iicfreport appendixa-e-final 10dec web
TRANSCRIPT
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
1/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
2/355
!"#$%#$&
!"#$%&" &"(()*" +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ,
)$-.%!#"/*"&".0( ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1
"2"$3045" (3&&)67 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 8
9)$-*6%3./ %: 44$:++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ;
%9
(063$036" +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ==
-"7 &4#"(0%."( +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ =?
-"7 0@"&"( ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ =A
!"#$%&"' )*+ ,+"+-&./ 0- 1%234 12563.&"' 7" 7"42"+/ 8888888888888888888888888888888888888888888888888888888888888888888888 9:
;+
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
3/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 2/A E2/2A95A41/ 95A2B N1@2D29K 4/ A29:3
1F G34/? ./F19:5A41/ 5/0 (1::G/4>5A41/ O2>6/1=1?8 P.(OQ F19 :192 E910G>A4D2
2>1/1:4> 5>A4D4A423K ./01/2345 3A4== =5?3 1G/A9423 0G2 A1 =4:4A5A41/3 4/
>1//2>A41/ 3E220 5/0 =1>5= >1/A2/AB
,3 ./01/2345 65EA29K A6292 592 A92:2/01G3 1EE19AG/4A423 A1 G32
50D5/>23 4/ A2>6/1=1?8 A1 02D2=1E 5 ;/1@=20?2R1/1:8B O62 4:E5>A 925>623
F59 6/1=1?8 >5/ 62=E 4:E91D2 ?1D29/:2/A 329D4>23K
20G>5A41/K 5/0 625=A6>592B O1 925=4I2 A6232 94A4>5= A1 02D2=1E 5 911383A2: @6292 4//1D5A41/ 5/0 2/A92E92/2G9364E >5/ A694D2B (1==56 53 A62 ./01/2345 .(O (1/3G=A5A4D2 S19G: P..(SQ 2/55/ 02D2=1E E91?92334D2 .(O E1=4>423 A65A @4== 62=E ./01/2345
?91@B
./ "LMTK A62 ..(S F1>G320 1/ 5 045=1?G2 51/340295A41/3K 5/0 =583 1GA
/2JA 3A2E3 F19 A62 ..(S 4/ "LM$B ./ A62 >1:4/? 8259K @2 =11; F19@590 A1 02=4D294/? E1=4>8
923G=A3
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
4/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
5/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
6/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; DA $)7&0(8 EFG$A@HI? *+-+6 >7%J1'.
C0K+(8 C&-07()- 3)- F1'+317(+-&', >'2+=(-8 4-);)(&)'. >'2)'0=&1 >':0=(;0'(D))-2&'1(&', L)1-2 ELM4FI? D%-&= N+66. $K07(-+; C&-07()-. G=&1 417&3&7. 9$FG? 1'2
C1:&2 $&)J.
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
7/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
8/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
9/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
10/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
11/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 62: 56 6A3 4/@54?
238B/054? 507 84/E54 43;34 6/ 5@AB3;3 6A3 >A5237 8/54 /G @2356B08 5 I0/F437831E5>37
3@/0/=: B0 ,07/03>B5C
7&87.#(0# 9:1+8:1+; '&%1)1#/ 6A2/98A B079>62: @/0>94656B/0 B0 6A3 73;34/? 507
43;3258B08 /0 3@6/2J> 3H3 507 B00/;56B/0 6/ /4;3 @A5443083> G5@37 B0 ,*+157/
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
12/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; DE 4+, F,G
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
13/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; ; 5?7 )C.E58(-' F(6?5?7(E; -'( A0& 0122.--(( 0'5.6 1@ B:>G0H &'(+122.--(( +12=6.3(3 I1/(6?2(?- 1@@.+.5C3 5- -'( 33.3-5?- 5?7 2(6.+5?
0'528(6 1@ 0122(6+( J>20'52K A?71?(3.5L3 A& M &(C(+1??(+-./.-9 0122.--((;
D>:&)N; 5?7 O>@@5.63; 53 S(CC 53 D.?.3-(63 @612 6(C(/5?- D.?.3-6.(3; -'61,I' -'( 0'5.625?
1@ -'( :-((6.?I 0122.--((H
-+./ 0&.#1,2
&'( S16Q 3-6(523 56( 7.6(+-(7 89 -'( )*(+,-./( 0122.--(( 5?7 =61/.7( 5? 5/(?,( -1
7.3+,33 .33,(3 .? 7(=-'H )5+' S16Q 3-6(52 .3 C(7 89 5 2(28(6 @612 B:>G0L3 A0&
0122.--(( 5?7 S.CC =61/.7( 7(-5.C(7 .?=,-3 5?7 -.2(C9 ,=75-(3H V./(? -'5- -'.3 .3 5
+1?3,C-5-./( @16,2; -'( 3+1=( 1@ (5+' S16Q 3-6(52 .3 1=(? 5?7 3,8W(+- -1 +'5?I(H A?
#X"Y; -'( .7(?-.@.(7 S16Q 3-6(523 S(6(Z
"#$%&'()*+ ,-./$0(.
?$+'$2)4 @((=.$A ,*)B(
,-1#-(/2/3/-$ 4)1'&/3'(/)-
?$+'$24 %&/$.
56#*$/-$ 7/$/('& 8*#-9.
?$+'$2)4 C*B2()(>/A D-+.B(33
)*52.?.?I C1+5C 5?7 IC185C
6(I,C5-.1?3 5?7 8(3- =65+-.+(3
-'5- 57/5?+( 3,3-5.?58C(; C1?I4
-(62 I61S-' .? -'( A0& 3(+-16
A7(?-.@9.?I 1==16-,?.-.(3 -1 I61S
-'( C1+5C A0& .?7,3-69
B=75-(3 1? IC185C .?7,3-69 -6(?73
5?7 6(C(/5?+( -1 -'( A0&
(+1393-(2 .? A?71?(3.5H
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
14/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 80AJ ,89 6D4@?062/A 08?0 M6@@ 6/519?A9 089 52D *25?@6P?062/J ,89 /993 721 >2K91/D9/0 @9?391A86< 6/
A06D4@?06/> 6/K9A0D9/0 6/0919A0O
o &D91>6/> Q6>60?@ ,19/3AJ ,19/3A 6/ )/32/9A6?NA 36>60?@ @?/3A5?
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
15/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
16/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; "''% DC4,(A-*
,-C(/- .55-22 /( @-.'/@5.,-E
-*)5./?(
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
17/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; - 3 (3)35+- (-19--5 4313 &.21-+1*25 :-3,'.-, 354 18-
4295,1.-3: -77-+1, 27 4313 )2+3)*@31*25 .-?'*.-:-51, 27 KCL= *5/-,1:-51,= 354
9-)73.-; M8-.- 3),2 5--4, 12 (- 3 +)-3.-. )-B3) ,1354*5B 25 4313 +-51.-, *5
E5425-,*3 354 :2.- +22.4*531*25 (-19--5 18- H*5*,1.6 27 N2::'5*+31*25 354
E572.:31*25 M-+852)2B6 OHNEMP= 18- J*535+*3) G-./*+-, Q'182.*16 ORSTP= 354 218-.
.-)31-4 B2/-.5:-51 *5,1*1'1*25,;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
18/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
19/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
20/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 0)+6 3.)4+,- .>+ +5'+ )4 .0-,0 +. 1'&,:>'0-
F4-.4,1)'I1 (6?,0 13'(,B +5, K*.?'* ;6?,01,(>0)+6 L:,4-' MF9CK;LN 4,,-1 +. ?,
'--0,11,- /)+5)4 '** 3)**'01 )4 F4-.4,1)'G *,:'* &0'0'*
(+>0,1B ('3'()+6 ?>)*-)4:B '4- )4+,04'+).4'* (..3,0'+).47
L&+,0 +5, 0,30,1,4+'+)@, 15'0,- ,2)1+)4: :.@,04
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
21/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; (/.I +. 1'( >(;/./1/+.
0.> 2(,0.1/*2 +; O*:=(< )0FP5
.#/012/%& %13 4(+/#35(%& 6#%75(#7- B'/)( A.>+.(2/0 '02 >(E()+?(> 1(*'./*0) 0.>
?-
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
22/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
23/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
24/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
25/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; + V-8,)'-. G)D*6*'8 )E V)'4H-+3 KWVVFLA 6)5,.* 9-16*'8+ -/*
-' ,'2/*-+,'0.1 E*-+,5.* 9-16*'8 9.-8E)/6 E)/ )'.,'* 0))(+ -'( +*/D,2*+: W,D*' 83*
3,03 6)5,.* 93)'* 9*'*8/-8,)' /-8* ,' &'()'*+,- -'( /=/-. 9)9=.-8,)'+> .,6,8*(
931+,2-. -22*++ 8) 5-'C+ -'( )83*/ E,'-'2,-. ,'+8,8=8,)'+A 83* 9/)D,+,)' )E 6)5,.*
7-..*8+ 51 8*.*2)66=',2-8,)' )9*/-8)/+ *T8*'(+ *42)66*/2* -'( E,'-'2,-. +*/D,2*+ 8)
9/*D,)=+.1 ='5-'C*( &'()'*+,-'+:
"XG-+8*/H-/( ;22*.*/-8*+
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
26/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
27/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 7-+,> &'?@5 8/ ) F828+)1E
G0*>,*1,55E A0( H*,,/,* I0*1>J F,D,105 )/> K00159 :0*;5.0E 0/18/, )--,55 +0 *,1,D)/+
)/> -07/+*3Q5 48/)/-, 8/40*()+80/B
@QA0((,*-, 044,*5 ) 582/848-)/+ 0 7/8T7, -.)11,/2,5 8/ ,QA0((,*-, )>0E '?@5 /,,> 40* 6*0)>6)/> 5,*D8-,5 )*, /0+ )1:)35 5,*D,> 63
+,1,-0((7/8-)+80/ 5,*D8-, ,*5B =/>05)+ 5.)*,> +.)+ 48R,> 5,*D8-,5 )*, 044,*,>
+3>*,558/2 +., 48/,
18/, 6,+:,,/ 5()11,* '?@5 )/> +., .82.Q,/> -0/57(,* ()*;,+B
K.8*>E =/>0/,58)/ 6)/;59 *828> 5+)/>)*>5 8/ )*,)5 57-. )5 (,*-.)/+ 7/>,*:*8+8/2 18(8+5
18/;)2,5 6,+:,,/ '?@ ,QA0((,*-, )-+8D8+8,5 )/> 6)/;5B K.85 85 ,R)-,*6)+,> 63 '?@5
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
28/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
29/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 934/+0' /' .->./39 4+ -(39/?/0: /4' 5>99 :-+@4< =+4(04/39A
B38/0: 3 2(8(9+=(2 =36,(04 /02>'4-6 /' 3 ;(6 (03C9(- 4+ ()*+,,(-.( :-+@4-(-' -(..4'A
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
30/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; *@+/*(&) /( +0(*' '-B.*@+/$ B2(@$))$)
>. 2'( RH@ 0++ 51*9;624 01( 1(/;+02(9 38 RH 9-1(62-B(4 ,'-6' 70.902( 2'02 *.6( 0
51*9;62 3(01-./ 2'( JR 701G-./ -4 5+06(9 -. 2'( RH 701G(2@ 7(73(1 4202(4 4'0++
51(4;7( 6*75+-0.6( ,-2' 2'( RH A-1(62-B(4 0.9 4'0++ .*2 51*'-3-2@ 1(421-62@ *1 -75(9(
2'( 5+06(7(.2 *) 2'-4 51*9;62 *1 4(1B-6( -. 2'(-1 701G(2@ ;.+(44 2'(8 '0B( (B-9(.6( 2*
2'( 6*.21018= >. 2'( H?@ 2(+(6*77;.-602-*. 51*9;624 ,-2' 0 A(6+0102-*. *) J*.)*17-28
01( (:(752(9 )1*7 );12'(1 1(B-(, 38 2'( 1(/;+02*1=
?$)/
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
31/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
32/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; ?@#K LIM>NO34*.--3 5-+'0 %45* 57*D3' -7%- D73&
2*9.43 -%B35 D3)3 )3'+,3'1 -73 57*)-6-3)2 4*55 .& 8*/3)&23&- )3/3&+35 D%5 P+.,Q40
)3,*/3)3' .& -73 23'.+26-3)2 '+3 -* -73 8)*D-7 .& -73 -%B 9%53 RS.8+)3 $T:
!"#$%& () *+","-. /0 12%3&- -/ %&4/5&% ,/6- -27 "8 .&2%6 0/,,/9"8# 28 2:;52,/%&1 -27 %&:$4-"/8
!"##$%&'() +%$,-+,(- -./.0$#1.(& '( 2(-$(.3',
U7.43 9)*%'9%&' .5 % Q30 3&%943) *C -73
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
33/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 3)/?
@2*4 A 0:('3*0'1 2) .)/0)(123 3)/ +23)/=2/*4 3B32+3>+(- ( 3++0;3*(/ 90' >'03/>3)/ *0 3;;03)/=2/*4F2)*()12B( 3::+2;3*20)1?
.) .)/0)(123- *4( ;&''()* @2FG2 >3)/=2/*4 21 +22+2*,
09 +3*(1* @2FG2 *(;4)0+0D2(1 *43* 1&::0'* >3)/=2/*41 09 H5 678 3)/ I5 678 3)/
:'2B3*( &1('1J 3;;(11 *0 (K:3)/(/ 9'(L&();, >3)/1 09 $M$5F$"$5 678 3)/ $HN5 O $N#$
678? .) 0'/(' 90' .)/0)(123) ;0)1&3)/ )(*=0'P1 3)/ 1('B2;(1 *43*
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
34/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
35/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567;
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
36/355
"#$ %&'(&$)*+ %," ,(&)-./+/*0$ 1(2-34 5678 9$0*$: +&' 567; 2(3 5&' EF$@-/*0$ D$$/*&= G %%,1
BK-&$ 58J 5678C
$%%&'()* (
D*&-/$) >2(3 L2' EF$@-/*0$ D$$/*&= G %%,1
BM@/(A$2 5J 5678C
$%%&'()* &
N-II.$3$&/+2O D+/$2*+.)
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
37/355
"##$%&'( "!"#$"" $"&'$()*& +," "-+'./)-,0"*+ 12
3*(1*"-)' 345 41*-6/+'+)7" 81$60 93348: 5"'0
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
38/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
39/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
40/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
41/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
42/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
43/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
44/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
45/355
"##$%&'( )"#$%&'( )*+, -(& ./'0%' "''$2 3 4456
789*#: -; ?
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
46/355
1stExecutive MeetingIndonesia ICT Consultative Forum
April 1st, 2014
Welcoming Remarks
Luky Eko Wuryanto, Deputy Minister for Infrastructure and Regional Planning,
Coordinating Ministry for Economic Affairs (CMEA)
! Opened the forum, encouraging the sharing of perspectives, the involvement ofhigher officials and focused on outcomes that will result in concrete
improvements
Alex Feldman, President, US-ASEAN Business Council (USABC)
USABC looks forward to an ongoing and long-term programme. Indonesia is one of the
top five countries when it comes to tech use, including mobile technology, Facebook, and
Twitter. The Indonesia ICT Consultative Forum aims to spur ICT in industry in
Indonesia, as well as connect Indonesia to opportunities outside the country.
2014 is a big year:! The Councils30thanniversary
! Indonesias Parliamentary Elections
! USABC is launching ASEAN Matters for America and American Matters
for ASEAN
! USABCs CEO Missionto Vietnam and the Philippines, where CEOs will
meet with the President and members of cabinet and leaders of businesscommunity. This follows a CEO Mission in 2013 to Indonesia and
Malaysia.
Indonesia is half the population of SE Asia and more than half of its economicactivity. As economic activity continues, ICT will play a critical role in growth
and Indonesiassuccess. Getting policies right is critical to ensuring peoplebenefit and growth continues across the world. There are opportunities in the
region, as demonstrated through entrepreneurs in the region making headlines
through development of apps and games that are becoming some of the most
popular in the world. Indonesia has a lot to gain in this sector, and there is greatexcitement for this new collaborative platform.
Presentation on IICF Concept & Plan
Eddy Satriya, Deputy Assistant for ICT and Utility, CMEA
Purpose
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
47/355
The Indonesia ICT Consultative Forum (IICF), an initiative started by the US-ASEAN
Business Councils ICT Committee and Coordinating Ministry of Economic Affairs aimsto create a collaborative platform between government and industry to support
Indonesias long-term policy of building a local ICT industry and toward fulfillment of a
shared goal of creating an innovation and knowledge-based economy in Indonesia.
Currently, every ministry has their own pilot projects involving ICT applications, thusthese experiences can be shared and learned from. The Forum will also serve to improve
mutual understanding in the areas of innovation, investment and regulation and will assist
in the development of future ICT policy in Indonesia.
He welcomes comments on the draft decree and proposes that the forum name IICF can
still change.
Implementation
Several objectives of the work streams include reducing coordination issues and
providing timely information before policies are made. In addition, they can be used to
promote local ICT industries.
Structure
The forum will be comprised of a "#$%&' ())%*%+, -&..%//## %$*,01%$2 '#3'#4#$/+/%5#4
)'&. /6# 7&5#'$.#$/ &) 8$1&$#4%+9 +4 :#,, +4 /6# ;"#6&,1#'4?
@6# "#$%&' ())%*%+, -&..%//## :%,, '#3&'/ )%$1%$24 /& /6# '#,#5+$/ A%$%4/#'4 &$
*0''#$/ 8-@ %440#4 +4 %1#$/%)%#1 BC /6# DE#*0/%5# -&..%//##? ;$1#' /6# "#$%&'
())%*%+, -&..%//## %4 /6# DE#*0/%5# -&..%//## :6%*6 :%,, B# ,#1 BC *&F*6+%'4 )'&.;"
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
48/355
Key purpose of the IICF is to ensure greaterpredictability, so that companies can
see where the government is coming from and how the business community canhelp meet the common objective of a vibrant ICT sector in Indonesia.
Shared objectivesGovernment and companies want the same thinga vibrant
ICT sector. IICF envisions working toward shared objectives, not as individual
companies or ministries, but as thought leaders toward development of an
innovative, knowledge based community with local ICT industry development asan enabler to achieving this goal.
WorkstreamsWorkstreams are tools to discuss relevant issues in depth and
serve as a starting pointing. Given that this is a consultative forum, the scope is
open and subject to change. Identified work streams are:
! Emerging Digital TrendsThe transformational nature of ICT is an
enabler for economic growth. This includes new areas like: cloudcomputing and analytics, as well as others new styles of IT. These new
trends need to be understood and regulatory frameworks need to bealigned with the new trends, thus providing an environment to expand
business and create a knowledge base. To be led by Microsoft and
Qualcomm.
! Incentivizing LocalizationThis workstream looks at how to increaseinvestment interest. There is a need to level playing field and remove
barriers, but also incentives need to be in place encourage investments. In
turn, greater ICT investment leads to job creation. To be led by Intel.
! Regulatory InsightsInitially, regulatory framework changes triggeredthe need for forum. IICF wants to understand challenges and looking
forward to share best practices from other countries who are also creatinga domestic ICT industry. This information exchange helps address
Indonesiasneeds and allows companies to be more effective. To be ledby Google.
Outcomes -Today is an outcome. At a minimum, the outcome IICF hopes toachieve are regular dialogues to minimize surprise. Such that if new
regulations come up, there is a chance for consultation to allow companies to
prepare operations to remain in compliance of the new policies. Beyond
sharing of information, there can be a sharing of best practices anddevelopment of a roadmap toward the vision to create a knowledge base.
"#$%&'$# ()&* +,,- ./0)1-/2 3#%40- 5$$1$0/'0 (&) 678 /', 901:10-2 7;+5
Last September during USABCs ICT Business Mission to Indonesia this Forum was
)%'4/ *&$*#%5#1 %$ &'1#' /& *'#+/# + '&B04/ 8-@ #*&4C4/#.?
PredictabilityA win-wincan be established using the input of governmentlocal incentives, timely regulation and using the expertise of companies.
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
49/355
Outcomes: In addition to reporting our findings from the work streams, we
should consider other measures of success including other metrics or mediainvolvement.
Participation: Attendeesideas and interaction are welcome. Questions to
consider: Which workstream is of most value? What topics would you like to
hear from experts about?
Work stream leaders presentation on objectives & plans
Emerging Digital Trends - Ruben Hattari (Microsoft) and Nies Purwati (Qualcomm)
Purpose: Provide updates to stakeholders on global industry trends;international best practices; case studies; government policies for long term
growth in the ICT sector.
Cloud technology: how it can help government and businesses, like SMEs.! Used in healthcare, politics and education to improve the sectors
! Important for SMEs in Indonesia given their desire for flexibility,collaboration, mobility and low costs. Also, considering around 90%
of industries in Indonesia are SME, this amounts to a large number of
companies.
! Broadband connectivity is difficult given Indonesias largeanddispersed geography/size, particularly in Eastern Indonesia where
connectivity is needed.
Concerns: cyber security, online privacy
Potential technology, such as smart cities and smart phones, will be discussedin this workstream, as well as policy challenges that new technology creates.
Incentivizing Localization, Deva Rachman (Intel)
Local demand - The education sector has the biggest need for ICT industry
Local government needs to add input but also the upcoming new government[national election coming up] requires leadership in this area as localizationneeds to be in line with Medium Term National Plan 2019.
Regulatory Insights, Shinto Nugroho (Google)
Regulatory insightGovernment needs to be in dialogue with private sectoras another source of information on how to make regulations that will
continue to create jobs and opportunities. Companies can share their good and
bad experiences in regards to the impact regulations had on the ICT sector.
TimelinessGovernment needs robust regulations to help Indonesia buildhuman resources to increase competitiveness.
Q & A
Suggestion that high-level meetings be moved forward to allow
recommendations for ICT industry to be put forward for the incoming
government and ask for chance to present to the new leadership.
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
50/355
Presentation: Cloud Computing and Its Impact on Our LivesSpeaker: Tony Seno Hartono, National Technology Officer, Microsoft
Key points
Cloud computing touches all aspects of our lifesocial, economic, political,healthcare
Cloud technology provides choicesPrivate, Public, Hybrid (Public/Private)and Community clouds exist. Each option provides a different level of
privacy.
! Clouds allow for automization, massive scalability and connectivity,
which is relevant given Indonesias size/population/dispersed islands.
Therefore, the Indonesia government should create positive policies forcloud computing given these important benefits.
! Allow software developers to use the online market to download and get
revenue, or regional governments with no infrastructure to manage
infrastructure using eservices.
ISO 31,000 Risk Management framework can help make decisions aboutpublic/private cloud and when to use each. Some require services on premise,
others off-premise or some in-between.
Need to have back-up/baskets depending on expected service level agreement(SLA) and solutions need to be designed accordingly.
Digital trends in Indonesia
Young demographic in Indonesia - 54 million students = cloud computing
opportunity.
Population growth will increase internet use, particularly the 12-34 year oldsusers who are often with a higher education.
Growth is primarily in mobile phones
High social media use.
Opportunities for cloud computing in education, healthcare, and politics
Shared responsibility - Government and citizens working together providehighest ROI thus internet access should be shared responsibility betweengovernment and citizens.
Challenge of internet connectivity
!
TV Band White SpacesUse unused frequency spectrum of TV fordata
! Potential to provide all citizens with free internet access to equalize
access
The power of cloud computing to transform government services such ashealthcare and education. Thus, we should maximize benefits of cloud
computing.
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
51/355
Open Discussion
"#/: ,#*/',
A%$%4/'C &) 8$104/'C H&*04#4 &$ 4/+'/F03 *&.3+$%#4 %$ 8-@
Asks how to collaborate between the government and private sector on ICTissues.
Proposes for next meetings:
! Look at how ICT has increased investment in Indonesia
!
Look at how to grow the local ICT industry. The benefits of cloudcomputing are known but the ministry struggles with how to support ICT
growth and grab the local market.
! Proposes looking at practices to grow local ICT industry in other countrieslooking at bad practices and also incentives needed to support ICT.
Workstream on incentivizing localization will address the creation of local
demand and will bring best practices, case studies . (i.e. Vietnam). These case
studies will be from closer to Indonesia and other emerging economies.
.#>4)10-
Concerns expressed regarding data security with cloud computing. Point of view
that certain data may be considered strategic thus making data security andprotection very important.
Security and privacy are important issues that must be addressed. However, this isa period of transitioning from data in a physical way to where data is on the cloud.
There are different levels of data security and privacy such that government data
is different and private. Today, data doesnt have boundaries such that data is anew form of currency. We need to think that data is accessible globally by banks
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
52/355
or enterprises and need to maximize this digital economy, particularly to the
benefit of SMEs to facilitate turning them into global players.
Financing / SMEs
Local industry needs to be supported, especially in ICT because it is hard forstart-ups to get funding from banking institutions. Start-ups usually get funding
from venture capital firms and telcos.
Investment is needed but also there are lots of SMEs who need coordinationunderMinistry of Industry and Communication. In this context, the ministry is
concerned about security but cannot avoid new technologies so instead require
assistance for training and education. Ministry is challenged by all the new
concerns and balancing the need for technology with the need to comply to
legislative measuresbecause this is the way forward.
Financial services
Bank of IndonesiaRecommends inviting Indonesia Financial Authority (OJK) to join
IICF
Regulates non-banks and banks.
Given cross-over with financial services, Financial Services Committee should
also be included.
Infrastructure requirements
KOMINFOThere is a need for a responsive regulatory environment and askswhat this new environment would look like. But also raises concern on what
infrastructure is needed and the funding required; what infrastructure is needed to
ensure is internet free and once it is built how to maintain good quality
infrastructure and continuity of infrastructure operators.
Need to collaborate with other systems like transport and logistics. However, itsalso important to consider the soft infrastructurei.e. human capital. Hard andsoft infrastructure are both needed. There is currently US government support for
entrepreneurship support in Indonesia such that companies can help with
training, entrepreneurship, and promotion of hackathons in tech space.
Discussion of IICF Next Steps
Workstream leaders will make respective work plans. Companies are encouragedto sign up, if they havent already. Also, there is a need to reach each out todifferent agencies so these meetings can be taking place on a regular working
level.
There is a need for case studies, experts and guest speakers to share moreinformation on this ICT transition in Indonesia.
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
53/355
Appendix
Resources
Presentation: IICF Concept & Plan
Draft decree
Presentation: Cloud Computing and its Impact on Economy
ASEAN Matters for America report
Partners in Prosperity: US Investment in Indonesia
Attendees
GOI
Luky Eko Wuryanto, Deputy Minister for Infrastructure and Regional Planning,CMEA
Eddy Satriya, Deputy Assistant for ICT and Utility, CMEA
Coordinating Ministry for Politics, Law and Security
Ministry of Industry
Ministry of Trade
Fiscal Policy Agency, Ministry of Finance
Ministry of Communication and Informatics
Bank of Indonesia
BKPM
Ministry of Tourism and Creative Economy
Partners
Didie Soewondho, Vice Chairman of Telecommunication, InformationTechnology and Broadcasting, KADIN
Eddy Thoyib, Executive Director, MASTEL
Andrew White, Managing Director, AmCham Indonesia
Sri Lakkundi, ICT Committee Co-Chair, AmCham Indonesia Jim Caruso, Economic Counselor, US Embassy
Phil Nervig, Economic Officer, US Embassy
USABC Members
Nazrya Octora, Associate Consultant, APCO Worldwide
Seow Hiong Goh, Executive Director, Global Policy & Government Affairs,Cisco Systems
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
54/355
Satria Gunayoman, Consultant, Cisco Systems - HD Asia Advisory
Shinto Nugroho, Head of Public Policy and Government Relations, GoogleIndonesia
Agung Yudhawiranata, Analyst - Public Policy & Government Relations, GoogleIndonesia
Suren Velappu , Director of Corporate Affairs, South East Asia, Hewlett-Packard
Elizabeth Hernandez, Vice President of Corporate Affairs, Asia Pacific Japan,Hewlett-Packard
Ananta Gondomono, Governmental Programs LeadIndonesia, IBM
Darryn Lim, Director, Trade and Innovation Policy, Microsoft
Nies Purwati, Director of Government AffairsIndonesia, QUALCOMM
Claudia Chan, Head of Government Relations, Asia Pacific and Japan, Seagate
Ruben Hattari, Director of Corporate Affairs-Indonesia, Microsoft
Tony Seno, National Technology Officer, Microsoft
Deva Rachman, Corporate Affairs Director, Intel Indonesia Corporation
Arnold Djiwatampu, Motorola Solutions
Alexander Feldman, President, US-ASEAN Business Council
Kathy Santillo, Regional Managing Director, US-ASEAN Business Council
Desi Indrimayutri, Senior Country Representative, US-ASEAN Business Council
Shay Wester, Manager, US-ASEAN Business Council
Caroline Tanjaya, Country Representative, US-ASEAN Business Council
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
55/355
"##$%&'( )"#$%&'( )*+, -$. /0'1%' "''$3 4 5567
89%$' -:; -
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
56/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
57/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
58/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
59/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
60/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
61/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
62/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
63/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
64/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
65/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
66/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
67/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
68/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
69/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
70/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
71/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
72/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
73/355
"##$%&'( &"#$%&'( )*+, -*. /0'1%' "''$3 4 5567
891&+:'* ;< ;=>?@
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
74/355
!"#$% '(%)(*+#, '-! -)(+./0,0#1* 2)$.3 4''-25 6#(.0*+"#$%&'()* +,-./0% 1* 1234
56 7(%%8.--* 56 700-89: ;09-0% 0? 1@
-)7-",#$*% 89:
A'') B(-%8)(* C0D$-) E&&8&-(9- F.% G;" (9' H-8?8-)* ;7AE
B$%%09'%09 I0?(DD$* C8%0,-.% .F ;.%D.%(-0 EFF(8%& F.% EBAEJ* KL 0%9N09-R
*/,??. 4@A5
"#0 GG;Q 8& (9 8ND.%-(9- D?(-F.%N F.% :.>0%9N09- (9' 89'$&-%) -. '0>0?.D ( N$-$(? $9'0%&-(9'89:
89 -#0 (%0(& .F 899.>(-8.9* 89>0&-N09-* (9' %0:$?(-8.9V T#8,# 8& ,%8-8,(? 89 (,#80>89: -#0 (%0'
./W0,-8>0 .F /$8?'89: (9 899.>(-8>0* P9.T?0':0S/(&0' 0,.9.N) 89 G9'.90&8(R
"#8& 8& -#0 -#8%' .$- .F F.$% F.%$N& -. /0 #0?' -#8& )0(%R "#0 D%0>8.$& &0&&8.9& #(>0 /009 >(?$(/?0
-. .$% G;" ,.NN8--00 N0N/0%&* (9' T0 /0?80>0* F.% -#0 X.>0%9N09- .F G9'.90&8( (& T0??R 60 ?..P
F.%T(%' -. ,.N89: /(,P 89 C0,0N/0% F.% -#0 F89(? F.%$N F.% -#8& )0(%R
Our last session addressed the governments cyber security concerns and several private sector0UD0%-& (%0' 0U8&-89: &.?$-8.9& F.% '(-( D%.-0,-8.9* ,?.$' &0,$%8-)* &0,$%89: .9?890 /(9P89:
-%(9&(,-8.9&* (9' F%($' D%0>09-8.9R "#0 :.>ernment officials sharing of regulatory measures
intended to safeguard cyber security furthered private sectors understanding of certain
%0:$?(-8.9&R
In todays third IICF meeting, we hope to continue this constructive discussion about the
'0>0?.DN09- .F F$-$%0 G;" D.?8,) 89 G9'.90&8(* D(%-8,$?(%?) 89 (%0(& .F 0S,.NN0%,0 (9' D%.N.-89:
-%('0 (9' 89>0&-N09-R
In todays forum, we hope to accomplish the following outcomes:
8@ B#(%89: .F /0&- D%(,-8,0& (9' 8'09-8F)89: ,$%%09- /(%%80%& (9' .DD.%-$98-80& -. D%.N.-0
G;" '0>0?.DN09-
88@ G'09-8F) .DD.%-$98-80& F.% D$/?8,SD%8>(-0 D(%-90%D& -. (''%0&& :(D& (9' ,#(??09:0& 89
-#0 89'$&-%)888@ C0-0%N890 F$-$%0 (%0(& .F T.%P (9' %0&0(%,# -#(- T8?? /0 $&0F$? 89 '0>0?.D89: D.?8,)
89D$-& F.% -#0 89,.N89: 90T ('N898&-%(-8.9
I8&8.9 of Indonesias ICT Ecosystem! #$/539(1&3* :2;5+ ,09 /) -0,#9.?.:)* -#0 G;" (%09( 8& ')9(N8, (9' ,#(9:0& %(D8'?)R "#8& 90,0&&8-(-0& ,.9&-(9-
'8(?.:$0 /0-T009 :.>0%9N09- &-(P0#.?'0%& (9' D%8>(-0 &0,-.% %0D%0&09-(-8>0&V (9' N.%0 D?(-F.%N&
F.% '8&,$&&8.9* &$,# (& -#0 GG;Q* (%0 900'0'R
E %./$&- G;" A,.&)&-0N ,.ND%8&0& .F -#%00 P0) D8??(%&Y
8@ G9F%(&-%$,-$%0
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
75/355
"#$%&'%(& )* % +,- ,(%'.,# $/ 01, 234 )(&5*0#-6 35##,(0.-7 2(&$(,*)% $(.- 1%* 89:;< $/
*=,>0#5? %..$>%0,& /$# @)#,.,** '#$%&'%(&6 A)01 B $=,#%0$#* )( 2(&$(,*)% %(& .)?)0,&
'%(&@)&01 %C%).%'.,7 ?$#, *=,>0#5? (,,&* 0$ ', %..$>%0,& /$# '#$%&'%(& 0$
%>>$??$&%0, 01, /$#,>%*0,& )(>#,%*, )( &,?%(&6
;%C)(D % #,D5.%0$#- =.%0/$#? 01%0 %..$@* 01, %>>,.,#%0)$( $/ 234 )(/#%*0#5>05#,
&,C,.$=?,(0 )* ,**,(0)%.6
))E F%-?,(0 G-*0,?*
F%-?,(0 *-*0,?* D$ ',-$(& ?$')., *,#C)>,* %(& ,C,( $//,# C$5>1,#*6 H( $=,#%0$# *5>1
%* 2(&$*%0 1%* I897999 =%-?,(0 $50.,0* 01%0 =#$C)&, ,(0#- %(& ,J)0 =$)(0* /$# ?$(,-7
015* ?%+)(D =,$=., ?$#, '%(+%'.,6
2( 0,#?* $/ ?$')., ?$ney, Indosats view is that it sho5.& ', % 0#%(*)0)$( 0$ '%(+
=%-?,(06 H .)?)0 $/ KGL 899 *1$5.& ', )?=$*,& $( ?$')., ?$(,-7 %(& ',-$(& 01%0 *5?7
=,$=., (,,& 0$ C)*)0 % '%(+6 ;$@,C,#7 >1%..,(D,* #,?%)( )( ?%)(0%)()(D >$(0#$.6
A)01 2(&$(,*)%(* %.#,%&- 50).)$??,#>, )(&5*0#-6 35##,(0.-7 01#,, .%#D, $=,#%0$#*
1%C, ?$')., =#$&5>0* %(& @, &$ ($0 5(&,#*0%(& @1- @, *1$5.& ', >$?=,0)(D @)01'%(+* 01%0 1%C, $01,# *,#C)>, $//,#)(D*7 @1)>1 %#, %.*$ %@%#&,& @)01 ?$')., .)>,(*,*6
)))E 3$(0,(0 %(& 2(C,*0?,(0
L,C,.$=,#* %#, % +,- %*=,>0 $/ 01, ,>$*-*0,? %(& 01,)# *+)..* %#, %.#,%&- ',)(D ,J=$#0,&
'- 2(&$(,*)%6
2(C,*0?,(0 )* %.*$ >#5>)%. %(& 1%C)(D %(D,. )(C,*0$#* %(& )(>5'%0$#* %#, (,>,**%#- 0$
&,C,.$= 234 *0%#05=*6 2( % >$..%'$#%0)$( @)01 :$5(0%)( F%#0(,#* HN7 2(&$*%0 1%* %(
)(>5'%0$# =#$D#%? >%..,& )&,%"$J 01%0 >5.0)C%0,* (,@ %==.)>%0)$(* %(& )(>#,%*,* 01,)#
C)*)').)0- %(& C%.5%0)$( '- ,J=$*)(D 01,? 0$ 01, ?%#+,06 2( $5# /)#*0 )()0)%0)C,7 @, *,.,>0,&
O $50 $/ 89 >%(&)&%0,*6 2( 01, *5'*,P5,(0 #$5(&7 $50 $/ Q89 #,D)*0#%(0*7 @, *,.,>0,& R6
A, #,%.)%( 1,.= 01,? ?%#+,0 01,)# )&,%* 0$ 01, )(0,#(%0)$(%. ?%#+,0 P5)>+.-6 A, %#, .)?)0)(D$5# *,.,>0,& >%(&)&%0,* 0$ Q9 &5, 0$ 01, #,*$5#>,M)(0,(*)C, (%05#, $/ )(>5'%0)$(6
2(&$*%0 %(& G$/0'%(+ 1%C, %.*$ >$..%'$#%0,& 0$ *,0 5= % /5(& 01%0 =#$C)&,* >$?=%(),*
@)01 >%=)0%.6 ;$@,C,#7 @, /$5(& )0 &)//)>5.0 0$ /)(& *0%#05=* 01%0 %#, #,%&- /$# )(C,*0?,(06
! # $
2(&$*0%0 1%* 0@$ .)(,* $/ *,#C)>,S >,..5.%# %(& /)J,&6 T)J,& *,#C)>,* %#, 5*5%..- $//,#,& 0$ >$#=$#%0,*
%(& .%#D,# G:U*6 4$ ?- +($@.,&D,7 2(&$*%0 )* 01, $(.- $=,#%0$# 01%0 )* =5*1)(D /$# 01, G:U
*,D?,(06 ;$@,C,#7 01,#, %#, >1%..,(D,* )( =#$C)&)(D *,#C)>,* 0$ *?%..,# G:U* &5, 0$ 01, /)(, .)(,
',0@,,( 01,? %(& 01, 1)D1 ,(& >$(*5?,# ?%#+,06
While Indonesias high smart phone p,(,0#%0)$( VI8WE $//,#* $==$#05()0-7 )0 )* &)//)>5.0 0$
&,?$(*0#%0, )0* C%.5, 0$ G:U*6 41, D$C,#(?,(0 %(& =#)C%0, *,>0$# *,, 01, $==$#05()0- /$# G:U*
)( =#$C)&)(D 5*,/5. %==.)>%0)$(* *5>1 %* '%(+)(D *,#C)>,*6 UC,( 01$5D1 01, >5##,(0 #%0, $/ G:U
D#$@01 )* ($0 )&,%. VXMRWE7 )0 )* *0).. 1)D1,# 01%( >$(*5?,# D#$@01 VYWE6 35##,(0.-7 01,#, %#, ?%(-
%==.)>%0)$(* ',)(D $//,#,&7 1$@,C,# 01, ,&5>%0)$( =#$>,** )* 0)?,M>$(*5?)(D %(& @, (,,& 0$
31%( Z$+ [$(D V)&UH\)F%-]]ES (, $/ 01, +,- )C,#* $/ ,M>$??,#>, D#$@01 )( HGUH_ >$5(0#),* %#,
G:U*6 ;$@,C,#7 )( 2(&$(,*)%7 01,#, )* ($ /$#?%.)$?=%(),* .)+,
H==., %(& N$$D.,7 @1)>1 =#$C)&, ,**,(0)%. *5==$#0 )( 0,#?* $/ )(/#%*0#5>05#, %(&
0,.,>$??5()>%0)$(*6 ;$@ &$,* 2(&$*%0 .)(+ @)01 G:U* 0$ *5==$#0 01,?`
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
76/355
"#$%&'& " #(%)%#"* +",,- ./ )$%, "(&"0 )$& 12'&(/+&/) "/3 4"/5, $"'& 4&&/ $&*6%/1 47 288&(%/1
,+"**&( ,%9&3 *2"/,-
:& )2)"**7 3%,"1(&& ;%)$ )$& governments 6(262,"* )2 .- :$&/ " 6$2/& %, 3&*%'&(&30
)$&2(&)%#"**70 %) ,$2. /. /. /. /
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
77/355
"#$% &'#() '*+ ,-# .*/*(0)+1 %)/#*2 *(2 3#.4/) 3#()56 7( 7(2#()+4*1 ,') 0)(,%*/ .*(8 )9&/404,/5
+,*,)+ ,'*, 5#$% %)/#*2 .*/*(0) 4+ (#, *//#-)2 ,# .) $+)2 *+ 3#.4/) 3#()5 *(2 ,'*, &%#:4,+
0*((#, .) 3*2) :%#3 3#.4/) 3#()56 "#$% ;$)+,4#( #( %#*34(< :))+ %):)%+ ,# %)/#*2 3#()56 7(
=#>)3.)%1 7(2#+,*, 4+ &/*((4(< :#% *// #$% &%#2$0,+ ,# '*>) #(/5 ? %#*34(< &*%,()% #>)%+)*+6
@'4/) ,'4+ 4+ * 42)+ /)>)%*) ,# &*5 :$// %*,)+ :#% ,') %)3*4(4()( ,'*, 3)3.)%+ *// '*>) 24::)%)(, +4,4#(+ #( ,'4+ 4++$)1 4, 4+ 24::40$/, :#% 3) ,# &%#>42) *+,*,)3)(, ,'*, 4+ %)&%)+)(,*,4>) #: CDE76 F$, ,')%) 4+ 0#(+)(+$+ 4( ,'*,1 *+ #-()%+ #: ,')
4(:%*+,%$0,$%)1 ,)/0#+ +'#$/2 .) )( * +'*%) #: ,') %)>)($) :%#3 GDD *2+ *(2 ,'*, ,')
)%(3)(, +'#$/2 .) * :*04/4,*,#% #: 4(< ,)/0#+ *( );$4,*./) +4,4#( #( GDD+ *(2 ,')4% +&*0)6
E4(0) :#$% 3#(,'+ *) .))( *&&%#*0')2 .5 0#(,)(, #-()%+ -'#
+*5 ,'*, #&)%*,#%+ +'#$/2 (#, &$+' *2+ *, ,') ,#& *(2 .#,,#3 #: ,') 3#.4/) 2)>40) +4(0) ,')5
*%) */%)*25 3*84(< %)>)($) .5 +)//4(< *2 +&*0)+6
C, 7(2#+,*,1 -) .)/4)>) ,'*, ,%*24,4#(*/ >#40) *(2 EHE 3)0'*(4+3+ '*>) 24+*&&)*%)2 *+ *(
4(,)%(), 7IJ.*+)2 >#40) /48) E85&) ,')#%),40*//5 0*( '*>) .),,)% ;$*/4,5 ,'*( * 04%0$4, +-4,0'
connection that is technologically limited. Indostats fund and incubator ensures we are part of
,'4+ ,%)(26 G() #: ,') 3#%) +$00)++:$/ 0#3&*(4)+ -'# 4+ */+# #$% &*%,()%1 E#:,.*(81 2#)+ (#,
%)0)4>) ,')4% >*/$*,4#( *(2 %)>)($) :%#3 ,') ,)/0# .$+4()++ *(2 4(+,)*21 %)/5 #( #,')% 4(0#3)
+,%)*3+6 D'4+ 34(2+), +'4:, 4+ 43%,*(, :#% 7(2#+,*,1 .$, $(/48) E#:,.*(8 -'40' +,*%,)2 #:: *+ *
+#:,-*%) 0#3&*(5 ,'*, .#$) ,') 0*+'/)++ +#04),5
>4+4#(1 ,') 24::)%)(, +,*8)'#/2)%+ ())2 ,# .) #&)( ,# 24+0$++4(< ,') $+) #: 3#.4/) 3#()5 ,# 2%4>)
BKI6 7(+,)*2 #: ,%*(+:)%%4(< :$(2+ ,'%#$40)+6 7( %)+(+)1 .*(8+ *%) (#- +*54(< ,'*, *+ /#(< ,'*, 4, 4+ #(/5 $+)2 *+ * 2)/4>)%5 3)0'*(4+3
*(2 ,') 3#()5 +4,+ -4,'4( ,') .*(8 4, 4+ :4()6 @) *// 8(#- ,'*, 0)(,%*/ .*(8+ *%#$(2 ,') -#%/2 *%)
0#(+)%>*,4>) 4(+,4,$,4#(+ *(2 %4
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
78/355
Discussion 1: Supporting Indonesias e!"#$$%&'% )*&+%,
!"#$%#&'( *&+, -$.$& /0$'1#&2$&3 *+34+#',$5
043#&$1#3 67( !8,+14 9:;&484 /
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
79/355
!"#$%&" ()*&)+ ,-&"&./*0 12 3*)4$5
"#$ %&'&()*+ ,- "*./$ 0.')( ), 12&3/ . 4,'/24&5$ $4,(+()$6 -,* )#$ $74,66$*4$ &'/2()*+ (, )#.)
.33 83.+$*( &' )#$ ($4),* 4.' ,8$*.)$ &' . (.-$ $'5&*,'6$') .'/ .33,0 -,* )#$ &'/2()*+ ), &68*,5$
&' )$*6( ,- 92.')&)+ .'/ 92.3&)+: ;$ .3(, -,2'/ *$8$.) 82*4#.($( ,' $74,66$*4$ (&)$( ), 1$ )#$
norm and this facilitates Indonesians purchase of locally manufactured products.
"#$ %&'&()*+ ,- "*./$ (288,*)(
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
80/355
"#$$%&'()*+ ',%-% &,)#./ 0% 1)/#.%& 2)- "34 %/#56'()* )* %75)11%-5%8
!"#$%& ()*+&"& ,-&&*./0
9)&&(0.% 5)..60)-6'()* )* "34 %/#56'()* )* %75)11%-5% :(', ',% "34 ;#&(*%&& "AGL 0(..()* )2 (*C%&'1%*' :%*' ') ',% @?D &%5')- )2 "AG8H
'-(..()* 16-T%' )NN)-'#*('= 2-)1 ',% $-):(*$ 1(//.% 5.6&&8 D,%-% :(.. 0% MF 1(..()* 6//('()*6.
5)*%-& (* EFHF8 @*/)*%&(6* 5)*%-& 6.&) ,6C% ',% ,($,%&' 5)*%- 5)*2(/%*5% (*/%U 61)*$
',% VEF 5)#*'-(%&8 @*/)*%&(6 (& ',% 1)&' N-)1(&(*$ 5)#*'-= 2)- )C%-&%6& 0#&(*%&& 655)-/(*$ ') ',%R6N6* ;6*T 2)- @*'%-*6'()*6. ?))N%-6'()* "#-C%= EFGH8
9))- (*2-6&'-#5'#-% -%16(*& 6 5,6..%*$% 0#' ',%-% ,6& 0%%* N-)$-%&& ',-)#$, N-)$-61& .(T% 39H4@P
96.6N6 W(*$P %'58
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
81/355
taxes or other taxes on connection, other special taxes, for example tax on mobile operators gross
"#$#%'(
)% *+,,- . '/&01 2% ,,, 34&%/"2#' '546#0 /5./ /5# 7"474"/24% 48 94/.: ;4'/ 48 6%#"'527
?9;@ .334&%/#0 84" =1 /.A 5.0 2%3"#.'#0 to an average of 18.11% (Deloitte/GSMA 2011, Global
Mobile Tax Review). Handset costs act as a barrier to the benefits of mobile usage and taxes34%'/2/&/#0 *BC 48 /52' 34'/ 4% .$#".D#( )% #:#$#% 34&%/"2#'- /.A 34%'/2/&/#0 4$#" E+C 48 /5# 5.%0'#/
34'/(
I%04%#'2. 3&""#%/:1 5.' B,F G2::24% G4=2:# 34%%#3/24%'- *H(BC 48 65235 ."# G4=2:# ="4.0=.%0( I2/5
/5# "2D5/ "#D&:./24%' 2% 7:.3#- 6# #A7#3/ G4=2:# ="4.0=.%0 /4 .334&%/ 84" F+(BC 48 . /4/.: 48 EBJ
G2::24% 34%%#3/24%' ?KL%3# . 7"40&3/ =#."2%D /5# ;] G."V2%D 2' 7:.3#0 2% /5# ]^
G."V#/- G#G=#" '/./#' '5.:: %4/ 7"452=2/- "#'/"23/ 4" 2G7#0# /5# 7:.3#G#%/ 48 /52' 7"40&3/ 4" '#"$23#
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
82/355
"# $%&"' ()'*&$ +' $&''"$+',- .'+/01$2 3&)'"#4 56 ()'* 1)##+$ 3& 2$+77&/ )$ 102$+(2 )#/ 1)# 8'&&9,
$'):&9 "#$+ $%& 6; )#/ ()'*&$ 20':&"99)#1& )#/ ()'*&$ +'1&($ "2 $%&
'&27+#2"3"9"$, +8 &)1% (&(3&' 2$)$&- ?)'*&$ @0':&"99)#1& A0$%+'"$"&2 /+ ')#/+( 1+(79")#1& 1%&1*2
ABC6D 7'+/01$2 )'& )9'&)/, 79)1&/ +# $%& ()'*&$- C%"2 "2 +77+2"$& $+ ) $,7"1)9 )77'+:)9 '&4"(& $%& "(7+'$&' 1+(79&$&2 ) B55 KOL
B+'(- =# $%& ;@> "(7+'$&'2 )'& '&27+#2"39& 8+' $%& 7'+/01$2- C%& B55 6#8+'1&($ E0'&)0 )2 $%&'& )'& 7'+/01$2 )'& )77'+:&/ $%'+04% /"88&'$ '&4"2$')$"+# 21%&(&2 /&7/"#4 +#
$%& $,7& +8 7'+/01$ )#/ $%&"' 9"*&9"%++/ $+ 1)02& "#$&'8&'&- B+' 7+2$ ()'*&$ 20':&"99)#1& "#@"#4)7+'&> =GA (), '&Q0"'& $%& 20779"&' $+ 203("$ $%& $&2$ '&209$2 +' &:"/& +8 &Q0"7($
1&'$"8"1)$"+# )2 7'++8 +8 1+#8+'("$,
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
83/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
84/355
!"#"$ &'()*+ ,-./01
"#$% &' ()*+, -.+ /00,*&)1-&)2 %&)&'-,3 40, 560)07&6 8441&,'9 :.+,+ 1,+ &)-+,;7&)&'-+,&1< 7++-&)2'
-0 *&'6('' =('&)+'' '+6-0,' -0 =+ 0>+)+* 0, 616-' -0 -.+
+60)073 04 @)*0)+'&19
:+,0-+6- -.+ &)-+,+'- 04 -.+ 60()-,3 A.&1,- &) -.+ *&'6(''&0) 0) -.+ &7>>0,-1)- &' .1?&)2 1 '-1=,06+''&)2 &)*('-,3Q
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
85/355
"##$%&'( $"#$$%&'&()*+, -*)&+.*%/
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
86/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
87/355
2
ECIPE OCCASIONAL PAPER
No. 3/2014
When you can measure what you are speaking about, and express it in numbers,
you know something about it; but when you cannot express it in numbers, yourknowledge is of a meagre and unsatisfactory kind.
Lord Kelvin
SUMMARY
This paper aims to quantify the losses that result from data localisation require-
ments and related data privacy and security laws that discriminate against foreign
suppliers of data, and downstream goods and services providers, using GTAP8.
The study looks at the effects of recently proposed or enacted legislation in seven
jurisdictions, namely Brazil, China, the European Union (EU), India, Indonesia,
South Korea and Vietnam. Access to foreign markets and globalised supply chains are the major sources of
growth, jobs and new investments in particular for developing economies. Manu-
facturing and exports are also dependent on having access to a broad range of ser-
vices at competitive prices, which depend on secure and efficient access to data.
Data localisation potentially affects any business that uses the internet to produce,
deliver, and receive payments for their work, or to pay their salaries and taxes.
The impact of recently proposed or enacted legislation on GDP is substantial in all
seven countries: Brazil (-0.2%), China (-1.1%), EU (-0.4%), India (-0.1%), Indone-
sia (-0.5%), Korea (-0.4%) and Vietnam (-1.7%). These changes significantly affect
post-crisis economic recovery and can undo the productivity increases from major
trade agreements, while economic growth is often instrumental to social stability.
If these countries would also introduce economy-wide data localisation require-
ments that apply across all sectors of the economy, GDP losses would be even high-
er: Brazil (-0.8%), the EU (-1.1%), India (-0.8%), Indonesia (-0.7%), Korea (-1.1%).
The impact on overall domestic investmentsis also considerable: Brazil (-4.2%),
China (-1.8%), the EU (-3.9%), India (-1.4%), Indonesia (-2.3%), Korea (-0.5%) and
Vietnam (-3.1). Exportsof China and Indonesia also decrease by -1.7% as a conse-
quence of direct loss of competitiveness.
Welfare losses (expressed as actual economic losses by the citizens) amount to
up to $63 bn for China and $193 bn for the EU. For India, the loss per worker is
equivalent to 11% of the average month salary, and almost 13 percent in China and
around 20% in Korea and Brazil.
The findings show that the negative impact of disrupting cross-border data flows
should not be ignored. The globalised economy has made unilateral trade restric-
tions a counterproductive strategy that puts the country at a relative loss to others,
with no possibilities to mitigate the negative impact in the long run. Forced locali-
sation is often the product of poor or one-sided economic analysis, with the sur-
reptitious objective of keeping foreign competitors out. Any gains stemming from
data localisation are too small to outweigh losses in terms of welfare and output in
the general economy.
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
88/355
3
ECIPE OCCASIONAL PAPER
No. 3/2014
INTRODUCTION
Over the past few years, there has been a widespread proliferation of regulatory restric-
tions of the internet, in particular for commercial use. Whereas governments earlier en-
deavours to increase control over the internet had the implicit aim of keeping information
outside state borders, this new breed of regulation aims at keeping data in. With the pretext
of increasing online security and privacy, some governments are requiring mandatory stor-
age of critical data on servers physically located inside the country, i.e. data localisation. Also,
some data protection and security laws create barriers to cross-border data transfers to such
an extent that they are effectively data localisation requirements.
The belief that forcing personal information, emails and other forms of data from leaving
the country would prevent foreign surveillance or protect citizens online privacy is flawed
in several ways. First, many of the recent legislative proposals pre-date the surveillance rev-
elations, and are not designed for addressing these issues. Second, information security is
not a function of where data is physically stored or processed. Threats are often domestic,
while storing information in one physical location could increase vulnerability. Thirdly, datalocalisation is not only ineffective against foreign surveillance, it enables governments to
surveil on their own citizens. Moreover, users and business do not access data across borders
with the purpose of evading domestic laws, while legal obligations do not always depend on
where a server is physically placed.
As a result, data localisation, or discriminatory privacy and security laws to similar effect,
has spawned severe protest from advocates for open internet and the global trading system.
Forced localisation is often the product of poor or one-sided economic analysis, with the
surreptitious objective of keeping foreign competitors out, or creating a handful of new jobs
in e-commerce, data centres or consultancies. However, any job gains as a result of data
localisation are minuscule compared to losses in terms of jobs and output in other parts of
the economy.
Access to foreign markets through trade liberalisation and globalised supply chains are major
sources of growth, jobs and new investments in particular for developing economies. Given
the nature of todays globally interconnected economy, poorly designed national policies
that increase data processing costs have a severe economic impact as many sectors of the
economy rely on digitally supplied services and goods. Manufacturing and exports sectors
are also dependent on having access to a broad range of services at competitive prices such
as logistics, retail distribution, finance or professional services which in turn are heavily de-
pendent on secure, cost-efficient and realtime access to data across borders. When data must
be confined within a country, it does not merely affect social networks and email services,
but potentially any business that uses the internet to produce, deliver, and receive payments
for their work, or to pay their salaries and taxes.
This paper aims to quantify the economic losses that result from data localisation require-ments and related data privacy and security laws that discriminate against foreign suppliers
of data. It does so by using a computable general equilibrium model (CGE) called GTAP8
(see Annex II), which is a well-acknowledged methodology that is frequently used for trade
and economic impact analyses by academia and policymakers worldwide. The study looks
at the effects of the recently proposed or enacted legislation in seven jurisdictions, namely
Brazil, China, the European Union (EU), India, Indonesia, South Korea and Vietnam. Some
of these countries have conducted quantitative impact studies (notably the EU) measuring
institutional or firm-level costs.1Yet, no public study by a market regulator has investigated
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
89/355
4
ECIPE OCCASIONAL PAPER
No. 3/2014
the effects on exports, gross domestic product (GDP) and consumer welfare as a result from
proposed data localisation requirements or privacy laws.
OVERVIEW OF RELEVANT INTERNET AND PRIVACY REGULATIONS
The analysis looks at a number of recently introduced or proposed measures with respect
to data localisation by conducting a survey in each of the aforementioned countries juris-
dictions. The measures are assumed to alter the costs of engaging in commercial activities
in the selected countries (a brief description of all measures in each country can be found in
Annex I). The way in which these primarily privacy and security related measures operate is
of principal importance for accurate data modelling. For instance, data localisation require-
ments are effectively disruptive bans of data processing and hence the foreign provision
of that service into the domestic territory. The ban can be introduced economy-wide (e.g.
China, Vietnam), or selectively to a particular sector (e.g. only financial services in Korea).
Besides data localisation, a number of administrative regulatory barriers could be introducedthrough additional legal obligations that increase compliance costs, such as stricter con-
sent requirements, a right to review personal information held by firms, the requirement to
notify a market regulator and/or data subjects in case of potential security breaches. Some
measures are institutional such as the requirement to appoint a data privacy officer (DPO)
within the organisation; while others increase business risks by introducing sanctions for
non-compliance (in many cases with ambiguous laws), or a governments right to access a
business proprietors or its clients data.
Overall, compliance with these measures increases the operational expenditure of firms
which raises domestic prices and non-tariff barriers (NTB) on imports. Therefore, in order
to measure the actual or potential costs of introducing these measures, for this paper we have
estimated the costs of all data localisation measures using two different scenarios:
Scenario 1, which is based on the actual proposed regulations as defined in Table 1,
including data localisation in each country as per today.
Scenario 2, which is based on the actual proposed regulations, but with the addi-
tion of a data localisation requirement applied to all sectors in each country.
TABLE 1: OVERVIEW OF REQUIREMENTS IN LEGISLATIVE PACKAGES
Brazil China EU28 India Indonesia Korea Vietnam
Data localisation requirement No Yes No Partial Yes Partial Yes
Consent required for datacollection
Yes Yes Yes Yes Yes Yes No
Consent required for transfer
to third partiesYes Yes No Yes No Yes No
Right to review No No Yes Yes Yes Yes No
Right to be forgotten Yes Yes Yes No No Yes Yes
Breach notification No Yes Yes No Yes Yes No
Impact assessment No Yes Yes No No No No
Data privacy officers No No Yes No No Yes No
Sanctions for non-compliance Yes Yes Yes Yes Yes Yes No
Government access required Yes No No Yes No No Yes
Data retention requirement Yes No No Yes No No Yes
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
90/355
5
ECIPE OCCASIONAL PAPER
No. 3/2014
CONCEPTUAL MODELLING
The scenarios are calculated using several economic shocks caused by data restrictions.
If new regulations restrict businesses and individuals from using data in a reasonable man-
ner prices of any good or service that uses data in its production would also increase. For
example, the input costs for a logistics company would increase as they can no longer process
data on its customers or shipments using their existing IT suppliers or infrastructure, or are
faced with some compliance costs for doing so. This new cost is passed on to its customers
who may be manufacturers, exporters and consumers. Thus, increased regulation leads
firstly to domestic productivity losses for various sectors of the economy. Secondly, it creates
an additional trade barrier against data processing and internet services, or any service (to a
lesser extent also goods) that depends on the use of data for delivery. Thirdly, as the competi-
tiveness of the economy changes, investments (both domestic and foreign) will be affected.
Finally, the effectiveness of R&D is affected to the extent that product development depend
on customer and market data to compete in the market place.
The first shock, which measures the effect on productivity, is created using a so-called aug-mented product market regulatory (PMR) index for all regulatory barriers on data, including
data localisation, to calculate domestic price increases or total factor productivity (TFP) loss-
es.2 It sets out what domestic companies will have to pay additionally for sourcing domestic
data services by first estimating the general effect of administrative burdens in data process-
ing services on prices and TFP in each sector of the economy. Data processing services is an
important input for production and by using existing indexes from the OECD measuring
administrative barriers in services over time, we evaluate the extent to which these admin-
istrative barriers in data services affect other parts of the economy through the use of data
services. For example, the telecommunications sector is very data intensive (with 31% of its
inputs being data-related) and should be more heavily affected by regulation; similarly, data
processing is 5 to 7% of the total inputs used by business/ICT and financial services.3
The index is then raised based on the regulatory barriers as given in Table 1 for each coun-try. Not all of these measures are equally restrictive, and their relative importance is there-
fore weighted according to their relative cost impact.4By benchmarking the resulting index
against the estimate prior to the legislation and data processing intensities for all sectors, we
compute the price and TFP changes for all sectors in each country as a result of data localisa-
tion and administrative barriers.
The second methodology computes cost differences between countries as a result of data
localisation requirements in each of the countries. Two types of data are primarily used
namely the Data Centre Risk Index,5and an empiric observation of cost differences.6The
first source ranks countries according to a number of risk factors that affect the costs of oper-
ating a data centre a ranking that closely follows the general cost structure across countries
of setting up a centre as a consequence of data localisation measures. The observations of
actual costs are broadly in line and thereby confirm the Risk Index.
These costs are up-front trade costs each firm will need to incur when investing in and ex-
porting to one of our selected countries (see Annex II). These trade costs are allocated across
all sectors in each economy based on the intensity with which each sector uses data services.
The final numbers are interpreted as the additional costs a firm will need to pay for using data
services when entering one of the countries in which data localisation laws are implemented.
The third shock occurs on investment, which forms a major driver for economic growth for
developing countries in particular. However, as the regulatory environment imposes more
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
91/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
92/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
93/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
94/355
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
95/355
10
ECIPE OCCASIONAL PAPER
No. 3/2014
those for Vietnam, India and Indonesia seem low. Yet, it should be taken into account that
the average workers salary is much lower in the latter countries. To give an example, using
comparable average workers salaries across countries the negative welfare effect would still
cost the Indian worker almost 11 percent of one average month salary. Similarly, for China,
this impact would come down to almost 13 percent, and even much higher for Korea and
Brazil around 20 percent for both economies.
CONCLUSION
Industry and internet advocates have warned against an Internet which is fragmented
along national borderlines. Some of them are going as far as calling balkanisation the great-
est threat to the Internet today, even greater than censorship.9One comprehensive study by
Chander and L (2014) from the California International Law Centre established that data
localisation threatens the major new advances in information technology not only cloud
computing, but also the promise of big data and the Internet of things.10It is not unlikely
that future trade agreements will include disciplines against data localisation requirements,as there are often less trade-restrictive measures available to address privacy and security.
However, the more immediate effect of data localisation measures the impact on economic
recovery and growth is even more dangerous. As this study has shown, this impact is a
direct consequence of the complex relations between cross-border data flows, supply chain
fragmentation and domestic prices. These are complexities that are generally not understood
by policymakers, who are often in the field of security and privacy law, rather than interna-
tional trade. The findings regarding the effects on GDP, investments and welfare from data
localisation requirements and discriminatory privacy and security laws are too considerable
to be ignored in policy design. It is also reasonable to assume that SMEs and new firms are
the first to be displaced from the market, as they lack resources to adapt to the regulatory
changes.
In the current security policy context, many regulators and privacy advocates stress the
importance of discretion to tackle problems at a national level (e.g. NetMundial 2014 draft
conclusions)11. The economic evidence however proves that unilateral trade restrictions are
counterproductive in the context of todays interdependent globalized economy. The self-
incurred losses make data localisation a policy that unilaterally puts the country at a relative
loss to others while the possibilities for offsetting the negative impact through trade agree-
ments or economic stimulus are relatively limited over the long term.
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
96/355
11
ECIPE OCCASIONAL PAPER
No. 3/2014
ANNEX I
Brief overview of proposed and enforced acts reviewed
Brazil
The Brazilian internet law Marco da Civil started out its life as a crowdsourced legislative
proposal in 2009. While it emphasised the fundamental principles of internet freedom and
net neutrality, following revelations that Brazilian entities had been subject to US surveil-
lance, new privacy related amendments were made to the bill , including strict consent re-
quirements for data collection, internet users right to be forgotten and a clear data localisa-
tion provision the controversial article 12, which was later withdrawn.
China
The existence of a plethora of overlapping data privacy laws has traditionally made compli-
ance a very difficult issue in China. Driven by an increasing number of reports on identitytheft and illegal trade in personal data,12rather than surveillance concerns, China has how-
ever taken steps towards privacy reforms the Resolution relating to Strengthening the Pro-
tection of Information on the Internet of December 2013 includes general rules for internet
service providers (ISPs) and other businesses prohibiting the collection of personal data
without consent and the illegal transfer or sale of personal information to third parties.13In
the same year, the Standardisation Administration and the General Administration of Qual-
ity Supervision, Inspection, and Quarantine published new national standards that prohibit
overseas transfers of data to an entity absent express user consent, government permission,
or other explicit legal or regulatory permission. Despite the voluntary character of these
guidelines, they serve as regulatory baseline for law enforcement and are de facto data lo-
calisation laws for all business sectors.14The Peoples Bank of China (PBOC) has also issued
a Notice to Urge Banking Financial Institutions to Protect Personal Financial Information, 15
which explicitly prohibits off-shore storing, processing or analysis of any personal financial
information of Chinese citizens; meanwhile the Ministry of Industry and Information Tech-
nology (MIIT) has banned collection of personal data without consent or without specific
and clear purpose.16The Telecommunications and Internet Personal User Data Protection
Regulation also requires regular risk impact assessments to be conducted by data processors.
The European Union
In January 2012, the European Commission proposed a reform of the EUs data protection
regime, which is currently based on the 1995 Data Protection Directive. The aim of the new
proposal, dubbed the General Data Protection Regulation (GDPR), is to establish a single
European-wide data protection law. Aside from simplifying administrative procedures and
centralizing supervisory authority, GDPR also introduces strict consent requirements, aright to review, a right to be forgotten, and the obligation for businesses to appoint a data
protection officer (DPO) and perform an annual data protection impact assessment (DPIA).
If implemented, the GDPR reform could lead to a stoppage of cross-border data flows from
the EU to important data processing countries such as the US and India, which are deemed
to have adequate data privacy safeguards in place under the EUs current regime.
Aside from GDPR, the Commission has also adopted a strategy for Unleashing the Potential
of Cloud Computing in Europe. The strategy aims to unify rules and standards related to
cloud computing within Europe. If these standards will be designed in a way that decreases
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
97/355
12
ECIPE OCCASIONAL PAPER
No. 3/2014
the interoperability with other countries regulatory regimes, this could lead to a de facto
data localization.
India
In 2011, the Indian Ministry of Communications and Technology implemented certain pro-
visions of the 2000 Information Technology Act by publishing privacy rules. These Reason-
able Security Practices and Procedures and Sensitive Personal Data or Information Rules
introduced a strict consent requirement that only allows for sensitive personal data to be
transferred abroad when necessary or when the individuals consent has been obtained.17,18
These rules also introduced the right to access and review personal information that a com-
pany holds. The mercantilist intent of the law is clear, as the government of India issued a
clarification to emphasise that the rules do not apply to its expanding outsourcing business. 19
The laws have also been amended with a data retention requirement (with duration at the
discretion of the government) for intermediaries that so far has not been implemented.
National media in India have reported that the National Security Council Secretariat (NSCS)
is considering proposals that incorporate strong elements of data localisation, mandating all
email providers to set up local servers, or that all data generated from within India should be
hosted in these India-based servers and this would make them subject to Indian laws. The
strategy also includes creating an Indian email service and ensuring Internet traffic data is
routed within India as much as possible, including precedents of forced data localisation for
selective cases and services, e.g. BlackBerry mail services in 2012.20
Indonesia
ata protection is covered by Law No. 11 of 2008 regarding Electronic Information and Trans-
action (the EIT Law) and Government Regulation No. 82 of 2012 regarding the Provision ofElectronic System and Transaction (Reg. 82), which went into force on 15 October 2012. In
order to collect and process data, the data controller needs a legitimate reason for collection
and the individuals consent.21Regulation 82 further requires a broad and undefined group
of companies, electronic systems operators for public service to set up a data centre and
disaster recovery centre in Indonesian territory for the purpose of law enforcement and
data protection. The scope of this requirement is unclear however, as electronic systems op-
erators for public service are not clearly defined. Draft Regulation Concerning Registration
Procedure of Electronic System Provider and January 2014 Draft Regulation with Technical
Guidelines for Data Centres contain same ambiguity, although a ministry spokesperson was
quoted saying: [the draft] covers any institution that provides information technology-
based services.22
Korea
In the Republic of Korea, the Personal Information Protection Act (PIPA) has been in force
since 30 September 2011 and covers all sectors. In addition, the sector-specific Act on Promo-
tion of Information and Communication Network Utilisation and Information Protection
(IT Network Act) regulates the collection and use of personal data by IT service providers.23
Under these acts, every data handler (including businesses, individuals and government
agencies) must appoint a data protection officer (DPO), and consent must be obtained both
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
98/355
13
ECIPE OCCASIONAL PAPER
No. 3/2014
for the initial collection and processing of personal data and prior to any transfer abroad or to
third parties. PIPA gives individuals the right to review and delete personal data that pertain
to them and obliges data handlers to notify the data subjects without delay in case of a data
breach. If the number of individuals affected exceeds 10,000, the data handler must also no-
tify the relevant authorities. In addition, Korea prohibits the outsourcing of data-processing
activities to third parties in the financial services industry. Banks can therefore only process
financial information related to Korean customers in-house, either in Korea or abroad.
Vietnam
In 2013, the Vietnamese government issued Decree 72, on Management, Provision, and Use
of Internet Services and Information Content Online, which came into effect on September
1st.24The Decrees main aim seems to have been to tighten the governments grip on the
Internet and limit free expression,25with a broad range of prohibitions under article 5 in-
cluding opposing the state. The Decree requires ISPs to obtain a license and to register with
the Ministry of Information and Communications before providing online services, and all
organisations establishing general websites, social networks and companies providing ser-
vices across mobile networks are required to establish at least one server inside the country
containing the entire history of information posting activities on general information web-
sites () and sharing on social networks.
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
99/355
14
ECIPE OCCASIONAL PAPER
No. 3/2014
ANNEX II
Description of the GTAP8 model
1. The Model
The model applied in this study is GTAP 8, a computable general equilibrium (CGE) mod-
el.26The most recent model setting accounts for inter-sectoral linkages between 129 regions
while capturing inter-regional trade flows of 57 commodities. The framework thus allows
for a general equilibrium analysis of the economic effects (e.g. GDP effects and changes in
trade flows) resulting from the regulation of cross-border data flows. In this model, regional
production is characterized by constant returns to scale and perfect competition. Private de-
mand is represented by non-homothetic consumer demands. The structure of foreign trade
is based on the so-called Armington assumption, which implies imperfect substitutability
between domestic and foreign goods.
The most recent GTAP 8 dataset includes national input-output data as well as trade, tariff
and demand structures. The models base data are primarily benchmarked to 2007. Trade
data are based on 2004 and 2007 values while the reference year of protection data is 2007
(see Narayanan et al 2012).27 Like any applied economic model, this model is based on a
number of assumptions. In order to account for recent changes in regional macroeconomic
variables, the GTAP 8 dataset on the global economy is extrapolated to 2014.
The exogenous variables used for the extrapolation are macroeconomic variables, i.e. the
size of GDP, total population, labour force, total factor productivity and capital endowment
as provided by the well recognised database of the French research center in international
economics (CEPII), which is documented by Four et al (2012).We apply the estimates of
these macroeconomic data projections in order to calculate the best estimate of the global
economy in 2014. Preferences and production structures as described by the models struc-
tural parameters have been left unmodified.
The model we use in this study is comparative static. This model does not account for endog-
enous productivity growth and may thus under-predict welfare effects, economic growth and
increases in trade flows that result from the imposition of NTBs due to regulations of cross-
border data flows.28The interdependence between, on the one hand, productivity growth
and, on the other hand, exports, imports and investment is neglected in static CGE models.
2. Treatment of Investment
GTAP is a pure real goods model that does not account for financial instruments. Thus, the
standard GTAP model does not take into consideration supply-side impacts of capital market
conditions. In the model, investors are represented by a global bank allocating regional sav-
ings and investments around the world. Investment itself is represented by a stock of capitalgoods (CGDS), which is treated as a commodity that is purchased by the global bank and al-
located to regions following a return-equalising rule. The capital goods commodity does not
employ any primary factors of production. It rather absorbs a mix of intermediate goods such
as construction, machinery equipment, vehicles, and services etc. In addition, capital goods
cannot be traded across regions. Instead regional capital goods formation is determined be
regional savings, which are absorbed by the global bank and reallocated to regions thereaf-
ter.29For a detailed description of the treatment of capital goods in GTAP see Malcom (1998).
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
100/355
15
ECIPE OCCASIONAL PAPER
No. 3/2014
In order to estimate the economic impact of decreasing returns on capital due to data locali-
sation barriers to trade, we follow an indirect expected rate of return approach. It is assumed
that the global bank allocates investment across regions in such a way that risk-adjusted rates
of returns are equalised across regions. Thus, in GTAP a change of the expected rate of return
in a given region results in corresponding changes in the amount of regional investment. The
underlying assumption is that equilibrium rates of returns on investment are equal across
regions and equal to a global rate of return. In addition, it is assumed that expected returns
in a specific region will fall as the amount of investment rises. Thus, a difference between the
global rate of return and a regions rate of return triggers a reallocation of investment across
regions until regional rates of investment are equalised again. The difference between risk-
adjusted regional rates of return can be read as a region-specific risk premium decreasing
the regions attractiveness to investors. In line with this assumption, an increase in regional
investment risk reduces capital goods formation and decreases demand for factor inputs to
investment in the region concerned. At the same time, investment would increase in regions
not affected by decreasing investor appetite.
The results of our experiment only have indicative character, meaning that we are not able
to forecast the precise investment effect due to data localisation barriers to trade mainly
for two reasons: 1) The shortcomings in the treatment of investment in GTAP and 2) the
transformation of expected returns on investment into investors risk appetite, which is an
empirical problem in general. Yet, the methodology we apply allows us to forecast and trace
the direction of investment flows.
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
101/355
16
ECIPE OCCASIONAL PAPER
No. 3/2014
BIBLIOGRAPHY
Andriamananjara, Dean, Feinberg, Ferrantino, Ludema, Tsigas (2004), The Effects of Non-
Tariff Measures on Prices, Trade, and Welfare: CGE Implementation of Policy-Based Price
Comparisons, USITC Economics Working Paper No. 2004-04-A.
Asia Sentinel, Indonesia May Force Web Giants to Build Local Data Centers, 27.01.2014, ac-
cessed at http://www.asiasentinel.com/econ-business/indonesia-web-giants-local-data-
centers/, 12.04.2014.
Cassells, Meister, Cost and trade impacts of environmental regulations: effluent control and
the New Zealand dairy sector. The Australian Journal of Agricultural and Resource Econom-
ics 45 (2), p. 257-274, 2001
A. Chander, U. P. L, Breaking the Web: Data Localization vs. the Global Internet, Working
Paper 2014-1, California International Law Center, 12.03.2014, accessed at http://ssrn.com/
abstract=2407858, 20.03.2014.
Christensen, L., A. Colciago, F. Etro and G. Rafert (2013) The Impact of the Data Protection
Regulation in the EU, Intertic Policy Paper, Intertic.
Covington & Burling LLP, China Releases New National Standard For Personal Information
Collected Over Information Systems, E-alert Global Privacy & Data Security, 15.02.2013, ac-
cessed at http://www.cov.com/files/Publication/.../China_Releases _New_National_Stand-
ard_for_Personal_Information_Collected_Over_Information_Systems.pdf, 12.04.2014.
G. Cheah, Protection of personal financial information in China, Norton Rose Fulbright,
October 2011, accessed at http://www.nortonrosefulbright.com/knowledge/publica-
tions/56148/protection-of-personal-financial-information-in-china, 12.04.2014.
China Copyright and Media, National Peoples Congress Standing Committee Decision
concerning Strengthening Network Information Protection, 28.12.2012, accessed at http://chinacopyrightandmedia.wordpress.com/2012/12/28/national-peoples-congress-stand-
ing-committee-decision-concerning-strengthening-network-information-protection/,
20.01.2014.
China Copyright and Media, Telecommunications and Internet Personal User Data Pro-
tection Regulations, 16.07.2013, accessed at: http://chinacopyrightandmedia.wordpress.
com/2013/07/16/telecommunications-and-internet-user-individual-information-protec-
tion-regulations/, 20.01.2014.
L. Clark, Tim Berners-Lee: we need to re-decentralise the web, Wired, 06.02.2014, accessed
at http://www.wired.co.uk/news/archive/2014-02/06/tim-berners-lee-reclaim-the-web,
20.03.2014.
Cushman & Wakefield, Data Centre Risk Index 2013, accessed at: http://www.cushman-
wakefield.pt/en-gb/research-and-insight/2013/data-centre-risk-index-2013
DLA Piper, Data Protection Laws of the World, accessed at http://files.dlapiper.com/files/
Uploads/Documents/Data_Protection_Laws_of_the_World_2013.pdf, 15.04.2014.
Elffers, Heijden, Hezewijk, Explaining Regulatory Non-compliance: A Survey Study of
Rule Transgression for Two Dutch Instrumental Laws, Applying the Randomized Response
Method, Journal of quantitative criminology, volume: 19 (2003), pp. 409 439, accessed
-
8/9/2019 IICFReport AppendixA-E-Final 10Dec Web
102/355
17
ECIPE OCCASIONAL PAPER
No. 3/2014
from [http://igitur-archive.library.uu.nl/fss/2007-0206-201216/64.%20Explaining%20regu-
latory%20non-compliance.pdf], 2003
Frost & Sullivan, Insights into Big Data and Analytics in Brazil, 2014
Koszerek, D., Havik, K., McMorrow, K., Rger, W., Schnborn, F. (2007), An Overview of the
EU KLEMS Growth and Productivity Accounts
Foure, Benassy-Quere, Fontagne (2010), The world economy in 2050: a tentative picture,
CEPII Working paper 2010-27.
Hertel, Tsiga, Structure of GTAP. In Global Trade Analysis : Modeling and Applications. Ed.
Thomas W. Hertel, Purdue University. Cambridge University Press. 1997
Hunton & Williams LLP, Recent Data Breach Events in China, Privacy and Information Se-
curity Law Blog, 31.12.2013, accessed at https://www.huntonprivacyblog.com/2013/12/arti-
cles/recent-data-breach-events-china/, 20.01.2014.
Hunton & Williams LLP, Outsourcers Exempt from Indias Privacy Regulations, Privacy and
Information Security Law Blog, 24.08.2011, accessed at https://www.huntonprivacyblog.
com/2011/08/articles/outsourcers-exempt-from-indias-privacy-regulations/, 18.03.2014.
Jorgenson, Ho, Stiroh, Information Technology and the American Growth Resurgence
(Cambridge, MA: MIT Press), 2005
Library of Congress, Global Legal Monitor: Vietnam: Controversial Internet Decree in Effect,
06.09.2013, accessed at http://www.loc.gov/lawweb/servlet/lloc_news?disp3_l205403690_
text, 13.12.2013.
Malcolm, G. (1998), Modeling Country Risk and Capital Flows in GTAP, GTAP Technical
Paper No. 13.
V. Manuturi, B. Gokkon, Web Giants to Build Data Centers in Indonesia?, 15.01.2014, The
Jakarta Globe, accessed at http://www.thejakartaglobe.com/news/web-giants-to-build-
data-centers/, 02.03.2014
C. C. Miller, Google Pushes Back Against Data Localization, Bits Blog New York Times,
24.01.2014, accessed at http://bits.blogs.nytimes.com/2014/01/24/google-pushes-back-
against-data-localization/, 27.03.2014.
Narayanan, G., Badri, Angel A. and McDougall, R., Eds., Global Trade, Assistance, and Pro-
duction: The GTAP 8 Data Base, Center for Global Trade Analysis, Purdue University, 2012
Rakotoarisoa, M. A. (2011), A Contribution to the Analyses of the Effects of Foreign Agricul-
tural Investment on the Food Sector and Trade in Sub-Saharan Africa.
M. Palmedo, Vietnams Decree 72 on Internet Services Aims to Fight Piracy, Raises Hu-
man Rights Concerns, infojustice.org, 02.09.2013, accessed at http://infojustice.org/ar-
chives/30620, 27.03.2014.
PTI, RIM finally sets up Blackberry server in Mumbai, 20.02.2012, accessed at http://
timesofindia.indiatimes.com/tech/tech-news/RIM-finally-sets-up-BlackBerry-server-in-
Mumbai/articlesh