The Internet: Challenge, Opportunities, and Governance
|
|
- Annabella Lyons
- 5 years ago
- Views:
Transcription
1 6th International Conference on Advances in Computing & Communications 2016 Kochi, India, 6-8 Sep 2016 The Internet: Challenge, Opportunities, and Governance Raja Kumar Murugesan Deputy Dean
2 Introduction The Internet, will be shaping the economy and society of the 21 st century Smart technologies are shaping the landscape of possibilities connecting more people and things to each other Trends include Mobile Internet, Cloud, IoT, smart wearables, smart cars, smart cities and etc Ability to connect people, things and engage them more meaningfully will grow exponentially Infinite opportunities, comes with challenges such as security and privacy Continued evolution of the Internet impacts difficult issues to be addressed making Internet Governance significant & complex 2
3 Outline Internet Governance Who governs the Internet? Different perspectives Challenges Opportunities Future 3
4 Internet The Internet has evolved from a closed network to a critical, public and commercial infrastructure used by all Has no centralized control on technological implementations or policies for access and usage It operates by self-governance influenced by market mechanisms ISPs government agencies regulatory bodies businesses, associations standard setting organizations network engineers end users etc. 4
5 IG different perspectives More Internet dependency by the society, more Internet Governance (IG) relevancy IG is relevant to all from e-business to social network users Internet reflects different perspectives, approaches and policy Telecommunication specialists thru development of technical infrastructure Computer Specialists development of standards and protocols Human rights activists privacy, freedom of expression, other basic human rights Lawyers jurisdiction and dispute resolution Politicians techno-optimism, threats; child protection, internet security etc., Diplomats process and protection of national interest 5
6 The Internet and Governance Internet is Ubiquitous more users, more services offered Internet governance refers to the processes that impact how the Internet is managed How the Internet is governed is critical as it directly impacts our life, economic and social opportunities far into the future 6
7 Early IG, Late 1960s, DARPA net Mid 70s, TCP/IP invention IG Evolution 1986, IETF managed the development of the Internet through a cooperative, consensus based decision making. No centralization DNS war NSF subcontracted managing the DNS to Network Solutions Inc (NSI) Internet community did not like it, leading to DNS war New players came in, international organizations and governments Lead to the development of ICANN Establishment of ICANN led to most debates today 7
8 , World Summit on the Information Society (WSIS) WSIS placed IG on diplomatic agendas and established the Working Group on IG (WGIG) WSIS Tunis agenda 2005 elaborated on IG, definition, listing issues, establishing IG Forum (IGF) a multi-stakeholder body convoked by the UN Secretary General expiration of the MoU and establishment of a new MoU between ICANN and US DoC There was hope that ICANN would eventually become an International organization ITU announced a stronger focus on cybersecurity and development assistance ICANNs discussion on.xxx domain Debates on whether ICANN should only be concerned with technical problems or should include public policy Intervention by US and other governments on.xxx domain raised the question on national governments participation in ICANN deliberations8
9 companies such as Google, Yahoo and facebook felt that a change in the Internet Architecture with a breach in net neutrality would endanger their business telcos such as Verizon, AT& T, ISPs and the multimedia industry wished to see some differentiation in packets travelling on the Internet Fast growth of social networking and increased use of web 2.0 tools opened up issues of privacy and data protection Affirmation of commitments between ICANN and US DoC to make ICANN a more independent organization 2010 IG debate was the impact of fast growing social media that includes protection of privacy of users ICANNs Introduction of non ASCII domain names for Arabic and Chinese, and approval of.xxx domain for adult materials Jan Egyptian authorities cut access to the Internet, a first example of country wide Internet blackout ordered by a government 9
10 2012 Introduction of new generic Top Level Domains (gtld) 2013 Snowden revelations on the US National Security Agencies (NSA) various surveillance programmes Snowden s revelations made global public to be interested in the way Internet is governed Main concern was data protection and privacy rights 2014 The US government asks the Internet community for a plan for moving IANAs oversight to the global multistakeholder community 2016 In March, the proposal on multistakeholder approach was submitted and in Aug NTIA stated that they will allow the IANA contract to expire 1 st Oct
11 Internet Governance reference framework IG is complex as it involves many issues, actors, mechanisms, procedures, and instruments One approach focuses on technical, the Internet Infrastructure (IP address, DNS, and root servers) and ICANNs position in this field the other focuses on policy (legal, economical, developmental and sociocultural issues) Technical and policy coherence Difficult to separate the two as Technical solutions are not neutral Each technical solution promotes certain interests, empowers certain groups, and to certain extent impacts social, political and economic life Internet for a long time both technical and policy was governed by one group the early Internet community Due to business and government actors it is difficult to be governed together 11
12 Old vs New approach Old approach, existing laws with minor adjustments could be applied to the Internet Cyber approach, Internet is fundamentally a different communication system hence, it requires a different form of governance Decentralized vs centralized structure of IG IG structure should reflect the very nature of Internet i.e. network of networks It is so complex that it cannot be governed by a single international organization Decentralized IG was one of the reason for the fast internet growth This view is supported by the technical community and developed countries Centralized approach is argued by the developing countries due to limited human and financial resources availability 12
13 Protection of Public Interest on the Internet Main strength of the Internet is its public nature that has enabled its fast growth, and creativity How to protect the public nature of the internet is one of the core issues The core internet infrastructure from intercontinental backbones and local area networks are owned by private Whether this privately owned property can be managed in the public interest? This has been the main discussion on network neutrality Geography and the Internet Policy Uncertainty Policy Balancing act Holistic approach and prioritization 13
14 Internet Governance Different Different Perspectives: Perspectives Infrastructure Legal Economic Development Sociocultural 14
15 Infrastructure
16 Telecommunication Infrastructure Regulation national and international by many public and private ITU sets technical standards, telecommunication specific international regulations, assist developing countries telecommunication systems, the allocation of the radio spectrum, and the management of satellite positioning International telecommunication regulations, liberalization of pricing and services in the internet field WTO - provides framework for general market rules Liberalization of telecommunication market worldwide 16
17 Telecommunication Infrastructure The last mile (local loop) issues Last mile problem affects use of the Internet Solution Technology > Wireless Liberalization of this segment of the telecom market Liberalization of telecom markets New communication services over existing infrastructures Developing countries challenges Liberalize and make the market bigger and efficient or preserve income form exiting telcos monopolies 17
18 Issues contd.. Establishment of technical infrastructure standards Set increasingly by private and professional institutions WiFi standard (IEEE b) by IEEE Certification of WiFi compatible equipment by WiFi allliance The above helps institutions to influence the market Who owns the electromagnetic spectrum? Currently managed by governments, regional initiatives (e.g. EU Radio Spectrum Committee (RSC) and the Radio Spectrum Policy Group (RSPG) and the ITU Spectrum is now conceived as less scarce due to its efficient use with new technologies Hence, should be open spectrum free from government regulation 18
19 Issues contd.. Open Spectrum > two potential problems Telcos investment to operate 3G network Free not necessarily mean will be used by many as public Only used by those who have technical capabilities Governments needed solutions for efficient use of the spectrum due to increasing demand for spectrum Digital television has allowed release part of the radio spectrum for other services digital dividend 19
20 TCP/IP TCP/IP, Key Internet Technical standard IG w.r.to TCP/IP Introduction of Standards, set by IETF IP address distribution follows a hierarchy IANA a subsidiary of ICANN distributes blocks of IP to the 5 RIRs RIRs distribute to LIRs and/or NIRs LIR/NIRs to ISPs and companies, and ISPs to individuals 20
21 Limitation of IP addresses IPv4 exhausted! Solution? Issues NAT quick fix CIDR by the RIRs IPv6 transition - long term solution Challenges with IPv6? transition Backward compatibility Technical assistance IPv6 distribution policy framework 21
22 Issues contd.. Changes in TCP/IP and cybersecurity Original Internet was closed, Security was no issue, not in mind Intrinsic security requires changes to the TCP/IP IPv6 provides some security, but not substantial Technology, standards and policies could bring conflict of interest?! Competing businesses and/or national interest Changes in TCP/IP and limited bandwidth Real-time applications QoS sensitive Multimedia services and content need minimum QoS to guarantee minimum level of performance QoS requirement may require changes in IP that could be a potential challenge to Network neutrality principles! 22
23 DNS Creation of new TLDs is unlimited But, creation of new gtlds had been slow and debated process 2012 ICANN began new gtld programme Any organization can apply to run a new gtld registry Opposition trademark concerns and cyber-squatting ICANNs new policy consultation Resolving competing claims for gtlds Cybersquatting Public morality Registration fees, and others 23
24 Issues contd.. Management of Country domains IANA reiterates the ISO standards for country codes Who should manage cctlds? Countries trying gaining control over their cc domains ICANNs approval on transition No conflict from interested stakeholders within the country Follow Governmental Advisory Committee (GAC) principles for the delegation of cctld administration Follow Best practices proposed by World Wide Alliance of Toplevel Domains Reluctance of many cc domain operators to become part of ICANN system ICANN is formulating Accountability Frameworks as less formal way to solve the above concern. ICANN, in May2010 started approving TLDs in other than in English scripts IDN is one of the success of the IG regime 24
25 Root servers 13 root servers in the world, maximum technically possible USA: 10, Sweden: 1, Netherlands: 1, Japan: 1 Even all 13 go down, domain name resolution can still function thru other domain name servers distributed hierarchically throughout the Internet Root servers are replicated thru anycast, resolving servers are close to end-user Root zone files are approved by US government proposed by IANA and given to root server managing companies Verisign operates the master root server that updates content approved by DoC The files in the master are then replicated to the root servers This is a concern for many governments as unilateral changes could be made to the master root server 25
26 Issues Internationalization of the control of root servers One country responsible for the content of the root servers was a concern US government to pass supervision of IANA to a new mechanism by 30 Sep 2015 Transition should be guided by - Support and enhance the multi-stakeholder model - Maintain the security, stability, and resiliency of the Internet DNS - Maintain the openness of the Internet Alternative root servers, feasibility and risks Single vs alternative root server system possible discussion? 26
27 Internet Access - issues Should the internet infrastructure be considered a public service? IBPs and critical infrastructures Telecommunication liberalization and the role of ISPs and IBPs 27
28 Network Neutrality - Issues Economic Human right issues, have and have nots? A lot to discuss. Who are the main players and arguments? Basic principles Policy approaches Developed and developing countries International Organizations and NGOs Open issues 28
29 Standardization
30 Web standards TCP/IP facilitated communication, but lacked applications HTML as the basis of the www led to internets exponential growth HTML evolved into XML with W3C for application standardization W3C has not influenced internet governance 30
31 Cloud Computing Data has moved from hard disks to the cloud Started with the use of online mail servers and applications such as Yahoo, Gmail, facebook, Twitter, wiki, blogs etc. More devices are connected to the Internet High dependency leads to pressure on robustness and reliability Privacy and data protection on who will have access to our data Digital information assets, national borders, regulations etc. 31
32 Common standards for smooth data transfer between different cloud operators Adoption of open standard is considered as another option Google has already started Data Liberation front, open standards towards data transfer between clouds Safe Harbour agreement between EU and US does not seems to work well on privacy and data protection Especially after the Snowden s leaks of mass surveillance Other governance issues in cloud computing may follow 32
33 Convergence Telecommunications, broadcasting and information delivery were handled by different technologies and regulations Today, the Internet has converged technological platforms for these While technical convergence is happening rapidly, its economic and legal consequences will take time to evolve 33
34 Economic Issues Convergence has reshaped traditional markets putting companies operating on separate domains into direct competition Legal framework Convergence opens up several governance and regulatory questions What happens to existing national and international telephony and broadcasting organizations? Will new organizations be developed that focus mainly on the Internet? Should the regulation of convergence be carried out by public authorities or self-regulation? E.g., Malaysia implemented Communications and Multimedia Act in 1988 as a general framework for the regulation of convergence EUs regulatory framework for electronic communication moved to national laws So are Swiss Telecommunication laws and regulations 34
35 Risk of convergence cable operators and ISPs Broadband internet is introduced thru cable in many countries e.g. US, and is more popular than ADSL Concerns are, cable operators could buffer between users and the Internet challenging the net neutrality principle Cable is not regulated by common carrier rules that applies to telephony that specifies access should be non discriminatory Cable operators could block certain applications, block access to certain materials, surveillance possibilities, and ability to violate privacy This may lead to Internet monopolies If The cable Internet is for telecommunication service and not information service then regulation has to follow common carrier rules 35
36 Cybersecurity - Issues Type of action data interception, illegal access, spyware, data corruption, sabotage, denial-of-service, and identity theft. Type of perpetrator possibilities include hackers, cybercriminals, cyber-warriors, and cyberterrorists. Type of target - ranges from individuals, private companies, and public institutions to critical infrastructures, governments, and military assets. 36
37 Cybersecurity framework Includes policy principles, instruments, and institutions dealing with cybersecurity Critical Information Infrastructure Protection Global critical infrastructure now depends on the Internet e.g., energy, transport and finance Vulnerability of the Internet is the vulnerability of modern society Cybercrime Cooperation is missing combating cybercrime black markets where easy to use digital weapons like viruses and botnets are easily available as outsourced services Cyber conflicts or Cyberwar has high media visibility but still low policy and legal regulations at a very early stage 37
38 Cybersecurity policy initiatives ITU s X.509 standards provides the basis for PKI used in https ITUs Global Security Agenda includes legal measures, policy cooperation and capacity building Commonwealth Cybercrime Initiative (CCI) to improve legislation and capacity of member states to handle cybercrime G8 s Subgroup on High Tech Crime establishing 24/7 communication between cybersecurity centres of member states to tackle cybercrime and promote cooperation between ICT industry and law enforcement agencies Council of Europe s Convention on Cybercrime Stanford Draft Convention on Protection from Cyber Crime and Terrorism recommends the establishment of an international body, the Agency for Information Infrastructure Protection (AIIP) 38
39 Influence of Internet Architecture on Cybersecurity Early Internet focus was on developing internet standards and applications, security was not priority Should we modify the current internet infrastructure or build security on the existing non-secure internet infrastructure Will this change affect other Internet openness, transparency and other features Though security related improvements on the internet protocol has been slow there are progress e.g. DNSSEC DNSSEC implementation challenges are there over the hierarchy of DNS registrars, ISPs and website hosts Security by design into technologies hardware, software and protocols will add security Vulnerabilities of the Internet are taken advantage for their own interests Human rights apart form value-based priority should also ensure the Internet is open and secure End users are the pillars of cybersecurity and they are the weakest link 39
40 Encryption, Spam encryption has become affordable for any Internet users, including criminals and terrorists There are governance issues in finding the right balance between respecting privacy of communication of Internet users and the need for governments to monitor communication relevant for the national security (potential criminal and terrorist activity remains an issue) statistics in 2014 says, 66% of traffic is spam Filtering spam has only limited effects, better to fight it thru technical and legal US, Can-Spam law, EUs anti-spam law weakness is cross-border spam Different definition of Spam prevents international anti-spam mechanism Authentication of could prevent fake address but anonymity is lost. Technical issue may affect policy Most spam originate across the country, needs global cooperation, capacity building and info exchange to combat 40
41 Legal
42 Legislation Legislation activities are progressing intensively in the Internet field especially with EU and OECD The priority areas are privacy, data protection, IP and cybercrime Too complex to regulate only thru legislation as society is dynamic Social norms prohibit certain behavior thru peer pressure E.g. Wikipedia has been evolving in to self-regulation ICANN proposed self-regulation as the preferred mechanism to regulate the Internet. Noticeable among ISPs Risks remains on areas of high public interest such as content policy, freedom of expression, protection of privacy Legal instruments International public & private laws, conventions, customary law Challenge is how to create a balance? 42
43 Internet Economy
44 Economic Issues More money has introduced more business and policy interest Challenges There should be optimal balance between Technical Efficiency, Economic Efficiency, and Social effects Replacing the existing flat-rate pricing structure with accounting based on packet traffic Changing the current Internet economic policies would open a Pandora s box Transactions over the Internet: E-Commerce, Internet Content Economy, Internet Access Economy, E-payments and cybercurrency issues: customer protection (privacy, data protection, cybersecurity), taxation, and digital signatures, detailed implementation standards, risk of incompatability 44
45 Internet Development
46 Digital divide Access and capabilities to use the Internet for technical, political, social or economic reasons Digital divide reflects socioeconomic inequalities in education, healthcare, employment, clean water and food Should facilitate Universal access, strategies, financial support, sociocultural aspects (literacy, ICT skills, training & education) Policies and institutional aspect 46
47 Sociocultural
48 Internet is a social phenomenon Internet has made considerable social and cultural impact on modern society Includes, privacy, freedom of expression, rights to receive information, rights protecting cultural, linguistic, and minority diversity, right to education Internet access Estonia, legal guarantee of right to access the Internet Finland, in 2010 all citizens have the right to 1 Megabit broadband connection Need to develop necessary software, hardware, content, standards and policy frame work to protect rights of people with disabilities Content control and policy through human rights, government and technology tools 48
49 Issues Effectiveness of content control and who should be responsible Education issues: quality assurance, recognition of degrees, online learning Child safety online: cyberbullying, abuse and sexual exploitation, violent games, addressing these challenges Balance between private and public interest Protecting the Internet as a Global public good 49
50 Internet Governance
51 Multistakeholder Approach IG has a wide variety of stakeholders National governments, international organizations, business organizations, civil societies, technical community and the end-users Efforts has been to the convergence of these actors in following an institutional approach Multistakeholder decision-making is accountable, sustainable and effective Creative solutions, a policy framework that balance public interests and private initiatives 51
52
53 Conclusion The multistakeholder approach for the Internet Governance is critical for ensuring the future of the Internet as a key driver for social and economic innovation Internet governance should promote universal, equal opportunity, affordable and high quality Internet access so it can be an effective tool for enabling human development and social inclusion The Internet is for everyone; let s work together to realize its full potential 53
54 Q&A
Related to the Internet
International Public Policy Issues Related to the Internet and the Role of the Governments Regional Follow-up to the Outcome of the World Summit on the Information Society Marco Obiso ICT Applications
More informationCIGF Terminology and Concepts. C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U )
+ CIGF Terminology and Concepts C a r i b b e a n Te l e c o m m u n i c a t i o n s U n i o n ( C T U ) What We Will Cover Fundamentals IG Actors Common Acronyms Concepts Infrastructure Legal Socio Cultural
More informationUNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG
Document WSIS-II/PC-3/CONTR/035-E 17 August 2005 Original: English UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG Y:\APP\PDF_SERVER\ALL-USER\IN\COORDUNIT\WGIG-COVER.DOC 17.08.05 17.08.05 www.itu.int/wsis
More informationTHE INTERNET GOVERNANCE ECOSYSTEM. Mr. Chengetai Masango Programme and Technology Manager, IGF Secretariat
THE INTERNET GOVERNANCE ECOSYSTEM Mr. Chengetai Masango Programme and Technology Manager, IGF Secretariat Overview - The Internet - Governance - Internet Governance - The Internet Governance Ecosystem
More informationInternet Governance and the World Summit on the Information Society (WSIS)
Internet Governance and the World Summit on the Information Society (WSIS) Dr Tim Kelly, Head, Strategy and Policy Unit, ITU & Secretary, Content Sub-Committees, WSIS Internet Governance Workshop, Bangkok,
More informationFundamental Principles of the Internet. Open, Distributed and Bottom-up.
Fundamental Principles of the Internet Open, Distributed and Bottom-up. 1 Internet s history = Giving rise to the governance principles that are open, interconnected, distributed, and transnational!2 Source:
More informationGSR-14 Internet Governance: an overview of the situation
GSR-14 Internet Governance: an overview of the situation Jeferson Fued Nacif Head, International Affarirs Office, Anatel, Brazil 2014 Agenda 1. Internet Governance 2. Why it is important Regulator s perspective
More informationInternet Governance in April April 2016
Internet Governance in April 2016 26 April 2016 Main events in April 3-6 Apr: Global Privacy Summit 2016 (Washington DC) 3-8 Apr: IETF 95 (Buenos Aires) 4-6 Apr: IGF Open Consultations and MAG meeting
More informationCybersecurity & Spam after WSIS: How MAAWG can help
Cybersecurity & Spam after WSIS: How MAAWG can help MAAWG Brussels Meeting 27-29 June 2006 Robert Shaw Deputy Head ITU Strategy and Policy Unit International Telecommunication Union 28 June 2006 1 Setting
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationRESOLUTION 130 (REV. BUSAN, 2014)
RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International
More informationDraft Resolution for Committee Consideration and Recommendation
Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations
More information2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope
Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your
More informationRESOLUTION 45 (Rev. Hyderabad, 2010)
212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference
More informationInternet Governance. Mr. Samiran Gupta Head of India, ICANN
Internet Governance Mr. Samiran Gupta Head of India, ICANN samiran.gupta@icann.org Today, more than 3.7 billion 1 people across the globe or over 50% of the world s population can access the Internet.
More informationWhere Now? A Rough Guide to Global Internet Governance Post-WSIS. Don MacLean Oxford Internet Institute May 19, 2006
Where Now? A Rough Guide to Global Internet Governance Post-WSIS Don MacLean Oxford Internet Institute May 19, 2006 Overview The Results of WSIS Where are we now? Where are we heading in the future? The
More informationModule 4: ICT Trends for Government Leaders
Module 4: ICT Trends for Government Leaders SESSION 4: Internet Applications Internet Organizations Author: Rajnesh D. Singh Internet Applications Tendency to define the public face of the Internet i.e.
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More informationCommonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017
Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information
More informationLiberia ICT Policy
Liberia ICT Policy 2017-2021 Initial Stakeholders Consultation Eleanor Sarpong Head of Policy and Advocacy November 23, 2016 a4ai.org Goals of consultation To convene under the auspices of the GoL (MoPT
More informationWSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!
FACILITATED BY: WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015! WSIS Forum 2012 was held from the 14-18th of May in Geneva. WSIS Forum 2012 resulted in an Outcome Document that aims
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationCybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce
Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce 5-8 September 2017 Yogyakarta, Indonesia Sameer Sharma Senior Advisor ITU Digital Infrastructure for Connectivity SDGs Evolution
More informationPlenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014
Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 PLENARY MEETING Addendum X to Document 79- E 07 September 2014 Original: English Arab States ARAB STATES COMMON PROPOSALS FOR THE WORK
More informationDIGITAL AGENDA FOR EUROPE
DIGITAL AGENDA FOR EUROPE Talk overview Background Institutional framework Administrative capacities Electronic Communications Strategy, Information Society Strategy Current and future activities. Background
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationGAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007
GAC PRINCIPLES REGARDING gtld WHOIS SERVICES Presented by the Governmental Advisory Committee March 28, 2007 1.1 The purpose of this document is to identify a set of general public policy issues and to
More informationICANN and Internet Governance. Pierre Dandjinou, VP ; Africa. AIS, Lusaka 17 JUNE 2013
ICANN and Internet Governance Pierre Dandjinou, VP ; Africa AIS, Lusaka 17 JUNE 2013 Agenda Today + ICANN Past and Present + The IG Ecosystem + The Internet Governance Debate + Some predictions. 2 ICANN
More informationE Government in Tonga
Asia Pacific Regional Forum on e Government, 19 20 August 2015, Bangkok E Government in Tonga Presented by: Mr. Paula P. Ma u CEO MEIDECC Presentation Outline I. Background II. National ICT Plan III. E
More informationLegal framework of ensuring of cyber security in the Republic of Azerbaijan
Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles
ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability Session 2: Conformity Assessment Principles 12-16 October 2015 Beijing, China Keith Mainwaring ITU Expert Agenda 1. Context
More informationCOUNTERING COUNTERING SPAM IN A DIGITAL WORLD
IN A DIGITAL WORLD EU SYMPOSIUM 2006 15 June 2006 Maastricht, The Netherlands Cristina Bueti Cristina Bueti Project Officer Strategy and Policy Unit (SPU) International Telecommunication Union www.itu.int/spam
More informationRESOLUTION 67 (Rev. Buenos Aires, 2017)
524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,
More informationInternet Governance in September September 2016
Internet Governance in September 2016 27 September 2016 Main events in September 1-2 Sept: Bern Symposium on Global Cybersecurity Awareness Messaging (Bern) 5-8 Sept: Global ICT Capacity Building Symposium
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationG8 Lyon-Roma Group High Tech Crime Subgroup
G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies
More informationInternet Governance: Today and Tomorrow
Internet Governance: Today and Tomorrow Philip Smith Internet Society Board of Trustees APNIC 28 Beijing August 25, 2009 The Internet Society Founded in 1992 by Internet pioneers International non-profit
More informationDNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific
DNS Abuse Handling FIRST TC Noumea New Caledonia Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific 10 September 2018 1 The Domain Name System (DNS) The root
More informationThe Internet Governance Forum (IGF) Strasbourg, 1-2 April 2008
The Internet Governance Forum (IGF) Octopus Interface Conference Cooperation against Cybercrime Strasbourg, 1-2 April 2008 Chengetai Masango Programme and Technology Manager Secretariat of the Internet
More informationInternet Governance & Current Internet Eco-system. Filiz Yilmaz SNE Colloquium, University of Amsterdam September 2016
Internet Governance & Current Internet Eco-system Filiz Yilmaz SNE Colloquium, University of Amsterdam September 2016 koalafil@gmail.com Overview Who am, I why am I here? Brief History of Internet Internet
More informationThe commission communication "towards a general policy on the fight against cyber crime"
MEMO/07/199 Brussels, 22 May 2007 The commission communication "towards a general policy on the fight against cyber crime" The use of the term cyber crime in this communication There is no agreed definition
More informationPlenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014
Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WORKING GROUP OF THE PLENARY Document DT/76- E 3 November 2014 Original: English WORKING GROUP OF THE PLENARY DRAFT RESOLUTION ITU'S
More informationCross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011
Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011 Issue Benefits of the Internet & Cloud Computing Aspen Institute IDEA (9/12/11 draft) An unfettered flow of
More informationCyber Security Roadmap
Cyber Security Roadmap The Hague, 25 May 2011 Security: Developing a Secure Cyberspace Protecting the 5 th Domain As with land, sea, air and space, a safe Cyberspace is crucial for our societies. Different
More informationA Strategy for a secure Information Society Dialogue, Partnership and empowerment
A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationProgram 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR
Program The structure of the workshop will be fully participatory for each session. We will ask several participants to take the lead in some panels, and to present the main challenges or comment on certain
More informationTO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME
INTERPOL FOUNDATION TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME TOGETHER WE CAN MAKE THE WORLD SAFER Every age is defined by the innovations it brings, the way in which it responds to the major
More informationBuilding digital societies in Asia: mobile government and m-services
Building digital societies in Asia: mobile government and m-services Asia-Pacific Regional Forum on e-government, Smart Cities, and Digital Societies for Sustainable Development, August 2015 About the
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationNATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY. Task Team Leader
NATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY BY Task Team Leader Outline of Presentation Introduction Broadband and the Economy Broadband for Sustainable Development Ecosystem Driving Broadband
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationInternet Governance for Operators
Internet Governance for Operators Marco Hogewoning External Relations officer - technical adviser RIPE NCC WCIT IGF Plenipotentiary Conference ITRs ITU-D EuroDIG WTSA WSIS ITU-T WTPF WTDC WGIG Tunis agenda
More informationInter-American Port Security Cooperation Plan
Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation
More informationComments submitted by IGTF-J (Internet Governance Task Force of Japan) *
submitted by IGTF-J (Internet Governance Task Force of Japan) * http:www.igtf.jp Do you have any comments on the process of determining the issues and their presentation by the WGIG? Yes. The purpose of
More informationBEST PRACTICE GUIDELINES ON POLICY AND REGULATORY INCENTIVE FOR AFFORDABLE ACCESS TO DIGITAL SERVICES
GSR17 BEST PRACTICE GUIDELINES ON POLICY AND REGULATORY INCENTIVE FOR AFFORDABLE ACCESS TO DIGITAL SERVICES Regulating the ever-changing ICT sector requires skills, foresight and innovation. Developing
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationChallenges in Developing National Cyber Security Policy Frameworks
Challenges in Developing National Cyber Security Policy Frameworks Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection William McCrum Deputy Director General
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationThailand Initiatives and Challenges in Cyber Terrorism
Thailand Initiatives and Challenges in Cyber Terrorism Agenda Cyber-Terrorism weapons & tactics MICT Cyber Inspector Group IT Laws Development Challenges Cyber-Terrorism weapons & tactics What is Cyber-Terrorism?
More informationChina and International Governance of Cybercrime
China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of
More informationJuly 13, Via to RE: International Internet Policy Priorities [Docket No ]
July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationKENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D
KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationUN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security
UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia
More informationDNSSEC: A game changing example of multi-stakeholder cooperation. ICANN Meeting, Singapore 21 June 2011
DNSSEC: A game changing example of multi-stakeholder cooperation ICANN Meeting, Singapore 21 June 2011 richard.lamb@icann.org ICANN ICANN is a global organization that coordinates the Internet s unique
More informationConcerns on IPv6 as a Public Policy Issue
Concerns on IPv6 as a Public Policy Issue Kuala Lumpur 3 March 2010 Xiaoya Yang Head, WTSA Programmes Division Telecommunication Standardization Bureau International Telecommunication
More informationNetherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice
Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses
More informationInternet Governance and Coordination
Internet Governance and Coordination Filiz Yilmaz SNE Colloquium, University of Amsterdam October 2013 koalafil@gmail.com Overview Who am I, why am I here? Brief History of Internet Internet Eco System:
More informationInternet Interconnection An Internet Society Public Policy Briefing
Internet Interconnection An Internet Society Public Policy Briefing 30 October 2015 Introduction The Internet comprises thousands of independently owned, managed, and operated networks that connect with
More informationICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia
ICANN and Russia Dr. Paul Twomey President and CEO 10 June 2007 1 ICANN s mission To coordinate, overall, the global Internet's system of unique identifiers, and to ensure stable and secure operation of
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationProposed Guidelines for the Implementation and Progress Monitoring of the
Proposed Guidelines for the Implementation and Progress Monitoring of the Arab Regional Roadmap for Internet Governance Open consultation ends on 28 February 2011 December 2010 Preface Following five global
More informationICANN Update RIPE Andrew McLaughlin
ICANN Update RIPE 35 24-2-00 Andrew McLaughlin The Basic Bargain ICANN = Internationalization of Policy Functions for DNS and IP Addressing systems + Private Sector (Non-governmental) Management What does
More informationData Governance for Smart City Management
The 4th Asia-Pacific Regional Forum on Smart Sustainable Cities and e-government 2018 Data Governance for Smart City Management July 2018 Thanh Hoa City, Vietnam Mi Kyoung Park United Nations Project Office
More informationJoint Declaration by G7 ICT Ministers
Joint Declaration by G7 ICT Ministers (Action Plan on implementing the Charter) G7 ICT Ministers Meeting in Takamatsu, Kagawa - 29-30 April 2016 [Preamble] 1. We, the Information and Communication Technology
More informationRadio Research and Development Institute (NIIR) Moscow, Russian Federation
Radio Research and Development Institute (NIIR) Moscow, Russian Federation Proposals to ITU CWG-Internet open consultations on "Public Policy considerations for OTTs" September, 2017 In accordance with
More informationIMPORTANT GLOBAL CYBERLAW TRENDS 2017
IMPORTANT GLOBAL CYBERLAW TRENDS 2017 BY PAVAN DUGGAL ADVOCATE, SUPREME COURT OF INDIA PRESIDENT, CYBERLAWS.NET HEAD, PAVAN DUGGAL ASSOCIATES, ADVOCATES The year 2017 promises to be a year of tremendous
More informationEU policy on Network and Information Security & Critical Information Infrastructures Protection
EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and
More informationRWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES, opportunities and challenges
5 th SG 13 Regional Workshop for Africa on "ITU-T Standardization Work on Future Networks: Towards a Better Future for Africa" (Cairo, Egypt, 2-3 April 2017) RWANDA S APPROACH TOWARDS EMERGING TECHNOLOGIES,
More informationMapping to the National Broadband Plan
The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National
More informationSmart Sustainable Cities
Smart Sustainable Cities In order to deal with increasing urbanization trends, smarter and more sustainable means of managing urban complexities, reducing urban expenditure, increasing energy efficiency
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationThe Arab ICT Organization
The Arab ICT Organization UNCITRAL, 21-22 April, 2016 The Arab ICT Organization SUMMARY I. About AICTO : creation, organs, membership II. objectives III. Action Plan IV. Working groups V. Projects : the
More informationPacNOG-21. Migrating to IPv6 : Experiences from Asia-Pacific
PacNOG-21 Migrating to IPv6 : Experiences from Asia-Pacific Goals for a Sustainable Future : The SDGs 17 Sustainable Development Goals and 169 Targets Available for download at http://www.itu.int/en/itu-d/statistics/pages/publications/mis2017.aspx
More informationRESOLUTION 47 (Rev. Buenos Aires, 2017)
Res. 47 425 RESOLUTION 47 (Rev. Buenos Aires, 2017) Enhancement of knowledge and effective application of ITU Recommendations in developing countries 1, including conformance and interoperability testing
More informationMichuki Mwangi Senior Education Manager ISOC. Policy Coherence in the Application of ICT for Development Paris, France th Sept 2009
Michuki Mwangi Senior Education Manager ISOC Policy Coherence in the Application of ICT for Development Paris, France 10 11 th Sept 2009 African Internet Infrastructure Realities Satellite Infrastructure
More informationGlobal IT Law Internet Governance January 4, professor michael geist university of ottawa, faculty of law
Global IT Law Internet Governance January 4, 2017 professor michael geist university of ottawa, faculty of law domain name system - registrants Root server (mirrored, TLD info, ICANN control) Registries
More informationValérie Andrianavaly European Commission DG INFSO-A3
Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:
More informationWorkshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA
Transition to IPv6 Drivers and Challenges Dr. Abdelfattah ABUQAYYAS ICT Consultant CITC- KSA 1 MAIN POINTS The ICT sector is developing rapidly - new services, and new modes of service delivery. The Internet
More informationRecommendations for Small and Medium Enterprises. Event Date Location
Recommendations for Small and Medium Enterprises Event Date Location B20 Structure B20 Members worldwide B20 Cross-thematic Group Small and Medium Enterprises CTG SMEs: Composition Coordination Group 129
More informationWhat is Internet Governance? How does Sweden take part in IG?
What is Internet Governance? How does Sweden take part in IG? Erika Hersaeus, The Swedish Post and Telecom Agency (PTS) Agenda Introduction to PTS What is Internet Governance? Who are governing the Internet?
More informationGarry Mukelabai Communications Authority Zambia
Garry Mukelabai Communications Authority Zambia ICT in Zambia. Current and Future Legislations. Way Forward? Pop 12 million. Zambia pioneers of internet in region. Over 10 Internet Service Providers Internet
More informationProtecting the Public Core of the Internet
Protecting the Public Core of the Internet Joanna Kulesza University of Lodz, Poland y Internet policy development reference frameworks global public goods global commons (Ostrom s common pool resource
More information