- %(& ,J)0 =$)(0* /$# ?$(,-7

    015* ?%+)(D =,$=., ?$#, '%(+%'.,6

    2( 0,#?* $/ ?$')., ?$ney, Indosats view is that it sho5.& ', % 0#%(*)0)$( 0$ '%(+

    =%-?,(06 H .)?)0 $/ KGL 899 *1$5.& ', )?=$*,& $( ?$')., ?$(,-7 %(& ',-$(& 01%0 *5?7

    =,$=., (,,& 0$ C)*)0 % '%(+6 ;$@,C,#7 >1%..,(D,* #,?%)( )( ?%)(0%)()(D >$(0#$.6

    A)01 2(&$(,*)%(* %.#,%&- 50).)$??,#>, )(&5*0#-6 35##,(0.-7 01#,, .%#D, $=,#%0$#*

    1%C, ?$')., =#$&5>0* %(& @, &$ ($0 5(&,#*0%(& @1- @, *1$5.& ', >$?=,0)(D @)01'%(+* 01%0 1%C, $01,# *,#C)>, $//,#)(D*7 @1)>1 %#, %.*$ %@%#&,& @)01 ?$')., .)>,(*,*6

    )))E 3$(0,(0 %(& 2(C,*0?,(0

    L,C,.$=,#* %#, % +,- %*=,>0 $/ 01, ,>$*-*0,? %(& 01,)# *+)..* %#, %.#,%&- ',)(D ,J=$#0,&

    '- 2(&$(,*)%6

    2(C,*0?,(0 )* %.*$ >#5>)%. %(& 1%C)(D %(D,. )(C,*0$#* %(& )(>5'%0$#* %#, (,>,**%#- 0$

    &,C,.$= 234 *0%#05=*6 2( % >$..%'$#%0)$( @)01 :$5(0%)( F%#0(,#* HN7 2(&$*%0 1%* %(

    )(>5'%0$# =#$D#%? >%..,& )&,%"$J 01%0 >5.0)C%0,* (,@ %==.)>%0)$(* %(& )(>#,%*,* 01,)#

    C)*)').)0- %(& C%.5%0)$( '- ,J=$*)(D 01,? 0$ 01, ?%#+,06 2( $5# /)#*0 )()0)%0)C,7 @, *,.,>0,&

    O $50 $/ 89 >%(&)&%0,*6 2( 01, *5'*,P5,(0 #$5(&7 $50 $/ Q89 #,D)*0#%(0*7 @, *,.,>0,& R6

    A, #,%.)%( 1,.= 01,? ?%#+,0 01,)# )&,%* 0$ 01, )(0,#(%0)$(%. ?%#+,0 P5)>+.-6 A, %#, .)?)0)(D$5# *,.,>0,& >%(&)&%0,* 0$ Q9 &5, 0$ 01, #,*$5#>,M)(0,(*)C, (%05#, $/ )(>5'%0)$(6

    2(&$*%0 %(& G$/0'%(+ 1%C, %.*$ >$..%'$#%0,& 0$ *,0 5= % /5(& 01%0 =#$C)&,* >$?=%(),*

    @)01 >%=)0%.6 ;$@,C,#7 @, /$5(& )0 &)//)>5.0 0$ /)(& *0%#05=* 01%0 %#, #,%&- /$# )(C,*0?,(06

    ! # $

    2(&$*0%0 1%* 0@$ .)(,* $/ *,#C)>,S >,..5.%# %(& /)J,&6 T)J,& *,#C)>,* %#, 5*5%..- $//,#,& 0$ >$#=$#%0,*

    %(& .%#D,# G:U*6 4$ ?- +($@.,&D,7 2(&$*%0 )* 01, $(.- $=,#%0$# 01%0 )* =5*1)(D /$# 01, G:U

    *,D?,(06 ;$@,C,#7 01,#, %#, >1%..,(D,* )( =#$C)&)(D *,#C)>,* 0$ *?%..,# G:U* &5, 0$ 01, /)(, .)(,

    ',0@,,( 01,? %(& 01, 1)D1 ,(& >$(*5?,# ?%#+,06

    While Indonesias high smart phone p,(,0#%0)$( VI8WE $//,#* $==$#05()0-7 )0 )* &)//)>5.0 0$

    &,?$(*0#%0, )0* C%.5, 0$ G:U*6 41, D$C,#(?,(0 %(& =#)C%0, *,>0$# *,, 01, $==$#05()0- /$# G:U*

    )( =#$C)&)(D 5*,/5. %==.)>%0)$(* *5>1 %* '%(+)(D *,#C)>,*6 UC,( 01$5D1 01, >5##,(0 #%0, $/ G:U

    D#$@01 )* ($0 )&,%. VXMRWE7 )0 )* *0).. 1)D1,# 01%( >$(*5?,# D#$@01 VYWE6 35##,(0.-7 01,#, %#, ?%(-

    %==.)>%0)$(* ',)(D $//,#,&7 1$@,C,# 01, ,&5>%0)$( =#$>,** )* 0)?,M>$(*5?)(D %(& @, (,,& 0$

    31%( Z$+ [$(D V)&UH\)F%-]]ES (, $/ 01, +,- )C,#* $/ ,M>$??,#>, D#$@01 )( HGUH_ >$5(0#),* %#,

    G:U*6 ;$@,C,#7 )( 2(&$(,*)%7 01,#, )* ($ /$#?%.)$?=%(),* .)+,

    H==., %(& N$$D.,7 @1)>1 =#$C)&, ,**,(0)%. *5==$#0 )( 0,#?* $/ )(/#%*0#5>05#, %(&

    0,.,>$??5()>%0)$(*6 ;$@ &$,* 2(&$*%0 .)(+ @)01 G:U* 0$ *5==$#0 01,?`

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    76/355

    "#$%&'& " #(%)%#"* +",,- ./ )$%, "(&"0 )$& 12'&(/+&/) "/3 4"/5, $"'& 4&&/ $&*6%/1 47 288&(%/1

    ,+"**&( ,%9&3 *2"/,-

    :& )2)"**7 3%,"1(&& ;%)$ )$& governments 6(262,"* )2 .- :$&/ " 6$2/& %, 3&*%'&(&30

    )$&2(&)%#"**70 %) ,$2. /. /. /. /

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    77/355

    "#$% &'#() '*+ ,-# .*/*(0)+1 %)/#*2 *(2 3#.4/) 3#()56 7( 7(2#()+4*1 ,') 0)(,%*/ .*(8 )9&/404,/5

    +,*,)+ ,'*, 5#$% %)/#*2 .*/*(0) 4+ (#, *//#-)2 ,# .) $+)2 *+ 3#.4/) 3#()5 *(2 ,'*, &%#:4,+

    0*((#, .) 3*2) :%#3 3#.4/) 3#()56 "#$% ;$)+,4#( #( %#*34(< :))+ %):)%+ ,# %)/#*2 3#()56 7(

    =#>)3.)%1 7(2#+,*, 4+ &/*((4(< :#% *// #$% &%#2$0,+ ,# '*>) #(/5 ? %#*34(< &*%,()% #>)%+)*+6

    @'4/) ,'4+ 4+ * 42)+ /)>)%*) ,# &*5 :$// %*,)+ :#% ,') %)3*4(4()( ,'*, 3)3.)%+ *// '*>) 24::)%)(, +4,4#(+ #( ,'4+ 4++$)1 4, 4+ 24::40$/, :#% 3) ,# &%#>42) *+,*,)3)(, ,'*, 4+ %)&%)+)(,*,4>) #: CDE76 F$, ,')%) 4+ 0#(+)(+$+ 4( ,'*,1 *+ #-()%+ #: ,')

    4(:%*+,%$0,$%)1 ,)/0#+ +'#$/2 .) )( * +'*%) #: ,') %)>)($) :%#3 GDD *2+ *(2 ,'*, ,')

    )%(3)(, +'#$/2 .) * :*04/4,*,#% #: 4(< ,)/0#+ *( );$4,*./) +4,4#( #( GDD+ *(2 ,')4% +&*0)6

    E4(0) :#$% 3#(,'+ *) .))( *&&%#*0')2 .5 0#(,)(, #-()%+ -'#

    +*5 ,'*, #&)%*,#%+ +'#$/2 (#, &$+' *2+ *, ,') ,#& *(2 .#,,#3 #: ,') 3#.4/) 2)>40) +4(0) ,')5

    *%) */%)*25 3*84(< %)>)($) .5 +)//4(< *2 +&*0)+6

    C, 7(2#+,*,1 -) .)/4)>) ,'*, ,%*24,4#(*/ >#40) *(2 EHE 3)0'*(4+3+ '*>) 24+*&&)*%)2 *+ *(

    4(,)%(), 7IJ.*+)2 >#40) /48) E85&) ,')#%),40*//5 0*( '*>) .),,)% ;$*/4,5 ,'*( * 04%0$4, +-4,0'

    connection that is technologically limited. Indostats fund and incubator ensures we are part of

    ,'4+ ,%)(26 G() #: ,') 3#%) +$00)++:$/ 0#3&*(4)+ -'# 4+ */+# #$% &*%,()%1 E#:,.*(81 2#)+ (#,

    %)0)4>) ,')4% >*/$*,4#( *(2 %)>)($) :%#3 ,') ,)/0# .$+4()++ *(2 4(+,)*21 %)/5 #( #,')% 4(0#3)

    +,%)*3+6 D'4+ 34(2+), +'4:, 4+ 43%,*(, :#% 7(2#+,*,1 .$, $(/48) E#:,.*(8 -'40' +,*%,)2 #:: *+ *

    +#:,-*%) 0#3&*(5 ,'*, .#$) ,') 0*+'/)++ +#04),5

    >4+4#(1 ,') 24::)%)(, +,*8)'#/2)%+ ())2 ,# .) #&)( ,# 24+0$++4(< ,') $+) #: 3#.4/) 3#()5 ,# 2%4>)

    BKI6 7(+,)*2 #: ,%*(+:)%%4(< :$(2+ ,'%#$40)+6 7( %)+(+)1 .*(8+ *%) (#- +*54(< ,'*, *+ /#(< ,'*, 4, 4+ #(/5 $+)2 *+ * 2)/4>)%5 3)0'*(4+3

    *(2 ,') 3#()5 +4,+ -4,'4( ,') .*(8 4, 4+ :4()6 @) *// 8(#- ,'*, 0)(,%*/ .*(8+ *%#$(2 ,') -#%/2 *%)

    0#(+)%>*,4>) 4(+,4,$,4#(+ *(2 %4

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    78/355

    Discussion 1: Supporting Indonesias e!"#$$%&'% )*&+%,

    !"#$%#&'( *&+, -$.$& /0$'1#&2$&3 *+34+#',$5

    043#&$1#3 67( !8,+14 9:;&484 /

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    79/355

    !"#$%&" ()*&)+ ,-&"&./*0 12 3*)4$5

    "#$ %&'&()*+ ,- "*./$ 0.')( ), 12&3/ . 4,'/24&5$ $4,(+()$6 -,* )#$ $74,66$*4$ &'/2()*+ (, )#.)

    .33 83.+$*( &' )#$ ($4),* 4.' ,8$*.)$ &' . (.-$ $'5&*,'6$') .'/ .33,0 -,* )#$ &'/2()*+ ), &68*,5$

    &' )$*6( ,- 92.')&)+ .'/ 92.3&)+: ;$ .3(, -,2'/ *$8$.) 82*4#.($( ,' $74,66$*4$ (&)$( ), 1$ )#$

    norm and this facilitates Indonesians purchase of locally manufactured products.

    "#$ %&'&()*+ ,- "*./$ (288,*)(

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    80/355

    "#$$%&'()*+ ',%-% &,)#./ 0% 1)/#.%& 2)- "34 %/#56'()* )* %75)11%-5%8

    !"#$%& ()*+&"& ,-&&*./0

    9)&&(0.% 5)..60)-6'()* )* "34 %/#56'()* )* %75)11%-5% :(', ',% "34 ;#&(*%&& "AGL 0(..()* )2 (*C%&'1%*' :%*' ') ',% @?D &%5')- )2 "AG8H

    '-(..()* 16-T%' )NN)-'#*('= 2-)1 ',% $-):(*$ 1(//.% 5.6&&8 D,%-% :(.. 0% MF 1(..()* 6//('()*6.

    5)*%-& (* EFHF8 @*/)*%&(6* 5)*%-& 6.&) ,6C% ',% ,($,%&' 5)*%- 5)*2(/%*5% (*/%U 61)*$

    ',% VEF 5)#*'-(%&8 @*/)*%&(6 (& ',% 1)&' N-)1(&(*$ 5)#*'-= 2)- )C%-&%6& 0#&(*%&& 655)-/(*$ ') ',%R6N6* ;6*T 2)- @*'%-*6'()*6. ?))N%-6'()* "#-C%= EFGH8

    9))- (*2-6&'-#5'#-% -%16(*& 6 5,6..%*$% 0#' ',%-% ,6& 0%%* N-)$-%&& ',-)#$, N-)$-61& .(T% 39H4@P

    96.6N6 W(*$P %'58

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    81/355

    taxes or other taxes on connection, other special taxes, for example tax on mobile operators gross

    "#$#%'(

    )% *+,,- . '/&01 2% ,,, 34&%/"2#' '546#0 /5./ /5# 7"474"/24% 48 94/.: ;4'/ 48 6%#"'527

    ?9;@ .334&%/#0 84" =1 /.A 5.0 2%3"#.'#0 to an average of 18.11% (Deloitte/GSMA 2011, Global

    Mobile Tax Review). Handset costs act as a barrier to the benefits of mobile usage and taxes34%'/2/&/#0 *BC 48 /52' 34'/ 4% .$#".D#( )% #:#$#% 34&%/"2#'- /.A 34%'/2/&/#0 4$#" E+C 48 /5# 5.%0'#/

    34'/(

    I%04%#'2. 3&""#%/:1 5.' B,F G2::24% G4=2:# 34%%#3/24%'- *H(BC 48 65235 ."# G4=2:# ="4.0=.%0( I2/5

    /5# "2D5/ "#D&:./24%' 2% 7:.3#- 6# #A7#3/ G4=2:# ="4.0=.%0 /4 .334&%/ 84" F+(BC 48 . /4/.: 48 EBJ

    G2::24% 34%%#3/24%' ?KL%3# . 7"40&3/ =#."2%D /5# ;] G."V2%D 2' 7:.3#0 2% /5# ]^

    G."V#/- G#G=#" '/./#' '5.:: %4/ 7"452=2/- "#'/"23/ 4" 2G7#0# /5# 7:.3#G#%/ 48 /52' 7"40&3/ 4" '#"$23#

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    82/355

    "# $%&"' ()'*&$ +' $&''"$+',- .'+/01$2 3&)'"#4 56 ()'* 1)##+$ 3& 2$+77&/ )$ 102$+(2 )#/ 1)# 8'&&9,

    $'):&9 "#$+ $%& 6; )#/ ()'*&$ 20':&"99)#1& )#/ ()'*&$ +'1&($ "2 $%&

    '&27+#2"3"9"$, +8 &)1% (&(3&' 2$)$&- ?)'*&$ @0':&"99)#1& A0$%+'"$"&2 /+ ')#/+( 1+(79")#1& 1%&1*2

    ABC6D 7'+/01$2 )'& )9'&)/, 79)1&/ +# $%& ()'*&$- C%"2 "2 +77+2"$& $+ ) $,7"1)9 )77'+:)9 '&4"(& $%& "(7+'$&' 1+(79&$&2 ) B55 KOL

    B+'(- =# $%& ;@> "(7+'$&'2 )'& '&27+#2"39& 8+' $%& 7'+/01$2- C%& B55 6#8+'1&($ E0'&)0 )2 $%&'& )'& 7'+/01$2 )'& )77'+:&/ $%'+04% /"88&'$ '&4"2$')$"+# 21%&(&2 /&7/"#4 +#

    $%& $,7& +8 7'+/01$ )#/ $%&"' 9"*&9"%++/ $+ 1)02& "#$&'8&'&- B+' 7+2$ ()'*&$ 20':&"99)#1& "#@"#4)7+'&> =GA (), '&Q0"'& $%& 20779"&' $+ 203("$ $%& $&2$ '&209$2 +' &:"/& +8 &Q0"7($

    1&'$"8"1)$"+# )2 7'++8 +8 1+#8+'("$,

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    83/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    84/355

    !"#"$ &'()*+ ,-./01

    "#$% &' ()*+, -.+ /00,*&)1-&)2 %&)&'-,3 40, 560)07&6 8441&,'9 :.+,+ 1,+ &)-+,;7&)&'-+,&1< 7++-&)2'

    -0 *&'6('' =('&)+'' '+6-0,' -0 =+ 0>+)+* 0, 616-' -0 -.+

    +60)073 04 @)*0)+'&19

    :+,0-+6- -.+ &)-+,+'- 04 -.+ 60()-,3 A.&1,- &) -.+ *&'6(''&0) 0) -.+ &7>>0,-1)- &' .1?&)2 1 '-1=,06+''&)2 &)*('-,3Q

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    85/355

    "##$%&'( $"#$$%&'&()*+, -*)&+.*%/

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    86/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    87/355

    2

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    When you can measure what you are speaking about, and express it in numbers,

    you know something about it; but when you cannot express it in numbers, yourknowledge is of a meagre and unsatisfactory kind.

    Lord Kelvin

    SUMMARY

    This paper aims to quantify the losses that result from data localisation require-

    ments and related data privacy and security laws that discriminate against foreign

    suppliers of data, and downstream goods and services providers, using GTAP8.

    The study looks at the effects of recently proposed or enacted legislation in seven

    jurisdictions, namely Brazil, China, the European Union (EU), India, Indonesia,

    South Korea and Vietnam. Access to foreign markets and globalised supply chains are the major sources of

    growth, jobs and new investments in particular for developing economies. Manu-

    facturing and exports are also dependent on having access to a broad range of ser-

    vices at competitive prices, which depend on secure and efficient access to data.

    Data localisation potentially affects any business that uses the internet to produce,

    deliver, and receive payments for their work, or to pay their salaries and taxes.

    The impact of recently proposed or enacted legislation on GDP is substantial in all

    seven countries: Brazil (-0.2%), China (-1.1%), EU (-0.4%), India (-0.1%), Indone-

    sia (-0.5%), Korea (-0.4%) and Vietnam (-1.7%). These changes significantly affect

    post-crisis economic recovery and can undo the productivity increases from major

    trade agreements, while economic growth is often instrumental to social stability.

    If these countries would also introduce economy-wide data localisation require-

    ments that apply across all sectors of the economy, GDP losses would be even high-

    er: Brazil (-0.8%), the EU (-1.1%), India (-0.8%), Indonesia (-0.7%), Korea (-1.1%).

    The impact on overall domestic investmentsis also considerable: Brazil (-4.2%),

    China (-1.8%), the EU (-3.9%), India (-1.4%), Indonesia (-2.3%), Korea (-0.5%) and

    Vietnam (-3.1). Exportsof China and Indonesia also decrease by -1.7% as a conse-

    quence of direct loss of competitiveness.

    Welfare losses (expressed as actual economic losses by the citizens) amount to

    up to $63 bn for China and $193 bn for the EU. For India, the loss per worker is

    equivalent to 11% of the average month salary, and almost 13 percent in China and

    around 20% in Korea and Brazil.

    The findings show that the negative impact of disrupting cross-border data flows

    should not be ignored. The globalised economy has made unilateral trade restric-

    tions a counterproductive strategy that puts the country at a relative loss to others,

    with no possibilities to mitigate the negative impact in the long run. Forced locali-

    sation is often the product of poor or one-sided economic analysis, with the sur-

    reptitious objective of keeping foreign competitors out. Any gains stemming from

    data localisation are too small to outweigh losses in terms of welfare and output in

    the general economy.

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    88/355

    3

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    INTRODUCTION

    Over the past few years, there has been a widespread proliferation of regulatory restric-

    tions of the internet, in particular for commercial use. Whereas governments earlier en-

    deavours to increase control over the internet had the implicit aim of keeping information

    outside state borders, this new breed of regulation aims at keeping data in. With the pretext

    of increasing online security and privacy, some governments are requiring mandatory stor-

    age of critical data on servers physically located inside the country, i.e. data localisation. Also,

    some data protection and security laws create barriers to cross-border data transfers to such

    an extent that they are effectively data localisation requirements.

    The belief that forcing personal information, emails and other forms of data from leaving

    the country would prevent foreign surveillance or protect citizens online privacy is flawed

    in several ways. First, many of the recent legislative proposals pre-date the surveillance rev-

    elations, and are not designed for addressing these issues. Second, information security is

    not a function of where data is physically stored or processed. Threats are often domestic,

    while storing information in one physical location could increase vulnerability. Thirdly, datalocalisation is not only ineffective against foreign surveillance, it enables governments to

    surveil on their own citizens. Moreover, users and business do not access data across borders

    with the purpose of evading domestic laws, while legal obligations do not always depend on

    where a server is physically placed.

    As a result, data localisation, or discriminatory privacy and security laws to similar effect,

    has spawned severe protest from advocates for open internet and the global trading system.

    Forced localisation is often the product of poor or one-sided economic analysis, with the

    surreptitious objective of keeping foreign competitors out, or creating a handful of new jobs

    in e-commerce, data centres or consultancies. However, any job gains as a result of data

    localisation are minuscule compared to losses in terms of jobs and output in other parts of

    the economy.

    Access to foreign markets through trade liberalisation and globalised supply chains are major

    sources of growth, jobs and new investments in particular for developing economies. Given

    the nature of todays globally interconnected economy, poorly designed national policies

    that increase data processing costs have a severe economic impact as many sectors of the

    economy rely on digitally supplied services and goods. Manufacturing and exports sectors

    are also dependent on having access to a broad range of services at competitive prices such

    as logistics, retail distribution, finance or professional services which in turn are heavily de-

    pendent on secure, cost-efficient and realtime access to data across borders. When data must

    be confined within a country, it does not merely affect social networks and email services,

    but potentially any business that uses the internet to produce, deliver, and receive payments

    for their work, or to pay their salaries and taxes.

    This paper aims to quantify the economic losses that result from data localisation require-ments and related data privacy and security laws that discriminate against foreign suppliers

    of data. It does so by using a computable general equilibrium model (CGE) called GTAP8

    (see Annex II), which is a well-acknowledged methodology that is frequently used for trade

    and economic impact analyses by academia and policymakers worldwide. The study looks

    at the effects of the recently proposed or enacted legislation in seven jurisdictions, namely

    Brazil, China, the European Union (EU), India, Indonesia, South Korea and Vietnam. Some

    of these countries have conducted quantitative impact studies (notably the EU) measuring

    institutional or firm-level costs.1Yet, no public study by a market regulator has investigated

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    89/355

    4

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    the effects on exports, gross domestic product (GDP) and consumer welfare as a result from

    proposed data localisation requirements or privacy laws.

    OVERVIEW OF RELEVANT INTERNET AND PRIVACY REGULATIONS

    The analysis looks at a number of recently introduced or proposed measures with respect

    to data localisation by conducting a survey in each of the aforementioned countries juris-

    dictions. The measures are assumed to alter the costs of engaging in commercial activities

    in the selected countries (a brief description of all measures in each country can be found in

    Annex I). The way in which these primarily privacy and security related measures operate is

    of principal importance for accurate data modelling. For instance, data localisation require-

    ments are effectively disruptive bans of data processing and hence the foreign provision

    of that service into the domestic territory. The ban can be introduced economy-wide (e.g.

    China, Vietnam), or selectively to a particular sector (e.g. only financial services in Korea).

    Besides data localisation, a number of administrative regulatory barriers could be introducedthrough additional legal obligations that increase compliance costs, such as stricter con-

    sent requirements, a right to review personal information held by firms, the requirement to

    notify a market regulator and/or data subjects in case of potential security breaches. Some

    measures are institutional such as the requirement to appoint a data privacy officer (DPO)

    within the organisation; while others increase business risks by introducing sanctions for

    non-compliance (in many cases with ambiguous laws), or a governments right to access a

    business proprietors or its clients data.

    Overall, compliance with these measures increases the operational expenditure of firms

    which raises domestic prices and non-tariff barriers (NTB) on imports. Therefore, in order

    to measure the actual or potential costs of introducing these measures, for this paper we have

    estimated the costs of all data localisation measures using two different scenarios:

    Scenario 1, which is based on the actual proposed regulations as defined in Table 1,

    including data localisation in each country as per today.

    Scenario 2, which is based on the actual proposed regulations, but with the addi-

    tion of a data localisation requirement applied to all sectors in each country.

    TABLE 1: OVERVIEW OF REQUIREMENTS IN LEGISLATIVE PACKAGES

    Brazil China EU28 India Indonesia Korea Vietnam

    Data localisation requirement No Yes No Partial Yes Partial Yes

    Consent required for datacollection

    Yes Yes Yes Yes Yes Yes No

    Consent required for transfer

    to third partiesYes Yes No Yes No Yes No

    Right to review No No Yes Yes Yes Yes No

    Right to be forgotten Yes Yes Yes No No Yes Yes

    Breach notification No Yes Yes No Yes Yes No

    Impact assessment No Yes Yes No No No No

    Data privacy officers No No Yes No No Yes No

    Sanctions for non-compliance Yes Yes Yes Yes Yes Yes No

    Government access required Yes No No Yes No No Yes

    Data retention requirement Yes No No Yes No No Yes

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    90/355

    5

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    CONCEPTUAL MODELLING

    The scenarios are calculated using several economic shocks caused by data restrictions.

    If new regulations restrict businesses and individuals from using data in a reasonable man-

    ner prices of any good or service that uses data in its production would also increase. For

    example, the input costs for a logistics company would increase as they can no longer process

    data on its customers or shipments using their existing IT suppliers or infrastructure, or are

    faced with some compliance costs for doing so. This new cost is passed on to its customers

    who may be manufacturers, exporters and consumers. Thus, increased regulation leads

    firstly to domestic productivity losses for various sectors of the economy. Secondly, it creates

    an additional trade barrier against data processing and internet services, or any service (to a

    lesser extent also goods) that depends on the use of data for delivery. Thirdly, as the competi-

    tiveness of the economy changes, investments (both domestic and foreign) will be affected.

    Finally, the effectiveness of R&D is affected to the extent that product development depend

    on customer and market data to compete in the market place.

    The first shock, which measures the effect on productivity, is created using a so-called aug-mented product market regulatory (PMR) index for all regulatory barriers on data, including

    data localisation, to calculate domestic price increases or total factor productivity (TFP) loss-

    es.2 It sets out what domestic companies will have to pay additionally for sourcing domestic

    data services by first estimating the general effect of administrative burdens in data process-

    ing services on prices and TFP in each sector of the economy. Data processing services is an

    important input for production and by using existing indexes from the OECD measuring

    administrative barriers in services over time, we evaluate the extent to which these admin-

    istrative barriers in data services affect other parts of the economy through the use of data

    services. For example, the telecommunications sector is very data intensive (with 31% of its

    inputs being data-related) and should be more heavily affected by regulation; similarly, data

    processing is 5 to 7% of the total inputs used by business/ICT and financial services.3

    The index is then raised based on the regulatory barriers as given in Table 1 for each coun-try. Not all of these measures are equally restrictive, and their relative importance is there-

    fore weighted according to their relative cost impact.4By benchmarking the resulting index

    against the estimate prior to the legislation and data processing intensities for all sectors, we

    compute the price and TFP changes for all sectors in each country as a result of data localisa-

    tion and administrative barriers.

    The second methodology computes cost differences between countries as a result of data

    localisation requirements in each of the countries. Two types of data are primarily used

    namely the Data Centre Risk Index,5and an empiric observation of cost differences.6The

    first source ranks countries according to a number of risk factors that affect the costs of oper-

    ating a data centre a ranking that closely follows the general cost structure across countries

    of setting up a centre as a consequence of data localisation measures. The observations of

    actual costs are broadly in line and thereby confirm the Risk Index.

    These costs are up-front trade costs each firm will need to incur when investing in and ex-

    porting to one of our selected countries (see Annex II). These trade costs are allocated across

    all sectors in each economy based on the intensity with which each sector uses data services.

    The final numbers are interpreted as the additional costs a firm will need to pay for using data

    services when entering one of the countries in which data localisation laws are implemented.

    The third shock occurs on investment, which forms a major driver for economic growth for

    developing countries in particular. However, as the regulatory environment imposes more

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    91/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    92/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    93/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    94/355

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    95/355

    10

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    those for Vietnam, India and Indonesia seem low. Yet, it should be taken into account that

    the average workers salary is much lower in the latter countries. To give an example, using

    comparable average workers salaries across countries the negative welfare effect would still

    cost the Indian worker almost 11 percent of one average month salary. Similarly, for China,

    this impact would come down to almost 13 percent, and even much higher for Korea and

    Brazil around 20 percent for both economies.

    CONCLUSION

    Industry and internet advocates have warned against an Internet which is fragmented

    along national borderlines. Some of them are going as far as calling balkanisation the great-

    est threat to the Internet today, even greater than censorship.9One comprehensive study by

    Chander and L (2014) from the California International Law Centre established that data

    localisation threatens the major new advances in information technology not only cloud

    computing, but also the promise of big data and the Internet of things.10It is not unlikely

    that future trade agreements will include disciplines against data localisation requirements,as there are often less trade-restrictive measures available to address privacy and security.

    However, the more immediate effect of data localisation measures the impact on economic

    recovery and growth is even more dangerous. As this study has shown, this impact is a

    direct consequence of the complex relations between cross-border data flows, supply chain

    fragmentation and domestic prices. These are complexities that are generally not understood

    by policymakers, who are often in the field of security and privacy law, rather than interna-

    tional trade. The findings regarding the effects on GDP, investments and welfare from data

    localisation requirements and discriminatory privacy and security laws are too considerable

    to be ignored in policy design. It is also reasonable to assume that SMEs and new firms are

    the first to be displaced from the market, as they lack resources to adapt to the regulatory

    changes.

    In the current security policy context, many regulators and privacy advocates stress the

    importance of discretion to tackle problems at a national level (e.g. NetMundial 2014 draft

    conclusions)11. The economic evidence however proves that unilateral trade restrictions are

    counterproductive in the context of todays interdependent globalized economy. The self-

    incurred losses make data localisation a policy that unilaterally puts the country at a relative

    loss to others while the possibilities for offsetting the negative impact through trade agree-

    ments or economic stimulus are relatively limited over the long term.

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    96/355

    11

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    ANNEX I

    Brief overview of proposed and enforced acts reviewed

    Brazil

    The Brazilian internet law Marco da Civil started out its life as a crowdsourced legislative

    proposal in 2009. While it emphasised the fundamental principles of internet freedom and

    net neutrality, following revelations that Brazilian entities had been subject to US surveil-

    lance, new privacy related amendments were made to the bill , including strict consent re-

    quirements for data collection, internet users right to be forgotten and a clear data localisa-

    tion provision the controversial article 12, which was later withdrawn.

    China

    The existence of a plethora of overlapping data privacy laws has traditionally made compli-

    ance a very difficult issue in China. Driven by an increasing number of reports on identitytheft and illegal trade in personal data,12rather than surveillance concerns, China has how-

    ever taken steps towards privacy reforms the Resolution relating to Strengthening the Pro-

    tection of Information on the Internet of December 2013 includes general rules for internet

    service providers (ISPs) and other businesses prohibiting the collection of personal data

    without consent and the illegal transfer or sale of personal information to third parties.13In

    the same year, the Standardisation Administration and the General Administration of Qual-

    ity Supervision, Inspection, and Quarantine published new national standards that prohibit

    overseas transfers of data to an entity absent express user consent, government permission,

    or other explicit legal or regulatory permission. Despite the voluntary character of these

    guidelines, they serve as regulatory baseline for law enforcement and are de facto data lo-

    calisation laws for all business sectors.14The Peoples Bank of China (PBOC) has also issued

    a Notice to Urge Banking Financial Institutions to Protect Personal Financial Information, 15

    which explicitly prohibits off-shore storing, processing or analysis of any personal financial

    information of Chinese citizens; meanwhile the Ministry of Industry and Information Tech-

    nology (MIIT) has banned collection of personal data without consent or without specific

    and clear purpose.16The Telecommunications and Internet Personal User Data Protection

    Regulation also requires regular risk impact assessments to be conducted by data processors.

    The European Union

    In January 2012, the European Commission proposed a reform of the EUs data protection

    regime, which is currently based on the 1995 Data Protection Directive. The aim of the new

    proposal, dubbed the General Data Protection Regulation (GDPR), is to establish a single

    European-wide data protection law. Aside from simplifying administrative procedures and

    centralizing supervisory authority, GDPR also introduces strict consent requirements, aright to review, a right to be forgotten, and the obligation for businesses to appoint a data

    protection officer (DPO) and perform an annual data protection impact assessment (DPIA).

    If implemented, the GDPR reform could lead to a stoppage of cross-border data flows from

    the EU to important data processing countries such as the US and India, which are deemed

    to have adequate data privacy safeguards in place under the EUs current regime.

    Aside from GDPR, the Commission has also adopted a strategy for Unleashing the Potential

    of Cloud Computing in Europe. The strategy aims to unify rules and standards related to

    cloud computing within Europe. If these standards will be designed in a way that decreases

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    97/355

    12

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    the interoperability with other countries regulatory regimes, this could lead to a de facto

    data localization.

    India

    In 2011, the Indian Ministry of Communications and Technology implemented certain pro-

    visions of the 2000 Information Technology Act by publishing privacy rules. These Reason-

    able Security Practices and Procedures and Sensitive Personal Data or Information Rules

    introduced a strict consent requirement that only allows for sensitive personal data to be

    transferred abroad when necessary or when the individuals consent has been obtained.17,18

    These rules also introduced the right to access and review personal information that a com-

    pany holds. The mercantilist intent of the law is clear, as the government of India issued a

    clarification to emphasise that the rules do not apply to its expanding outsourcing business. 19

    The laws have also been amended with a data retention requirement (with duration at the

    discretion of the government) for intermediaries that so far has not been implemented.

    National media in India have reported that the National Security Council Secretariat (NSCS)

    is considering proposals that incorporate strong elements of data localisation, mandating all

    email providers to set up local servers, or that all data generated from within India should be

    hosted in these India-based servers and this would make them subject to Indian laws. The

    strategy also includes creating an Indian email service and ensuring Internet traffic data is

    routed within India as much as possible, including precedents of forced data localisation for

    selective cases and services, e.g. BlackBerry mail services in 2012.20

    Indonesia

    ata protection is covered by Law No. 11 of 2008 regarding Electronic Information and Trans-

    action (the EIT Law) and Government Regulation No. 82 of 2012 regarding the Provision ofElectronic System and Transaction (Reg. 82), which went into force on 15 October 2012. In

    order to collect and process data, the data controller needs a legitimate reason for collection

    and the individuals consent.21Regulation 82 further requires a broad and undefined group

    of companies, electronic systems operators for public service to set up a data centre and

    disaster recovery centre in Indonesian territory for the purpose of law enforcement and

    data protection. The scope of this requirement is unclear however, as electronic systems op-

    erators for public service are not clearly defined. Draft Regulation Concerning Registration

    Procedure of Electronic System Provider and January 2014 Draft Regulation with Technical

    Guidelines for Data Centres contain same ambiguity, although a ministry spokesperson was

    quoted saying: [the draft] covers any institution that provides information technology-

    based services.22

    Korea

    In the Republic of Korea, the Personal Information Protection Act (PIPA) has been in force

    since 30 September 2011 and covers all sectors. In addition, the sector-specific Act on Promo-

    tion of Information and Communication Network Utilisation and Information Protection

    (IT Network Act) regulates the collection and use of personal data by IT service providers.23

    Under these acts, every data handler (including businesses, individuals and government

    agencies) must appoint a data protection officer (DPO), and consent must be obtained both

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    98/355

    13

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    for the initial collection and processing of personal data and prior to any transfer abroad or to

    third parties. PIPA gives individuals the right to review and delete personal data that pertain

    to them and obliges data handlers to notify the data subjects without delay in case of a data

    breach. If the number of individuals affected exceeds 10,000, the data handler must also no-

    tify the relevant authorities. In addition, Korea prohibits the outsourcing of data-processing

    activities to third parties in the financial services industry. Banks can therefore only process

    financial information related to Korean customers in-house, either in Korea or abroad.

    Vietnam

    In 2013, the Vietnamese government issued Decree 72, on Management, Provision, and Use

    of Internet Services and Information Content Online, which came into effect on September

    1st.24The Decrees main aim seems to have been to tighten the governments grip on the

    Internet and limit free expression,25with a broad range of prohibitions under article 5 in-

    cluding opposing the state. The Decree requires ISPs to obtain a license and to register with

    the Ministry of Information and Communications before providing online services, and all

    organisations establishing general websites, social networks and companies providing ser-

    vices across mobile networks are required to establish at least one server inside the country

    containing the entire history of information posting activities on general information web-

    sites () and sharing on social networks.

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    99/355

    14

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    ANNEX II

    Description of the GTAP8 model

    1. The Model

    The model applied in this study is GTAP 8, a computable general equilibrium (CGE) mod-

    el.26The most recent model setting accounts for inter-sectoral linkages between 129 regions

    while capturing inter-regional trade flows of 57 commodities. The framework thus allows

    for a general equilibrium analysis of the economic effects (e.g. GDP effects and changes in

    trade flows) resulting from the regulation of cross-border data flows. In this model, regional

    production is characterized by constant returns to scale and perfect competition. Private de-

    mand is represented by non-homothetic consumer demands. The structure of foreign trade

    is based on the so-called Armington assumption, which implies imperfect substitutability

    between domestic and foreign goods.

    The most recent GTAP 8 dataset includes national input-output data as well as trade, tariff

    and demand structures. The models base data are primarily benchmarked to 2007. Trade

    data are based on 2004 and 2007 values while the reference year of protection data is 2007

    (see Narayanan et al 2012).27 Like any applied economic model, this model is based on a

    number of assumptions. In order to account for recent changes in regional macroeconomic

    variables, the GTAP 8 dataset on the global economy is extrapolated to 2014.

    The exogenous variables used for the extrapolation are macroeconomic variables, i.e. the

    size of GDP, total population, labour force, total factor productivity and capital endowment

    as provided by the well recognised database of the French research center in international

    economics (CEPII), which is documented by Four et al (2012).We apply the estimates of

    these macroeconomic data projections in order to calculate the best estimate of the global

    economy in 2014. Preferences and production structures as described by the models struc-

    tural parameters have been left unmodified.

    The model we use in this study is comparative static. This model does not account for endog-

    enous productivity growth and may thus under-predict welfare effects, economic growth and

    increases in trade flows that result from the imposition of NTBs due to regulations of cross-

    border data flows.28The interdependence between, on the one hand, productivity growth

    and, on the other hand, exports, imports and investment is neglected in static CGE models.

    2. Treatment of Investment

    GTAP is a pure real goods model that does not account for financial instruments. Thus, the

    standard GTAP model does not take into consideration supply-side impacts of capital market

    conditions. In the model, investors are represented by a global bank allocating regional sav-

    ings and investments around the world. Investment itself is represented by a stock of capitalgoods (CGDS), which is treated as a commodity that is purchased by the global bank and al-

    located to regions following a return-equalising rule. The capital goods commodity does not

    employ any primary factors of production. It rather absorbs a mix of intermediate goods such

    as construction, machinery equipment, vehicles, and services etc. In addition, capital goods

    cannot be traded across regions. Instead regional capital goods formation is determined be

    regional savings, which are absorbed by the global bank and reallocated to regions thereaf-

    ter.29For a detailed description of the treatment of capital goods in GTAP see Malcom (1998).

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    100/355

    15

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    In order to estimate the economic impact of decreasing returns on capital due to data locali-

    sation barriers to trade, we follow an indirect expected rate of return approach. It is assumed

    that the global bank allocates investment across regions in such a way that risk-adjusted rates

    of returns are equalised across regions. Thus, in GTAP a change of the expected rate of return

    in a given region results in corresponding changes in the amount of regional investment. The

    underlying assumption is that equilibrium rates of returns on investment are equal across

    regions and equal to a global rate of return. In addition, it is assumed that expected returns

    in a specific region will fall as the amount of investment rises. Thus, a difference between the

    global rate of return and a regions rate of return triggers a reallocation of investment across

    regions until regional rates of investment are equalised again. The difference between risk-

    adjusted regional rates of return can be read as a region-specific risk premium decreasing

    the regions attractiveness to investors. In line with this assumption, an increase in regional

    investment risk reduces capital goods formation and decreases demand for factor inputs to

    investment in the region concerned. At the same time, investment would increase in regions

    not affected by decreasing investor appetite.

    The results of our experiment only have indicative character, meaning that we are not able

    to forecast the precise investment effect due to data localisation barriers to trade mainly

    for two reasons: 1) The shortcomings in the treatment of investment in GTAP and 2) the

    transformation of expected returns on investment into investors risk appetite, which is an

    empirical problem in general. Yet, the methodology we apply allows us to forecast and trace

    the direction of investment flows.

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    101/355

    16

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    BIBLIOGRAPHY

    Andriamananjara, Dean, Feinberg, Ferrantino, Ludema, Tsigas (2004), The Effects of Non-

    Tariff Measures on Prices, Trade, and Welfare: CGE Implementation of Policy-Based Price

    Comparisons, USITC Economics Working Paper No. 2004-04-A.

    Asia Sentinel, Indonesia May Force Web Giants to Build Local Data Centers, 27.01.2014, ac-

    cessed at http://www.asiasentinel.com/econ-business/indonesia-web-giants-local-data-

    centers/, 12.04.2014.

    Cassells, Meister, Cost and trade impacts of environmental regulations: effluent control and

    the New Zealand dairy sector. The Australian Journal of Agricultural and Resource Econom-

    ics 45 (2), p. 257-274, 2001

    A. Chander, U. P. L, Breaking the Web: Data Localization vs. the Global Internet, Working

    Paper 2014-1, California International Law Center, 12.03.2014, accessed at http://ssrn.com/

    abstract=2407858, 20.03.2014.

    Christensen, L., A. Colciago, F. Etro and G. Rafert (2013) The Impact of the Data Protection

    Regulation in the EU, Intertic Policy Paper, Intertic.

    Covington & Burling LLP, China Releases New National Standard For Personal Information

    Collected Over Information Systems, E-alert Global Privacy & Data Security, 15.02.2013, ac-

    cessed at http://www.cov.com/files/Publication/.../China_Releases _New_National_Stand-

    ard_for_Personal_Information_Collected_Over_Information_Systems.pdf, 12.04.2014.

    G. Cheah, Protection of personal financial information in China, Norton Rose Fulbright,

    October 2011, accessed at http://www.nortonrosefulbright.com/knowledge/publica-

    tions/56148/protection-of-personal-financial-information-in-china, 12.04.2014.

    China Copyright and Media, National Peoples Congress Standing Committee Decision

    concerning Strengthening Network Information Protection, 28.12.2012, accessed at http://chinacopyrightandmedia.wordpress.com/2012/12/28/national-peoples-congress-stand-

    ing-committee-decision-concerning-strengthening-network-information-protection/,

    20.01.2014.

    China Copyright and Media, Telecommunications and Internet Personal User Data Pro-

    tection Regulations, 16.07.2013, accessed at: http://chinacopyrightandmedia.wordpress.

    com/2013/07/16/telecommunications-and-internet-user-individual-information-protec-

    tion-regulations/, 20.01.2014.

    L. Clark, Tim Berners-Lee: we need to re-decentralise the web, Wired, 06.02.2014, accessed

    at http://www.wired.co.uk/news/archive/2014-02/06/tim-berners-lee-reclaim-the-web,

    20.03.2014.

    Cushman & Wakefield, Data Centre Risk Index 2013, accessed at: http://www.cushman-

    wakefield.pt/en-gb/research-and-insight/2013/data-centre-risk-index-2013

    DLA Piper, Data Protection Laws of the World, accessed at http://files.dlapiper.com/files/

    Uploads/Documents/Data_Protection_Laws_of_the_World_2013.pdf, 15.04.2014.

    Elffers, Heijden, Hezewijk, Explaining Regulatory Non-compliance: A Survey Study of

    Rule Transgression for Two Dutch Instrumental Laws, Applying the Randomized Response

    Method, Journal of quantitative criminology, volume: 19 (2003), pp. 409 439, accessed

  • 8/9/2019 IICFReport AppendixA-E-Final 10Dec Web

    102/355

    17

    ECIPE OCCASIONAL PAPER

    No. 3/2014

    from [http://igitur-archive.library.uu.nl/fss/2007-0206-201216/64.%20Explaining%20regu-

    latory%20non-compliance.pdf], 2003

    Frost & Sullivan, Insights into Big Data and Analytics in Brazil, 2014

    Koszerek, D., Havik, K., McMorrow, K., Rger, W., Schnborn, F. (2007), An Overview of the

    EU KLEMS Growth and Productivity Accounts

    Foure, Benassy-Quere, Fontagne (2010), The world economy in 2050: a tentative picture,

    CEPII Working paper 2010-27.

    Hertel, Tsiga, Structure of GTAP. In Global Trade Analysis : Modeling and Applications. Ed.

    Thomas W. Hertel, Purdue University. Cambridge University Press. 1997

    Hunton & Williams LLP, Recent Data Breach Events in China, Privacy and Information Se-

    curity Law Blog, 31.12.2013, accessed at https://www.huntonprivacyblog.com/2013/12/arti-

    cles/recent-data-breach-events-china/, 20.01.2014.

    Hunton & Williams LLP, Outsourcers Exempt from Indias Privacy Regulations, Privacy and

    Information Security Law Blog, 24.08.2011, accessed at https://www.huntonprivacyblog.

    com/2011/08/articles/outsourcers-exempt-from-indias-privacy-regulations/, 18.03.2014.

    Jorgenson, Ho, Stiroh, Information Technology and the American Growth Resurgence

    (Cambridge, MA: MIT Press), 2005

    Library of Congress, Global Legal Monitor: Vietnam: Controversial Internet Decree in Effect,

    06.09.2013, accessed at http://www.loc.gov/lawweb/servlet/lloc_news?disp3_l205403690_

    text, 13.12.2013.

    Malcolm, G. (1998), Modeling Country Risk and Capital Flows in GTAP, GTAP Technical

    Paper No. 13.

    V. Manuturi, B. Gokkon, Web Giants to Build Data Centers in Indonesia?, 15.01.2014, The

    Jakarta Globe, accessed at http://www.thejakartaglobe.com/news/web-giants-to-build-

    data-centers/, 02.03.2014

    C. C. Miller, Google Pushes Back Against Data Localization, Bits Blog New York Times,

    24.01.2014, accessed at http://bits.blogs.nytimes.com/2014/01/24/google-pushes-back-

    against-data-localization/, 27.03.2014.

    Narayanan, G., Badri, Angel A. and McDougall, R., Eds., Global Trade, Assistance, and Pro-

    duction: The GTAP 8 Data Base, Center for Global Trade Analysis, Purdue University, 2012

    Rakotoarisoa, M. A. (2011), A Contribution to the Analyses of the Effects of Foreign Agricul-

    tural Investment on the Food Sector and Trade in Sub-Saharan Africa.

    M. Palmedo, Vietnams Decree 72 on Internet Services Aims to Fight Piracy, Raises Hu-

    man Rights Concerns, infojustice.org, 02.09.2013, accessed at http://infojustice.org/ar-

    chives/30620, 27.03.2014.

    PTI, RIM finally sets up Blackberry server in Mumbai, 20.02.2012, accessed at http://

    timesofindia.indiatimes.com/tech/tech-news/RIM-finally-sets-up-BlackBerry-server-in-

    Mumbai/articlesh