You are using an outdated browser and your browsing experience will not be optimal. Please update to the latest version of Microsoft Edge, Google Chrome or Mozilla Firefox. Install Microsoft Edge

January 20, 2017

New Computer Crimes Act to Tackle Cybercrime amid Public Concerns over Online Freedom

Bangkok Post, Corporate Counsellor Column

The Thai government’s attempts to revamp the 2007 Computer Crimes Act (CCA) and grant authorities more power to investigate and apprehend perpetrators of increasingly diverse cybercrimes has raised consternation among internet users who fear the new and more stringent law may impinge on human rights and place restrictions on online activity in the country.

Thailand’s National Legislative Assembly (NLA) passed draft amendments to the 2007 Computer Crimes Act (CCA) on December 16, 2016, and it is now awaiting publication in the Government Gazette. The law will come into effect 120 days after its publication date.

According to a report issued by the NLA committee responsible for drafting the CCA, the amendments are intended to:

  • Enhance and update the 2007 CCA, which is outdated due to rapid changes in the nature of cybercrimes;
  • Introduce new committees; and
  • Adjust and rationalize the authority of officials under the new law.

However, the public appears not to share the government’s thinking behind this rationale, and before the law was passed, more than 340,000 people signed a petition objecting to the amendments as they believe the new CCA gives excessively broad authority to government agencies to act against online content containing information that is deemed inappropriate.

The activists fear abuse of the new enhanced powers under the new law could adversely affect the rights of people both inside and outside the country, and particular attention is focused on Sections 14, 18, and 20 of the CCA.

Under the new NLA-approved CCA, Section 14 introduces more offenses and offers more room for interpretation. Under this controversial section, the public are prohibited from entering (or knowingly sharing) a computer system that causes “damage to the public, creates panic, or causes harm to public infrastructure, national security, public security, or economic security.”

The broad scope of the new Section 14 operates as a catch-all for a wide range of offenses, thus compelling online users—including businesses—to be more discrete and mindful of publicly sharing information. Some argue this will force users to be more responsible in disseminating content online, while others contend that it serves to restrict freedoms for internet users.

Section 18 has also been severely criticized, as it broadly empowers officers investigating an offense under the CCA or other laws to enquire, request, access, seize, duplicate, and unlock computer systems to obtain the data in question. However, a court order is specifically required for the access, seizure, duplication, or hacking (unlocking) of computer systems that are not in the possession of the officers.

Although no mechanism is prescribed under the law detailing how the courts should exercise their judicial discretion in granting or declining an order, the wording of this section appears intended to limit questions about whether officers are deliberately or excessively exercising their broad authority over the unpossessed computer data.

But Section 18 does not require officers to obtain a court order if they wish to request Service Providers, such as online access providers or social media platforms, to provide “traffic data” information to facilitate an investigation into an offense under the CCA or other laws. Although the public has questioned why a court order is not required, these new powers will undoubtedly cause businesses and other public users to be more mindful of handling their “traffic data,” which could also be interpreted to include data messages sent through work or personal devices and computers.

Section 20 of the new CCA requires the formation of a new Computer Data Screening Committee to be appointed by the Digital Ministry, wherein three out of nine members must be representatives from the private sector, including human rights, media, and other related fields.

This new committee will have the authority to consider and provide second-tier approval to censor “inappropriate” computer data (i.e., defined as against good morals or public order) before the request to censor the “inappropriate” computer data can be submitted for court approval. The subsequent granting of a court approval will result in such data being censored. However, the public have questioned whether authorities need this type of oversight of all inappropriate computer data.

Public attention is now focused squarely on the Digital Ministry, the authority charged with ensuring the smooth implementation of the new CCA. The NLA drafting committee has recommended that the ministry conduct training and educate officials so they have a better understanding of cybercrime investigations and computer data evidence collection, to ensure enforcement of the CCA complies with their intentions.

It is hoped that correct and efficient enforcement by authorities will ease public concerns over the new Computer Crimes Act, although undoubtedly, concerns will remain as the public continues to debate whether the new act is wholly appropriate for computer and online users in Thailand. All business operators in Thailand will need to closely monitor the CCA’s implementation and enforcement to ensure compliance.

RELATED INSIGHTS​