ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

Similar documents
The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Child Online Protection

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

International Cooperation on Child Online Protection

Cybersecurity for ALL

RESOLUTION 67 (Rev. Buenos Aires, 2017)

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 130 (REV. BUSAN, 2014)

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Child Online Protection in Child Pornography Namibia

Global cybersecurity and international standards

Promoting Global Cybersecurity

Global Cybersecurity Agenda

Cybersecurity & Spam after WSIS: How MAAWG can help

Policy recommendations. Technology fraud and online exploitation

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

RESOLUTION 130 (Rev. Antalya, 2006)

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

Cybersecurity for ALL

GLOBAL CYBERSECURITY INDEX 2016

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Guiding principles on the Global Alliance against child sexual abuse online

The cost of cybercrime the benefits of cooperation

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Garry Mukelabai Communications Authority Zambia

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Child. Online Protection (( ( Child Online Protection

RESOLUTION 140 (REV. BUSAN, 2014)

Role of ITU in Building Security & Trust in Cyberspace

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Commonwealth Cyber Declaration

ITU-IMPACT. Regional Cybersecurity Forum - CLMV

Scope of the Member State mechanism

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

WSIS Action Lines Roadmaps C2, C5, C6

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

E-Strategies in Africa

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

The Role of Standards in Ensuring Toy Safety

Caribbean Cyber Security: Not Only Government s Responsibility

Related to the Internet

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Submissions from entities in the United Nations system and elsewhere on their efforts in 2017 to implement the outcome of the WSIS

INTRODUCTION OVERVIEW ON CYBERCRIME

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

Text and messaging - Safeguarding Guidelines

RESOLUTION 47 (Rev. Buenos Aires, 2017)

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

UN FREEDOM OF INFORMATION POLICIES INTERNATIONAL TELECOMMUNICATION UNION (ITU)

UNODC tackling cybercrime in support of a safe and secure AP-IS

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

G8 Lyon-Roma Group High Tech Crime Subgroup

The Global Fund to Prevent Violence against Children

Smart Sustainable Cities

EU policy on Network and Information Security & Critical Information Infrastructures Protection

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

OCTOPUS CONFERENCE COOPERATION AGAINST CYBERCRIME Workshop 1: Policies, activities and initiatives on cybercrime of international organisations

General Secretariat (SG)

ITU-IMPACT Capacity Building for Least Developed & Developed Countries

ECOWAS Cyber security Agenda

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

ITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

NAVIGATING THE ITU. Four routes for civil society engagement. / December 2017

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

From Hyogo to Sendai. Anoja Seneviratne Disaster Management Centre

Internet Governance and the World Summit on the Information Society (WSIS)

4 th - 5 th 6 th June 2013, Speke Resort, Uganda Day 1

Regional Development Forum For the Arab States(RDF-ARB) 2018

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

CYBER CRIME LEGISLATION COURSE MALAYSIAN COMMUNCIATIONS AND MULTIMEDIA COMMISSION MALAYSIA

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Implementation of WTDC-14 Regional Initiatives for Europe

Cyber Security Development. Ghana in Perspective

Legal Foundation and Enforcement: Promoting Cybersecurity

About Issues in Building the National Strategy for Cybersecurity in Vietnam

China and International Governance of Cybercrime

European Union Agency for Network and Information Security

THE CONNECT 2020 AGENDA FOR GLOBAL TELECOMMUNICATION/ICT DEVELOPMENT. April 8, 2015

Cyber Security in Europe

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Senator the Hon Stephen Conroy Minister for Broadband, Communications and the Digital Economy. Deputy Leader of the Government in the Senate

Cyber Security Roadmap

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!

Collaboration between National CSIRTs. Marco Obiso Cybersecurity Coordinator International Telecommunication Union (ITU)

10025/16 MP/mj 1 DG D 2B

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Transcription:

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN 14-16 March 2017 The need of an international framework for cooperation: the Child Online Protection (COP) Initiative & Guidelines Anne Rita SSEMBOGA ITU REGIONAL OFFICE FOR AFRICA anne,rita.ssemboga@itu.int Telecommunication Union

Why COP Children are going online more than ever. Technology is readily available to children at a young age Being at ease with technology, children can easily bypass restrictions. Cybercrime is borderless, invisible and organized Telecommunication Union

Today, the use of Information and Communication Technologies (ICTs) is the key to access information society On-line public services Real-time Information Entertainment Databases Libraries Personal communication Media Social and professional networks Social media Telecommunication Union

Key risks to children online Access to illegal online content/ inappropriate material or image Easy access to age inappropriate goods/services Exposure to many inadequate data access commerce societal Easy Exposure to sexual predators Risky online behavior or sexual online interaction Bullying Open digital divide betweens users in terms of acess or proficient/confident use Obsessive behavior/addiction Excessive use Telecommunication Union

ITU s mandate on Cybersecurity 2003 2005 WSIS entrusted ITU as sole facilitator for WSIS Action Line C5 - Building Confidence and Security in the use of ICTs 2007 Global Cybersecurity Agenda (GCA) was launched by ITU Secretary General The GCA is a framework for international cooperation in cybersecurity The COP initiative is part of the Global cybersecurity agenda(gca) Building confidence and security in the use of ICTs is widely present in ITU resolutions. In particular several ITU Conferences (ITU Plenipotentiary- PP, WTSA, and WTDC) have produced Resolutions (PP Res 130, 174, 179, 181, WTSA Res 50, 52, 58, and WTDC 45, 67, 69) touching on the most relevant ICT security related issues, from legal to policy, to technical and organization measures.

The Child Online Protection (COP) Initiative 6 The COP Initiative aims at bringing together partners from all sectors of the global community to ensure a safe and secure online experience for children everywhere. Objectives Identify risks and vulnerabilities to children in cyberspace; Create awareness of the risks and issues through multiple channels; Develop practical tools to help governments, organizations and educators minimize risk; and Share knowledge and experience while facilitating international strategic partnership to define and implement concrete initiatives

Coordinated Response Need for a multi-level response to the cybersecurity challenges Corporation framework Exchange of information Regional Harmonization of policies, legal frameworks and good practices at regional level National National strategies and Policies National Response capabilities Country level capacity building and training Telecommunication Union

8 We count on the support of several partners

Council Working Group (CWG) on COP The CWG COP is a platform which facilitates the membership's input and guidance on ITU's role in child online protection. Through the work of the Group, our membership makes recommendations and provide invaluable inputs to the Initiative. The last Plenipotentiary Conference, held in Busan in 2014, made some important amendments: - participation in the Group meetings will be open to all stakeholders (both ITU members and non-members); - all documentation will be publicly available without password protection Next CWG-COP Meeting 30 September 2015

10 What do we do?

11 4 Set of COP Guidelines Developed in cooperation with COP partners, is the first set of guidelines addressing different stakeholders. Available in the six UN languages

12 The COP Guidelines in details COP Guidelines for Children

13 The COP Guidelines in details COP Guidelines for Parents, Guardians and Educators

14 The COP Guidelines in details COP Guidelines for Policy Makers

15 The COP Guidelines in details New COP Guidelines for Industry

ITU & UNICEF new version of the Guidelines for Industry 16 How are the Guidelines structured? Policies and management processes Child sexual abuse content Safer and age appropriate environment Educate children, parents and teachers Promote positive use of ICTS Sub-sector check lists Mobile operators ISPs Content providers, online retailers, app developers Social media Internet access in public places Hardware manufacturers

Child online country profile wellness Cybersecurity wellness profile provide an overview of the country level cybersecurity development based on the 5 pillars of the GCA and the Information on Child online protection initiative is also covered. Currently 195 country profiles are available based on GCI 2014 data and the graph below is the COP wellness profile for Africa ( 38 countries) COP country wellness profile for Africa 40 35 30 25 20 15 10 5 0 Y N 38 35 31 28 10 7 3 0 National Legislation UN Convention & protocol Institutional Support Reporting mechanism

Assisting countries to establish national strategies and policies Cameroon Ghana Mauritius Sierra Leone Gambia Oman Brunei Zambia Bahrain Chad Gabon Rwanda

Key stakeholders to ensure children online safety at national level Educators Social services Parents/ guardians Law enforcement Children and youth Industry NGO The research community Telecommunication Union

Specificities/ characteristic of each stakeholders (1) Children Parents/guardians Educators Comfortable with Internet & Technology devices inexperienced Little lost when it comes to technology/internet use Responsibility to teach children about how to stay safer online at home/school or anywhere else There is a need to develop policy at a national level to protect and ensure children safe use of Internet Need to be informed about risks and advantages of new technologies & Internet through different communication channels Need professional training linked to 1 st class, up to date teaching resources Telecommunication Union

Specificities/ characteristic of each stakeholders (2) Industry Have expertise and knowledge of their products/services Should promote awareness of the online &safety issues to community Should identify hazards in their products and services and correct them Research community Have the knowledge of technical and social aspects and impact of the Internet Can help national government and policy makers develop strategies based on hard facts & evidence Can be an intellectual counterweight to the industry NGO Have the Expertise and information which can be an invaluable resources in reaching out & providing services to the community Can help promote the online safety agenda Telecommunication Union

Specificities/characteristic of each stakeholders(3) Law Enforcement Social services Should be fully engaged with any overall strategy to help make the internet safer Can provide support and counselling to abused or harmed children/youth online Need to be trained appropriately to conduct investigations into internet related crimes against children and youth Need the right level of technical knowledge and access to forensic facilities to extract and interpret data obtained from technologies devices Should establish clear reporting mechanism (hotline) Professional working with the social services need appropriate training to be able to provide this kind of support Telecommunication Union

National Checklist Comprehensive legal framework Need for a national focus on online child protection Laws should make it clear that any and every crime that can be committed in the real world can also be committed online Developed new laws or adapt existing ones to outlaw internet specific offense such as grooming, perform or watch sexual acts Outlaws the misuse of computers for criminal ends Bring together all of the key stakeholders and players to develop and implement a national initiative/strategy for children online safety Establish a self or co-regulatory model by publishing codes or good practices to guide Internet industry on measures to be taken to keep children safer online Involve the mass media in promoting awareness messages and campaigns Need to develop local resources To reflect national laws and local cultural norms to take into consideration language and cultural barriers Essential for any Internet safety campaign or training material developed Need for public education and awareness activities Need for reporting mechanisms for online predatory behavior including bullying Helping children to stay safe online through the use of technical tools Educational & outreach programs should be developed for professional, parents/guardians/educators to help build awareness on the issues and provide strategy to deal with them Ensure safety material are made available in either in written forms or produce using other media such as video Important to strike the right tone for any education and awareness campaign Mechanism for reporting abuse of an online services or illegal online behavior should be widely promoted online and using other medias. Possibility for people who feel threaten in any way or who have witness any worrying activity on the Internet to report quickly to the relevant law enforcement agencies( who should be trained and ready to respond. Numbers of free software programs can help screen out unwanted materials or block unwanted contact.as they as generally part of the operating system or provided as part of a package from ISP. Technical tools should be use as part of a global arsenal as parent/guardian involvement is critical. Telecommunication Union

24 Online Platform of Case Studies

Regional activities In 2015, ITU-D Sector Member ONAT launched an online and offline course titled Multimedia distance-learning course on the safe use of Internet resources Regional annual Capacitybuilding Workshop on Child Online Safety(COS) for Africa Sub-Saharan countries Lilongwe, Malawi, 18-20 July 2016 Cybersecurity in Romania- Congress in Sibiu (September 2016) 25 Telecommunication Union

Other projects Share a platform of countries profiles Run surveys with policy makers Data collection 26 Develop case studies Telecommunication Union

For more information please visit: www.itu.int/cop Thank you Telecommunication Union