Draft Resolution for Committee Consideration and Recommendation
|
|
- Herbert Leonard
- 6 years ago
- Views:
Transcription
1 Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations to the Model United Nations College of Charleston, 2013 Convinced that communication, the capacity for early warning, and the dissemination of information throughout the global populace are key features for the sustainability of a choiceworthy digital environment, Having considered that the dissemination and use of information technologies and means affect the interests of the entire international community and that optimum effectiveness is enhanced by broad international cooperation, Recalling, in this connection, the approaches and principles outlined at the Information Society and Development Conference, held in Midrand, South Africa, in May 1996 and the proposal lead by China, Russia, Tajikistan, and Uzbekistan in the creation of an International code of conduct for information security in September 2011, Noting with appreciation General Assembly Resolution 54/49 and GA Resolution 55/28, which call upon Members States to consider the advisability of developing international principles that would enhance the security of global information and telecommunications systems and help to combat information terrorism and criminality, Acknowledging GA Resolution 56/19 which acknowledges the need to preserve the free flow of information while considering possible measures to limit the threats of information security, and GA Resolution 57/239 on the Creation of a global culture of cybersecurity, Reaffirming Article 10 of the UN Convention on Anti-corruption which encourages countries to adopt measures to improve public access to information as a means to fight corruption, Further reaffirming Article 13 of the aforementioned Convention which states that each State Party shall take appropriate measures to promote the active participation of individuals and groups in the prevention of and the fight against corruption by enhancing transparency and promoting the contribution of the public to decision- making processes and ensuring that the public has effective access to information, Emphasizing Article 19 of both the Universal Declaration on Human Rights and the International Covenant on Civil and Political Rights which provides that every person shall have the right to free expression and to seek and impart information,
2 Bearing in mind the Freedom of Information Law enacted on July 4, 1966 in the United States of America which provides that any person has a right, enforceable in court, to obtain access to federal agency records, except to the extent that such records (or portions of them) are protected from public disclosure by one of three special law enforcement record exclusions, Keeping into consideration the efforts of the Freedom of Information Project of PI, the UN Special Rapporteur on Freedom of Opinion and Expression who have endorsed principles on freedom of information as both an essential part of freedom of speech and as an important human right on its own, Taking into consideration GA Resolution 58/32 on the role of science and technology in the context of international security, in which, it recognized that scientific and technological developments could have both civilian and military applications, Noting with approval of the GA Resolution 60/45 on the report of the Secretary-General on the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, prepared on the basis of the results of the Group s work, Restating GA Resolution 57/53 concerning the creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information infrastructures, Reaffirming the need to harness the potential of information and communications technologies to promote the achievement of the internationally agreed development goals, including the Millennium Development Goals, and recognizing that gaps in access to and use of information technologies by States can diminish their economic prosperity, and the effectiveness of cooperation in combating the criminal misuse of information technology and in creating a global culture of cybersecurity, Stressing the need for enhanced efforts to close the digital divide in order to achieve universal access to information and communication technologies and to protect critical information infrastructures by facilitating the transfer of information technology, Recognizing that national efforts should be supported by international information-sharing and collaboration, so as to effectively confront the increasingly transnational nature of such threats and the work of relevant regional and international organizations on enhancing cybersecurity, and reiterating their role in encouraging national efforts and fostering international cooperation, Noting also the 2009 Report of the International Telecommunication Union on securing information and communication networks: best practices for developing a culture of cybersecurity, which focused on a comprehensive national approach to cybersecurity consistent with free speech, the free flow of information, and due process of law, Acknowledging Resolution 66/152 concerning the UNODA report by the Security General which provides a framework for protection from information security threats, and sets international legal principles including those of sovereign equality of States that are applicable to the choiceworthy use of cyberspace,
3 Fully believing in industry-leading Australia's response to GA Resolution 65/41 on developments in the field of information and telecommunications in the context of international security, Accepts Georgia s response to the Russian Federation s 2008 heavily distributed denial-of-service attack, by creating the Data Exchange Agency, functioning as a tool to provide professional education concerning cybersecurity, prepare proposals, monitor security and issue digital signature certificates, Supporting Germany s efforts to combat attacks on information technology networks and other databases by non-state actors, through the adoption of a new cybersecurity strategy, and it s perpetual effort to cooperate with other nations to prompt international security, Viewing with appreciation the concern by Greece to maintain national sovereignty rights regarding information security in global information sharing, Emphasizing the Netherland s support of safe and reliable information and communications technologies and the protection of an open, free Internet and respect for human rights, safe and reliable information and communications technologies which are essential for our prosperity and well-being and serve as a catalyst for sustainable economic growth, information and communications technologies which offer opportunities, and the importance of public-private partnerships and individual responsibility on the part of all users of information and communications technologies, Therefore this Committee: 1. Calls upon Member States to promote, at multilateral levels, the consideration of existing and potential threats in the field of information security, as well as possible measures to limit the threats emerging in this field, consistent with the need to preserve the free flow of information; 2. Considers that the purpose of such measures could be served through the examination of relevant international concepts aimed at strengthening the security and transparency of global information and telecommunications systems; 3. Encourages continued and expanded support for public-private partnerships with the developing world in the development of security for telecommunication and information technology; 4. Requires that the United Nations University establish a programme dedicated to the research and development of security systems for telecommunications and information technology funded by technologically developed nations; 5. Emphasizes the need for advancement in countries that are not as technologically advanced in order to assure their national digital security and in turn ensure global digital security;
4 6. Requests that greater measures be taken to ensure the incorporation of underdeveloped countries into the global information system as a means to strengthen telecommunication and technological systems; a. Further requests the participation of developed nations in providing education methods and tools in order to diminish the digital divide (the gulf between those who have ready access to technology, and those who do not); 7. Calls upon the International Telecommunications Union (ITU) and the International Organization for Standardization (ISO) to reevaluate and strengthen, as necessary, the relevant international standards for security in telecommunication and information technology; 8. Approves the creation of transparency standards under the UN Development Programme to combat corruption and promote transparency and integrity in government, business and development assistance; a. Trusts that all information must be available to anyone who seeks it except: i. Information received from or sent to third parties, under an expectation of confidentiality; ii. Information whose disclosure is likely to endanger the safety or security of any individual, violates his or her rights, or invades his or her privacy; iii. Commercial information where disclosure would harm financial interests; 9. Encourages member States to endorse and implement the transpa standards in telecommunications systems and software; 10. Declares accordingly the creation of safe and reliable information and communications technologies and the protection of an open, free internet and respect for human rights: a. Requires that all Member States allow free internet and global access to internet servers; i. Further requires the creation of public internet hotspots, public computer hubs and access routes to such spots through national efforts; b. Affirming that funding for global digital access will be the responsibility of all G20 members; c. Invites all countries to aid in the development of mass technologies to ensure global access; 11. Resolves that the security of critical information infrastructures is a responsibility all nations must address systematically and an area in which they must lead nationally, in coordination with relevant stakeholders, who in turn must be aware of relevant risks, preventive measures and effective responses in a manner appropriate to their respective roles; 12. Declares accordingly an International Right for Freedom of Information under the provisions of the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights; a. Proclaims this right, enforceable in the Sub-Committee established by this Resolution, as the ability to obtain access to federal information, except information regarding genuine
5 national security concerns, without violating any international digital-security agreements; 13. Designates the creation of a Subcommittee under the UN Human Rights Council: a. To promote the effective and comprehensive implementation of the Declaration on the Right and Responsibility of Individuals, Groups and Organs of Society to Promote and Protect Universally Recognized Human Rights and Fundamental Freedoms through cooperation and constructive dialogue and engagement with Governments, relevant stakeholders and other interested actors; b. To study, in a comprehensive manner, trends, developments and challenges in relation to the exercise of the right of anyone, acting individually or in association with others, to promote and protect human rights and fundamental freedoms in regards to a digital environment; c. To recommend concrete and effective strategies to better protect human rights defenders, and the individual through the adoption of a universal approach, and to follow up on these recommendations; d. To seek, receive, examine and respond to information on the situation and the rights of anyone, acting individually or in association with others, to promote and protect human rights and fundamental freedoms, including thereby the Right for Freedom of Information; e. To work in close coordination with other relevant United Nations bodies, offices, departments and specialized agencies, both at Headquarters and at the state level; f. To report regularly to the Human Rights Council and the General Assembly; 14. Further resolves that the established Subcommittee will seek to protect human rights defenders, members of the press, and any individual who attempts to publish or obtain information under the aforementioned Right; 15. Invites all Member States to continue to inform the Subcommittee of their views and assessments on the following questions: a. General appreciation of the issues of information security; b. Efforts taken at the national level to strengthen information security and promote international cooperation in this field; c. The content of the concepts mentioned in clause no. 2; d. Possible measures that could be taken by the international community to strengthen information security at the global level; 16. Additionally requests the Subcommittee, with the assistance of a group of governmental experts, to be established on the basis of equitable geographical distribution, to continue to study existing and potential threats in the sphere of information security and possible cooperative measures to address them, and to submit a report on the results of this study to the General Assembly;
6 17. Recommends that States form an advisory council within the established Subcommittee on technology security to promote awareness and the development of systems designed to withstand serious threats, including cyber-terrorism; a. Requests that standards be proposed by such a committee to make securing a stable global economy safe from cyber-terrorism a primary goal; 18. Decides to remain actively seized of the matters in this Resolution.
Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationRESOLUTION 130 (REV. BUSAN, 2014)
RESOLUTION 130 (REV. BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference of the International
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]
United Nations General Assembly Distr.: General 9 February 2010 Sixty-fourth session Agenda item 50 Resolution adopted by the General Assembly [on the report of the Second Committee (A/64/417)] 64/187.
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationRESOLUTION 45 (Rev. Hyderabad, 2010)
212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference
More informationRESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection
RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection The Plenipotentiary Conference of the International Telecommunication Union (Busan, 2014), recognizing a) Resolution 67 (Rev. Dubai,
More informationRESOLUTION 67 (Rev. Buenos Aires, 2017)
524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,
More informationRESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection
402 Res. 179 RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection The Plenipotentiary Conference of the International Telecommunication Union (Busan, 2014), recognizing a) Resolution
More informationUNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG
Document WSIS-II/PC-3/CONTR/035-E 17 August 2005 Original: English UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG Y:\APP\PDF_SERVER\ALL-USER\IN\COORDUNIT\WGIG-COVER.DOC 17.08.05 17.08.05 www.itu.int/wsis
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]
United Nations A/RES/56/195 General Assembly Distr.: General 21 January 2002 Fifty-sixth session Agenda item 98 (b) Resolution adopted by the General Assembly [on the report of the Second Committee (A/56/561/Add.2)]
More informationRESOLUTION 130 (Rev. Antalya, 2006)
Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference
More informationCybersecurity & Spam after WSIS: How MAAWG can help
Cybersecurity & Spam after WSIS: How MAAWG can help MAAWG Brussels Meeting 27-29 June 2006 Robert Shaw Deputy Head ITU Strategy and Policy Unit International Telecommunication Union 28 June 2006 1 Setting
More information2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope
Timestamp 8/30/2013 15:34:00 The information solicited through this questionnaire will only be used in aggregate form, unless otherwise authorised by the respondent. Do you authorise us to cite/share your
More informationRESOLUTION ADOPTED BY THE GENERAL ASSEMBLY. [on the report of the Second Committee (A/54/588/Add.2)]
UNITED NATIONS A General Assembly Distr. GENERAL A/RES/54/219 3 February 2000 Fifty-fourth session Agenda item 100 (b) RESOLUTION ADOPTED BY THE GENERAL ASSEMBLY [on the report of the Second Committee
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More information2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society
Resolutions 2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling the outcome
More informationResolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]
United Nations A/RES/62/91 General Assembly Distr.: General 8 February 2008 Sixty-second session Agenda item 71 (a) Resolution adopted by the General Assembly [without reference to a Main Committee (A/62/L.30
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationOUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY
OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY ADOPTED BY THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY AT NEW DELHI
More informationUN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security
UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia
More informationAssessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society
ECOSOC Resolution 2008/3 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationPlenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014
Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WGPL AHG Document DL/13(Rev.2)- E 28 October 2014 English only WGPL Ad Hoc Group on Resolution 174 RESOLUTION 174 (GUADALAJARA, 2010REV.
More informationInter-American Port Security Cooperation Plan
Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationPreparatory process of the second High-level United Nations Conference on South-South Cooperation
United Nations A/72/711 General Assembly Distr.: General 29 January 2018 Original: English Seventy-second session Agenda item 24 (b) Operational activities for development: South-South cooperation for
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/65/433)]
United Nations A/RES/65/141 General Assembly Distr.: General 2 February 2011 Sixty-fifth session Agenda item 17 Resolution adopted by the General Assembly [on the report of the Second Committee (A/65/433)]
More informationResolution adopted by the General Assembly. [on the report of the Second Committee (A/60/488/Add.3)]
United Nations A/RES/60/195 General Assembly Distr.: General 2 March 2006 Sixtieth session Agenda item 52 (c) Resolution adopted by the General Assembly [on the report of the Second Committee (A/60/488/Add.3)]
More informationNuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting
General Conference GC(60)/RES/10 Date: September 2016 General Distribution Original: English Sixtieth regular session Item 14 of the agenda (GC(60)/20) Nuclear Security Resolution adopted on 30 September
More informationWorld Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014
World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 Document WTDC14/28- E 10 February 2014 Original: French SOURCE: TITLE: ALG/28/1 Objective: 3 Ministry of Post and
More informationDepartamento de Asia y Pacífico
Departamento de Asia y Pacífico Shanghai Cooperation Organization Joint Communiqué of Meeting of the Council of the Heads of the Member States of the Shanghai Cooperation Organisation 2010-6-11 Tenth Meeting
More informationGENERAL ASSEMBLY RESOLUTION A/RES/67/195. Information and communications technologies for development
GENERAL ASSEMBLY RESOLUTION A/RES/67/195 Information and communications technologies for development Draft resolution II Information and communications technologies for development The General Assembly,
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationUN FREEDOM OF INFORMATION POLICIES INTERNATIONAL TELECOMMUNICATION UNION (ITU)
UN FREEDOM OF INFORMATION POLICIES INTERNATIONAL TELECOMMUNICATION UNION (ITU) 1. Does your organization have an access to information? If so, please provide a link or copy of it. Please also respond to
More informationMs. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations
Opening Remarks by Ms. Izumi Nakamitsu, High Representative for Disarmament Affairs, at the High-Level Event on Cyber Security, hosted by the Prime Minister of Bangladesh Ms. Izumi Nakamitsu High Representative
More informationRESOLUTION 47 (Rev. Buenos Aires, 2017)
Res. 47 425 RESOLUTION 47 (Rev. Buenos Aires, 2017) Enhancement of knowledge and effective application of ITU Recommendations in developing countries 1, including conformance and interoperability testing
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF
SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security
More informationResolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]
United Nations A/RES/61/132 General Assembly Distr.: General 1 March 2007 Sixty-first session Agenda item 69 (a) Resolution adopted by the General Assembly on 14 December 2006 [without reference to a Main
More informationA1. Actions which have been undertaken by Governments
Subject: Response to the ITU invitation for Member States to provide their input on actions that have been undertaken or to be governments in relation to various international Internet-related public policy
More informationRESOLUTION 140 (REV. BUSAN, 2014)
RESOLUTION 140 (REV. BUSAN, 2014) ITU's role in implementing the outcomes of the World Summit on the Information Society and in the overall review by United Nations General Assembly of their implementation
More informationCHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING
CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING 1 CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING Under Canada s G7 presidency, Energy Ministers or their representatives from Canada, France, Germany, Italy,
More information21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM
21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM Increasing stability and security: Improving the environmental footprint of energy-related activities in the OSCE region CONCLUDING MEETING Prague, 11 13 September
More informationResolution adopted by the General Assembly. [on the report of the Fifth Committee (A/61/592/Add.4)]
United Nations General Assembly Distr.: General 2 May 2007 Sixty-first session Agenda item 117 Resolution adopted by the General Assembly [on the report of the Fifth Committee (A/61/592/Add.4)] 61/263.
More information15412/16 RR/dk 1 DGD 1C
Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations
More informationPlenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014
Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 PLENARY MEETING Addendum X to Document 79- E 07 September 2014 Original: English Arab States ARAB STATES COMMON PROPOSALS FOR THE WORK
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationAsia-Pacific Telecommunity Administrations ASIA-PACIFIC COMMON PROPOALS FOR THE WORK OF THE CONFERENCE
World Conference on International Telecommunications (WCIT-12) Dubai, 3-14 December 2012 PLENARY MEETING Addendum 2 to Document 3-E 5 October 2012 Original: English Asia-Pacific Telecommunity Administrations
More informationBackground Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues
Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues Introduction This background note outlines, in a non-exhaustive manner,
More informationPlenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014
Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WORKING GROUP OF THE PLENARY Document DT/76- E 3 November 2014 Original: English WORKING GROUP OF THE PLENARY DRAFT RESOLUTION ITU'S
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationPromoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda
2016 PARTNERSHIP FORUM Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 31 March 2016 Dialogue Two (3:00 p.m. 5:45 p.m.) ECOSOC CHAMBER,
More informationInternet Governance and the World Summit on the Information Society (WSIS)
Internet Governance and the World Summit on the Information Society (WSIS) Dr Tim Kelly, Head, Strategy and Policy Unit, ITU & Secretary, Content Sub-Committees, WSIS Internet Governance Workshop, Bangkok,
More informationGermany Candidate for the ITU Council
Germany Candidate for the ITU Council Germany Candidate for the ITU Council International Telecommunication Union is an important forum for global co-operation in the various areas of ICTs. Germany continuously
More information13967/16 MK/mj 1 DG D 2B
Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:
More informationCONNECT ARAB STATES SUMMIT
CONNECT ARAB STATES SUMMIT Doha, Qatar, 5-7 March 2012 Draft Concept Paper Overview The Connect Arab States Summit is being organized by the International Telecommunication Union (ITU) in partnership with
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationCommonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017
Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017 Title: Facilitating Investment in Cybersecurity as a means of achieving the Sustainable Development Goals Description: Information
More informationCOUNTERING COUNTERING SPAM IN A DIGITAL WORLD
IN A DIGITAL WORLD EU SYMPOSIUM 2006 15 June 2006 Maastricht, The Netherlands Cristina Bueti Cristina Bueti Project Officer Strategy and Policy Unit (SPU) International Telecommunication Union www.itu.int/spam
More informationCOOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS
COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS February 2018 A HISTORY OF COOPERATION 1997: Cooperation agreement between INTERPOL and the UN Many decades of collaboration was formalized in an agreement
More informationRelated to the Internet
International Public Policy Issues Related to the Internet and the Role of the Governments Regional Follow-up to the Outcome of the World Summit on the Information Society Marco Obiso ICT Applications
More informationGuiding principles on the Global Alliance against child sexual abuse online
Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationDonor Countries Security. Date
PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information
More informationThe challenges of the NIS directive from the viewpoint of the Vienna Hospital Association
The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the
More informationJoint Declaration by G7 ICT Ministers
Joint Declaration by G7 ICT Ministers (Action Plan on implementing the Charter) G7 ICT Ministers Meeting in Takamatsu, Kagawa - 29-30 April 2016 [Preamble] 1. We, the Information and Communication Technology
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More informationStatement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationEngaging space tools for development on Earth contribution of space technology and applications to the post-2015 Development Agenda
A/AC.105/2014/CRP.9 16 June 2014 English only Committee on the Peaceful Uses of Outer Space Fifty-seventh session Vienna, 11-20 June 2014 Item 13 of the provisional agenda * Use of space technology in
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More informationCONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE
CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 18-19 APRIL, SKOPJE CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT 2018 At the Trieste Western Balkans Summit, we stressed the importance of the
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationState of Israel Prime Minister's Office National Cyber Bureau. Unclassified
- 1 - Background for the Government Resolutions Regarding Advancing the National Preparedness for Cyber Security and Advancing National Regulation and Governmental Leadership in Cyber Security On February
More informationScope of the Member State mechanism
FIRST MEETING OF THE MEMBER STATE MECHANISM ON SUBSTANDARD/SPURIOUS/FALSELY-LABELLED/ 2 November 2012 FALSIFIED/COUNTERFEIT MEDICAL PRODUCTS Provisional agenda item 4 Scope of the Member State mechanism
More informationThe Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation
The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation I. Introduction At the 2+2 U.S.-Japan Security Consultative Committee (SCC) meeting in Tokyo on October 3, 2013,
More informationCybersecurity. Topic Background
Cybersecurity Topic Background The growth of the Internet has allowed nations, organizations, and people to connect in ways previously unimagined. This new interconnectivity has allowed for collaboration,
More informationThe UNISDR Private Sector Alliance for Disaster Resilient Societies
The UNISDR Private Sector Alliance for Disaster Resilient Societies Sandra Amlang United Nations Office for Disaster Risk Reduction (UNISDR) Regional Office- the Americas. 24 August 2017 Increase in Frequency
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationA framework for community safety and resilience
11/21/08 1:01 PM Page 1 Red Cross Red Crescent support to the Millenium Development Goals Building community safety and resilience Millenium Development Goals Community safety and resilience Red Cross
More informationComprehensive Study on Cybercrime
Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited
More informationASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016
ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)
More informationMapping to the National Broadband Plan
The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National
More informationG8 Lyon-Roma Group High Tech Crime Subgroup
G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies
More informationProvisional Translation
Provisional Translation Environmental Change Vision to aim as a Goal Merger and Integration of Cyberspace and Real-space [expansion/penetration, progress of the use/application, global] Increasing Serious
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593
COUNCIL OF THE EUROPEAN UNION Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject : Council Resolution on a European approach towards a
More informationThe APEC Model. Global Partnership through Regional Initiatives
The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security
More informationENISA s Position on the NIS Directive
ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides
More informationENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010
ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions
More informationCurrent international space security (sustainability) activities and initiatives
Current international space security (sustainability) activities and initiatives Peter Martinez National Research Foundation/SAAO South Africa Outline Space infrastructure Space Security and Space Sustainability
More informationPresented by: - Anselm Charles ICT Manager CARICOM IMPACS
Presented by: - Anselm Charles ICT Manager CARICOM IMPACS Outline Introduction to CARICOM IMPACS What is Cybersecurity? CARICOM & Cybersecurity CARICOM Cyber Security and Cybercrime Action Plan (CCSCAP)
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationGlobal cybersecurity and international standards
World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level
More information