Anda di halaman 1dari 26

Dr.

Mona Al Achkar Jabbour


Maj_aj@hotmail.com
Founder of the
Pan Arab Observatory for cyber Security

10/May/2013- Crown Plaza- Hamra

can be understood as comprising the following


elements:

1- the technical standardization activities


(interoperability of Internet
Protocol (IP) applications , network security, reliability and
quality for the Internet)

2- the technical coordination of the key protocols


and addresses and names underpinning the
technical functioning of the Internet)
3- public policy matters.

Internet governance includes the entire set of


multi-stakeholder decision making Processes for
technical and public policy matters that affect :
- information and communication technology (ICT)
-infrastructures and networks
- Internet communications
-Internet commerce and applications.

The most important aspect of the Internet is


governed by The private sector (Internet
Corporation for Assigned Names and Numbers ICANN)
It manages the domain name system and Internet
Protocol (IP) addressing.
ICANN makes its policy decisions using a
multistakeholder model of governance, in which a
bottom-up collaborative process is open to all
constituencies of Internet stakeholders.

global business coordination on Internet and


Information and Communication Technologies
(ICT) policy issues.
Launching of the Business Action to Support the
Information Society (BASIS) in 2006

critical Internet governance mechanisms, such as


the Domain Name System, were created by largely
voluntary organizations with technical rather than
legal or political expertise.
While states and publics are getting more
interested in these mechanisms

On June 13, 2012, ICANN announced it had


received 1,930 applications for new gTLDs
(generic top-level domain (gTLD))

Top Level Domains (TLDs) are the suffixes


that appear at the end of an address (after
the dot).
Prior to ICANNs establishment in 1998, the
Internet had eight generic top level domains
(gTLDs), including .com, .org, .net, and .gov.
In 2000 and 2004, ICANN held application
rounds
for a limited number of new gTLDscurrently
there are twenty-two.

Some business saw that gTLD expansion will


likely cause millions of dollars in increased
costs related to combating cybersquatting.
Senator Rockefeller
They asked ICANN to further address law
enforcement, trademark, and consumer
concerns before launching the program

ICC at IGF & ICANN


BASIS (in 2006 launching Business Action to
Support the Information Society )
policies promoting private sector investment,
innovation and competition..

policy discussions motivated by broad national public


objectives, such as:
Promoting economic infrastructure growth and
development
Attracting capital and encourage investment
Stimulating innovation and creativity

Public policy matters related to the


information society include:
Speech & content
privacy
security
education
spam
intellectual property protection

The Internet is a vibrant and growing medium


for:
- communicating
- sharing information and knowledge
- doing business

The protection of personal data is an essential


element of building confidence in the use of
information and communication technologies
and the Internet.
The general functions of privacy policies :
Identification: identification includes analyzing
technological trends, isolating threats to
consumers, and suggesting how consumers
might be protected from those harms.

Education: Consumers need to be educated


about the uses of information, benefits those
uses create, risks, and consumer rights and
responsibilities
Implementation: Implementation of privacy
protection principles
Enforcement: There are numerous ways to
ensure that privacy protections are enforced

- a privacy protection regime that offers sufficient


protection to citizens while allowing business to flourish
and thrive.
- allows for cultural and business practice variations
The OECD adopted Privacy Guidelines in 1980 that
represent an international consensus on such a core set
of principles.
In November 2004,APEC adopted a Privacy Framework
consisting of a set of principles, guidance for domestic
implementation and a work programme for cross border
implementation.

flexible and responsive approach to the protection


of personal data
Educate the public
Cooperate internationally
Avoid developing laws, policies and practices that
create obstacles to cross border flows of personal
data.
Endorse model contracts, codes of conduct, seal
programs, and other self-regulatory mechanisms
prepared by the private sector in order to promote
the free and secure flow of information within and
between companies, and across borders.

Business, and ICC in particular, strongly supports a


global culture of security consistent with the OECD
Guidelines for the Security of Information Systems
and Networks, and United Nations General Assembly
Resolution on this issue. ICC and the Business and
Industry
Advisory Committee to the OECD (BIAC), have
developed Information Security Assurance for
Executives
culture of security. ICC and BIAC have also developed
Information security issues and resources for
Organization for Economic Cooperation and
Development, OECD Guidelines on the Protection of
Privacy and Transborder Flows of Personal Data, 1981

fraudulent and unsolicited harmful e-mail


Spam is harmfull to consumers and business
fraudulent and untargeted commercial
communications and legitimate commercial email
Education and cooperation
Technology
Government Regulation/Enforcement

- OECD recommendations on cross-border


fraud provide guidance on these issues
- bilateral and multilateral memorandums
of understanding
-National efforts to facilitate international
enforcement actions
- the Global Online Spam Resource
established by the ICC

intellectual property system:


-insubstantial balance between the needs of the
creator and the user
-designed to promote innovation and creativity to
benefit society as a whole.
-(IPRs) contribute to society by helping
competition, encouraging the production and
dissemination of a wide range of quality goods and
services
Strong intellectual property protection promotes
economic and social development by stimulating
innovation and investment.

Business supports efforts to combat fraud


business is shallwork with governments to
identify mechanisms to combat fraud on the
Internet.
International cooperation is vital.

government should ensure that it has the


needed tools to cross -border cooperation
with law enforcement agencies.
business will cooperate with law enforcement
in a manner consistent with business
realities.
The OECD has Guidelines on Cross-border
Fraud.
The Council of Europe adopted its Convention
on Cybercrime in November 2002.

- Promotes innovation, increase access and


foster diversity of choice
- Maximizes competition
- allows users choice of the technology that
best solutions to their specific needs
(performance, quality, reliability, security and
life-cycle cost)

Business supports existing organizations


maintaining their current roles and mandate, and
the importance of private sector leadership in the
technical management and development of the
Internet.
Business views the evolution, development and
improvement of these structures as keys to:
- Unleashing the full potential of the Internet for
all.
- The free flow of information,
- Access
- Full integration of ICTs and the Internet as tools
for economic growth and social development

Anda mungkin juga menyukai