International Conference on Cyberlaw, Cybercrime & Cybersecurity New Delhi, India OUTCOME DOCUMENT

Similar documents
OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Commonwealth Cyber Declaration

PLEASE NOTE: firms may submit one set of research questionnaires covering both China and Hong Kong or separate sets for each jurisdiction

Collaborative Regulation in the APP Economy

Draft Resolution for Committee Consideration and Recommendation

No Purchase needed

IMPORTANT GLOBAL CYBERLAW TRENDS 2017

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Spoka Meet Audio Calls Rates Dial-In UK

Angela McKay Director, Government Security Policy and Strategy Microsoft

Dashboard. Feb 18, Feb 18, 2008 Comparing to: Site. 13,318 Visits 28,414 Pageviews 2.13 Pages/Visit

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Data Governance for Smart City Management

The Critical Importance of CIIP to Cybersecurity

Measures to Maintain Post-Nuclear Security Summit Momentum for Continuously Enhancing Nuclear Security

International Roaming Telstra

Digital EAGLEs. Outlook and perspectives

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Turquoise Terminal Returns User Guide for Creating & Uploading a Turquoise Terminal Return

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Japan s Cyber Diplomacy

G7 Bar Associations and Councils

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

Access Code and Phone Number

Improving digital infrastructure for a better connected Thailand

RESOLUTION 45 (Rev. Hyderabad, 2010)

Hybrid Wide-Area Network Application-centric, agile and end-to-end

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Opportunities and Challenges in a World of Global Information

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

E-Strategies in Africa

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

CRYPTO CLOUD SIM UNLIMITED DATA NO TRACEABILITY NO THIRD-PARTIES

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Technology Lifecycle Management Assessment. Know your network - achieve business agility

RESOLUTION 130 (REV. BUSAN, 2014)

A Guide to our Tariffs

INTRODUCTION OVERVIEW ON CYBERCRIME

Collaboration between National CSIRTs. Marco Obiso Cybersecurity Coordinator International Telecommunication Union (ITU)

ITU-IMPACT. Regional Cybersecurity Forum - CLMV

ITU Plenipotentiary 2018

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Disaster risk reduction in a changing climate

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

id x Economy fixed CTY Income group 1 Afghanistan Afghanistan Low income 2 Albania Albania Upper middle income 3 Algeria Algeria Upper middle income

Cybersecurity & Digital Privacy in the Energy sector

NIS Country Reports Overview Document

JOINT MEDIA STATEMENT

ehaction Joint Action to Support the ehealth Network

ITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

Shell Global Helpline - Telephone Numbers

Coordinated implementation of the Basel, Rotterdam and Stockholm Conventions

A Guide to our Tariffs

Moving Professionals Forward. World Leader In Competence Based Certification

For: Ministry of Education From Date: 19 November 18-2 December 18 Venue: M1 Shops

Liberia ICT Policy

Cybersecurity & Spam after WSIS: How MAAWG can help

The cost of cybercrime the benefits of cooperation

"DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY?

Regional Development Forum For the Arab States(RDF-ARB) 2018

ITU Global Cybersecurity Index

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Joint Declaration by G7 ICT Ministers

THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS

Forum and additional background data. For information on data and

Cisco Aironet In-Building Wireless Solutions International Power Compliance Chart

Tariffs & Instructions for China Prepaid SIM Card

Transforming networks and services for communications service providers

OAS Cybersecurity Capacity Building Efforts

Cybersecurity for ALL

Forum. Ningbo, China 25 February

China and International Governance of Cybercrime

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

European Union Agency for Network and Information Security

Scope of the Member State mechanism

Protecting Critical Information Infrastructure in times of increasing cyber conflict

EXPERT GROUP MEETING ON CYBERCRIME

SWIFT Payments market infrastructures. Christina Hutchinson Director SWIFT South Latam Region November, 2009

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

Managed Network Services. Managing your network to enable your digital business

Mining and The Standards World

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Generate growth in Asia Pacific with Intelligent Connectivity. Edward Zhou Huawei Technologizes

Centre Region Classifications

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

Guide to Roaming and International on O2 January 2018 V1

International Rates Published 18 th October 2013

Caribbean Private Sector Network meeting 24 August 2017, Ministry of Trade, Port-of-Spain, Trinidad and Tobago

ECOWAS Cyber security Agenda

Permanent Moratorium on Custom Duties on ET Products- Implications for Digital Industrialization

G8 Lyon-Roma Group High Tech Crime Subgroup

Transcription:

OUTCOME DOCUMENT INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY ADOPTED BY THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY AT NEW DELHI ON 14 TH 16 TH NOVEMBER, 2018 1

PREAMBLE CONSIDERING that Cybersecurity is an intrinsic part of human security and is inalienable from sustainable development and daily human progress; POINTING OUT that Cybercrimes are on the rise and have increased exponentially over the past few years; UNDERSTANDING that security of cyberspace has become a multifaceted issue and mere unilateral action will not suffice to meet cybersecurity needs of various stakeholders; ACKNOWLEDGING the surge of new National Cybersecurity legislations around the globe and the inconsistencies therein, REITERATING the need of a global approach to ; RECOGNIZING the value and worth of newly emerging technologies, if used responsibly, to mankind; ACCEPTING that in order to prevent the use of such newly emerging technologies, particularly Artificial Intelligence, against humanity, there is an urgent need to be proactive and not responsive; OBSERVING the importance of Cyber ethics, which means values-driven decisions based on core values such as freedom, justice, equality, inclusivity, security and peace as they are globally agreed by the community of states in the Sustainable Development Goals of the United Nations; AFFIRMING that an international legal framework integrating the varied features and nuances of the interconnected fields of Cyberlaw, Cybercrime and Cybersecurity needs to be established which shall promote the development of the Internet and technologies and also aid in the development of trust and peace building amongst the world community; APPRECIATING that the International Conference on Cyberlaw, Cybercrime and Cybersecurity addresses a wide variety of distinctive and diverse issues, being faced by the 2

world community in Cyberspace and brings forth recommendations for potential and/or possible solutions for the same; WARMLY THANKING the supporters and participants of this Conference, because of whose support, International Conference on Cyberlaw, Cybercrime and Cybersecurity, 2018 could be successful, eventful and prolific; PROMISING that the International Conference on Cyberlaw, Cybercrime and Cybersecurity will continue to provide an international platform for fruitful dialogue amongst various stakeholders in the cyberspace and endeavoring to devise a legal model for the development of cyberspace and to address cybercrimes and cyber terrorism therein. KEY RECOMMENDATIONS THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME AND CYBERSECURITY HEREBY CALL UPON THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME AND CYBERSECURITY 1. To become a catalyst for discussions on the key aspects of Cyberspace,and its future trends and impacts, including legal, policy and regulatory issues thereof and present an integrated, holistic and strategic view of the issues therein whilst recognizing that there is an urgent need for effective global cooperation on cyber issues amongst all stakeholders; 2. To map out key developments in Cybersecurity and Cyberlaws with a view to collate principles of cyber security law jurisprudence, in collaboration with distinct thought leaders and international stakeholders and chalk out minimum levels for best practices that can be followed in real world by states and their Ministries and agencies; 3. To strengthen the cooperation on Cybersecurity law by creating more opportunities for governments, private sector, civil society, the technical community and academia from various regions of the world to engage and develop innovative and effective legal frameworks to address the truly global challenge of Cybersecurity and cybercrimes. 3

4. To conduct Round Tables on in different countries and jurisdictions across the world. These would be necessary to encourage discussions, debates, deliberations and perspectives at regional and national levels in different parts of the globe so that the emerging challenges concerning Cyberlaw, Cybercrime & Cybersecurity could be appropriately discussed by the respective governments, national stakeholders, corporates, academic and civil society and their inputs appropriately collated. These Round Tables shall not only understand the level of national developments of various nations on the subjects under discussion but shall also come up with distinctive inputs and diverse recommendations on various topics, strategies and approaches that need to inform the deliberations of the subsequent editions of International Conference on ; 5. To help identify the common minimum denominators of legal principles governing the regulation of cyber security and cybercrimes at a global level; 6. To identify rights and obligations of nation countries in cyber sphere vis-à-vis common cyber security threats and challenges by facilitating international cooperation: 7. To collaborate with various international, regional and national stakeholders to work together in the development of legal jurisprudence on cyber security law; 8. To identify the cause of rise in cyber terrorism in the world and its impact on the consumers and the vulnerable sections of the society and the existing legal and policy norms to curtail the same; 9. To identify though an interdisciplinary approach the future possibilities, scope and impacts of emerging technologies such as IoT, Artificial Intelligence and Machine Learning vis-à-vis cyber security regulations; 10. To recognize and work on the legal principles for the basis of regulation of Artificial Intelligence and its varied applications and to explore legal routes and mechanisms to regulate the malafide uses of Artificial Intelligence impacting the interests of humanity and human civilization; 11. To explore the impact of various regional and national legislations on data protection such as GDPR on other nations, non state actors and corporate stakeholders as well as 4

to discuss the challenges posed by the rise in popularity of Darknet and the approaches of law enforcement agencies to address cyber threats; 12. To discuss the legalities involved in use of social media and spread of fake news by various social media platforms in order to identify the culprits and to identify the liabilities and obligations of Intermediaries under International and National laws in this regard; THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME AND CYBERSECURITY HEREBY FURTHER CALL UPON UNITED NATIONS AND ITS VARIOUS AGENCIES INCLUDING ITU, UNESCO, WIPO AS WELL AS ALL INTER-GOVERNMENTAL ORGANIZATIONS (IGOs) & NGOs 1. To enable countries to agree to common/uniform minimum international standards on attribution for defined cyber incidents such as cyber terrorism, data breaches and other specified cyber crimes; 2. To encourage the implementation of reports of the UN Group of Government Experts (UNGGE) concerning acceptable cyberspace norms and behaviours in order to protect, promote and ensure Cybersecurity; 3. To foster the culture of cyber security and awareness on cyber related risks through aimed actions addressing citizens from kids to seniors. 4. To ensure the compliance with Cyber ethics principles, values-driven decisions based on core values such as freedom, justice, equality, inclusivity, security and peace as they are globally agreed by the community of states in the Universal Declaration of Human Rights and Sustainable Development Goals; 5. To actively encourage having international coordination and relations to analyze how multiple sovereign governments can and should address questions of Internet Governance that cannot be solved by or within a single state; 6. To explore the need for a new international cooperation mechanism to deal with rise in complex cybercrimes and data breaches; 5

7. To cooperate on the emerging challenges and understand the impact and significance of newly emerging technologies like Artificial Intelligence, Blockchain, IoT, Machine Learning and Quantum Computing on legislative frameworks and appropriately encourage dealing with the same in an enabling manner, in the legislative framework of various States; 8. To define minimum elements involved in cyber-terror and cyber-war on international level in order to ensure uniformity in approach in dealing with the same and maintaining transparency in cyberspace. 9. To identify the threats involved with machine learning and Artificial Intelligence and their commercial usage vis-à-vis military usage and the need to regulate the same; 10. To work together towards evolving international policy solutions to deal with the legal challenges presented by multiplicity of cybersecurity legislations covering various sectors; 11. To draft more futuristic legal frameworks to deal with new emerging technologies in order to safeguard the interests of consumers/users of Internet and Cyberspace; 12. To identify the various emerging challenges in Internet of Things(IoT) and how can they be regulated by various governmental agencies; 13. To regulate the commercial use of IoT, and other emerging technologies in order to ensure consumer-safety; 14. To explore ways, mechanisms and processes as to how emerging technologies including Artificial Intelligence, Internet of Things, Blockchains and Quantum Computing could be used constructively to enhance a cyber secure ecosystem, whether through legal, policy, process approaches or otherwise; 15. To work together towards evolving international cooperation to deal with the legal challenges presented by cyberspace in a time-bound manner; 16. To work towards international policy and regulatory approaches and responses to the legal challenges presented by emergence of Cryptocurrencies; 6

17. To provide for protection of Intellectual Property in cyberspace and curb digital piracy; 18. To identify and map out specific and comprehensive frameworks and policies to combat various cyber crimes and breaches and chalk out a blueprint for enforcement agencies to curtail the same; 19. To identify new variants of Cybercrimes and Cyberattacks that have emerged over time in order to encourage the enforcement of stricter regime to curb them; 20. To agree upon common minimum international standards pertaining to Cybersecurity regulations at the international level and the need for international cooperation in terms of exchange of information concerning the security, stability and resilience of the Internet and connected best practices; 21. To recognize the disruptive role of new technologies like Blockchain, Artificial Intelligence which could potentially disrupt large number of any human activities and operations; THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME AND CYBERSECURITY HEREBY CALL UPON NATION STATES, EDUCATION & RESEARCH INSTITUTIONS, PROFESSIONAL ASSOCIATIONS, MEDIA INSTITUTIONS, CULTURAL & SOCIAL INSTITUTIONS AND ORGANIZATIONS, NETWORKS, BUSINESS, CORPORATE & INDUSTRY SECTORS AS WELL AS ALL RELEVANT STAKEHOLDERS: 1. To implement the various bilateral agreements between different countries concerning acceptable cyberspace norms and behaviours in order to protect, promote and ensure Cybersecurity; 2. To implement bipartite and multipartite agreements on international level between different nations, non state actors, relevant stakeholders on relevant cyber issues, cyber security norms in order to ensure peaceful cooperation and transparency mechanisms between nations; 7

3. To safeguard countries critical information infrastructure from cyber-attacks by strengthening their cybersecurity policies, practices and procedures; 4. To minimise the frequency and impact of cyber breaches on elections of government bodies and other local/subordinate bodies and their affected electorate; 5. To formulate national level standards that caters to global best practices and to legally address the various challenges thrown by IoT and cybercrime by creating effective enforcement capacity; 6. To draft out legislations dealing with consumer protection for promoting electronic commerce (e-commerce); 7. To consider making data as the basis of data sovereignty in cyberspace; 8. To make such multipartite agreements which ensure peaceful relations and international cooperation amongst nations in order to have maximum transparency and cooperation, when it comes to dealing with cyber crimes and acts of cyber terror; 9. To ensure compliance with minimum standards of regulations and best practices at international, regional and national level and concerning the security, resilience and reliability of cyberspace; 10. To give legal recognition of IoT based contracts and blockchain based contracts, as part of contractual law frameworks in different countries, including, the national laws on contracts; 11. To ensure focus on resilience, protection, preservation, and Cybersecurity of Critical Information Infrastructures including their core resources; 12. To acknowledge and appropriately deal with the impact and significance of newly emerging technologies like Artificial Intelligence, Blockchain, IoT, Machine Learning and Quantum Computing in an enabling manner, in the legislative framework of various States; 13. To enforce the mandatory obligation of data breach notifications on Intermediaries including internet service providers within a specific time frame; 8

14. To make cloud computing more cyber-secure by enforcing mandatory legislative regulations upon the intermediaries; 15. To introduce legal, policy, administrative changes on a priority basis towards establishing a safe and secure cyberspace by enforcing cyber deterrence and aid in its further development; 16. To build up and expand the legal principles on cyber cooperation; 17. To formulate policies and strategies basing on the principles enshrined in UN Charter, for the evolution and development of more universal international principles concerning acceptable norms and behaviour in cyberspace; 18. To introduce legal, policy, administrative changes on a priority basis towards establishing a safe and secure cyberspace and use of ICTs for sustainable development. We, ICCC participants, urge that a joint effort needs to be taken by all relevant stakeholders to maintain the intrinsic character of cyberspace which is safer, more resilient, and remains the major driver of sustainable economic development and growth for years to come. We reiterate that stepping forward in a new era of Internet 3.0, we all need to be safe, secure and diligent while encouraging further advancement in cyberspace as well as information and communication technologies (ICTs). We, the participants from the following countries, approve and adopt the above Outcome Document: Algeria Iran Senegal Australia Israel Seychelles Azerbaijan Italy Sierra Leone Bangladesh Jamaica Singapore Belarus Japan Spain Bhutan Jordan Somalia 9

Brazil Laos South Africa Botswana Lesotho South Korea Bulgaria Liberia Sri Lanka Cambodia Lithuania St. Lucia Chile Luxembourg Swaziland China Malawi Sweden Czech Republic Malaysia Switzerland Democratic Malta Syria Republic of Congo Ecuador Mauritius Tanzania Egypt Myanmar Thailand Estonia Namibia Tunisia Ethiopia Nepal Turkmenistan France Norway Uganda Fiji Niger United Kingdom Gambia Nigeria United States of America Germany Oman Uzbekistan Georgia Portugal Venezuela Ghana Romania Vietnam Guyana Russia Yemen Hungary Samoa Zambia India Scotland Zimbabwe 10