OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Similar documents
IMPORTANT GLOBAL CYBERLAW TRENDS 2017

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

International Conference on Cyberlaw, Cybercrime & Cybersecurity New Delhi, India OUTCOME DOCUMENT

Draft Resolution for Committee Consideration and Recommendation

RESOLUTION 45 (Rev. Hyderabad, 2010)

Commonwealth Cyber Declaration

G7 Bar Associations and Councils

Promoting Global Cybersecurity

European Directives and reglements for Information security

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

RESOLUTION 130 (REV. BUSAN, 2014)

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Cybersecurity, safety and resilience - Airline perspective

Legal and Regulatory Developments for Privacy and Security

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Cybersecurity & Spam after WSIS: How MAAWG can help

G8 Lyon-Roma Group High Tech Crime Subgroup

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Cyber Security and Cyber Fraud

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Robert Holleyman, President and CEO, BSA The Software Alliance

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

ENISA EU Threat Landscape

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

RESOLUTION 130 (Rev. Antalya, 2006)

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

National Communications Authority

Liberia ICT Policy

GUIDING PRINCIPLES I. BACKGROUND. 1 P a g e

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

Security and resilience in Information Society: the European approach

National Policy and Guiding Principles

ENISA s Position on the NIS Directive

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RBI GUIDELINES ON CYBER SECURITY AND RAKSHA APPROACH

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

European Union Agency for Network and Information Security

13967/16 MK/mj 1 DG D 2B

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ACCAB. Accreditation Commission For Conformity Assessment Bodies

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

Package of initiatives on Cybersecurity

Cyber Security Beyond 2020

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

OAS Cybersecurity Capacity Building Efforts

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

10025/16 MP/mj 1 DG D 2B

Cyber Security Strategy

WSIS Forum 2012-Identifying Emerging Trends and a Vision beyond 2015!

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

Global cybersecurity and international standards

Global Wildlife Cybercrime Action Plan1

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Legal Foundation and Enforcement: Promoting Cybersecurity

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Call for Expressions of Interest

Inter-American Port Security Cooperation Plan

Cyber Security in Europe

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015

Joint Declaration by G7 ICT Ministers

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

10496/18 MC/sl 1 DGD 2

10007/16 MP/mj 1 DG D 2B

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

HPH SCC CYBERSECURITY WORKING GROUP

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Comprehensive Study on Cybercrime

SWIFT Response to the Committee on Payments and Market Infrastructures discussion note:

8 th APEC Transportation Ministerial Meeting Tokyo, Japan SEPTEMBER 5, 2013 Ministerial Joint Statement

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Driving Global Resilience

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

The Digitalisation of Finance

Cyber Security Roadmap

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

Legal, Ethical, and Professional Issues in Information Security

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

Executive Order & Presidential Policy Directive 21. Ed Goff, Duke Energy Melanie Seader, EEI

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

The UK s National Cyber Security Strategy

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

Angela McKay Director, Government Security Policy and Strategy Microsoft

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

Internet Governance and the World Summit on the Information Society (WSIS)

Data Preservation Checklists

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Transcription:

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY ADOPTED BY THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY AT NEW DELHI ON 17-18 TH NOVEMBER, 2016 1

PREAMBLE HAVING IN MIND that Internet and technology is now an integral part of human life, utilizing the same for the benefit of the human race as a whole and devising a model for all the stakeholders in the cyberspace which promotes their interests and also that of the world at large and of the generations to come; WARMLY THANKING the supporters of this Conference, with whose support, International Conference on Cyberlaw, Cybercrime and, 2016 could be eventful and prolific; CONSIDERING THAT the total number of cybercrimes and cyber security incidents detected grows with each passing day; AFFIRMING that an international legal framework integrating the varied features and nuances of the interconnected fields of Cyberlaw, Cybercrime and needs to be established which shall promote the development of the Internet and technologies and also aid in the development and peace building amongst the world community; APPRECIATING the ethics and ethical issues have to play an integral part in cyberspace as the world moves forward. REAFFIRMING that the International Conference on Cyberlaw, Cybercrime and will provide a platform for fruitful dialogue amongst various communities in cyberspace endeavoring to devise a legal model for the development of cyberspace and to curb the crimes therein; 2

APPRECIATING the contribution and role of the Conference Director Mr. Pavan Duggal in being a significant catalyst in the evolving global Cyberlaw jurisprudential landscape; RECOGNIZING the call for an International Convention on Cyberlaw and Cyber Security made by the Conference Director Mr. Pavan Duggal; CONVINCED that the International Conference on Cyberlaw, Cybercrime and addresses a distinctive set of issues being faced by the world community in cyberspace and possible solutions for the same KEY DECISIONS THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME AND CYBERSECURITY HEREBY CALL UPON THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME AND CYBERSECURITY To take thought leadership in contributing towards evolving Cyberlaw jurisprudence; To work and contribute towards evolving cyber security law jurisprudence by coming up with common denominators and 3

principles which are accepted by nations concerning protection and preservation of cyber security; To work on collating principles of cyber security law jurisprudence in collaboration with distinct thought leaders and international stakeholders including International Commission on Cyber Security Law; To work with the international organizations and stakeholders for the purposes of coming up with legal frameworks on how to deal with the challenges posed by Security, Privacy and Freedom; To collate international best practices concerning Cyberlaw by working with all relevant stakeholders for the benefit of the entire community and comity of nations; To work towards harmonizing principles on Cyberlaw globally to include ethical values, virtues and balancing conflicting value perceptions in all instruments to strengthen cyber laws, aligned with international cooperation principles; To tie-up with international stakeholders and collate international best practices concerning emerging jurisprudence concerning Cyberlaw, Cybercrime and and further to engage in distinct deliberations with stakeholders to help collate common universally accepted principles concerning Cyberlaw, Cybercrime and ; 4

To work for and contribute towards the respect of International Law enshrining the Freedom of Opinion and Expression; To work on issues concerning Darknet jurisprudence as also legal, policy and regulatory issues concerning Darknet; To strengthen the Permanent Standing Committee on Cyberlaw, Cybercrime & Cyber Security, recommended by the 2014 conference. THE PARTICIPANTS OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME AND CYBERSECURITY HEREBY ENCOURAGE AND CALL UPON COUNTRIES AND NATIONAL GOVERNMENTS To work together towards evolving international solutions to deal with the legal challenges presented by jurisdiction and attribution on the Internet; To mandate provisions for reporting cybercrimes and breaches of cyber security by various stakeholders and further encourage them to come up with appropriate enforcement mechanisms to enforce such reporting; To achieve the golden balance between protecting national interests, sovereignty, integrity and security on the one hand 5

and the protection and preservation of individual liberty, rights and obligations on the other hand; To have in place robust legal frameworks for protection and preservation of Critical Information Infrastructures and to promote information sharing between public and private sectors to protect critical assets from cyber security threats; To work in close interaction with all stakeholders in the cyber community as also space community at the inter-governmental level for increased global awareness of the need to protect space assets and space systems, including critical infrastructures as well as to encourage enhanced cooperation and coordination for finding and implementing common approaches to the protection of communications and space systems. To proactively deal with the issue of detection, investigation and prosecution of cybercrimes on an expeditious basis; To work for a universal cyber penal law and internationally binding rules of cooperation in law enforcement, in order to close existing loopholes in the persecution of cyber criminals; To participate actively in all international endeavors to extend International Law, and particularly the International Law of Conflict, to the requirements of the digital environment with a view to generate consensus rules of law and behavior limiting conflict and conserve cyber peace; 6

To introduce legal, policy, administrative and pragmatic frameworks as a priority towards establishing a safe and secure cyberspace and aid in its further development. WE URGE that a united effort is necessary to be adopted by all stakeholders to maintain cyberspace that is safer, more resilient, and remains a source of tremendous opportunity and growth for years to come. WE REITERATE THAT GOING FORWARD IN A NEW ERA OF CYBERSPACE DEVELOPMENTS, WE ALL NEED TO BE SAFE, BE SECURE, BE DILIGENT. 7