Minister of Finance: President Jokowi Asks for Redenomination of Rupiah Review

By : Aldo Bella Putra | Wednesday, July 26 2017 - 05:28 IWST

5166
5166

INDUSTRY.co.id - Jakarta - Finance Minister Sri Mulyani Indrawati said President Joko Widodo has asked for a social, political and economic review of the redenomination plan or the simplification of the value of the rupiah.

"The President asked this to be discussed first from the social aspect, the political side, the economic side," said Sri Mulyani, in Jakarta, Tuesday (7/25/2017)

Sri Mulyani said the redenomination plan was re-proposed by Bank Indonesia after the previous agenda of simplifying the value of the rupiah currency once rolled in 2013.

However, before the government and Bank Indonesia proposed a discussion on the Redenomination Bill, the President expected the study so that this plan would not cause negative perception among the people.

"Do not get misunderstood and do not let this become an unproductive problem for our economy," said the former Managing Director of the World Bank as well.

Sri Mulyani ensured the President also asked him to coordinate with Bank Indonesia to finalize a plan that could take seven years.

"The president asked me to coordinate with the Governor of Bank Indonesia to see this process and will be presented in a limited cabinet meeting before any political or legal process," she said.

Sri Mulyani has not been able to ensure that the Redenomination Bill can be included in Prolegnas 2017, as there are currently around 15 bills that are priority discussions with the DPR.

"Of course we will communicate with the House Commission XI on the schedule that is still possible, especially in completing various other bill commitments, but the maximum effort," she said again.

Regarding this redenomination plan, Sri Mulyani conveyed the importance of a deep understanding of this agenda that simplifying the value of currency is not a sanering.

In addition, socialization should also be done by including a comparative country that has successfully implemented redenomination in order not to cause public doubt.

"The most important thing to say is the process in other countries that can be used as a reference, so we do not think in a situation as if this is something completely new and cannot be managed," said Sri Mulyani.

News Comment

Today's Industry

Oleg Mogilevsky - Product Marketing Manager at Check Point Software Technologies (Photo by Linkedin)

Selasa, 10 November 2020 - 11:00 WIB

Five Reasons to Reevaluate Your Endpoint Protection

With the new emerging threats caused by remote working standards, security professionals need to reevaluate their approach to protecting endpoints. In order to do so, it’s vital that organisations…

Darrell Adams, Head of Southeast Asia & Oceania, Universal Robots (Photo by LinkedIn)

Selasa, 10 November 2020 - 10:30 WIB

Collaborative Robots Open New Horizons in Quality Control Processes

Collaborative robots (cobots) offer suitable solutions to manufacturers. Hence, cobot-based quality control and inspection systems that can transition between different end products in very…

Ilustration Hackers (Photo by Microwire.info)

Jumat, 30 Oktober 2020 - 11:20 WIB

Organisations Paid Hackers US$23.5 Million for These 10 Vulnerabilities in One Year

HackerOne report reveals cross-site scripting, improper access control, and information disclosure top list of most common and impactful vulnerabilities.

Clean Earth Technologies (CET)

Jumat, 30 Oktober 2020 - 10:30 WIB

Clean Earth Technologies’ New Class Of Polymers Invented By Associate Professor, Justin Chalker, Receives Australian Pm’s New Innovator Award

Associate Professor Justin Chalker has invented a novel class of polymers synthesised directly from elemental sulphur which is a waste by-product of the petrochemical industry and renewable…

Adi Ikan - Network Research & Protection Group Manager, at Check Point Software Technologies (Photo by Linkedin)

Jumat, 30 Oktober 2020 - 10:05 WIB

Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild

NSA’s list of top vulnerabilities were used to launch 3 million attacks in 2020, with 2.5 million of those attacks occurring in the last 6 months.