The Internet: Challenge, Opportunities, and Governance

Size: px
Start display at page:

Download "The Internet: Challenge, Opportunities, and Governance"

Transcription

1 6th International Conference on Advances in Computing & Communications 2016 Kochi, India, 6-8 Sep 2016 The Internet: Challenge, Opportunities, and Governance Raja Kumar Murugesan Deputy Dean

2 Introduction The Internet, will be shaping the economy and society of the 21 st century Smart technologies are shaping the landscape of possibilities connecting more people and things to each other Trends include Mobile Internet, Cloud, IoT, smart wearables, smart cars, smart cities and etc Ability to connect people, things and engage them more meaningfully will grow exponentially Infinite opportunities, comes with challenges such as security and privacy Continued evolution of the Internet impacts difficult issues to be addressed making Internet Governance significant & complex 2

3 Outline Internet Governance Who governs the Internet? Different perspectives Challenges Opportunities Future 3

4 Internet The Internet has evolved from a closed network to a critical, public and commercial infrastructure used by all Has no centralized control on technological implementations or policies for access and usage It operates by self-governance influenced by market mechanisms ISPs government agencies regulatory bodies businesses, associations standard setting organizations network engineers end users etc. 4

5 IG different perspectives More Internet dependency by the society, more Internet Governance (IG) relevancy IG is relevant to all from e-business to social network users Internet reflects different perspectives, approaches and policy Telecommunication specialists thru development of technical infrastructure Computer Specialists development of standards and protocols Human rights activists privacy, freedom of expression, other basic human rights Lawyers jurisdiction and dispute resolution Politicians techno-optimism, threats; child protection, internet security etc., Diplomats process and protection of national interest 5

6 The Internet and Governance Internet is Ubiquitous more users, more services offered Internet governance refers to the processes that impact how the Internet is managed How the Internet is governed is critical as it directly impacts our life, economic and social opportunities far into the future 6

7 Early IG, Late 1960s, DARPA net Mid 70s, TCP/IP invention IG Evolution 1986, IETF managed the development of the Internet through a cooperative, consensus based decision making. No centralization DNS war NSF subcontracted managing the DNS to Network Solutions Inc (NSI) Internet community did not like it, leading to DNS war New players came in, international organizations and governments Lead to the development of ICANN Establishment of ICANN led to most debates today 7

8 , World Summit on the Information Society (WSIS) WSIS placed IG on diplomatic agendas and established the Working Group on IG (WGIG) WSIS Tunis agenda 2005 elaborated on IG, definition, listing issues, establishing IG Forum (IGF) a multi-stakeholder body convoked by the UN Secretary General expiration of the MoU and establishment of a new MoU between ICANN and US DoC There was hope that ICANN would eventually become an International organization ITU announced a stronger focus on cybersecurity and development assistance ICANNs discussion on.xxx domain Debates on whether ICANN should only be concerned with technical problems or should include public policy Intervention by US and other governments on.xxx domain raised the question on national governments participation in ICANN deliberations8

9 companies such as Google, Yahoo and facebook felt that a change in the Internet Architecture with a breach in net neutrality would endanger their business telcos such as Verizon, AT& T, ISPs and the multimedia industry wished to see some differentiation in packets travelling on the Internet Fast growth of social networking and increased use of web 2.0 tools opened up issues of privacy and data protection Affirmation of commitments between ICANN and US DoC to make ICANN a more independent organization 2010 IG debate was the impact of fast growing social media that includes protection of privacy of users ICANNs Introduction of non ASCII domain names for Arabic and Chinese, and approval of.xxx domain for adult materials Jan Egyptian authorities cut access to the Internet, a first example of country wide Internet blackout ordered by a government 9

10 2012 Introduction of new generic Top Level Domains (gtld) 2013 Snowden revelations on the US National Security Agencies (NSA) various surveillance programmes Snowden s revelations made global public to be interested in the way Internet is governed Main concern was data protection and privacy rights 2014 The US government asks the Internet community for a plan for moving IANAs oversight to the global multistakeholder community 2016 In March, the proposal on multistakeholder approach was submitted and in Aug NTIA stated that they will allow the IANA contract to expire 1 st Oct

11 Internet Governance reference framework IG is complex as it involves many issues, actors, mechanisms, procedures, and instruments One approach focuses on technical, the Internet Infrastructure (IP address, DNS, and root servers) and ICANNs position in this field the other focuses on policy (legal, economical, developmental and sociocultural issues) Technical and policy coherence Difficult to separate the two as Technical solutions are not neutral Each technical solution promotes certain interests, empowers certain groups, and to certain extent impacts social, political and economic life Internet for a long time both technical and policy was governed by one group the early Internet community Due to business and government actors it is difficult to be governed together 11

12 Old vs New approach Old approach, existing laws with minor adjustments could be applied to the Internet Cyber approach, Internet is fundamentally a different communication system hence, it requires a different form of governance Decentralized vs centralized structure of IG IG structure should reflect the very nature of Internet i.e. network of networks It is so complex that it cannot be governed by a single international organization Decentralized IG was one of the reason for the fast internet growth This view is supported by the technical community and developed countries Centralized approach is argued by the developing countries due to limited human and financial resources availability 12

13 Protection of Public Interest on the Internet Main strength of the Internet is its public nature that has enabled its fast growth, and creativity How to protect the public nature of the internet is one of the core issues The core internet infrastructure from intercontinental backbones and local area networks are owned by private Whether this privately owned property can be managed in the public interest? This has been the main discussion on network neutrality Geography and the Internet Policy Uncertainty Policy Balancing act Holistic approach and prioritization 13

14 Internet Governance Different Different Perspectives: Perspectives Infrastructure Legal Economic Development Sociocultural 14

15 Infrastructure

16 Telecommunication Infrastructure Regulation national and international by many public and private ITU sets technical standards, telecommunication specific international regulations, assist developing countries telecommunication systems, the allocation of the radio spectrum, and the management of satellite positioning International telecommunication regulations, liberalization of pricing and services in the internet field WTO - provides framework for general market rules Liberalization of telecommunication market worldwide 16

17 Telecommunication Infrastructure The last mile (local loop) issues Last mile problem affects use of the Internet Solution Technology > Wireless Liberalization of this segment of the telecom market Liberalization of telecom markets New communication services over existing infrastructures Developing countries challenges Liberalize and make the market bigger and efficient or preserve income form exiting telcos monopolies 17

18 Issues contd.. Establishment of technical infrastructure standards Set increasingly by private and professional institutions WiFi standard (IEEE b) by IEEE Certification of WiFi compatible equipment by WiFi allliance The above helps institutions to influence the market Who owns the electromagnetic spectrum? Currently managed by governments, regional initiatives (e.g. EU Radio Spectrum Committee (RSC) and the Radio Spectrum Policy Group (RSPG) and the ITU Spectrum is now conceived as less scarce due to its efficient use with new technologies Hence, should be open spectrum free from government regulation 18

19 Issues contd.. Open Spectrum > two potential problems Telcos investment to operate 3G network Free not necessarily mean will be used by many as public Only used by those who have technical capabilities Governments needed solutions for efficient use of the spectrum due to increasing demand for spectrum Digital television has allowed release part of the radio spectrum for other services digital dividend 19

20 TCP/IP TCP/IP, Key Internet Technical standard IG w.r.to TCP/IP Introduction of Standards, set by IETF IP address distribution follows a hierarchy IANA a subsidiary of ICANN distributes blocks of IP to the 5 RIRs RIRs distribute to LIRs and/or NIRs LIR/NIRs to ISPs and companies, and ISPs to individuals 20

21 Limitation of IP addresses IPv4 exhausted! Solution? Issues NAT quick fix CIDR by the RIRs IPv6 transition - long term solution Challenges with IPv6? transition Backward compatibility Technical assistance IPv6 distribution policy framework 21

22 Issues contd.. Changes in TCP/IP and cybersecurity Original Internet was closed, Security was no issue, not in mind Intrinsic security requires changes to the TCP/IP IPv6 provides some security, but not substantial Technology, standards and policies could bring conflict of interest?! Competing businesses and/or national interest Changes in TCP/IP and limited bandwidth Real-time applications QoS sensitive Multimedia services and content need minimum QoS to guarantee minimum level of performance QoS requirement may require changes in IP that could be a potential challenge to Network neutrality principles! 22

23 DNS Creation of new TLDs is unlimited But, creation of new gtlds had been slow and debated process 2012 ICANN began new gtld programme Any organization can apply to run a new gtld registry Opposition trademark concerns and cyber-squatting ICANNs new policy consultation Resolving competing claims for gtlds Cybersquatting Public morality Registration fees, and others 23

24 Issues contd.. Management of Country domains IANA reiterates the ISO standards for country codes Who should manage cctlds? Countries trying gaining control over their cc domains ICANNs approval on transition No conflict from interested stakeholders within the country Follow Governmental Advisory Committee (GAC) principles for the delegation of cctld administration Follow Best practices proposed by World Wide Alliance of Toplevel Domains Reluctance of many cc domain operators to become part of ICANN system ICANN is formulating Accountability Frameworks as less formal way to solve the above concern. ICANN, in May2010 started approving TLDs in other than in English scripts IDN is one of the success of the IG regime 24

25 Root servers 13 root servers in the world, maximum technically possible USA: 10, Sweden: 1, Netherlands: 1, Japan: 1 Even all 13 go down, domain name resolution can still function thru other domain name servers distributed hierarchically throughout the Internet Root servers are replicated thru anycast, resolving servers are close to end-user Root zone files are approved by US government proposed by IANA and given to root server managing companies Verisign operates the master root server that updates content approved by DoC The files in the master are then replicated to the root servers This is a concern for many governments as unilateral changes could be made to the master root server 25

26 Issues Internationalization of the control of root servers One country responsible for the content of the root servers was a concern US government to pass supervision of IANA to a new mechanism by 30 Sep 2015 Transition should be guided by - Support and enhance the multi-stakeholder model - Maintain the security, stability, and resiliency of the Internet DNS - Maintain the openness of the Internet Alternative root servers, feasibility and risks Single vs alternative root server system possible discussion? 26

27 Internet Access - issues Should the internet infrastructure be considered a public service? IBPs and critical infrastructures Telecommunication liberalization and the role of ISPs and IBPs 27

28 Network Neutrality - Issues Economic Human right issues, have and have nots? A lot to discuss. Who are the main players and arguments? Basic principles Policy approaches Developed and developing countries International Organizations and NGOs Open issues 28

29 Standardization

30 Web standards TCP/IP facilitated communication, but lacked applications HTML as the basis of the www led to internets exponential growth HTML evolved into XML with W3C for application standardization W3C has not influenced internet governance 30

31 Cloud Computing Data has moved from hard disks to the cloud Started with the use of online mail servers and applications such as Yahoo, Gmail, facebook, Twitter, wiki, blogs etc. More devices are connected to the Internet High dependency leads to pressure on robustness and reliability Privacy and data protection on who will have access to our data Digital information assets, national borders, regulations etc. 31

32 Common standards for smooth data transfer between different cloud operators Adoption of open standard is considered as another option Google has already started Data Liberation front, open standards towards data transfer between clouds Safe Harbour agreement between EU and US does not seems to work well on privacy and data protection Especially after the Snowden s leaks of mass surveillance Other governance issues in cloud computing may follow 32

33 Convergence Telecommunications, broadcasting and information delivery were handled by different technologies and regulations Today, the Internet has converged technological platforms for these While technical convergence is happening rapidly, its economic and legal consequences will take time to evolve 33

34 Economic Issues Convergence has reshaped traditional markets putting companies operating on separate domains into direct competition Legal framework Convergence opens up several governance and regulatory questions What happens to existing national and international telephony and broadcasting organizations? Will new organizations be developed that focus mainly on the Internet? Should the regulation of convergence be carried out by public authorities or self-regulation? E.g., Malaysia implemented Communications and Multimedia Act in 1988 as a general framework for the regulation of convergence EUs regulatory framework for electronic communication moved to national laws So are Swiss Telecommunication laws and regulations 34

35 Risk of convergence cable operators and ISPs Broadband internet is introduced thru cable in many countries e.g. US, and is more popular than ADSL Concerns are, cable operators could buffer between users and the Internet challenging the net neutrality principle Cable is not regulated by common carrier rules that applies to telephony that specifies access should be non discriminatory Cable operators could block certain applications, block access to certain materials, surveillance possibilities, and ability to violate privacy This may lead to Internet monopolies If The cable Internet is for telecommunication service and not information service then regulation has to follow common carrier rules 35

36 Cybersecurity - Issues Type of action data interception, illegal access, spyware, data corruption, sabotage, denial-of-service, and identity theft. Type of perpetrator possibilities include hackers, cybercriminals, cyber-warriors, and cyberterrorists. Type of target - ranges from individuals, private companies, and public institutions to critical infrastructures, governments, and military assets. 36

37 Cybersecurity framework Includes policy principles, instruments, and institutions dealing with cybersecurity Critical Information Infrastructure Protection Global critical infrastructure now depends on the Internet e.g., energy, transport and finance Vulnerability of the Internet is the vulnerability of modern society Cybercrime Cooperation is missing combating cybercrime black markets where easy to use digital weapons like viruses and botnets are easily available as outsourced services Cyber conflicts or Cyberwar has high media visibility but still low policy and legal regulations at a very early stage 37

38 Cybersecurity policy initiatives ITU s X.509 standards provides the basis for PKI used in https ITUs Global Security Agenda includes legal measures, policy cooperation and capacity building Commonwealth Cybercrime Initiative (CCI) to improve legislation and capacity of member states to handle cybercrime G8 s Subgroup on High Tech Crime establishing 24/7 communication between cybersecurity centres of member states to tackle cybercrime and promote cooperation between ICT industry and law enforcement agencies Council of Europe s Convention on Cybercrime Stanford Draft Convention on Protection from Cyber Crime and Terrorism recommends the establishment of an international body, the Agency for Information Infrastructure Protection (AIIP) 38

39 Influence of Internet Architecture on Cybersecurity Early Internet focus was on developing internet standards and applications, security was not priority Should we modify the current internet infrastructure or build security on the existing non-secure internet infrastructure Will this change affect other Internet openness, transparency and other features Though security related improvements on the internet protocol has been slow there are progress e.g. DNSSEC DNSSEC implementation challenges are there over the hierarchy of DNS registrars, ISPs and website hosts Security by design into technologies hardware, software and protocols will add security Vulnerabilities of the Internet are taken advantage for their own interests Human rights apart form value-based priority should also ensure the Internet is open and secure End users are the pillars of cybersecurity and they are the weakest link 39

40 Encryption, Spam encryption has become affordable for any Internet users, including criminals and terrorists There are governance issues in finding the right balance between respecting privacy of communication of Internet users and the need for governments to monitor communication relevant for the national security (potential criminal and terrorist activity remains an issue) statistics in 2014 says, 66% of traffic is spam Filtering spam has only limited effects, better to fight it thru technical and legal US, Can-Spam law, EUs anti-spam law weakness is cross-border spam Different definition of Spam prevents international anti-spam mechanism Authentication of could prevent fake address but anonymity is lost. Technical issue may affect policy Most spam originate across the country, needs global cooperation, capacity building and info exchange to combat 40

41 Legal

42 Legislation Legislation activities are progressing intensively in the Internet field especially with EU and OECD The priority areas are privacy, data protection, IP and cybercrime Too complex to regulate only thru legislation as society is dynamic Social norms prohibit certain behavior thru peer pressure E.g. Wikipedia has been evolving in to self-regulation ICANN proposed self-regulation as the preferred mechanism to regulate the Internet. Noticeable among ISPs Risks remains on areas of high public interest such as content policy, freedom of expression, protection of privacy Legal instruments International public & private laws, conventions, customary law Challenge is how to create a balance? 42

43 Internet Economy

44 Economic Issues More money has introduced more business and policy interest Challenges There should be optimal balance between Technical Efficiency, Economic Efficiency, and Social effects Replacing the existing flat-rate pricing structure with accounting based on packet traffic Changing the current Internet economic policies would open a Pandora s box Transactions over the Internet: E-Commerce, Internet Content Economy, Internet Access Economy, E-payments and cybercurrency issues: customer protection (privacy, data protection, cybersecurity), taxation, and digital signatures, detailed implementation standards, risk of incompatability 44

45 Internet Development

46 Digital divide Access and capabilities to use the Internet for technical, political, social or economic reasons Digital divide reflects socioeconomic inequalities in education, healthcare, employment, clean water and food Should facilitate Universal access, strategies, financial support, sociocultural aspects (literacy, ICT skills, training & education) Policies and institutional aspect 46

47 Sociocultural

48 Internet is a social phenomenon Internet has made considerable social and cultural impact on modern society Includes, privacy, freedom of expression, rights to receive information, rights protecting cultural, linguistic, and minority diversity, right to education Internet access Estonia, legal guarantee of right to access the Internet Finland, in 2010 all citizens have the right to 1 Megabit broadband connection Need to develop necessary software, hardware, content, standards and policy frame work to protect rights of people with disabilities Content control and policy through human rights, government and technology tools 48

49 Issues Effectiveness of content control and who should be responsible Education issues: quality assurance, recognition of degrees, online learning Child safety online: cyberbullying, abuse and sexual exploitation, violent games, addressing these challenges Balance between private and public interest Protecting the Internet as a Global public good 49

50 Internet Governance

51 Multistakeholder Approach IG has a wide variety of stakeholders National governments, international organizations, business organizations, civil societies, technical community and the end-users Efforts has been to the convergence of these actors in following an institutional approach Multistakeholder decision-making is accountable, sustainable and effective Creative solutions, a policy framework that balance public interests and private initiatives 51

52

53 Conclusion The multistakeholder approach for the Internet Governance is critical for ensuring the future of the Internet as a key driver for social and economic innovation Internet governance should promote universal, equal opportunity, affordable and high quality Internet access so it can be an effective tool for enabling human development and social inclusion The Internet is for everyone; let s work together to realize its full potential 53

54 Q&A

Related to the Internet

Related to the Internet International Public Policy Issues Related to the Internet and the Role of the Governments Regional Follow-up to the Outcome of the World Summit on the Information Society Marco Obiso ICT Applications

More information

CIGF Terminology and Concepts. C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U )

CIGF Terminology and Concepts. C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U ) + CIGF Terminology and Concepts C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U ) What We Will Cover Fundamentals IG Actors Common Acronyms Concepts Infrastructure Legal Socio Cultural

More information

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG Document WSIS-II/PC-3/CONTR/035-E 17 August 2005 Original: English UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG Y:\APP\PDF_SERVER\ALL-USER\IN\COORDUNIT\WGIG-COVER.DOC 17.08.05 17.08.05 www.itu.int/wsis

More information

THE INTERNET GOVERNANCE ECOSYSTEM. Mr. Chengetai Masango Programme and Technology Manager, IGF Secretariat

THE INTERNET GOVERNANCE ECOSYSTEM. Mr. Chengetai Masango Programme and Technology Manager, IGF Secretariat THE INTERNET GOVERNANCE ECOSYSTEM Mr. Chengetai Masango Programme and Technology Manager, IGF Secretariat Overview - The Internet - Governance - Internet Governance - The Internet Governance Ecosystem

More information

Internet Governance and the World Summit on the Information Society (WSIS)

Internet Governance and the World Summit on the Information Society (WSIS) Internet Governance and the World Summit on the Information Society (WSIS) Dr Tim Kelly, Head, Strategy and Policy Unit, ITU & Secretary, Content Sub-Committees, WSIS Internet Governance Workshop, Bangkok,

More information

Fundamental Principles of the Internet. Open, Distributed and Bottom-up.

Fundamental Principles of the Internet. Open, Distributed and Bottom-up. Fundamental Principles of the Internet Open, Distributed and Bottom-up. 1 Internet s history = Giving rise to the governance principles that are open, interconnected, distributed, and transnational!2 Source:

More information

GSR-14 Internet Governance: an overview of the situation

GSR-14 Internet Governance: an overview of the situation GSR-14 Internet Governance: an overview of the situation Jeferson Fued Nacif Head, International Affarirs Office, Anatel, Brazil 2014 Agenda 1. Internet Governance 2. Why it is important Regulator s perspective

More information

Internet Governance in April April 2016

Internet Governance in April April 2016 Internet Governance in April 2016 26 April 2016 Main events in April 3-6 Apr: Global Privacy Summit 2016 (Washington DC) 3-8 Apr: IETF 95 (Buenos Aires) 4-6 Apr: IGF Open Consultations and MAG meeting

More information

Cybersecurity & Spam after WSIS: How MAAWG can help

Cybersecurity & Spam after WSIS: How MAAWG can help Cybersecurity & Spam after WSIS: How MAAWG can help MAAWG Brussels Meeting 27-29 June 2006 Robert Shaw Deputy Head ITU Strategy and Policy Unit International Telecommunication Union 28 June 2006 1 Setting

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

RESOLUTION 130 (REV. BUSAN, 2014)

RESOLUTION 130 (REV. BUSAN, 2014) RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International

More information

Draft Resolution for Committee Consideration and Recommendation

Draft Resolution for Committee Consideration and Recommendation Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations

More information

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your

More information

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 45 (Rev. Hyderabad, 2010) 212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference

More information

Internet Governance. Mr. Samiran Gupta Head of India, ICANN

Internet Governance. Mr. Samiran Gupta Head of India, ICANN Internet Governance Mr. Samiran Gupta Head of India, ICANN samiran.gupta@icann.org Today, more than 3.7 billion 1 people across the globe or over 50% of the world s population can access the Internet.

More information

Where Now? A Rough Guide to Global Internet Governance Post-WSIS. Don MacLean Oxford Internet Institute May 19, 2006

Where Now? A Rough Guide to Global Internet Governance Post-WSIS. Don MacLean Oxford Internet Institute May 19, 2006 Where Now? A Rough Guide to Global Internet Governance Post-WSIS Don MacLean Oxford Internet Institute May 19, 2006 Overview The Results of WSIS Where are we now? Where are we heading in the future? The

More information

Module 4: ICT Trends for Government Leaders

Module 4: ICT Trends for Government Leaders Module 4: ICT Trends for Government Leaders SESSION 4: Internet Applications Internet Organizations Author: Rajnesh D. Singh Internet Applications Tendency to define the public face of the Internet i.e.

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (Rev. Antalya, 2006) Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference

More information

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information

More information

Liberia ICT Policy

Liberia ICT Policy Liberia ICT Policy 2017-2021 Initial Stakeholders Consultation Eleanor Sarpong Head of Policy and Advocacy November 23, 2016 a4ai.org Goals of consultation To convene under the auspices of the GoL (MoPT

More information

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015! FACILITATED BY: WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015! WSIS Forum 2012 was held from the 14-18th of May in Geneva. WSIS Forum 2012 resulted in an Outcome Document that aims

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution

More information

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 PLENARY MEETING Addendum X to Document 79- E 07 September 2014 Original: English Arab States ARAB STATES COMMON PROPOSALS FOR THE WORK

More information

DIGITAL AGENDA FOR EUROPE

DIGITAL AGENDA FOR EUROPE DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background

More information

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,

More information

GAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007

GAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007 GAC PRINCIPLES REGARDING gtld WHOIS SERVICES Presented by the Governmental Advisory Committee March 28, 2007 1.1 The purpose of this document is to identify a set of general public policy issues and to

More information

ICANN and Internet Governance. Pierre Dandjinou, VP ; Africa. AIS, Lusaka 17 JUNE 2013

ICANN and Internet Governance. Pierre Dandjinou, VP ; Africa. AIS, Lusaka 17 JUNE 2013 ICANN and Internet Governance Pierre Dandjinou, VP ; Africa AIS, Lusaka 17 JUNE 2013 Agenda Today + ICANN Past and Present + The IG Ecosystem + The Internet Governance Debate + Some predictions. 2 ICANN

More information

E Government in Tonga

E Government in Tonga Asia Pacific Regional Forum on e Government, 19 20 August 2015, Bangkok E Government in Tonga Presented by: Mr. Paula P. Ma u CEO MEIDECC Presentation Outline I. Background II. National ICT Plan III. E

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability Session 2: Conformity Assessment Principles 12-16 October 2015 Beijing, China Keith Mainwaring ITU Expert Agenda 1. Context

More information

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD IN A DIGITAL WORLD EU SYMPOSIUM 2006 15 June 2006 Maastricht, The Netherlands Cristina Bueti Cristina Bueti Project Officer Strategy and Policy Unit (SPU) International Telecommunication Union www.itu.int/spam

More information

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 67 (Rev. Buenos Aires, 2017) 524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,

More information

Internet Governance in September September 2016

Internet Governance in September September 2016 Internet Governance in September 2016 27 September 2016 Main events in September 1-2 Sept: Bern Symposium on Global Cybersecurity Awareness Messaging (Bern) 5-8 Sept: Global ICT Capacity Building Symposium

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

G8 Lyon-Roma Group High Tech Crime Subgroup

G8 Lyon-Roma Group High Tech Crime Subgroup G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies

More information

Internet Governance: Today and Tomorrow

Internet Governance: Today and Tomorrow Internet Governance: Today and Tomorrow Philip Smith Internet Society Board of Trustees APNIC 28 Beijing August 25, 2009 The Internet Society Founded in 1992 by Internet pioneers International non-profit

More information

DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific

DNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific DNS Abuse Handling FIRST TC Noumea New Caledonia Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific 10 September 2018 1 The Domain Name System (DNS) The root

More information

The Internet Governance Forum (IGF) Strasbourg, 1-2 April 2008

The Internet Governance Forum (IGF) Strasbourg, 1-2 April 2008 The Internet Governance Forum (IGF) Octopus Interface Conference Cooperation against Cybercrime Strasbourg, 1-2 April 2008 Chengetai Masango Programme and Technology Manager Secretariat of the Internet

More information

Internet Governance & Current Internet Eco-system. Filiz Yilmaz SNE Colloquium, University of Amsterdam September 2016

Internet Governance & Current Internet Eco-system. Filiz Yilmaz SNE Colloquium, University of Amsterdam September 2016 Internet Governance & Current Internet Eco-system Filiz Yilmaz SNE Colloquium, University of Amsterdam September 2016 koalafil@gmail.com Overview Who am, I why am I here? Brief History of Internet Internet

More information

The commission communication "towards a general policy on the fight against cyber crime"

The commission communication towards a general policy on the fight against cyber crime MEMO/07/199 Brussels, 22 May 2007 The commission communication "towards a general policy on the fight against cyber crime" The use of the term cyber crime in this communication There is no agreed definition

More information

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WORKING GROUP OF THE PLENARY Document DT/76- E 3 November 2014 Original: English WORKING GROUP OF THE PLENARY DRAFT RESOLUTION ITU'S

More information

Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011

Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011 Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011 Issue Benefits of the Internet & Cloud Computing Aspen Institute IDEA (9/12/11 draft) An unfettered flow of

More information

Cyber Security Roadmap

Cyber Security Roadmap Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different

More information

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

A Strategy for a secure Information Society Dialogue, Partnership and empowerment A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain

More information

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major

More information

Building digital societies in Asia: mobile government and m-services

Building digital societies in Asia: mobile government and m-services Building digital societies in Asia: mobile government and m-services Asia-Pacific Regional Forum on e-government, Smart Cities, and Digital Societies for Sustainable Development, August 2015 About the

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

NATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY. Task Team Leader

NATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY. Task Team Leader NATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY BY Task Team Leader Outline of Presentation Introduction Broadband and the Economy Broadband for Sustainable Development Ecosystem Driving Broadband

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

Internet Governance for Operators

Internet Governance for Operators Internet Governance for Operators Marco Hogewoning External Relations officer - technical adviser RIPE NCC WCIT IGF Plenipotentiary Conference ITRs ITU-D EuroDIG WTSA WSIS ITU-T WTPF WTDC WGIG Tunis agenda

More information

Inter-American Port Security Cooperation Plan

Inter-American Port Security Cooperation Plan Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation

More information

Comments submitted by IGTF-J (Internet Governance Task Force of Japan) *

Comments submitted by IGTF-J (Internet Governance Task Force of Japan) * submitted by IGTF-J (Internet Governance Task Force of Japan) * http:www.igtf.jp Do you have any comments on the process of determining the issues and their presentation by the WGIG? Yes. The purpose of

More information

BEST PRACTICE GUIDELINES ON POLICY AND REGULATORY INCENTIVE FOR AFFORDABLE ACCESS TO DIGITAL SERVICES

BEST PRACTICE GUIDELINES ON POLICY AND REGULATORY INCENTIVE FOR AFFORDABLE ACCESS TO DIGITAL SERVICES GSR17 BEST PRACTICE GUIDELINES ON POLICY AND REGULATORY INCENTIVE FOR AFFORDABLE ACCESS TO DIGITAL SERVICES Regulating the ever-changing ICT sector requires skills, foresight and innovation. Developing

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

Challenges in Developing National Cyber Security Policy Frameworks

Challenges in Developing National Cyber Security Policy Frameworks Challenges in Developing National Cyber Security Policy Frameworks Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection William McCrum Deputy Director General

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Thailand Initiatives and Challenges in Cyber Terrorism

Thailand Initiatives and Challenges in Cyber Terrorism Thailand Initiatives and Challenges in Cyber Terrorism Agenda Cyber-Terrorism weapons & tactics MICT Cyber Inspector Group IT Laws Development Challenges Cyber-Terrorism weapons & tactics What is Cyber-Terrorism?

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

July 13, Via to RE: International Internet Policy Priorities [Docket No ]

July 13, Via  to RE: International Internet Policy Priorities [Docket No ] July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

DNSSEC: A game changing example of multi-stakeholder cooperation. ICANN Meeting, Singapore 21 June 2011

DNSSEC: A game changing example of multi-stakeholder cooperation. ICANN Meeting, Singapore 21 June 2011 DNSSEC: A game changing example of multi-stakeholder cooperation ICANN Meeting, Singapore 21 June 2011 richard.lamb@icann.org ICANN ICANN is a global organization that coordinates the Internet s unique

More information

Concerns on IPv6 as a Public Policy Issue

Concerns on IPv6 as a Public Policy Issue Concerns on IPv6 as a Public Policy Issue Kuala Lumpur 3 March 2010 Xiaoya Yang Head, WTSA Programmes Division Telecommunication Standardization Bureau International Telecommunication

More information

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses

More information

Internet Governance and Coordination

Internet Governance and Coordination Internet Governance and Coordination Filiz Yilmaz SNE Colloquium, University of Amsterdam October 2013 koalafil@gmail.com Overview Who am I, why am I here? Brief History of Internet Internet Eco System:

More information

Internet Interconnection An Internet Society Public Policy Briefing

Internet Interconnection An Internet Society Public Policy Briefing Internet Interconnection An Internet Society Public Policy Briefing 30 October 2015 Introduction The Internet comprises thousands of independently owned, managed, and operated networks that connect with

More information

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

Proposed Guidelines for the Implementation and Progress Monitoring of the

Proposed Guidelines for the Implementation and Progress Monitoring of the Proposed Guidelines for the Implementation and Progress Monitoring of the Arab Regional Roadmap for Internet Governance Open consultation ends on 28 February 2011 December 2010 Preface Following five global

More information

ICANN Update RIPE Andrew McLaughlin

ICANN Update RIPE Andrew McLaughlin ICANN Update RIPE 35 24-2-00 Andrew McLaughlin The Basic Bargain ICANN = Internationalization of Policy Functions for DNS and IP Addressing systems + Private Sector (Non-governmental) Management What does

More information

Data Governance for Smart City Management

Data Governance for Smart City Management The 4th Asia-Pacific Regional Forum on Smart Sustainable Cities and e-government 2018 Data Governance for Smart City Management July 2018 Thanh Hoa City, Vietnam Mi Kyoung Park United Nations Project Office

More information

Joint Declaration by G7 ICT Ministers

Joint Declaration by G7 ICT Ministers Joint Declaration by G7 ICT Ministers (Action Plan on implementing the Charter) G7 ICT Ministers Meeting in Takamatsu, Kagawa - 29-30 April 2016 [Preamble] 1. We, the Information and Communication Technology

More information

Radio Research and Development Institute (NIIR) Moscow, Russian Federation

Radio Research and Development Institute (NIIR) Moscow, Russian Federation Radio Research and Development Institute (NIIR) Moscow, Russian Federation Proposals to ITU CWG-Internet open consultations on "Public Policy considerations for OTTs" September, 2017 In accordance with

More information

IMPORTANT GLOBAL CYBERLAW TRENDS 2017

IMPORTANT GLOBAL CYBERLAW TRENDS 2017 IMPORTANT GLOBAL CYBERLAW TRENDS 2017 BY PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA PRESIDENT, CYBERLAWS.NET HEAD, PAVAN DUGGAL ASSOCIATES, ADVOCATES The year 2017 promises to be a year of tremendous

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES, opportunities and challenges

RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES, opportunities and challenges 5 th SG 13 Regional Workshop for Africa on "ITU-T Standardization Work on Future Networks: Towards a Better Future for Africa" (Cairo, Egypt, 2-3 April 2017) RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES,

More information

Mapping to the National Broadband Plan

Mapping to the National Broadband Plan The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National

More information

Smart Sustainable Cities

Smart Sustainable Cities Smart Sustainable Cities In order to deal with increasing urbanization trends, smarter and more sustainable means of managing urban complexities, reducing urban expenditure, increasing energy efficiency

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

The Arab ICT Organization

The Arab ICT Organization The Arab ICT Organization UNCITRAL, 21-22 April, 2016 The Arab ICT Organization SUMMARY I. About AICTO : creation, organs, membership II. objectives III. Action Plan IV. Working groups V. Projects : the

More information

PacNOG-21. Migrating to IPv6 : Experiences from Asia-Pacific

PacNOG-21. Migrating to IPv6 : Experiences from Asia-Pacific PacNOG-21 Migrating to IPv6 : Experiences from Asia-Pacific Goals for a Sustainable Future : The SDGs 17 Sustainable Development Goals and 169 Targets Available for download at http://www.itu.int/en/itu-d/statistics/pages/publications/mis2017.aspx

More information

RESOLUTION 47 (Rev. Buenos Aires, 2017)

RESOLUTION 47 (Rev. Buenos Aires, 2017) Res. 47 425 RESOLUTION 47 (Rev. Buenos Aires, 2017) Enhancement of knowledge and effective application of ITU Recommendations in developing countries 1, including conformance and interoperability testing

More information

Michuki Mwangi Senior Education Manager ISOC. Policy Coherence in the Application of ICT for Development Paris, France th Sept 2009

Michuki Mwangi Senior Education Manager ISOC. Policy Coherence in the Application of ICT for Development Paris, France th Sept 2009 Michuki Mwangi Senior Education Manager ISOC Policy Coherence in the Application of ICT for Development Paris, France 10 11 th Sept 2009 African Internet Infrastructure Realities Satellite Infrastructure

More information

Global IT Law Internet Governance January 4, professor michael geist university of ottawa, faculty of law

Global IT Law Internet Governance January 4, professor michael geist university of ottawa, faculty of law Global IT Law Internet Governance January 4, 2017 professor michael geist university of ottawa, faculty of law domain name system - registrants Root server (mirrored, TLD info, ICANN control) Registries

More information

Valérie Andrianavaly European Commission DG INFSO-A3

Valérie Andrianavaly European Commission DG INFSO-A3 Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:

More information

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA Transition to IPv6 Drivers and Challenges Dr. Abdelfattah ABUQAYYAS ICT Consultant CITC- KSA 1 MAIN POINTS The ICT sector is developing rapidly - new services, and new modes of service delivery. The Internet

More information

Recommendations for Small and Medium Enterprises. Event Date Location

Recommendations for Small and Medium Enterprises. Event Date Location Recommendations for Small and Medium Enterprises Event Date Location B20 Structure B20 Members worldwide B20 Cross-thematic Group Small and Medium Enterprises CTG SMEs: Composition Coordination Group 129

More information

What is Internet Governance? How does Sweden take part in IG?

What is Internet Governance? How does Sweden take part in IG? What is Internet Governance? How does Sweden take part in IG? Erika Hersaeus, The Swedish Post and Telecom Agency (PTS) Agenda Introduction to PTS What is Internet Governance? Who are governing the Internet?

More information

Garry Mukelabai Communications Authority Zambia

Garry Mukelabai Communications Authority Zambia Garry Mukelabai Communications Authority Zambia ICT in Zambia. Current and Future Legislations. Way Forward? Pop 12 million. Zambia pioneers of internet in region. Over 10 Internet Service Providers Internet

More information

Protecting the Public Core of the Internet

Protecting the Public Core of the Internet Protecting the Public Core of the Internet Joanna Kulesza University of Lodz, Poland y Internet policy development reference frameworks global public goods global commons (Ostrom s common pool resource

More information