DATE: 1 APRIL Introduction
|
|
|
- Stella Wheeler
- 10 years ago
- Views:
Transcription
1 INTERNET SOCIETY SUBMISSION TO THE OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS IN RESPONSE TO THE CONSULTATION ON THE RIGHT TO PRIVACY IN THE CONTEXT OF THE UN GENERAL ASSEMBLY RESOLUTION 68/167 DATE: 1 APRIL 2014 Question 5 - Any information on the protection and promotion of the right to privacy in the context of domestic and extraterritorial surveillance and/or interception of digital communications and collection of personal data. Introduction The Internet Society respectfully wishes to emphasis that domestic and extraterritorial surveillance encompasses monitoring and interception by commercial, governmental and/or entities of communications, data and/or metadata. Our focus is on surveillance of Internet users. Merely because Internet communications and data are not encrypted or otherwise protected or obscured does not mean the sender or the intended recipient(s) consider that data to be public. Furthermore, even where communications and data are publicly accessible, individuals may quite reasonably expect that such data would not be used by others in a different context and/or for a different purpose (e.g. for surveillance). It is also important to be mindful when considering the state of art regarding the protection and promotion of the right to privacy in the context of domestic and extraterritorial surveillance and/or the interception of digital communications and the collection of personal data, including on a mass scale that the surveillance tools and techniques, which today may only be available to a select group of states or entities, could rapidly become resources that anyone could access and use. Data that has been collected may be stored for indefinite periods of time and over time easily linked with more and larger data sets. Data that is considered meaningless noise could one day be rendered meaningful through developments in data analytics. Data that is currently safe from decryption may not remain protected forever: future decryption techniques may be successful in rendering the data in clear text. While an individual s right to privacy must, in appropriate circumstances, give way to matters of public interest such as safety, law enforcement and security, recent events have demonstrated that concepts such as necessary, proportionate and reasonable used to determine whether an exemption or lower level of protection is justified need to be revisited. Further, the standard that the international community should apply is not one of strict legality, but rather what is lawful, just and fair. The Internet Society calls upon the global community to work together to: confine the ambit of data collection for national security purposes to those truly exceptional instances where the public interest objectively outweighs an individual s right to privacy; and agree a set of strong principles for ethical data handling. Page 1 of 5
2 Some initiatives from the Internet technical community The Internet Engineering Task Force (IETF) and the World Wide Web Consortium have implemented initiatives to specifically address privacy and security in Internet standards development. For example, the IETF, through the Internet Architecture Board (IAB) Privacy Program, published RFC 6973 Privacy Considerations for Internet Protocols 1 and the W3C is developing similar guidance for Web standards through the Privacy Interest Group. The IAB Privacy Program also held a privacy tutorial entitled Engineering Privacy into Internet Protocols at IETF89 (in London, March 2014). The disclosures concerning the nature and extent of government surveillance of Internet users communications and data drew the world s attention to a new threat model: pervasive surveillance and interception of private communications. The IETF and W3C have responded with initiatives to develop standards that strengthen the Internet against this type of threat. For example, the IETF launched a new public list ([email protected]) to discuss specific technical proposals for improvements in IETF protocols for better mitigation against pervasive monitoring. Importantly, IETF mailing lists and meetings are open to everyone. The IETF also reached consensus at IETF88 (in Vancouver, November 2013) to address pervasive surveillance as a community in all its standards-track specifications. In early 2014, the W3C and IAB held a joint workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT) 2. The program committee received more than 60 paper submissions across a broad range of topics. Approximately 100 individuals were invited to participate. A report will be made available in due course. The policy community The surveillance disclosures have caused ripples across the Internet policy landscape. Many institutions, organisations and communities involved in Internet policy development or dialogue have reacted in one way or another. For the assistance of the OHCHR in preparing its report, we note some examples here: UN General Assembly Resolution: The right to privacy in the digital age 3 Joint Declaration on surveillance programs and their impact on freedom of expression (UN Special Rapporteur on the Protection and Promotion of the Right to Freedom of Opinion and Expression and Special Rapporteur for Freedom of Expression of the Inter-American Commission on Human Rights 4 (21 June 2013) Council of Europe Declaration of the Committee of Ministers on Risks to Fundamental Rights stemming from Digital Tracking and other Surveillance Technologies 5 (11 June 2013) Message from the Council of Europe Consultative Committee of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (T-PD) to the Council of Europe Committee of Ministers 6 (from the plenary, October 2013) (in progress before the Snowden disclosures) ColorLogged=F5D (page 18) Page 2 of 5
3 Conference of Ministers responsible for Media and Information Society, Political Declaration: Freedom of Expression and Democracy in the Digital Age Opportunities, rights, responsibilities 7 European Commission documents Restoring Trust in EU-US data flows 8 European Parliament resolution of 12 March 2014 on the US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens fundamental rights and on transatlantic cooperation in Justice and Home Affairs (2013/2188(INI) 9 In December 2013, the Council of Europe Cybercrime Convention Committee (T-CY) decided to put on hold its earlier decision 10 to commence work on a protocol regarding transborder access to data 11. Additionally, there is a whole body of recent and/or ongoing international and regional policy work regarding privacy that is relevant because it defines principles for the collection, handling and cross border access/transfer of personal data. While that work may not be confined to the surveillance context, that work is, naturally, informed and influenced by the now well-known threat of pervasive extraterritorial surveillance of Internet communications for national security or other purposes. For the assistance of the OHCHR in preparing its report, we note some examples here: Organisation for Economic Co-operation and Development (OECD) o In 2011, the Organisation for Economic Co-operation and Development (OECD) published The Evolving Privacy Landscape: 30 Years After The OECD Privacy Guidelines and commenced its review of the guidelines. 12 Two years later, in 2013, the OECD adopted a Recommendation of the Council concerning Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data (2013) revising the OECD Privacy Guidelines. 13 Council of Europe o The Council of Europe Consultative Committee of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (T-PD) prepared proposals for the modernisation of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (Convention 108) and an accompanying supplementary explanatory memorandum. 14 This proposal is being considered by the Ad Hoc Committee on Data Protection (CAHDATA) 15, set up by the Council of Europe Committee of Ministers. 7 opted_en.pdf At the 9 th plenary (see page 15 of CY%282013%2922_PlenAbrMeetRep_V9.pdf) 11 CY%282013%2928_Plen10AbrRep_V3.pdf 12 Please see Chapter 2 at %20Ad%20hoc%20committee%20on%20data%20protection% pdf Page 3 of 5
4 o In 2013, Uruguay became the first non-council of Europe member to accede to the Convention. Morocco has also been invited to accede. 16 International Conference of Data Protection and Privacy Commissioners o In 2009, the 31st International Conference of Data Protection and Privacy Commissioners ( Conference ) produced a Joint Proposal for a Draft of International Standards on the Protection of Privacy with regard to the processing of Personal Data ( the Madrid Resolution ). 17 In 2010, the 32 nd Conference adopted a Resolution calling for the organisation of an intergovernmental conference with a view to developing a binding international instrument on privacy and the protection of personal data 18. In 2013, the 35 rd Conference adopted a Resolution on anchoring data protection and the protection of privacy in international law. 19 Asia-Pacific Economic Cooperation (APEC) o In 2011, Asia-Pacific Economic Cooperation (APEC) leaders approved the APEC Cross Border Privacy Rules (CBPR) system, a voluntary accountability-based system to facilitate privacy-respecting data flows among APEC economies. o There are currently two APEC member economy participants: USA and Mexico. Japan has also applied to join the APEC CBPR system. European Commission o In 2012, the European Commission proposed a comprehensive reform of the European Union s data protection rules. In March 2014, the European Parliament voted in favour of a proposed regulation 20. The proposed regulation is currently under consideration by the European Council of Ministers. Organization of American States (OAS) o On 6 June 2013, during the 43 rd Regular Session of the General Assembly of the Organization of American States (OAS) adopted Resolution 2811 (XLIII-O/13) Access to Public Information and Protection of Personal Data. 21 Among other things, the resolution instructed the Inter-American Juridical Committee to prepare proposals for the [Committee on Juridical and Political Affairs] on the different ways in which the protection of personal data can be regulated, including a model law on personal data protection, taking into account international standards in that area. In making this resolution, the OAS General Assembly took note of the Inter-American Juridical Committee s (IACJ) proposed Statement of Principles for Privacy and Personal Data Protection in the Americas 22. African Union and UN Economic Commission for Africa o The African Union with the UN Economic Commission for Africa is working on a draft convention, currently titled Draft African Union Convention on the Establishment of a Legal Framework Conducive to Cyber Security in Africa or Draft African Union Convention on the Confidence and Security in Cyberspace %29.pdf Page 4 of 5
5 Part II of that draft convention covers personal data protection and aims to provide a legal framework for the region, leveraging internationally recognised best practices. UNESCO o In 2012, the UN Educational, Scientific and Cultural Organization (UNESCO) published a Global Survey on Internet Privacy and Freedom of Expression. 23 UNESCO s aim in publishing the report was to provide UNESCO Member States and other stakeholders, national and international, with a useful reference tool. In the foreword, UNESCO said It is our wish that this publication will contribute to bringing stakeholders together for informed debate on approaches that are conducive to privacy protection without compromising freedom of expression. IGF o Security, Openness and Privacy has been one of the main themes of the Internet Governance Forum (IGF) since In addition to main sessions devoted to this theme, participants have organised numerous multistakeholder workshops on a range of current and emerging privacy topics. CONTACT INFORMATION Ms. Christine Runnegar, Director, Public Policy, Internet Society ([email protected]) Mr. Nicolas Seidler, Policy Advisor, Internet Society ([email protected]) 23 Page 5 of 5
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
Value of the EU Data Protection Reform against the Big Data challenges. Keynote address 5th European Data Protection Days Berlin, 4.5.
Value of the EU Data Protection Reform against the Big Data challenges Keynote address 5th European Data Protection Days Berlin, 4.5.2015 Giovanni Buttarelli European Data Protection Supervisor (Check
Self-Assessment of a Comprehensive Privacy Programme: A Tool for Practitioners
Self-Assessment of a Comprehensive Privacy Programme: A Tool for Practitioners The Accountability Project ( the Project ) is pleased to release Self-Assessment of a Comprehensive Privacy Programme: A Tool
Council of Europe Standing Conference of Ministers of Education
MED-24-2 5 April 2013 Council of Europe Standing Conference of Ministers of Education Governance and Quality Education 24 th session Helsinki, Finland, 26-27 April 2013 Information on the objectives and
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction
UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet
Establishing and supporting CERTs for Internet security
Report on the Activities of the IGF Best Practice Forum (BPF) for: Establishing and supporting CERTs for Internet security Cristine Hoepers, CERT.br/NIC.br Maarten Van Horenbeeck, FIRST Adli Wahid, FIRST
Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
F A C T S H E E T. EU-US Summit (Brussels, 26 March 2014) and EU-US relations
Brussels, 24 March 2014 140324/01 F A C T S H E E T EU-US Summit (Brussels, 26 March 2014) and EU-US relations The Leaders of the European Union and the United States of America will meet on 26 March 2014
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
Council of the European Union Brussels, 14 November 2014 (OR. en) Ensuring respect for the rule of law in the European Union
Council of the European Union Brussels, 14 November 2014 (OR. en) 15206/14 FREMP 198 JAI 846 COHOM 152 POLG 156 NOTE From: To: Subject: Presidency Council Ensuring respect for the rule of law in the European
EDRi s. January 2015. European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70
EDRi s Red lines on TTIP January 2015 European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70 ABOUT EDRI European Digital Rights is a network of 34 privacy and
EU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union
ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY
Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament
September 5, 2012 Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament Lara Comi Rapporteur, Committee on Internal market and Consumer Protection
EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004
COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
NEGOTIATING FRAMEWORK FOR TURKEY. Principles governing the negotiations
NEGOTIATING FRAMEWORK FOR TURKEY Principles governing the negotiations 1. The negotiations will be based on Turkey's own merits and the pace will depend on Turkey's progress in meeting the requirements
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of
Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16
Response of the Northern Ireland Human Rights Commission on the Health and Social Care (Control of Data Processing) NIA Bill 52/11-16 Summary The Northern Ireland Human Rights Commission (the Commission):
Cybersecurity Governance
AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional
Privacy and Data Protection
Hewlett-Packard Company 3000 Hanover Street Palo Alto, CA 94304 hp.com HP Policy Position Privacy and Data Protection Current Global State of Privacy and Data Protection The rapid expansion and pervasiveness
EUROPEAN DATA PROTECTION SUPERVISOR. Inventory 2014. A strategic approach to legislative consultation
Brussels, 18 December 2013 EUROPEAN DATA PROTECTION SUPERVISOR Inventory 2014 A strategic approach to legislative consultation 1 1. ISSUES OF STRATEGIC IMPORTANCE FOR 2014 This document presents the public
UN Human Rights Council UNITED KINGDOM 2014-2016 candidate
UN Human Rights Council UNITED KINGDOM 2014-2016 candidate The UK is a passionate, committed and effective defender of human rights. We are seeking election to the UN Human Rights Council for the term
005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation
Protocol No. 14 to the Convention for the Protection of Human Rights and Fundamental Freedoms, amending the control system of the Convention
Protocol No. 14 to the Convention for the Protection of Human Rights and Fundamental Freedoms, amending the control system of the Convention Strasbourg, 13.V.2004 Convention Protocol Protocols: No. 4 No.
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
Accession to Convention 108: Benefits and Commitments. Marc Rotenberg, President Electronic Privacy Information Center Washington, DC
Accession to Convention 108: Benefits and Commitments Marc Rotenberg, President Electronic Privacy Information Center Washington, DC Convention 108: From a European Reality to Global Treaty Strasbourg,
ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION
ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION We, over 125 members of the global access to information community from 40 countries, representing governments,
Draft WGIG Issues Paper on E-Commerce
Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not
Ninth session. Intergovernmental Council for the Information for All Programme
IFAP-2016/COUNCIL.IX/Inf 7 Paris, 4 April 2016 Original : English Distribution limited Ninth session Intergovernmental Council for the Information for All Programme 30-31 May 2016 UNESCO House, Paris (Fontenoy
PROCLAMATION OF 28 SEPTEMBER AS THE INTERNATIONAL DAY FOR THE UNIVERSAL ACCESS TO INFORMATION OUTLINE
38th Session, Paris, 2015 38 C 38 C/70 3 November 2015 Original: English Item 4.23 of the provisional agenda PROCLAMATION OF 28 SEPTEMBER AS THE INTERNATIONAL DAY FOR THE UNIVERSAL ACCESS TO INFORMATION
Universal Periodic Review
Universal Periodic Review Civil society Follow-up Kit 2014 Nomenclature CAT CRPD ECOSOC HRC ICC ICESCR MIA NGO NHRI OHCHR SuR UPR Convention against Torture Convention on the Rights of Persons with Disabilities
STEERING COMMITTEE ON THE MEDIA AND NEW COMMUNICATION SERVICES (CDMC)
Strasbourg, 9 January 2012 CDMC(2011)018Rev8 STEERING COMMITTEE ON THE MEDIA AND NEW COMMUNICATION SERVICES (CDMC) Draft declaration of the Committee of Ministers on the desirability of international standards
Cybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
UNITAR Contribution to the Permanent Forum on Indigenous Issues Seventh Session s Recommendations and Priorities
UNITAR Contribution to the Permanent Forum on Indigenous Issues Seventh Session s Recommendations and Priorities Executive Summary THE UN INSTITUTE FOR TRAINING AND RESEARCH (UNITAR) PROGRAMME IN PEACEMAKING
Section 1: Development of the EU s competence in the field of police and judicial cooperation in criminal matters
CALL FOR EVIDENCE ON THE GOVERNMENT S REVIEW OF THE BALANCE OF COMPETENCES BETWEEN THE UNITED KINGDOM AND THE EUROPEAN UNION Police and Criminal Justice LEGAL ANNEX Section 1: Development of the EU s competence
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
Anti-Doping Convention
Anti-Doping Convention Strasbourg, 16.XI.1989 The 2006 Prohibited List Additional Protocol Explanatory Report Français Preamble The member States of the Council of Europe, the other States party to the
COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a COUNCIL RECOMMENDATION
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 18.02.2005 COM(2005) 53 final Proposal for a COUNCIL RECOMMENDATION on priority actions to increase cooperation in the field of archives in Europe (presented
Application of Data Protection Concepts to Cloud Computing
Application of Data Protection Concepts to Cloud Computing By Denitza Toptchiyska Abstract: The fast technological development and growing use of cloud computing services require implementation of effective
Annotated Agenda of the Sherpa meeting. Main features of Contractual Arrangements and Associated Solidarity Mechanisms
Annotated Agenda of the Sherpa meeting 21-11-2013 Main features of Contractual Arrangements and Associated Solidarity Mechanisms At their meeting on 26 November the Sherpas are invited to discuss: General
Memorandum of Understanding on Labour Cooperation
Memorandum of Understanding on Labour Cooperation The Department of Labour of New Zealand, in the name of New Zealand and the Ministry of Human Resources and Social Security of the People s Republic of
EUROPEAN COMMISSION HIGH LEVEL PROCESS OF REFLECTION ON PATIENT MOBILITY AND HEALTHCARE
EUROPEAN COMMISSION HIGH LEVEL PROCESS OF REFLECTION ON PATIENT MOBILITY AND HEALTHCARE DEVELOPMENTS IN THE EUROPEAN UNION Document: Meeting of the high level process of reflection on patient mobility
PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security
PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria
Final Resolution for the 6 th European Interparliamentary Space Conference (EISC), held on November 10 th and 11 th 2004
Final Resolution for the 6 th European Interparliamentary Space Conference (EISC), held on November 10 th and 11 th 2004 The 6 th European Interparliamentary Space Conference (EISC), held at the Congress
The role of governments in protecting and furthering internet freedom. Background paper
The role of governments in protecting and furthering internet freedom Background paper Introduction Governments, as well as private-sector, civil-society and other international organisations, have an
Working Party on Information Security and Privacy
Unclassified DSTI/ICCP/REG(2003)5/REV1 DSTI/ICCP/REG(2003)5/REV1 Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 02-Jul-2003
Behavioral Targeting Legal Developments in Europe and the Netherlands
1 Behavioral Targeting Legal Developments in Europe and the Netherlands Frederik Zuiderveen Borgesius Ph.D researcher, focusing on behavioral targeting and privacy law Institute for Information Law, University
The case for adoption of the UN Electronic Communications Convention
2014 UNCITRAL South Asia Seminar The case for adoption of the UN Electronic Communications Convention Joy Cheng, Acting Senior Legal Officer Attorney-General s Department, Australia The role of the Attorney-General
AFRICAN DECLARATION on Internet Rights and Freedoms
AFRICAN DECLARATION on Internet Rights and Freedoms Last updated 28 August 2014 Emphasising that the Internet is an enabling space and resource for the realisation of all human rights, including the right
COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.9.2005 COM(2005) 438 final 2005/0182 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the retention of data processed
Panel discussion on Intellectual Property and Human Rights
E WIPO-UNHCHR/IP/PNL/98/INF/4 ORIGINAL: ENGLISH DATE: NOVEMBER 6, 1998 Panel discussion on Intellectual Property and Human Rights Geneva, November 9, 1998 OPENING STATEMENT BY MR. BRIAN BURDEKIN ON BEHALF
The EU Democratic Governance Pact
The EU Democratic Governance Pact Upholding the Rule of law and Fundamental Rights ALDE initiative outline The EU Democratic Governance Pact Upholding the Rule of law and Fundamental Rights ALDE initiative
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical
Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks
Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.
United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes
United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Zero Draft Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for the Information Society to
Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA
TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA (TESPOK) BACKGROUND TESPOK is a professional, non-profit organization representing the interests of telecommunication service providers in Kenya.
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
IBA Business and Human Rights Guidance for Bar Associations. Adopted by the IBA Council on 8 October 2015
IBA Business and Human Rights Guidance for Bar Associations Adopted by the IBA Council on 8 October 2015 With Commentaries 2015 IBA Business and Human Rights Guidance for Bar Associations With Commentaries
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon
Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,
COMMISSION OF THE EUROPEAN COMMUNITIES GREEN PAPER
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 11.11.2009 COM(2009) 624 final GREEN PAPER on obtaining evidence in criminal matters from one Member State to another and securing its admissibility
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015
Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
Political Aspects of the Mandate of the European Bank for Reconstruction and Development
Political Aspects of the Mandate of the European Bank for Reconstruction and Development Introduction The Agreement Establishing the European Bank for Reconstruction and Development includes a significant
The guidance will be developed over time in the light of practical experience.
Freedom of Information Act Awareness Guidance No. 14 International Relations The Information Commissioner s Office (ICO) has produced this guidance as part of a series of good practice guidance designed
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
Presentation by Minister Sean Sherlock TD, Minister for Research and Innovation on Irish Presidency s Space and Research Priorities to ITRE Committee
Presentation by Minister Sean Sherlock TD, Minister for Research and Innovation on Irish Presidency s Space and Research Priorities to ITRE Committee Check against delivery 23 January, 2013 It is a particular
COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT AND THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
EN EN EN EUROPEAN COMMISSION Brussels, COM(2010) COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT AND THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE Removing cross-border tax obstacles
Online Ads: A new challenge for privacy? Jörg Polakiewicz*
31st International Conference of Data Protection and Privacy Commissioners, Madrid Thursday 5 November 2009, 15.00-16.30 Parallel Session A Smile! There s a camera behind the ad or Send it to a friend
National Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
A/HRC/28/L.27. General Assembly. United Nations
United Nations General Assembly Distr.: Limited 24 March 2015 Original: English A/HRC/28/L.27 Human Rights Council Twenty-eighth session Agenda item 3 Promotion and protection of all human rights, civil,
INTER AMERICAN CONVENTION ON THE ELIMINATION OF ALL FORMS OF DISCRIMINATION AGAINST PERSONS WITH DISABILITIES
INTER AMERICAN CONVENTION ON THE ELIMINATION OF ALL FORMS OF DISCRIMINATION AGAINST PERSONS WITH DISABILITIES (Adopted at Guatemala City, Guatemala at the twenty ninth regular session of the General Assembly
Accountability: Data Governance for the Evolving Digital Marketplace 1
Accountability: Data Governance for the Evolving Digital Marketplace 1 1 For the past three years, the Centre for Information Policy Leadership at Hunton & Williams LLP has served as secretariat for the
CONSUMER EDUCATION Policy Recommendations of the OECD S Committee on Consumer Policy
CONSUMER EDUCATION Policy Recommendations of the OECD S Committee on Consumer Policy INTRODUCTION The Committee on Consumer Policy (CCP) launched a project to examine consumer education issues in October
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION)
AG/RES. 2004 CYBER SECURITY STRATEGY (RESOLUTION) AG/RES. 2004 (XXXIV-O/04) ADOPTION OF A COMPREHENSIVE INTER-AMERICAN STRATEGY TO COMBAT THREATS TO CYBERSECURITY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY
THE INITIATIVE OF THE VOLUNTARY PRINCIPLES ON SECURITY AND HUMAN RIGHTS GOVERNANCE RULES
THE INITIATIVE OF THE VOLUNTARY PRINCIPLES ON SECURITY AND HUMAN RIGHTS GOVERNANCE RULES As approved by the Plenary on September 16, 2011 TABLE OF CONTENTS SECTION I. General Provisions... 1 SECTION II.
Questions and Answers on the European Commission Communication: The Paris Protocol A blueprint for tackling global climate change beyond 2020
European Commission - Fact Sheet Questions and Answers on the European Commission Communication: The Paris Protocol A blueprint for tackling global climate change beyond 2020 Brussels, 25 February 2015
