Draft Resolution for Committee Consideration and Recommendation

Similar documents
Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

RESOLUTION 130 (REV. BUSAN, 2014)

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

Promoting Global Cybersecurity

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]

RESOLUTION 130 (Rev. Antalya, 2006)

Cybersecurity & Spam after WSIS: How MAAWG can help

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

RESOLUTION ADOPTED BY THE GENERAL ASSEMBLY. [on the report of the Second Committee (A/54/588/Add.2)]

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Inter-American Port Security Cooperation Plan

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Preparatory process of the second High-level United Nations Conference on South-South Cooperation

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/65/433)]

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/60/488/Add.3)]

Nuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

Departamento de Asia y Pacífico

GENERAL ASSEMBLY RESOLUTION A/RES/67/195. Information and communications technologies for development

Commonwealth Cyber Declaration

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

UN FREEDOM OF INFORMATION POLICIES INTERNATIONAL TELECOMMUNICATION UNION (ITU)

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

RESOLUTION 47 (Rev. Buenos Aires, 2017)

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

National Policy and Guiding Principles

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

Resolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]

A1. Actions which have been undertaken by Governments

RESOLUTION 140 (REV. BUSAN, 2014)

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

Resolution adopted by the General Assembly. [on the report of the Fifth Committee (A/61/592/Add.4)]

15412/16 RR/dk 1 DGD 1C

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Asia-Pacific Telecommunity Administrations ASIA-PACIFIC COMMON PROPOALS FOR THE WORK OF THE CONFERENCE

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Cybersecurity for ALL

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Internet Governance and the World Summit on the Information Society (WSIS)

Germany Candidate for the ITU Council

13967/16 MK/mj 1 DG D 2B

CONNECT ARAB STATES SUMMIT

Cyber Security Strategy

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

COOPERATION BETWEEN INTERPOL AND THE UNITED NATIONS

Related to the Internet

Guiding principles on the Global Alliance against child sexual abuse online

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Donor Countries Security. Date

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Joint Declaration by G7 ICT Ministers

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Engaging space tools for development on Earth contribution of space technology and applications to the post-2015 Development Agenda

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Statement for the Record

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

ISAO SO Product Outline

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

Scope of the Member State mechanism

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

Cybersecurity. Topic Background

The UNISDR Private Sector Alliance for Disaster Resilient Societies

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

A framework for community safety and resilience

Comprehensive Study on Cybercrime

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

Mapping to the National Broadband Plan

G8 Lyon-Roma Group High Tech Crime Subgroup

Provisional Translation

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

The APEC Model. Global Partnership through Regional Initiatives

ENISA s Position on the NIS Directive

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Current international space security (sustainability) activities and initiatives

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

Global cybersecurity and international standards

Transcription:

Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations to the Model United Nations College of Charleston, 2013 Convinced that communication, the capacity for early warning, and the dissemination of information throughout the global populace are key features for the sustainability of a choiceworthy digital environment, Having considered that the dissemination and use of information technologies and means affect the interests of the entire international community and that optimum effectiveness is enhanced by broad international cooperation, Recalling, in this connection, the approaches and principles outlined at the Information Society and Development Conference, held in Midrand, South Africa, in May 1996 and the proposal lead by China, Russia, Tajikistan, and Uzbekistan in the creation of an International code of conduct for information security in September 2011, Noting with appreciation General Assembly Resolution 54/49 and GA Resolution 55/28, which call upon Members States to consider the advisability of developing international principles that would enhance the security of global information and telecommunications systems and help to combat information terrorism and criminality, Acknowledging GA Resolution 56/19 which acknowledges the need to preserve the free flow of information while considering possible measures to limit the threats of information security, and GA Resolution 57/239 on the Creation of a global culture of cybersecurity, Reaffirming Article 10 of the UN Convention on Anti-corruption which encourages countries to adopt measures to improve public access to information as a means to fight corruption, Further reaffirming Article 13 of the aforementioned Convention which states that each State Party shall take appropriate measures to promote the active participation of individuals and groups in the prevention of and the fight against corruption by enhancing transparency and promoting the contribution of the public to decision- making processes and ensuring that the public has effective access to information, Emphasizing Article 19 of both the Universal Declaration on Human Rights and the International Covenant on Civil and Political Rights which provides that every person shall have the right to free expression and to seek and impart information,

Bearing in mind the Freedom of Information Law enacted on July 4, 1966 in the United States of America which provides that any person has a right, enforceable in court, to obtain access to federal agency records, except to the extent that such records (or portions of them) are protected from public disclosure by one of three special law enforcement record exclusions, Keeping into consideration the efforts of the Freedom of Information Project of PI, the UN Special Rapporteur on Freedom of Opinion and Expression who have endorsed principles on freedom of information as both an essential part of freedom of speech and as an important human right on its own, Taking into consideration GA Resolution 58/32 on the role of science and technology in the context of international security, in which, it recognized that scientific and technological developments could have both civilian and military applications, Noting with approval of the GA Resolution 60/45 on the report of the Secretary-General on the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, prepared on the basis of the results of the Group s work, Restating GA Resolution 57/53 concerning the creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information infrastructures, Reaffirming the need to harness the potential of information and communications technologies to promote the achievement of the internationally agreed development goals, including the Millennium Development Goals, and recognizing that gaps in access to and use of information technologies by States can diminish their economic prosperity, and the effectiveness of cooperation in combating the criminal misuse of information technology and in creating a global culture of cybersecurity, Stressing the need for enhanced efforts to close the digital divide in order to achieve universal access to information and communication technologies and to protect critical information infrastructures by facilitating the transfer of information technology, Recognizing that national efforts should be supported by international information-sharing and collaboration, so as to effectively confront the increasingly transnational nature of such threats and the work of relevant regional and international organizations on enhancing cybersecurity, and reiterating their role in encouraging national efforts and fostering international cooperation, Noting also the 2009 Report of the International Telecommunication Union on securing information and communication networks: best practices for developing a culture of cybersecurity, which focused on a comprehensive national approach to cybersecurity consistent with free speech, the free flow of information, and due process of law, Acknowledging Resolution 66/152 concerning the UNODA report by the Security General which provides a framework for protection from information security threats, and sets international legal principles including those of sovereign equality of States that are applicable to the choiceworthy use of cyberspace,

Fully believing in industry-leading Australia's response to GA Resolution 65/41 on developments in the field of information and telecommunications in the context of international security, Accepts Georgia s response to the Russian Federation s 2008 heavily distributed denial-of-service attack, by creating the Data Exchange Agency, functioning as a tool to provide professional education concerning cybersecurity, prepare proposals, monitor security and issue digital signature certificates, Supporting Germany s efforts to combat attacks on information technology networks and other databases by non-state actors, through the adoption of a new cybersecurity strategy, and it s perpetual effort to cooperate with other nations to prompt international security, Viewing with appreciation the concern by Greece to maintain national sovereignty rights regarding information security in global information sharing, Emphasizing the Netherland s support of safe and reliable information and communications technologies and the protection of an open, free Internet and respect for human rights, safe and reliable information and communications technologies which are essential for our prosperity and well-being and serve as a catalyst for sustainable economic growth, information and communications technologies which offer opportunities, and the importance of public-private partnerships and individual responsibility on the part of all users of information and communications technologies, Therefore this Committee: 1. Calls upon Member States to promote, at multilateral levels, the consideration of existing and potential threats in the field of information security, as well as possible measures to limit the threats emerging in this field, consistent with the need to preserve the free flow of information; 2. Considers that the purpose of such measures could be served through the examination of relevant international concepts aimed at strengthening the security and transparency of global information and telecommunications systems; 3. Encourages continued and expanded support for public-private partnerships with the developing world in the development of security for telecommunication and information technology; 4. Requires that the United Nations University establish a programme dedicated to the research and development of security systems for telecommunications and information technology funded by technologically developed nations; 5. Emphasizes the need for advancement in countries that are not as technologically advanced in order to assure their national digital security and in turn ensure global digital security;

6. Requests that greater measures be taken to ensure the incorporation of underdeveloped countries into the global information system as a means to strengthen telecommunication and technological systems; a. Further requests the participation of developed nations in providing education methods and tools in order to diminish the digital divide (the gulf between those who have ready access to technology, and those who do not); 7. Calls upon the International Telecommunications Union (ITU) and the International Organization for Standardization (ISO) to reevaluate and strengthen, as necessary, the relevant international standards for security in telecommunication and information technology; 8. Approves the creation of transparency standards under the UN Development Programme to combat corruption and promote transparency and integrity in government, business and development assistance; a. Trusts that all information must be available to anyone who seeks it except: i. Information received from or sent to third parties, under an expectation of confidentiality; ii. Information whose disclosure is likely to endanger the safety or security of any individual, violates his or her rights, or invades his or her privacy; iii. Commercial information where disclosure would harm financial interests; 9. Encourages member States to endorse and implement the transpa standards in telecommunications systems and software; 10. Declares accordingly the creation of safe and reliable information and communications technologies and the protection of an open, free internet and respect for human rights: a. Requires that all Member States allow free internet and global access to internet servers; i. Further requires the creation of public internet hotspots, public computer hubs and access routes to such spots through national efforts; b. Affirming that funding for global digital access will be the responsibility of all G20 members; c. Invites all countries to aid in the development of mass technologies to ensure global access; 11. Resolves that the security of critical information infrastructures is a responsibility all nations must address systematically and an area in which they must lead nationally, in coordination with relevant stakeholders, who in turn must be aware of relevant risks, preventive measures and effective responses in a manner appropriate to their respective roles; 12. Declares accordingly an International Right for Freedom of Information under the provisions of the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights; a. Proclaims this right, enforceable in the Sub-Committee established by this Resolution, as the ability to obtain access to federal information, except information regarding genuine

national security concerns, without violating any international digital-security agreements; 13. Designates the creation of a Subcommittee under the UN Human Rights Council: a. To promote the effective and comprehensive implementation of the Declaration on the Right and Responsibility of Individuals, Groups and Organs of Society to Promote and Protect Universally Recognized Human Rights and Fundamental Freedoms through cooperation and constructive dialogue and engagement with Governments, relevant stakeholders and other interested actors; b. To study, in a comprehensive manner, trends, developments and challenges in relation to the exercise of the right of anyone, acting individually or in association with others, to promote and protect human rights and fundamental freedoms in regards to a digital environment; c. To recommend concrete and effective strategies to better protect human rights defenders, and the individual through the adoption of a universal approach, and to follow up on these recommendations; d. To seek, receive, examine and respond to information on the situation and the rights of anyone, acting individually or in association with others, to promote and protect human rights and fundamental freedoms, including thereby the Right for Freedom of Information; e. To work in close coordination with other relevant United Nations bodies, offices, departments and specialized agencies, both at Headquarters and at the state level; f. To report regularly to the Human Rights Council and the General Assembly; 14. Further resolves that the established Subcommittee will seek to protect human rights defenders, members of the press, and any individual who attempts to publish or obtain information under the aforementioned Right; 15. Invites all Member States to continue to inform the Subcommittee of their views and assessments on the following questions: a. General appreciation of the issues of information security; b. Efforts taken at the national level to strengthen information security and promote international cooperation in this field; c. The content of the concepts mentioned in clause no. 2; d. Possible measures that could be taken by the international community to strengthen information security at the global level; 16. Additionally requests the Subcommittee, with the assistance of a group of governmental experts, to be established on the basis of equitable geographical distribution, to continue to study existing and potential threats in the sphere of information security and possible cooperative measures to address them, and to submit a report on the results of this study to the General Assembly;

17. Recommends that States form an advisory council within the established Subcommittee on technology security to promote awareness and the development of systems designed to withstand serious threats, including cyber-terrorism; a. Requests that standards be proposed by such a committee to make securing a stable global economy safe from cyber-terrorism a primary goal; 18. Decides to remain actively seized of the matters in this Resolution.