Internet Rules: Unboxing Digital Laws in Southeast Asia, 2021
The Internet Rules: Unboxing digital laws in Southeast Asia workshop is an opportunity for those working on issues relating to ICT laws in Southeast Asia to understand fundamentals of legal methodology, research and advocacy and get a sense of the ICT laws ecosystem. The workshop will also explore cross jurisdictional analysis of laws and jurisprudence in the region.
- 🌟 Workshop Overview
- 🔖 Agenda
- Sessions' briefer & Curriculum
- 💻 Zoom link to workshop and instructions to use zoom
- 📝 Daily summaries
- ⌨️ Organisers' contact details
- 💡 Workshop Sessions
- Day 1️⃣ | Session 1: Law and Jurisprudence 101: Introduction and Basic Concepts
- Day 1️⃣ | Session 2: Introduction to ICT law ecosystem
- Day 2️⃣ | Session 3: Error 403: Access, telecom policy and network shutdowns
- Day 2️⃣ | Session 4: Under lock and key: Privacy, surveillance and data protection
- Day 3️⃣ | Session 5: Speaking up: Exploring SEA laws on protecting freedom of expression
- Day 3️⃣ | Session 6: Unpacking hate speech, defamation and misinformation
- Day 4️⃣ | Session 7: Managing online spaces: Content moderation and intermediary liability
- Day 4️⃣ | Session 8: Protecting the vulnerable: Special provisions for gender and marginalised groups
- Day 5️⃣ | Session 9: Generating new knowledge: Legal research methodology and process
- Day 5️⃣ | Session 10: Spreading the message: Strategies on advocacy and communication
- 🔊 Workshop policies & governing rules
- 👤 Resource persons' profiles
- Session 1: Law and Jurisprudence 101: Introduction and Basic Concepts
- Session 2: Introduction to ICT law ecosystem
- Session 3: Error 403: Access, telecom policy and network shutdowns
- Session 4: Under lock and key: Privacy, surveillance and data protection
- Session 5: Speaking up: Exploring SEA laws on protecting freedom of expression
- Session 6: Unpacking hate speech, defamation and misinformation
- Session 7: Managing online spaces: Content moderation and intermediary liability | Panel
- Session 8: Protecting the vulnerable: Special provisions for gender and marginalised groups | Panel
- Session 9: Generating new knowledge: Legal research methodology and process
- Session 10: Spreading the message: Strategies on advocacy and communication
- 🎧 Workshop playlist
- 🤩 Memes Collection
🌟 Workshop Overview
🔖 Agenda
🕝 Please check the UTC Time Converter to know the time of the sessions in your local time zone!
Sessions' briefer & Curriculum
The entire curriculum for the workshop can be downloaded here.
Introduction
As emerging information and communications technologies (ICTs) begin to challenge, modulate and fundamentally alter everyday life, legal and policy frameworks must adapt to better capture social, economic and political vectors driving this change. With a heterogenous mass of users increasingly coming online, countries in Southeast Asia have an unique opportunity to drive this change and use technology to improve the lives of individuals. In doing so, they can set the benchmark for other emerging economies grappling with the prospect of technological change.
However, the development and governance of these ICTs must evolve keeping in mind the aspirations and rights of individuals and communities. Over the past decade, several laws and policies have been enacted by states to address challenges. These regulations have a significant impact on an array of rights guaranteed by national and international law.
This course seeks to equip participants with knowledge of the fundamental legal questions that need to be answered from a rights-based perspective when uncovering this form of technological change and the legal methods that are required to answer these questions.
Substantive sessions
Day 1, 20 September 2021
Session 1: Law and jurisprudence 101: Introduction and basic concepts
Resource person: Emerlynne Gil
Time: 3:30 - 5:30 AM UTC
Laws, and jurisprudence interpreting them, are critical to the study of any field. Understanding fundamental concepts of law and jurisprudence are essential for engaging in digital rights research and advocacy for all. This unit is an introductory session designed for participants, especially non-lawyers, to get a foundational understanding of how legal instruments, institutions and systems work. It aims to equip participants with fundamental skills and information needed to access the other sessions and navigate digital rights advocacy and policy work in their countries.
In this session, participants should aim to uncover debates around the nature of law, be able to distinguish between legal systems and institutions, appreciate core constitutional doctrines and synthesise various sources of law. This session will also help participants understand the analysis of legal provisions and jurisprudence with the help of tools, databases and methods to access them.
--------------------------------------------------------------------------------------------------------------------------
Session 2: Introduction to ICT law ecosystem
Resource person: Indri D. Saptaningrum
Time: 6:30 - 8:30 AM UTC
The last decade has seen a surge of legislation, policy instruments and jurisprudence in Southeast Asia. These developments will shape the future of the digital ecosystem both regionally and globally. These laws and regulations combined with other instruments dictate how ICTs are governed. This has tremendous implications on our rights. Therefore, this unit seeks to provide a high-level understanding of the legal ecosystem in Southeast Asia which regulates ICTs and user experience.
The objective of this unit is to summarise regulations, including legislation and policies as applicable, used to govern different aspects of the internet and online experience. Participants will leave the session with an appreciation of the framework within which ICT laws are created, and the powers and processes that create them. They will also have a broad understanding of the common opportunities and challenges across sectors and countries as a result of these regulations.
-----------------------------------------------------------------------------------------------------------------------
Day 2, 21 September 2021
Session 3: Error 403: Exploring access, telecom policy and network shutdowns
Resource persons: Edmon Chung & Damar Juniarto
Time: 3:30 - 5:30 AM UTC
Access to the internet is intrinsic to exercising other rights. The digital divide between urban and rural areas has significantly impeded the ability of all people to untap the potential of ICTs. While most access to the internet has been provided by corporations, either state or privately owned, the space for democratising ICT infrastructure is far from being realised in Southeast Asia. Nations, particularly emerging economies, rely on equitable access to digital infrastructure both for economic growth and welfare. To facilitate this, countries have instituted a variety of laws and policies that enable both private and public vendors to carry out these services, although some of these policies have been criticised for unduly disenfranchising communities who need it most. With the highest number of network shutdowns and a significant gender-based digital divide, several sections of society remain discriminated against in being able to obtain meaningful access to the internet. However, there have been positive developments in the region, including recognition of access as a right and pronouncements that recognise the importance of access.
The first part of this unit is designed to help understand meaningful access and the regulatory framework, including laws and policies, that enable access to the internet or connectivity. Participants will be exposed to international discussions and jurisprudence from the region that recognise the significance of access. The second part of the unit will focus on the unique problem of network shutdowns and its consequences. Participants will be familiarised with laws and regulations used to impose government-mandated disruptions of internet access. This part of the session will provide participants with a factual primer on network shutdowns to appreciate the legal challenges and evolving jurisprudence on the issue.
--------------------------------------------------------------------------------------------------------------------------------
Session 4: Under lock and key: Privacy, surveillance and data protection
Resource person: Jam Jacob
Time: 6:30 - 8:30 AM UTC
Privacy and data protection have been recognised as two of the most important human rights in the digital age. Recent technological advances have changed the manner in which individuals interact with such a complex ecosystem. Nation states have launched mass surveillance programmes that have unprecedented capability of recording information about citizens’ communication and activity.
This unit will identify the different facets of an individual’s privacy that are impacted in the digital age and map regulations that are intended to protect those rights. It will examine the impact of emerging technologies on decisional privacy by analysing the different forms of surveillance currently deployed in society and the legal frameworks enabling them. Since the increasing use of personal data in the ICT space warrants a closer look at data protection legislations, we will look at the current level of protection offered by legislations and examine if they have been adapted to address the informational privacy harms arising out of the technological changes.
-------------------------------------------------------------------------------------------------------------------------------------
Day 3, 22 September 2021
Session 5: Speaking up: Exploring SEA laws on protecting freedom of expression
Resource person: Wahyudi Djafar
Time: 3:30 - 5:30 AM UTC
Freedom of expression is the bedrock of any democracy. In the current, polarised, political times, our communication and political conversations are increasingly shifting online. The internet is a critical enabler and a tool for citizens, activists and journalists to express themselves. It is therefore important to know the laws and regulations that protect our speech, and the laws and regulations that limit it.
Accordingly, this unit seeks to familiarise participants with the different laws protecting freedom of speech and expression across Southeast Asia, and the restrictions on freedom of expression that are common in these legal systems. The session will also look at the brief history of these laws and restrictions, and how they surface both offline and online in contemporary times.
------------------------------------------------------------------------------------------------------------------------
Session 6: Unpacking hate speech, defamation and misinformation
Resource person: Herlambang Wiratraman
Time: 6:30 - 8:30 AM UTC
Limitations to freedom of expression have been difficult to define in precise terms given that a lot hinges on context. This has often become an excuse for unwarranted action and censorship against inconvenient speech in the name of misinformation and national security. On the other hand, hate speech has become rampant in the region with little effort from the state to curb or counter it. The laws that seek to regulate or prohibit such speech are vague, overly broad and riddled with inconsistencies.
This session will provide an overview of the provisions relating to hate speech, misinformation and defamation in the region. Participants will understand the criticism against these laws and how they differ from international standards. Most importantly, efforts will be made to help identify and distinguish legitimate speech from prohibited speech.
-----------------------------------------------------------------------------------------------------------------------
Day 4, 23 September 2021
Session 7: Managing online spaces: Content moderation and intermediary liability
Moderator: Pavitra Ramanujam
Time: 3:30 - 5:30 AM UTC
The private sector, and more specifically social media platforms, wield great power and decision making on what content gets to stay online and what is taken down. The increasing quantity and diversity of sources of online speech hosted by internet platforms coupled with the dangerous impact and consequences caused by the spread of misinformation and hate speech have led to a growing inclination among governments across the globe to demand more aggressive intervention by platforms in filtering the content they host. However, these moves have been challenged by experts as having a chilling effect on free speech, possibly amounting to censorship while also imposing unreasonable expectations on platforms.
This session, which will be in the form of a panel discussion, will uncover the approach taken by countries and the private sector in the region to address content moderation and intermediary liability, covering regulatory tools used by governments, community standards established by private actors, jurisprudence laid down by courts, and concerns identified by scholars. The core objective of this session is for participants to unpack how individual rights and public interest are dealt with by platforms under the law.
--------------------------------------------------------------------------------------------------------------------------
Session 8: Protecting the vulnerable: Special provisions for gender and marginalised groups
Moderator: Gayatri Khandhadai
Time: 6:30 - 8:30 AM UTC
Law and policy making have disparate impacts on different groups, depending on axes such as gender, income, caste, disabilities and geography. These regulations can often determine the nature and extent to which communities and individuals influence and are impacted by policy making. These inequalities merit specific attention across the domains of technology policy – from digital access to protection of digital rights. This module will introduce these concepts in the context of Southeast Asia, with particular focus on gender as a cross-cutting theme across forms of inequality.
This unit, which will be in the form of a panel discussion, is designed to get participants familiar with special provisions that protect gender and vulnerable groups in ICT spaces and how these provisions may be used to target their agency, and to get participants to understand how a feminist and rights perspective could be used in the process of legal analysis. It will adopt a feminist lens to critique legal systems and jurisprudence that govern technology, while also discussing provisions that are designed to protect vulnerable groups from negative impact. The experiences of vulnerable groups as they adopt and resist technology and data systems will be highlighted. The session will also discuss the role of marginalised groups in policy making, including reimagining technology law and policy through feminist principles as they are mobilised to create alternative feminist realities.
---------------------------------------------------------------------------------------------------------------------
Day 5, 24 September 2021
Session 9: Generating new knowledge: Legal research methodology and process
Resource persons: Dhevy Sivaprakasam, Anna Bueno & Emilie Pradichit
Time: 3:30 - 5:30 AM UTC
Researching digital rights is often incomplete without addressing laws and policies that further exacerbate restrictive environments or fail in curbing violations. Despite strong constitutional guarantees in the region, we have witnessed monumental challenges in realising rights in online spaces. Sociological and intersectional approaches are essential in reflecting the human impact of laws and policies. Ethical research practices behind evidence-based credible research are critical for engaging in advocacy for changes in regulatory frameworks.
This unit will seek to help participants unearth practices for developing a research process by addressing key issues around developing research questions, methods and ethical practices. The session will also provide an overview on collecting data and engaging in developing a narrative in the research. This will be followed by a breakout session where participants will hear from the developers of two key research projects on policies from the region discussing the process they followed and the challenges they faced.
---------------------------------------------------------------------------------------------------------------------------
Session 10: Spreading the message: Strategies on advocacy and communication
Resource persons: Edmund Bon, Nurina Savitri & Nalini Elumalai
Time: 6:30 - 8:30 AM UTC
Strategic advocacy with courts, legislatures and international forums have played an instrumental role in shaping the digital policy ecosystem, and in developing a free, open and rights-respecting internet. The success of strategic advocacy is contingent on the political and social set-up in each country, but common themes and tools apply across nations. It is essential therefore to hear from individuals who have been involved in campaigns, policy processes and strategic litigation across a variety of digital issues to gain different perspectives.
This unit will start with an overview of the different kinds of advocacy initiatives that groups have undertaken to effect changes in both enacted ICT laws and draft laws. Discussions will include addressing stakeholders and developing documents for the initiatives. Strategies for public campaigning and key considerations for engaging in strategic litigation will be shared. This will be followed by two breakout groups. One group will specifically look at how public campaigning can be developed, while the other group will dive into strategic policy advocacy targeting decision makers.
💻 Zoom link to workshop and instructions to use zoom
Our Zoom space
Our workshop will take place at: https://apc-org.zoom.us/j/88118144206
Tips for participation in Zoom sessions
- Update your Zoom client to the latest version. The zoom app takes 5 minutes to install, so please set it up before the sessions.
- Please join the sessions before they start (we have 60 minutes for that), so we can assist you if you experience any issue.
- Please use your real name or nickname, so we can know who you are and let you in. You can change your name after you have joined.
- Please use headphones with microphone rather bluetooth headphones where possible.
- Please mute your microphone when entering a session and unmute only when you want to speak.
- If you need a break during the sessions, take it.
How to use zoom
Join the workshop session by opening the link in your browser, a client or an app. You will be redirected to the correct zoom room with the waiting room. When the host will adds you to the meeting you will be able to see the main screen.
Configure Audio
If your audio is not working, please check your settings.
For Audio click on the up arrow next to Unmute/Mute button and check if your Microphone and Speaker have been correctly configured.
To test Speaker and Microphone click on Audio Settings in the same menu and click on the link Test Speaker and Microphone.
In the window that opens you can Test the Speaker and Microphone and select the volume.
Configure Video
If your video is not working when you click Start Video, please check your settings.
Click on the up arrow next to Start Video and see if Camera is selected.
If you would like to examine settings in more detail, click on the last option Video Settings... and the following window will open.
Here you can define how your video should be presented and we recommend you select the option Hide Non-video Participants so that you will be able to see only the videos of participants who have their cameras enabled.
Chat
Zoom enables you to participate in public chat and also send private messages to specific participants. To send a private message select the participant in the dropdown field which is by default set to Everyone (for public chat).
Share screen...
If you select the wrong window you can always stop sharing and then start sharing the intended one.
📝 Daily summaries
Summaries of each day's sessions will be shared here!
⌨️ Organisers' contact details
The Challenge team can be reached at challenge@apc.org!
💡 Workshop Sessions
Day 1️⃣ | Session 1: Law and Jurisprudence 101: Introduction and Basic Concepts
Date: Monday, 20 September 2021 [3:30 am - 5:30 am UTC]
Resource Person: Emerlynne Gil
Laws, and jurisprudence interpreting them, are critical to the study of any field. Understanding fundamental concepts of law and jurisprudence are essential for engaging in digital rights research and advocacy for all. This unit is an introductory session designed for participants, especially non-lawyers, to get a foundational understanding of how legal instruments, institutions and systems work. It aims to equip participants with fundamental skills and information needed to access the other sessions and navigate digital rights advocacy and policy work in their countries.
In this session, participants should aim to uncover debates around the nature of law, be able to distinguish between legal systems and institutions, appreciate core constitutional doctrines and synthesize various sources of law. This session will also help participants understand the analysis of legal provisions and jurisprudence with the help of tools, databases and methods to access them.
Key points of discussion:
- What is the significance of law?
- What is rule of law and rule by law?
- What are the legal systems broadly in the ASEAN countries?
- What is the process for enactment of laws and their enforcement - who is responsible for what?
- How do you break down a legal section or clause and analyse it?
- How do the same provisions of law compare across jurisdictions?
- What is the value of a judgment?
- How do we understand the different components of a judgment?
- Where can you find ICT laws and judgments?
Session exercise:
This session will have four breakout groups of 6 participants each, with two groups working on the same exercise. Groups will be pre-assigned by the organising team.
Exercise 1A: Groups 1 & 2: Understanding the legal systems in Southeast Asia
Groups 1 & 2 will be made up of persons from different countries. They will have preset questions about the legal systems and will share with each other answers. These will include questions on how a law gets made, courts’ power to declare a law illegal, whether a citizen can challenge a law and if international law is enforceable.
Group 1 Exercise Sheet
Group 2 Exercise Sheet
Exercise 1B: Groups 3 & 4: Understanding legal provisions
Groups 3 & 4 will be made up of persons from different countries. The groups will each get two legal provisions. They will read the provision and discuss what that each provision means. They will also analyse what they like about the provision and what concerns they have about it.
Group 3 Exercise Sheet
Group 4 Exercise Sheet
Reference materials:
- Table 1 - Legal systems in Southeast Asian countries
- Table 2 - Constitutional guarantees for different rights in Southeast Asian countries
- CYRILLA database (digital rights legal resources)
Suggested readings:
- Oxford Library Guides
- Types of Legal Systems, University of Ottawa
- Piotr Mikuli, Seperation of Power (March 2016)
- The Economist, What is the difference between common and civil law? (July 2013)
- What is public international law? How are monist and dualist systems different?
- Cornell Law School, Stare decisis
- Rod Hollier, The ultimate guide to the ratio decidendi and obiter dictum
- What is a constitution?
- Fundamental rights
- What are human rights and their instruments?
Additional readings:
- Zachary Holladay, Public interest litigation in India as a paradigm for developing nations
- International law in municipal frameworks
- Guide to statutory interpretation
📌 Session Presentation
🔖 Read Day 1 Summary Here
Day 1️⃣ | Session 2: Introduction to ICT law ecosystem
Date: Monday, 20 September 2021 [6:30 am - 8:30 am UTC]
Resource Person: Indri D. Saptaningrum
The last decade has seen a surge of legislation, policy instruments and jurisprudence in Southeast Asia. These developments will shape the future of the digital ecosystem both regionally and globally. These laws and regulations combined with other instruments dictate how ICTs are governed. This has tremendous implications on our rights. Therefore, this unit seeks to provide a high-level understanding of the legal ecosystem in Southeast Asia which regulates ICTs and user experience.
The objective of this unit is to summarise regulations, including legislation and policies as applicable, used to govern different aspects of the internet and online experience. Participants will leave the session with an appreciation of the framework within which ICT laws are created, and the powers and processes that create them. They will also have a broad understanding of the common opportunities and challenges across sectors and countries as a result of these regulations.
Key points of discussion:
- What are the key laws that impact and regulate internet functionality?
- What other instruments are used?
- What is the relationship of these instruments to the different laws?
- Who is responsible for enacting the different instruments and how can we engage with them?
- What are the broad kinds of problems with these laws and instruments for users?
- How do laws enter the internet governance ecosystem?
Session exercise:
This session will have four breakout groups of 6 participants each, with two groups working on the same exercise. Groups will be pre-assigned by the organising team.
Exercise 2A: Groups 1 & 2: Understanding authorities that make ICT laws
Groups 1 & 2 will be made up of persons from different countries. Participants in these groups will list out the different authorities that make ICT law and regulations in their countries. They will give examples of the kinds of laws or regulations such authorities have created. The group will then talk about whether there are similarities in the authorities across different countries in the region and if they have had experience of interacting with these authorities.
Exercise 2B: Groups 3 & 4: Understanding framework of laws that govern ICTs
Groups 3 & 4 will be made up of persons from different countries. Participants from each group will each list out the laws that they know of which regulate online spaces and ICTs. They will also list the areas that each of the laws touch upon. The group will discuss the list to see if they have similar or different ICT laws in their countries.
Reference materials:
- Table 3 - Laws governing the ICT ecosystem in Southeast Asian countries
- Table 4 - Resources and databases on ICT and jurisprudence
- Table 5 - International human rights law landscape
Suggested readings:
- The APC ICT Policy Handbook (Second Edition), Association for Progressive Communication
- Frank H. Easterbrook, Cyberspace and the Law of the Horse
- Tim Wu and Jack L. Goldsmith, Who controls the internet?
- How to find Digital Rights Laws on CYRILLA?
- United Nations resolutions, decisions and reports on human rights and technology
📌 Session Presentation
🔖 Read Day 1 Summary Here
Day 2️⃣ | Session 3: Error 403: Access, telecom policy and network shutdowns
Date: Tuesday, 21 September 2021 [3:30 am - 5:30 am UTC]
Resource Persons: Edmon Chung & Damar Juniarto
Access to the internet is intrinsic to exercising other rights. The digital divide between urban and rural areas has significantly impeded the ability of all people to tap the potential of ICTs. While most access to the internet has been provided by corporations, either state or privately owned, the space for democratizing ICT infrastructure is far from being realised in Southeast Asia. Nations, particularly emerging economies, rely on equitable access to digital infrastructure both for economic growth and welfare. To facilitate this, countries have instituted a variety of laws and policies that enable both private and public vendors to carry out these services, although some of these policies have been criticised for unduly disenfranchising communities who need it most. With the highest number of network shutdowns and significant gender-based digital divide, several sections of society remain discriminated against in being able to obtain meaningful access to the internet. However, there have been positive developments in the region, including recognition of access as a right and pronouncements that recognise the importance of access.
The first part of this unit is designed to help understand meaningful access and the regulatory framework, including laws and policies, that enable access to the internet or connectivity. Participants will be exposed to international discussions and jurisprudence from the region that recognise the significance of access. The second part of the unit will focus on the unique problem of network shutdowns and its consequences. Participants will be familiarised with laws and regulations used to impose government-mandated disruptions of internet access. This part of the session will provide participants with a factual primer on network shutdowns to appreciate the legal challenges and evolving jurisprudence on the issue.
Key points of discussion on access and telecom infrastructure:
- What is access?
- What are the kinds of regulations and laws that govern access to the internet?
- What other laws and judgments from the region impact access?
- What laws and policies impact the democratisation of internet infrastructure including the setting up of community networks?
- Is access to the internet receiving growing recognition as a legal or fundamental right? Why?
Key points of discussion on network shutdowns:
- What are internet shutdowns?
- What laws, justifications, authorities and means are used to impose them?
- What are international bodies saying about internet shutdowns?
- What have courts said on the issue of internet shutdowns?
Reference materials:
- Table 3 - Laws and regulations governing the ICT ecosystem in Southeast Asian countries
- Table 4 - Resources and databases on ICT and jurisprudence
- Table 5 - International human rights law landscape
Suggested readings:
- APC, Redes A.C., Universidad Politécnica de Catalunya, Expanding the telecommunications operators ecosystem: Policy and regulatory guidelines to enable local operators (September 2020)
- Aayush Rathi, Arindrajit Basu and Anoushka Soni, Dialling in the Law: A comparative assessment of jurisprudence on internet shutdowns (November 2020)
- Report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association, Ending Internet shutdowns: a path forward
Additional readings:
- Ritu Srivastava, Mapping the regulatory environment of community networks in India, Myanmar and Philippines (August 2019)
- [Podcast] Chips with Everything podcast, 2020, Turning off the internet, The Guardian
📌 Edmon Chung - Session Presentation
📌 Damar Juniarto - Session Presentation
🔖 Read Day 2 Summary Here
Day 2️⃣ | Session 4: Under lock and key: Privacy, surveillance and data protection
Date: Tuesday, 21 September 2021 [6:30 am - 8:30 am UTC]
Resource Person: Jam Jacob
Privacy and data protection have been recognised as two of the most important human rights in the digital age. Recent technological advances have changed the manner in which individuals interact with such a complex ecosystem. Nation states have launched mass surveillance programs that have unprecedented capability of recording information about citizens’ communication and activity.
The objective of this unit is to summarise regulations pertaining to privacy, surveillance and data protection used to govern different aspects of the internet and online experience. This unit will identify the different facets of an individual’s privacy that are impacted in the digital age and map regulations that are intended to protect those rights. It will examine the impact of emerging technologies on decisional privacy by analysing the different forms of surveillance currently deployed in society and the legal frameworks enabling them. Since the increasing use of personal data in the ICT space warrants a closer look at the data protection legislations, we will look at the current level of protection offered by legislations and examine if they have been adapted to address the informational privacy harms arising out of the technological changes.
Key points of discussion on privacy and surveillance:
- What is privacy and what is the international law position on it?
- Privacy protection in constitution and other laws in Southeast Asia
- What are the key concerns on privacy in the region?
- What are the key issues with surveillance and laws that regulate it?
Key points of discussion on data protection:
- What is data protection?
- What are the key legal concepts around data protection?
- Do data protection laws in southeast Asia sufficiently protect individuals?
- What are the gaps that need to be addressed in data protection laws in the region?
Session exercise:
This session will have four breakout groups of 6 participants each, with two groups working on the same exercise.
Exercise 4A: Groups 1 & 2: Data protection law analysis
The groups will be made of persons from different countries, and each group will assume the role of law-makers! The groups will talk about the ideal components of a data protection legislation in their countries and come back with a list of things they will include and a list of things they will avoid in a data protection law.
Exercise 4B: Groups 3 & 4: Surveillance law analysis
The groups will be made of persons from different countries, and each group will assume the role of law-makers! The groups will talk about the ideal components of a surveillance regulation or legislation in their countries and come back with a list of things they will include and a list of things they will avoid in a surveillance law.
Reference materials:
- Table 3 - Laws and regulations governing the ICT ecosystem in Southeast Asian countries
- Table 4 - Resources and databases on ICT and jurisprudence
- Table 5 - International human rights law landscape
- Table 2 - Constitutional guarantees
Suggested readings:
- Graham Greenleaf, Global Data Privacy Laws 2021: Despite COVID Delays, 145 Laws shows GDPR Dominance
- Shoshana Zuboff, Surveillance, capitalism, VPRO Documentary
- General Data Protection Regulation
- OECD Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data
Additional readings:
- APEC Privacy Framework
- The Fair Information Practice Principles
- The failure of Fair Information Practice Principles
- Incompatible: The GDPR in the Age of Big Data
- A critique of consent in Information Privacy
- A Contextual Approach to Privacy Online
📌 Session Presentation
🔖 Read Day 2 Summary Here
Day 3️⃣ | Session 5: Speaking up: Exploring SEA laws on protecting freedom of expression
Date: Wednesday, 22 September 2021 [3:30 am - 5:30 am UTC]
Resource Person: Wahyudi Djafar
Freedom of expression is the bedrock of any democracy. In the current, polarized, political times, our communication and political conversations are increasingly shifting online. The internet is a critical enabler and a tool for citizens, activists and journalists to express themselves. It is therefore important to know the laws and regulations that protect our speech, and the laws and regulations that limit them.
Accordingly, this unit seeks to familiarize participants with the different laws protecting freedom of speech and expression across Southeast Asia, and the restrictions on freedom of expression that are common in these legal systems. The session will also look at the brief history of these laws and restrictions, and how they surface both off-line and on-line in contemporary times.
Key points of discussion:
- What are the guarantees for freedom of expression in Southeast Asian countries?
- What standards guide the restriction of freedom of expression including international instruments?
- What are the key laws that regulate freedom of expression online?
- What are the kinds of expressions that are commonly criminalised in the region?
- What laws are used to target these forms of expression and what are the distinctions in the provisions?
- What are the judicial standards and pronouncements on these provisions?
Session exercise:
This session will have four breakout groups of 6 participants each. Groups will be pre-assigned by the organising team.
Exercise 5: Groups 1-4: Understanding laws used to curtail freedom of expression
The groups will be made of persons from different countries. Participants from each group will identify the most commonly used laws against freedom of expression, and discuss how these laws are used and the different concerns with how they are used.
Reference materials:
- Table 3 - Laws and regulations governing the ICT ecosystem in Southeast Asian countries
- Table 4 - Resources and databases on ICT and jurisprudence
- Table 5 - International human rights law landscape
- Table 2 - Constitutional guarantees
Additional references:
- Comparison of the Constitutional Guarantee of the Freedom of Expressions in the Southeast Asian Countries
-
Challenge of the Freedom of Expressions in Southeast Asia: Law Comparison
- Three Part Test of the Limitation of Freedom of Expressions
Suggested readings:
- Unshackling expression, 2017 report, Unshackling Expression: A Study on Laws Criminalising Expression Online in Asia, GISWatch 2017 (Association for Progressive Communications)
- Unshackling Expression: the Philippines Report 2020 (Association for Progressive Communications)
- Dictating the Internet: Curtailing Free Expression, Opinion and Information Online in South east Asia, International Commission of Jurists
- Irine Putranto, Sharly Chan and Siena Anstis, On/offline: Multidimensional threats faced by the environmental human rights defender in South East Asia
- Klonick, Kate. 2018. “The New Governors: The People, Rules and Processes Governing Online Speech.” Harvard Law Review 131: 73.
- Wired.com, The Quest to Topple Science-Stymying Academic Paywalls (April 2019)
- Columbia Journalism Review, Infection and Repression (September 2020)
📌 Session Presentation
🔖 Read Day 3 Summary Here
Day 3️⃣ | Session 6: Unpacking hate speech, defamation and misinformation
Date: Wednesday, 22 September 2021 [6:30 am - 8:30 am UTC]
Resource Person: Herlambang Wiratraman
Limitations to freedom of expression have been difficult to define in precise terms given that a lot hinges on context. This has often become an excuse for unwarranted action and censorship against inconvenient speech in the name of misinformation and national security. On the other hand, hate speech has become rampant in the region with little efforts from the state to curb or counter it. The laws that seek to regulate or prohibit such speech are vague, over broad and riddled with inconsistencies.
This session will provide an overview of the provisions relating to hate speech, defamation, misinformation and national security in the region. Participants will understand the criticism against these laws and how they differ from international standards. Most importantly, efforts will be made to help identify and distinguish legitimate speech from prohibited speech.
Key points for discussion:
- What are the most common forms of content or expression online that are prohibited?
- What is hate speech? How do laws define it?
- What are the grey areas in deciding if a content is hate speech?
- What is defamation and what are the exceptions?
- What is misinformation and what are the laws that regulate it?
- How are defamation and misinformation laws implemented?
- Do they violate national and international free speech standards?
Session Exercise:
This session will have six breakout groups of 4 participants each, with two groups working on the same exercise.
Exercise 6A: Groups 1& 2: Hate speech
Participants will be provided a series of different statements and asked to discuss if they think what is displayed meets the threshold of hate speech. The groups will discuss within themselves for both sides of the argument for each series of statements.
Exercise 6B: Groups 3 & 4: Defamation
Participants will be provided a series of different statements and asked to discuss if they think what is displayed meets the threshold of defamation. The groups will discuss within themselves for both sides of the argument for each series of statements.
Exercise 6C: Groups 5 & 6: Misinformation
Participants will be provided a series of different statements and asked to discuss if they think what is displayed meets the threshold of misinformation. The groups will discuss within themselves for both sides of the argument for each series of statements.
Reference materials:
- Table 3 - Laws and regulations governing the ICT ecosystem in Southeast Asian countries
- Table 4 - Resources and databases on ICT and jurisprudence
- Table 5 - International human rights law landscape
- Table 2 - Constitutional guarantees
Suggested readings:
- Gayathry Venkiteswaran, “Let the mob do the job”: How proponents of hatred are threatening freedom of expression and religion online in Asia (September 2017)
- Unshackling expression, 2017 report, Unshackling Expression: A Study on Laws Criminalising Expression Online in Asia, GISWatch 2017 (Association for Progressive Communications)
- Unshackling Expression: the Philippines Report 2020 (Association for Progressive Communications)
- International Press Institute, Rush to pass ‘fake news’ laws during Covid-19 intensifying global media freedom challenges (October 2020)
📌 Session Presentation
🔖 Read Day 3 Summary Here
Day 4️⃣ | Session 7: Managing online spaces: Content moderation and intermediary liability
Date: Thursday, 23 September 2021 [3:30 am - 5:30 am UTC]
Panel
The private sector, and more specifically social media platforms wield great power and decision making on what content gets to stay online and what is taken down. The increasing quantity and diversity of sources of online speech hosted by internet platforms coupled with the dangerous impact and consequences caused by the spread of misinformation and hate speech has led to a growing inclination among governments across the globe to demand more aggressive intervention in filtering the content they host. However, these moves have been challenged by experts as having a chilling effect on free speech, possibly amounting to censorship while also imposing unreasonable expectations on platforms.
This session, which will be in the form of a panel discussion, will uncover the approach taken by countries and the private sector in the region to content moderation and intermediary liability covering regulatory tools used by governments, community standards established by private actors, jurisprudence laid down by courts, and concerns identified by scholars. The core objective of this session is for participants to unpack how individual rights and public interest are dealt with by platforms under the law.
Key points of discussion:
- What is content moderation?
- What are the kinds of speech subject to content moderation?
- What are the laws that regulate content moderation and provide for intermediary liability?
- What are the key distinctions in the laws from the Southeast Asian countries?
- What laws and policies exist on content moderation for platforms?
- What are the prominent judicial pronouncements on content moderation and intermediary liability?
Reference Materials:
- Table 3 - Laws and regulations governing the ICT ecosystem in Southeast Asian countries
- Table 4 - Resources and databases on ICT and jurisprudence
- Table 5 - International human rights law landscape
Suggested readings:
- Association for Progressive Communications, APC policy explainer: Platform Responsibility and Accountability (November 2020)
- Global Network Initiative, Addressing Digital Harms AND Protecting Human Rights — GNI Shares Recommendations for Policymakers
- APC, Reorienting rules for rights: A summary of the report on online content regulation by the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression
- Manila Principles on Intermediary Liability
- Santa Clara Principles on Transparency and Accountability in Content Moderation
- UN Guiding Principles on Business and Human Rights
- Asia Pacific Survey on Fake News and Intermediary Liability
- AIC Releases Toolkit on Addressing Online Misinformation Through Legislation – POFMA
Additional readings:
- Comparative Analysis of National Approaches of the Liability of the Internet Intermediaries: Malaysia
- Roberts, Sarah T. 2017. “Content Moderation” edited by L. A. Schintler and C. L. McNeely. Encyclopedia of Big Data.
- Matias, J. Nathan. 2019. “The Civic Labor of Volunteer Moderators Online.” Social Media & Society 5(2):205630511983677.
- Jeong, Sarah. 2016. “The History of Twitter’s Rules.” Motherboard / Vice, January 14.
- Newton, Casey. 2019. “Bodies in seats”/ The Verge, June 19
- The Ringer, The BTS Army and the Transformative Power of Fandom As Activism (June 2020)
📌 Presentation - Jeff Paine
📌 Presentation - Victoire Rio
📌 Presentation - Katherine Chen
🔖 Read Day 4 Summary Here
Day 4️⃣ | Session 8: Protecting the vulnerable: Special provisions for gender and marginalised groups
Date: Thursday, 23 September 2021 [6:30 am - 8:30 am UTC]
Panel Discussion
Law and policy making have disparate impacts on different groups, depending on axes such as gender, income, caste, disabilities and geography. These regulations can often determine the nature and extent to which communities and individuals influence and are impacted by policy making. These inequalities merit specific attention across the domains of technology policy – from digital access to protection of digital rights. This module will introduce these concepts in the context of Southeast Asia, with particular focus on gender as a cross-cutting theme across forms of inequality.
This unit, which will be in the form of a panel discussion, is designed to get participants familiar with special provisions that protect gender and vulnerable groups in the ICT spaces, how these provisions may be used to target their agency and to get participants to understand how a feminist and rights perspective could be used in the process of legal analysis. It will adopt a feminist lens to critique legal systems and jurisprudence that govern technology, while also discussing provisions that are designed to protect vulnerable groups from negative impact. The experiences of vulnerable groups as they adopt and resist technology and data systems will be highlighted. The session will also discuss the role of marginalised groups in policy making, including reimagining technology law and policy through feminist principles as they are mobilised to create alternative feminist realities.
Key points of discussion:
- Broadly, who are the vulnerable groups in Southeast Asia?
- What special laws or provisions addressing gender and vulnerable groups are applicable to ICT spaces?
- How are broad ICT regulations impacting gender and vulnerable groups?
- Are perspectives of vulnerable groups taken into account in policy making?
- Key jurisprudence on the issue from the region
Reference materials:
- Table 3 - Laws and regulations governing the ICT ecosystem in Southeast Asian countries
- Table 4 - Resources and databases on ICT and jurisprudence
- Table 5 - International human rights law landscape
- Table 2 - Constitutional guarantees
Suggested readings:
- Association for Progressive Communications, Feminist Principles of the Internet - Version 2.0 (August 2016)
- Dr. Anja Kovacs, Gendering Surveillance: An Introduction (February 2017)
- Report of the Office of the United Nations High Commissioner for Human Rights on ways to bridge the gender digital divide from a human rights perspective
- UN Women, 2020, Online violence against women in Asia: a multi-country study
- Gender Digital Equality Across ASEAN, ERIA Discussion Paper Series
- Is access real?
📌 Presentation Slide - Lisa
📌 Presentation Slide - Biplabi
📌 Presentation Slide - Siti and Nathania
🔖 Read Day 4 Summary Here
Day 5️⃣ | Session 9: Generating new knowledge: Legal research methodology and process
Date: Friday, 24 September 2021 [3:30 am - 5:30 am UTC]
Resource Persons: Dhevy Sivaprakasam, Anna Bueno & Emilie Pradichit
Researching digital rights is often incomplete without addressing laws and policies that further restrictive environments or fail in curbing violations. Despite strong constitutional guarantees in the region, we have witnessed monumental challenges in realising rights in online spaces. Sociological and intersectional approaches are essential in reflecting the human impact of laws and policies. Ethical research practices behind evidence-based credible research are critical for engaging in advocacy for changes in regulatory framework.
This unit will seek to help participants unearth practices for developing a research process by addressing key issues around developing research questions, methods and ethical practices. The session will also provide an overview on collecting data and engaging in developing a narrative in the research. This will be followed by a break-out session where participants will hear from the developers of two key researches on policies from the region discussing the process and challenges they faced.
Key points of overall discussion:
- How to frame the research question?
- What support systems would you need when embarking on legal research?
- Principles for ethical research from a human rights based approach
- How can we go about data collection?
- Common pitfalls to avoid
Session breakout:
This session will have two breakout groups of 12 participants each.
Each breakout group will consist of an interview lead by the organisers with an established researcher who will speak to the group about a legal research that they have undertaken in the past, including how they framed the research questions, the kind of research methodology that they undertook, their approach to data collection and principles of carrying out ethical research.
Reference materials:
Suggested readings:
- De Nardis et al, Researching internet governance: methods, frameworks, futures (2020)
- Jessica Dheere, A methodology for mapping the emerging legal landscapes for human rights in the digitally networked sphere (2017)
- Marsha L. Baum, Ten tips for moving beyond the brick wall in the legal research process (2001)
- Unshackling Expression: the Philippines Report 2020 (Association for Progressive Communications)
Additional readings:
- George Orwell, Politics and the English Language
- Strunk, The Elements of Style
- ICT law analysis workbook
- Jurisprudence analysis workbook
📌 Emilie - Session Presentation
🔖 Read Day 5 Summary Here
Day 5️⃣ | Session 10: Spreading the message: Strategies on advocacy and communication
Date: Friday, 24 September 2021 [6:30 am - 8:30 am UTC]
Resource Persons: Edmund Bon, Nurina Savitri & Nalini Elumalai
Strategic advocacy with courts, legislatures and international forums have played an instrumental role in shaping the digital policy ecosystem, and in developing a free, open and rights-respecting internet. The success of strategic advocacy is contingent on the political and social set-up in each country, but common themes and tools apply across nations. It is essential therefore to hear from individuals who have been involved in campaigns, policy processes and strategic litigation across a variety of digital issues to gain different perspectives.
This unit will start with an overview of the different kinds of advocacy initiatives that groups have undertaken to effect changes in both enacted ICT laws and draft laws. Discussions will include addressing stakeholders and developing documents for the initiatives. Strategies for public campaigning and key considerations for engaging in strategic litigation will be shared. This will be followed by two breakout groups. One group will specifically look at how public campaigning can be developed, while the other group will dive into strategic policy advocacy targeting decision makers.
Key points of discussion main session (45 minutes):
- What is policy advocacy?
- Who are the different stakeholders to consider when advocating for ICT laws and policies?
- What are the kinds of advocacy initiatives that can be undertaken to effect change in ICT laws and drafts (national, regional and international)?
- What are some of the challenges and risks you might encounter while undertaking such advocacy?
- Engaging in strategic litigation - things to think about (when and how to engage, finding allies etc.)
Session exercise:
This session will have two breakout groups of 12 participants each.
Breakout room 1: Policy advocacy
There will be presentation on policy advocacy aimed at decision makers, including the how to begin advocacy, identifying stakeholders, preparation of documents etc. This will be followed by an exercise for participants.
Exercise 10A: Group 1: Developing a policy advocacy strategy
The group will brainstorm about what is needed for carrying out policy advocacy directed towards decision makers on a particular ICT law or policy.
Breakout room 2: Public advocacy
There will be a presentation on how to develop and run a public campaign, including the various steps involved in planning, target audience, key messaging etc. This will be followed by an exercise for participants.
Exercise 10B: Group 2: Developing a public campaign
This group will discuss the different steps involved in developing and implementing a public or social media campaign for an anti-fake news law to bring awareness to that particular law.
Reference materials:
- Table 7 - Map on UN spaces for advocacy
- Table 8 - Map of UNHRC spaces
- Table 9 - Status of ratifications and reservations
Suggested readings:
- APC, The APC ICT Policy Handbook (Second Edition)
- Eóin Young & Lisa Quinn, Making Research Evidence Matter: A Guide to Policy Advocacy in Transition Countries
- ISHR Academy, Risks in Engaging with the UN
- Activating Malaysians - The D-I-Y Toolkit
- Strategic litigation training for lawyers: A facilitator's manual
Additional Readings
- APC, APC Internet Rights Charter
- Johanna Eve Simeant, Interpreting the Rise of International “Advocacy”
- Shannon O'Connell, Policy Development and Policy Advocacy
📌 Presentation Slide - Edmon Bon
📌 Presentation Slide - Nalini
🔖 Read Day 5 Summary Here
🔊 Workshop policies & governing rules
Code of conduct and principles of participation
The Association for Progressive Communications is committed to providing a safe and welcoming environment for discussing issues related to its community. The APC Community comprises members of the network, all APC staff and team and its larger network of partners, friends and allies.
The code of conduct and ground rules apply to this meeting, all APC hosted events, conference-related social events, such as parties or gatherings at restaurants or bars and spaces, and includes our mailing lists, wikis, platforms, websites and any other spaces that APC hosts, both online and off. Participants are responsible for knowing and abiding by these guidelines. In this event, the code applies to anyone who is part of the event, which includes organisers, resource persons, participants and performers.
All APC meetings, virtual and physical meetings, are intended to be SAFE spaces and we ask participants to be guided by the following:
|Be respectful
|Listen actively
|Be respectful of others’ views even when you disagree
|Be collaborative
|Recognise diversity
|Respect privacy of participants
|Ask for consent for photography, audio-visual recordings or quotes
|Be aware of language diversity
|Handle disagreement constructively
|Act fairly, honestly, and in good faith with other participants
It is vital that discussions include and acknowledge a diversity of opinions and experiences, and that the community does not tolerate harassment of any kind.
We expect the members of the APC community to treat one another with respect and to acknowledge that everyone can make a valuable contribution. We may not always agree, but the space and conversation must always have openness to positions that may not be aligned or in agreement. Frustration cannot turn into a personal attack. It's important to remember that a community where people feel uncomfortable or threatened is not a productive one, and that the meeting conduct and ground rules are anchored in the APC values we have all committed to uphold. It is our collective responsibility to ensure that we create a safe, creative, productive and welcoming space that can hold us in all of our diversity.
We will take action in response to harassment related to gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, nationality, caste, ethnicity or religion. APC does not tolerate harassment of participants in any form.
Definitions
Harassment
includes, but is not limited to:
- Offensive comments related to gender, gender identity and expression, sexual orientation, disability, mental illness, neuro(a)typicality, physical appearance, body size, race, caste, ethnicity or religion.
- Unwelcome comments regarding a person’s lifestyle choices and practices, including those related to food, health, parenting, drugs, and employment.
- Physical contact and simulated physical contact without consent or after a request to stop.
- Deliberate intimidation.
- Sustained disruption of discussion.
- Continued one-on-one communication after requests to cease.
- Sexual harassment
Sexual harassment
is a broad term. For the purposes of this event it is defined as:
Any unwelcome sexual advance in the form of words, images, gestures or physical contact in physical, digital or communication spaces which may reasonably be expected, or be perceived, to cause distress, intimidation, fear, humiliation, or harm to another. The term also covers any request for a sexual favour, or a threat of a sexual nature. Sexual harassment may occur in any space, including the workplace. This includes activities of face-to-face meetings, virtual meetings and digital communication of all kinds. It can be a one-time incident or a series of incidents. Sexual harassment may be unintended, deliberate, or coercive. Sexual harassment may occur both within formal working hours and spaces, and outside these. Men, women, transitioning and transgender individuals may be victims or offenders.
Sexual harassment may result in discrimination, and it may create a hostile working environment. Other forms of behaviour which cause discrimination, fear, and/or a hostile working environment may be implicated in sexual harassment, such as harassment based on race, gender, sexuality, national origin, physical appearance, age, ancestry, disability, economic disparity, nationality, or religious or spiritual beliefs. APC recognises that APC's staff members, partners and event participants are from diverse contexts, and that sexual harassment experiences are embedded within the cultural, social, historical and personal contexts.
Sexual harassment should not be confused with unintentional careless communication in a diverse working environment, or with our efforts to create a working culture which is open to conversations on sexuality and human rights.
We understand that the impact of sexual harassment on APC's working culture can be highly destructive, and we understand the harmful impact of sexual harassment on any person’s work, mind and body.
Examples of sexual harassment include (but are not limited to):
- Gratuitous or off-topic sexual images or behaviour in spaces where they are not appropriate.
- Unwelcome sharing of sexualised content in visual, audio or text form
- Deliberate stalking, following or intimidation, online and/or offline
- Harassing photography, video or audio recording
- Inappropriate and/or unwanted physical contact
- Unwelcome sexual attention, in any form of communication
- Requests for sexual favours, verbal or physical contact of a sexual nature in exchange for an opportunity
- Threats, either explicit or implicit, to withdraw an opportunity or resources unless sexual contact and/or communication is permitted
- Advocating for, or encouraging, any of the above behaviour.
If you believe you have been harassed, or notice that someone else is being harassed, or have any other concerns, you are encouraged to raise your concerns in confidence to the Event Incidents Team.
APC commits that each case will be considered, and concrete actions will be taken as appropriate.
Please refer to APC’s sexual harassment policy for how APC responds to sexual harassment.
Code of Conduct and Anti-Harassment Policy Response Process
If you are being harassed by a member of the community or a participant or organiser at the conference, or have any other concerns, please contact a member of the Event Incidents Team.
When a complaint is made or an incident occurs that breaches this code, the Event Incidents Team will confidentially review and respond to any participant who has experienced harassment or inappropriate behavior.
If the person who is harassing you is on the Event Incidents Team, they will recuse themselves from handling your incident. If the person who is harassing you is a member of the organising team, they will not receive differential treatment than any other participant in the handling of the complaint.
We will try to respond as promptly to complaints as we can. These steps will be taken once you make a complaint:
- One or more members of the Event Incidents team will discuss the issue with you.
- They may take notes, with your consent, of what you say.
- One or more members of the Events Incidents team will separately speak with the person(s) against whom the complaint is lodged.
- The process will involve attaining resolution while ensuring safety, dignity and respect for everyone involved.
If a participant engages in harassing behavior, the Response Team may take any action they deem appropriate, up to and including expulsion from all APC spaces during the event, and identification of the participant as a harasser to other APC members or the general public. The Event Incidents team will prioritise marginalised people’s safety over privileged people’s comfort.
Any member of the Event Incidents Team can be contacted with any questions or concerns participants may have throughout the duration of an APC event. Anonymous complaints can be reported to the team on Telegram or submitted via email.
👤 Resource persons' profiles
Session 1: Law and Jurisprudence 101: Introduction and Basic Concepts
Emerlynne Gil
Twitter handle: https://twitter.com/EmerlynneGil
Session 2: Introduction to ICT law ecosystem
Indri D. Saptaningrum
Session 3: Error 403: Access, telecom policy and network shutdowns
Damar Juniarto
Twitter handle: https://twitter.com/DamarJuniarto
---------------------------------------------------------------------------------------------------------------
Edmon Chung
Twitter handle: https://twitter.com/edmonchung
Session 4: Under lock and key: Privacy, surveillance and data protection
Jam Jacob
Twitter handle: https://twitter.com/jamjacob
Session 5: Speaking up: Exploring SEA laws on protecting freedom of expression
Wahyudi Djafar
Twitter handle: https://twitter.com/wahyudidjafar
Session 6: Unpacking hate speech, defamation and misinformation
Herlambang P. Wiratraman
Session 7: Managing online spaces: Content moderation and intermediary liability | Panel
Katherine Chen
Twitter handle: https://twitter.com/kynchen
--------------------------------------------------------------------------------------------------------------
Victoire Rio
Twitter handle: https://twitter.com/riovictoire
-------------------------------------------------------------------------------------------------------------
Michael Caster
Twitter handle: https://twitter.com/michaelcaster
-----------------------------------------------------------------------------------------------------------------
Jeff Paine
Session 8: Protecting the vulnerable: Special provisions for gender and marginalised groups | Panel
Lisa Garcia
Twitter handle: https://twitter.com/li_saga
----------------------------------------------------------------------------
Siti Mazumah
---------------------------------------------------------------------------------------------------------------------
Nathania Theora
---------------------------------------------------------------------------------------------------------------------
Biplabi Shrestha
Session 9: Generating new knowledge: Legal research methodology and process
Dhevy Sivaprakasam
-----------------------------------------------------------------------------------------------------------------
Anna Margarita Bueno
-----------------------------------------------------------------------------------------------------------------
Emilie Pradichit
Twitter handle: https://twitter.com/EmiliePradichit
Session 10: Spreading the message: Strategies on advocacy and communication
Edmund Bon
Twitter handle: https://twitter.com/edmundbon
------------------------------------------------------------------------------------------------------------
Nalini Elumalai
Twitter handle: https://twitter.com/nalinielumalai
-------------------------------------------------------------------------------------------------------------
Nurina Savitri
🎧 Workshop playlist
🎸 Spotify Playlist
This is a collaborative playlist and everyone is welcome to send us the songs. 😊
https://open.spotify.com/playlist/6SgtfXKfDmJ49YYJBQqKvf?si=78d760d6885948f3
🤩 Memes Collection