The ubiquitous presence of the Internet and the growing

Size: px
Start display at page:

Download "The ubiquitous presence of the Internet and the growing"

Transcription

1 A CYBER FOREIGN POLICY TIME FOR CANADA TO GET ONE Paul Meyer Cyber security is a growing concern as global dependence on the Internet increases. The development of an international regime to govern the use of cyberspace is at an early stage. Canada currently lacks an articulated foreign policy for cyberspace, although it has tried to incorporate the new cyber reality into traditional foreign policy goals. The time has come for Canada to develop a dedicated cyber foreign policy with an associated diplomatic strategy to promote it, and a supporting policy and research capacity. La cybersécurité soulève une inquiétude grandissante à mesure que s accroît la dépendance mondiale à l égard d Internet. Pourtant, on commence à peine à élaborer un système international qui régirait l utilisation du cyberespace. Le Canada ne possède en la matière aucune politique étrangère spécifique, même s il a tenté d intégrer cette nouvelle réalité virtuelle à ses objectifs traditionnels. Il doit donc établir sans délai une politique étrangère du cyberespace, accompagnée des stratégies diplomatiques nécessaires à sa promotion et soutenue à la fois par des capacités de recherche et des mesures concrètes. The ubiquitous presence of the Internet and the growing dependency on it for a wide spectrum of human activity has naturally given rise to concerns about the security of cyberspace. According to current estimates, 26 percent of the world s population, or 1.7 billion people, use the Internet. At all levels, from states to private citizens, reliance on the Internet is growing and interests from national security to individual financial ones are engaged and potentially at risk from cyber attack. Concerns over cyber security have led several states to formulate national cyber security strategies to address threats to cyberspace. The United States unveiled its strategy in May 2009, the UK in June 2009 and Australia released its national strategy in October In the Speech from the Throne in March 2010 the Canadian government indicated its intention to set out a national blueprint for cyber security and released its own strategy in early October. Understandably, much of the focus of these national strategies is on developing the domestic capacities to counter cyber crime and other threats to cyber security. At the same time, the Internet is quintessentially a global instrument, and securing cyberspace will necessarily require international cooperation. The realm of international relations is normally governed by the foreign policy of states. Cyber experts in Canada have decried the apparent lack of a foreign policy for cyberspace. In the words of one leading observer, University of Toronto s Ron Diebert: At present, Canada has no foreign and security policy for cyberspace. There is no Canadian Cyber Command, such as that which was recently stood up in the United States, nor does Canada have an Office of Cyberspace in Foreign Affairs. We are not only miserably behind other countries in this respect; we have not even begun to form a strategic policy. Of course, policy is more than just the institutional trappings of military commands or divisions within a foreign ministry. It is developing a set of objectives linked to some primary values and interests of a state that governs its interaction in the international arena. While one might search in vain for a volume on a foreign affairs department shelf (or a document on its Web site) entitled A Cyber Foreign Policy for Canada, it would be wrong to assume that the emerging phenomenon of cyber security is not being taken into account in the conduct of Canada s foreign policy. That policy reflects enduring Canadian values and interests, such as advocating respect for human rights, promoting the rule of law and fostering democracy. Contributing to national and global peace and security, economic prosperity and individual and social well-being are key goals of Canada s international relations. The cyber 70

2 realm, like other major technological innovations before it, will over time be integrated into the foreign policy of states and the international system as a whole. This article describes some of the varied activities and forums related to cyberspace, and cyber security in particular, in which Canada is currently engaged. It will also consider some of the challenges facing Canada in defining its cyber foreign policy and possible areas of focus for the nation in this vast and rapidly changing field. One of the principal reasons why foreign policy approaches to cyberspace are only now emerging, is that this realm has developed largely outside the sphere of state-to-state relations that foreign policy normally addresses. The Internet has been a creation of civil society, and many consider its governance should best be left to nongovernmental entities. Informal associations, such as the Internet Corporation for Assigned Names and Numbers (ICANN), have provided the basis for administering the domain name systems that are at the heart of the Internet. Many users of the Internet believe that this global tool for the free flow of information and human interaction must be protected from those forces that would seek to control or manipulate it for political or commercial purposes. At the same time, the growing importance of the Internet and its potential to connect directly with individuals, without going through official channels, has prompted increased attention on the part of governments around the world. There is a predisposition on the part of many states to want to develop some form of regulation of cyberspace, akin to the regulations that have governed earlier forms of telecommunication and broadcasting. As an emerging global public policy challenge, the use of cyberspace is being subjected to scrutiny by the international community, Canada included, and the first outline of a multilateral governance system is beginning to take shape. At the level of international relations and the United Nations, initial policy development regarding cyberspace occurred in the framework of the World While one might search in vain for a volume on a foreign affairs department shelf (or a document on its Web site) entitled A Cyber Foreign Policy for Canada, it would be wrong to assume that the emerging phenomenon of cyber security is not being taken into account in the conduct of Canada s foreign policy. A cyber foreign policy time for Canada to get one Summit on the Information Society (WSIS), which was held in two stages and in two locales: in Geneva in December 2003 and in Tunis in November The Geneva stage produced a declaration setting out key principles of the Information Society and an associated Action Plan to guide follow-on work in support of these principles. The Tunis session mirrored this output with its Commitment and Agenda documents. Together these consensus outcome documents represent the core of global policy direction on cyberspace and its usage. This policy guidance, however, is not of a nature to be summarized in a concise one-page communiqué. The first Geneva stage of WSIS adopted a declaration of principles that set out in no less than 67 paragraphs a collective vision for the Information Society. It is worth citing its opening paragraph in full to convey a sense of the direction it provided: 1. We, the representatives of the peoples of the world, assembled in Geneva from December 2003 for the first phase of the World Summit on the Information Society, declare our common desire and commitment to build a people-centred, inclusive and development-oriented Information Society, where everyone can create, access, utilize and share information and knowledge, enabling individuals, communities and peoples to achieve their full potential in promoting their sustainable development and improving their quality of life, premised on the purposes and principles of the Charter of the United Nations and respecting fully and upholding the Universal Declaration of Human Rights. These lofty principles are expanded upon in the rest of the declaration and in the accompanying action plan, but the chief themes are evident in the opening paragraph: peoplecentred, development-oriented, aligned with the UN Charter and supportive of human rights. Cyber security figures among the various facets of the declaration, although it is approached at a high level of generality: We support the activities of the United Nations to prevent the potential use of ICT (Information and Communications Technologies) for purposes that are inconsistent with the objectives of maintaining international stability and security, and may adversely affect the integrity of the infrastructure within States, to the detriment of their security. The tricky question of who governs the Internet is addressed in an inclusive manner in the declaration: The management of the Internet encompasses both technical and public policy issues and should involve all stakeholders and relevant intergovernmental and international organizations. A role for states, the private sector, civil society and inter-governmental and international organizations is affirmed without being overly prescriptive of who actually does what. To a degree, the entire question of governance was punted with the decision to create the Internet Governance Forum. This multi-stakeholder forum was deliberately established as a non-decision-making grouping that would provide a nexus for discussion of issues relevant to POLICY OPTIONS DECEMBER 2010-JANUARY

3 Paul Meyer cyberspace, but with no authority to determine policy. It has met annually since the 2005 session of WSIS. As its initial five-year mandate is coming to a close, the UN secretary general is directed to develop recommendations regarding the forum s future for consideration by UN member states. The WSIS process has also engendered a parallel mechanism for coordinating work by the UN system in implementing the Geneva Action Plan and Tunis Agenda. The United Nations Group on the Information Society (UNGIS) comprises 30 specialized agencies and programs of the UN and has met on an annual basis since its inception in Among these UN agencies, the International Telecommunications Union (ITU) has been assuming a leadership role on issues relating to WSIS follow-up. It has, in collaboration with UNESCO and the UN Development Program, been responsible for organizing annual sessions of the WSIS Forum, a further multi-stakeholder gathering, established to review progress on WSIS implementation. While this description of current international activity on cyber issues has concentrated on the global level represented by the UN, there is also an extensive range of activity undertaken by regional organizations and crossregional bodies. The Organization for Security and Co-operation in Europe, Organization of American States, Asia- Pacific Economic Cooperation, Organisation for Economic Co-operation and Development, NATO and the Council of Europe are just some of the more salient regional organizations engaged in cyber security work relevant to their mandates and members interests. One of the most important products of a regional organization has been the Convention on Cyber Crime, which was developed by the Council of Europe and opened for signature in Budapest in This convention, which entered into force in 2004, has been signed by 46 states and ratified by 30 states. It represents one of the first efforts to develop a legally binding international agreement requiring states to combat cyber crime within their jurisdiction and to cooperate with official agencies of other signatory governments to facilitate prosecution of cyber crime. The G8 s Roma/Lyon Group, focused on counter-terrorism and counter-organized crime activity, has also been an active grouping of states collaborating behind the scenes to combat cyber attacks by terrorists or criminal entities. Whether at the global or regional levels, activity on cyber security has tended to fall into four broad areas: i) education and awareness-raising; ii) ensuring integrity of cyber systems; iii) technical assistance and capacity-building and iv) development of norms and standards. Given the complexity and relative newness of cyber security, a great deal of basic work is required to raise awareness within international organizations and their member states as to the nature of cyber threats and the potential negative impact on their interests. After education as to the seriousness of the threat, there is a natural focus on securing the integrity of the informational systems utilized by the organization and member states against these threats. In light of the disparities in cyber security capacities among states, it is also logical to stress the provision of technical assistance and capacity-building to ensure that the less developed member states achieve a modicum of cyber security capability. Finally, there is frequently an interest in developing norms or standards to govern cyber security The Internet has been a creation of civil society, and many consider its governance should best be left to nongovernmental entities. Informal associations, such as the Internet Corporation for Assigned Names and Numbers (ICANN), have provided the basis for administering the domain name systems that are at the heart of the Internet. behaviour. This realm of action, particularly when it tries to move beyond political measures to specify international legal obligations, is extremely challenging. Currently the Budapest Convention on Cybercrime is one of the few international legal instruments extant in the field of cyber security and it has been criticized from several perspectives. In particular, its origins as a Council of Europe agreement and the council s control of amendments are cited as reasons why the Budapest Convention may not prove acceptable as the global treaty on cyber crime that its proponents had hoped it to be. Where is Canada in this vast arena of cyber activity? Canada and its official delegations to the international forums mentioned above have been active in the debates and in shaping the outcomes to date. This involvement has been informed by the main tenets of Canadian foreign policy as our diplomats and representatives have tried to integrate the implications of cyber security into the international system. This process may resemble grafting more than new plantings in the sense that the cyber dimension is added to existing structures or processes aimed at achieving basic goals of Canadian foreign policy. For example, at the Human Rights Council and its forerunner, the Commission on Human Rights, Canada has taken the lead in preparing a resolution affirming the importance of freedom of opinion and expression. Previously, this resolution focused on the role of the printed and electronic media in realising this fundamental freedom. The current version, adopted in October 2009, explicitly recognized, alongside the 72

4 traditional media, the importance of the Internet in the exercise, promotion and protection of the right to freedom of opinion and expression. In this way, the Internet was granted a status similar to the older media forms in the implementation of one of the primary freedoms enshrined in international human rights law. Critics will point out that this is only part of a declaratory policy resolution with no binding power. The fact that the UN s premier human rights body, in a consensus resolution, has acknowledged the role of the Internet in fostering freedom of opinion and expression has political and practical significance. The resolution provides a key authoritative reference that can be cited if state action subsequently fails to uphold these standards. The creation of norms and standards regarding the use of cyberspace, and cyber security in particular, is one of the chief avenues for Canadian foreign policy action in this realm. Some norm-setting comes through the patient craft of multilateral diplomacy and the fashioning of declaratory policy statements such as the WSIS outcome documents or UN resolutions. A more demanding expression of norm-making is the negotiation of international legal instruments that are binding on those states that sign on to them. There are relatively few such agreements governing cyberspace. This reflects the newness and complexity of the subject and the degree of obligation represented by these instruments. The Budapest Convention on Cyber Crime is a rare example of a binding instrument, but the problems it has encountered in gaining global acceptance do not augur well for future treaties on cyber security. The requirements for developing implementing legislation and regulation are also an obstacle for treaty ratification even for states with the political intent to achieve the treaty s aims. Canada, for example, has still not ratified the A cyber foreign policy time for Canada to get one Budapest Convention even though it was among its initial signatories in November The protracted process for negotiation, signature and ratification of treaties has led some observers to conclude that treaty-making is not the most promising approach to address as complex and rapidly changing an environment as cyberspace. An alternative to treaty-making in the cyber realm is the development of so-called politically binding measures. These can take various forms, such as confidence-building measures, codes of conduct or rules of the road. In the international security field, such measures have been Extrapolating from its long association with international development efforts, Canada is well positioned to aid less developed countries in bridging what has been termed the digital divide. Much activity has already been supported by Canada in this field as key development goals such as public health, poverty eradication, education and gender equality are promoted through cyber-related projects. popular as a substitute or supplement to the more demanding treaty form. At times such measures have served as precursors for legally binding instruments to follow. For example, the confidence-building measures in the Helsinki Final Act and the Stockholm Agreement preceded the mandatory measures for notification and observation negotiated in the Conventional Forces in Europe (CFE) treaty. For those concerned with preventing cyber warfare and developing norms of state behaviour in the conduct of cyber operations, the option of developing a set of political measures may prove a more practical avenue to explore than initiating formal treaty negotiations. Canada has been associated in the past with the promotion of such confidence-building measures in the international security field (e.g., in outer space security) and could contribute to the formulation of new measures to prevent or moderate conflict in the cyber realm. Given the wide disparities in cyber capabilities globally, it is not surprising that technical assistance and capacitybuilding are prominent themes in international cyber discussions. Extrapolating from its long association with international development efforts, Canada is well positioned to aid less developed countries in bridging what has been termed the digital divide. Much activity has already been supported by Canada in this field as key development goals such as public health, poverty eradication, education and gender equality are promoted through cyber-related projects. Canada can also contribute in the crucial, if at times sensitive, realms of democratic development, promotion of human rights and upholding the rule of law as these pertain to cyberfocused activity. The Open Net Initiative, which monitors steps taken by some governments to censor and control cyberspace, is but one example of the vital work that is underway and that will require sustained support in the future. While this brief account of Canadian action internationally shows that cyber-related interests are already being woven into the fabric of Canada s foreign policy, what should the priorities be in future? There would seem to be at least three areas that require priority attention if a Canadian cyber foreign policy is to be developed. The first is to seek to fashion an integrated cyber foreign policy, rather than a disconnected series of foreign policy actions with cyber elements to them. In other words, to set out a cyber foreign policy rather than simply a POLICY OPTIONS DECEMBER 2010-JANUARY

5 Paul Meyer foreign policy that happens to contain some cyber aspects. This is more than a semantic difference, but rather a qualitatively different approach that strives to identify cyber-relevant aims Canada wishes to pursue and integrate these into a coherent foreign policy. Only in this way can a view of the whole be achieved and the latent synergies of cyber activity in a myriad of international forums be realised. The second priority is to harness this foreign policy to a strategy for its implementation in the international arena. It is not sufficient to have clear and laudatory goals for one s cyber foreign policy; there needs to be a diplomatic strategy for their achievement. This will require careful analysis of the comparative advantages of various forums for advancing Canadian cyber objectives and how best to build the likeminded coalitions to gain support for these aims. It will also entail some prioritization of Canadian objectives as it will not be possible to give them all the same level of attention and resources. The third priority is investing in the policy and research capacity to support the development of the cyber foreign policy and strategy described above. At present, no new resources have been provided to DFAIT for carrying out an enhanced policy effort on cyberspace. What activity has been undertaken has been ad hoc and incremental to existing tasks of officers working on files such as counter-terrorism, anti-crime and legal affairs. While certain other departments and agencies of the Canadian government have had some international engagement on dimensions of cyberspace (e.g., Industry Canada on promotion of the digital economy), none have the mandate or capacity to develop a foreign policy for cyberspace. Such an effort will demand a substantial commitment of policy capacity and diplomatic resources to ensure that a cyber foreign policy of real international impact is created and successfully carried out. This in turn will require the support of a government that wants to see Canada help influence the emerging global public policy regime for cyber space, rather than simply accept one designed by others. Paul Meyer is a former Canadian foreign service officer with 35 years of diplomatic experience. He served as Canada s ambassador and permanent representative to the United Nations in Geneva and as director-general of the Security and Intelligence Bureau at Foreign Affairs and International Trade. In both of these assignments he was engaged in cyber security policy matters. CANADA S PREMIER PUBLIC POLICY MARKETPLACE The best way to reach the public policy community Career opportunities Academic courses Events and conferences Événements et conférences Offres d emploi Éducation et formation LE PORTAIL POUR REJOINDRE LA COMMUNAUTÉ DES AFFAIRES PUBLIQUES For information and rate card: sostiguy@irpp.org Renseignements et tarifs : sostiguy@irpp.org 74

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Zero Draft Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for the Information Society to

More information

TUNIS COMMITMENT. Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English

TUNIS COMMITMENT. Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English TUNIS COMMITMENT 1. We, the representatives of the peoples of the world, have gathered in Tunis from 16-18 November 2005 for this second

More information

Michael Yakushev PIR-Center, Moscow (Russia)

Michael Yakushev PIR-Center, Moscow (Russia) Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Draft WGIG Issues Paper on E-Commerce

Draft WGIG Issues Paper on E-Commerce Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not

More information

Outcome Document The New Delhi Declaration on Inclusive ICTs for Persons with Disabilities: Making Empowerment a Reality

Outcome Document The New Delhi Declaration on Inclusive ICTs for Persons with Disabilities: Making Empowerment a Reality United Nations Educational, Scientific and Cultural Organization Organisation des Nations Unies pour l éducation, la science et la culture Outcome Document The New Delhi Declaration on Inclusive ICTs for

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented

More information

General Assembly. United Nations A/69/723

General Assembly. United Nations A/69/723 United Nations A/69/723 General Assembly Distr.: General 13 January 2015 Original: English Sixty-ninth session Agenda item 91 Developments in the field of information and telecommunications in the context

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Committee of Ministers - The promotion of Internet and online media services a...

Committee of Ministers - The promotion of Internet and online media services a... Page 1 of 5 Ministers Deputies CM Documents CM/AS(2010)Rec1882 final 18 June 2010 The promotion of Internet and online media services appropriate for minors Parliamentary Assembly Recommendation 1882 (2009)

More information

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents Catherine Lotrionte and Eneken Tikk, co-chairs Cyber security and the acceptable behavior of state and non-state

More information

Outcome Document of the High Level Meeting of the General Assembly on the Overall Review of the Implementation of WSIS Outcomes

Outcome Document of the High Level Meeting of the General Assembly on the Overall Review of the Implementation of WSIS Outcomes Outcome Document of the High Level Meeting of the General Assembly on the Overall Review of the Implementation of WSIS Outcomes Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

peace, Security and Development in BRICS

peace, Security and Development in BRICS BRICS ACADEMIC FORUM 2014: THE ELEPHANT IN THE ROOM: PEACE AND SECURITY IN THE BRICS PARTNERSHIP TOWARDS THE 6 TH BRICS SUMMIT Dr Candice Moore Senior Researcher (ACCORD) and Research Associate (UJ, Faculty

More information

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Presentation to 21 st Asian Export Control Seminar The Wassenaar Arrangement and the ATT 26-28 February 2014. Tokyo, Japan

Presentation to 21 st Asian Export Control Seminar The Wassenaar Arrangement and the ATT 26-28 February 2014. Tokyo, Japan Check Against Delivery Presentation to 21 st Asian Export Control Seminar The Wassenaar Arrangement and the ATT 26-28 February 2014 Tokyo, Japan It is a pleasure to join the Asian Export Control Seminar

More information

Twelfth United Nations Congress on Crime Prevention and Criminal Justice

Twelfth United Nations Congress on Crime Prevention and Criminal Justice United Nations A/65/92 General Assembly Distr.: General 10 June 2010 Original: English Sixty-fifth session Item 107 of the preliminary list * Crime prevention and criminal justice Twelfth United Nations

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

DECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM

DECLARATION ON STRENGTHENING GOOD GOVERNANCE AND COMBATING CORRUPTION, MONEY-LAUNDERING AND THE FINANCING OF TERRORISM MC.DOC/2/12 Organization for Security and Co-operation in Europe Ministerial Council Dublin 2012 Original: ENGLISH Second day of the Nineteenth Meeting MC(19) Journal No. 2, Agenda item 7 DECLARATION ON

More information

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes Draft Outcome Document 4 November 2015 Preamble 1. Recalling the request in paragraph 111 of the Tunis Agenda for

More information

Security concerns and the desire to reduce fossil fuel emissions have led the United Nations to take up the topic of nuclear power.

Security concerns and the desire to reduce fossil fuel emissions have led the United Nations to take up the topic of nuclear power. Topic 1: Nuclear Power Security concerns and the desire to reduce fossil fuel emissions have led the United Nations to take up the topic of nuclear power. The United Nations is concerned with the spread

More information

How To Write A Letter To The World'S Leaders On The Ovemll Review

How To Write A Letter To The World'S Leaders On The Ovemll Review THE PRESIDENT OF THE GENERAL AS SEMBLY 12 August 2015 Excellency, I have the pleasure to transmit herewith a SmrunillY of the key messages and proposals fi'om the Informal Intemctive Stakeholders Consultation

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

E Distr. LIMITED E/ESCWA/2015/EC.2/4(Part IV) 17 November 2015 ORIGINAL: ENGLISH

E Distr. LIMITED E/ESCWA/2015/EC.2/4(Part IV) 17 November 2015 ORIGINAL: ENGLISH UNITED NATIONS ECONOMIC AND SOCIAL COUNCIL E Distr. LIMITED E/ESCWA/2015/EC.2/4(Part IV) 17 November 2015 ORIGINAL: ENGLISH Economic and Social Commission for Western Asia (ESCWA) Executive Committee Second

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION

ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION ATLANTA DECLARATION AND PLAN OF ACTION FOR THE ADVANCEMENT OF THE RIGHT OF ACCESS TO INFORMATION We, over 125 members of the global access to information community from 40 countries, representing governments,

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Developing the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments

Developing the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments 1 Developing the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments J. Herbach 1 1 Centre for Conflict and Security Law, University of Amsterdam E-mail contact

More information

Five Principles for Shaping Cybersecurity Norms

Five Principles for Shaping Cybersecurity Norms TRANSPARENCY PROPORTIONALITY HARMONIZATION RISK REDUCTION COLLABORATION Five Principles for Shaping Cybersecurity Norms Contents Introduction 3 Cybersecurity Norms 5 The Role of the Public Sector 6 Cybersecurity

More information

UN Human Rights Council UNITED KINGDOM 2014-2016 candidate

UN Human Rights Council UNITED KINGDOM 2014-2016 candidate UN Human Rights Council UNITED KINGDOM 2014-2016 candidate The UK is a passionate, committed and effective defender of human rights. We are seeking election to the UN Human Rights Council for the term

More information

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE 16 April 2014 (Highlighted in yellow below) Introduction 1. The Global Multistakeholder Meeting on the Future of Internet

More information

ECOWAS COMMON POSITION ON THE ARMS TRADE TREATY

ECOWAS COMMON POSITION ON THE ARMS TRADE TREATY COMISSÂO DA CEDEAO ECOWAS COMMISSION COMMISSION DE LA CEDEAO ECOWAS COMMON POSITION ON THE ARMS TRADE TREATY COTONOU, DECEMBER 2010 1 BACKGROUND AND JUSTIFICATION 1. During its 55 th plenary meeting on

More information

DRAFT GUIDELINES ON DECENTRALISATION AND THE STRENGTHENING OF LOCAL AUTHORITIES

DRAFT GUIDELINES ON DECENTRALISATION AND THE STRENGTHENING OF LOCAL AUTHORITIES DRAFT GUIDELINES ON DECENTRALISATION AND THE STRENGTHENING OF LOCAL AUTHORITIES 1 INTRODUCTION Sustainable human settlements development can be achieved through the effective decentralization of responsibilities,

More information

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical

More information

Cybersecurity in the Commonwealth: Setting the Stage

Cybersecurity in the Commonwealth: Setting the Stage Cybersecurity in the Commonwealth: Setting the Stage Tim Unwin Secretary General Commonwealth Telecommunications Organisation CTO Cybersecurity Forum, Yaoundé 24 th April 2013 For governments Imagine if

More information

Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice

Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice Bangkok Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice We, the States Members of the United Nations, Having assembled at the Eleventh United Nations Congress

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

ONLINE GAMBLING WHEN THE REALITY OF THE VIRTUAL CATCHES UP WITH US

ONLINE GAMBLING WHEN THE REALITY OF THE VIRTUAL CATCHES UP WITH US ONLINE GAMBLING WHEN THE REALITY OF THE VIRTUAL CATCHES UP WITH US Gouvernement du Québec, 2014 INTRODUCTION On February 10, 2010, the Québec government announced, in the Gazette officielle du Québec,

More information

1 FAM 330 BUREAU OF INTERNATIONAL ORGANIZATION AFFAIRS (IO)

1 FAM 330 BUREAU OF INTERNATIONAL ORGANIZATION AFFAIRS (IO) 1 FAM 330 BUREAU OF INTERNATIONAL ORGANIZATION AFFAIRS (IO) (Office of Origin: EUR-IO/EX) 1 FAM 331 ASSISTANT SECRETARY FOR INTERNATIONAL ORGANIZATION AFFAIRS 1 FAM 331.1 Assistant Secretary Responsibilities

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

ICT4Peace: Strategic use of ICT for Crisis Management 1 High- Level Working Lunch, 15 th November 2007

ICT4Peace: Strategic use of ICT for Crisis Management 1 High- Level Working Lunch, 15 th November 2007 ICT4Peace: Strategic use of ICT for Crisis Management 1 High- Level Working Lunch, 15 th November 2007 The Permanent Representative of Switzerland hosted a High- Level working Lunch, on 15 November 2007.

More information

Draft resolution submitted by the President of the General Assembly

Draft resolution submitted by the President of the General Assembly United Nations A/70/L.33 General Assembly Distr.: Limited 13 December 2015 Original: English Seventieth session Agenda item 17 Information and communications technologies for development Draft resolution

More information

Peaceful and Just Societies: A Key Factor in Financing for Sustainable Development

Peaceful and Just Societies: A Key Factor in Financing for Sustainable Development Peaceful and Just Societies: A Key Factor in Financing for Sustainable Development Input to the third Financing for Development Conference Published: May 2015 Recommendations: 1. Include language in the

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

RECOMMENDATION CONCERNING THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE

RECOMMENDATION CONCERNING THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE RECOMMENDATION CONCERNING THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE UNESCO, Paris CONTENTS PREAMBLE... 1 Development of multilingual content and systems... 2 Facilitating

More information

Adopted by the Security Council at its 5430th meeting, on 28 April 2006

Adopted by the Security Council at its 5430th meeting, on 28 April 2006 United Nations S/RES/1674 (2006) Security Council Distr.: General 28 April 2006 Resolution 1674 (2006) Adopted by the Security Council at its 5430th meeting, on 28 April 2006 The Security Council, Reaffirming

More information

Promoting Human Rights and Fundamental Freedoms for All : Australia s Engagement with the UN Human Rights Council

Promoting Human Rights and Fundamental Freedoms for All : Australia s Engagement with the UN Human Rights Council Promoting Human Rights and Fundamental Freedoms for All : Australia s Engagement with the UN Human Rights Council Issue The work, functioning and status of the United Nations Human Rights Council will

More information

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,

More information

Working Party on Information Security and Privacy

Working Party on Information Security and Privacy Unclassified DSTI/ICCP/REG(2003)5/REV1 DSTI/ICCP/REG(2003)5/REV1 Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 02-Jul-2003

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

The United Nations Convention against Corruption An Overview

The United Nations Convention against Corruption An Overview The United Nations Convention against Corruption An Overview The United Nations Convention against Corruption Adopted by the General Assembly: Resolution 58/4, 31 October 2003 Entry into Force: 14 December

More information

THE GLOBAL AGENDA FOR SOCIAL WORK AND SOCIAL DEVELOPMENT COMMITMENT TO ACTION March 2012

THE GLOBAL AGENDA FOR SOCIAL WORK AND SOCIAL DEVELOPMENT COMMITMENT TO ACTION March 2012 THE GLOBAL AGENDA FOR SOCIAL WORK AND SOCIAL DEVELOPMENT COMMITMENT TO ACTION March 2012 OUR COMMITMENTS As social workers, educators and social development practitioners, we witness the daily realities

More information

General Assembly. United Nations A/66/359

General Assembly. United Nations A/66/359 United Nations A/66/359 General Assembly Distr.: General 14 September 2011 Original: English Sixty-sixth session Item 93 of the provisional agenda* Developments in the field of information and telecommunications

More information

Draft Resolution on Science, technology and innovation for development

Draft Resolution on Science, technology and innovation for development 1 Draft Resolution on Science, technology and innovation for development The Economic and Social Council, Recognizing the role of the Commission on Science and Technology for Development as the United

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN

More information

DEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS Division for Social Policy and Development Secretariat of the Permanent Forum on Indigenous Issues

DEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS Division for Social Policy and Development Secretariat of the Permanent Forum on Indigenous Issues PFII/2015/EGM Original: English UNITED NATIONS NATIONS UNIES DEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS Division for Social Policy and Development Secretariat of the Permanent Forum on Indigenous Issues

More information

SUMMARY. This item has been included in the provisional agenda of the 196th session of the Executive Board at the request of Austria and Italy.

SUMMARY. This item has been included in the provisional agenda of the 196th session of the Executive Board at the request of Austria and Italy. Executive Board Hundred and ninety-sixth session 196 EX/32 PARIS, 19 March 2015 Original: English Item 32 of the provisional agenda UNESCO S ROLE AND RESPONSIBILITIES IN IMPLEMENTING GLOBAL CITIZENSHIP

More information

Ensuring protection European Union Guidelines on Human Rights Defenders

Ensuring protection European Union Guidelines on Human Rights Defenders Ensuring protection European Union Guidelines on Human Rights Defenders I. PURPOSE 1. Support for human rights defenders is already a long-established element of the European Union's human rights external

More information

Legal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign

Legal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign PARLIAMENTS UNITED in combating sexual violence against children Legal protection of children from sexual exploitation: The Lanzarote Convention and the ONE in FIVE campaign Tanja Kleinsorge Head of the

More information

DECISION No. 1049 OSCE STRATEGIC FRAMEWORK FOR POLICE-RELATED ACTIVITIES

DECISION No. 1049 OSCE STRATEGIC FRAMEWORK FOR POLICE-RELATED ACTIVITIES PC.DEC/1049 Organization for Security and Co-operation in Europe Permanent Council Original: ENGLISH 922nd Plenary Meeting PC Journal No. 922, Agenda item 6 DECISION No. 1049 OSCE STRATEGIC FRAMEWORK FOR

More information

The Bangkok Charter for Health Promotion in a Globalized World

The Bangkok Charter for Health Promotion in a Globalized World The Bangkok Charter for Health Promotion in a Globalized World Introduction Scope The Bangkok Charter identifies actions, commitments and pledges required to address the determinants of health in a globalized

More information

(COSAC) CONTRIBUTION OF THE XLI COSAC

(COSAC) CONTRIBUTION OF THE XLI COSAC Conference of Community and European Affairs Committees of Parliaments of the European Union (COSAC) CONTRIBUTION OF THE XLI COSAC Prague, 10-12 May 2009 1. Current Economic and Financial Situation 1.1

More information

ACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES

ACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES ACCESSIBLE INFORMATION PROVISION FOR LIFELONG LEARNING KEY POLICY MESSAGES Introduction The purpose of this paper is to give an overview of the conclusions and recommendations of the European Agency for

More information

I. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED

I. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED SHAPING THE FUTURE OF EQUALITY POLICIES IN THE EU JOINT HIGH LEVEL EVENT ON NON-DISCRIMINATION AND EQUALITY, ROME, 6-7 NOVEMBER 2014 SUMMARY AND MAIN CONCLUSIONS I. CONTEXT The Italian Presidency of the

More information

Diversity of Cultural Expressions INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION OF THE DIVERSITY OF CULTURAL EXPRESSIONS

Diversity of Cultural Expressions INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION OF THE DIVERSITY OF CULTURAL EXPRESSIONS Diversity of Cultural Expressions 1.EXT.IGC Distribution limited CE/08/1.EXT.IGC/Dec. Rev. 2 Paris, 20 August 2008 Original: English / French INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION

More information

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children Introduction This booklet contains the Ouagadougou Action Plan to Combat Trafficking in Human Beings, Especially

More information

Education 2030: Towards inclusive and equitable quality education and lifelong learning for all. ED/WEF2015/MD/3 Original: English

Education 2030: Towards inclusive and equitable quality education and lifelong learning for all. ED/WEF2015/MD/3 Original: English Education 2030: Towards inclusive and equitable quality education and lifelong learning for all ED/WEF2015/MD/3 Original: English 1. We, Ministers, heads and members of delegations, heads of agencies and

More information

RECOMMENDATIONS ON FOLLOW-UP TO THE MANDATE

RECOMMENDATIONS ON FOLLOW-UP TO THE MANDATE Mandate of the Special Representative of the Secretary-General (SRSG) on the Issue of Human Rights and Transnational Corporations and other Business Enterprises RECOMMENDATIONS ON FOLLOW-UP TO THE MANDATE

More information

Resolution adopted by the General Assembly on 19 December 2014. [on the report of the Second Committee (A/69/465)]

Resolution adopted by the General Assembly on 19 December 2014. [on the report of the Second Committee (A/69/465)] United Nations A/RES/69/204 General Assembly Distr.: General 21 January 2015 Sixty-ninth session Agenda item 16 Resolution adopted by the General Assembly on 19 December 2014 [on the report of the Second

More information

Building peace and security for all

Building peace and security for all Building peace and security for all Canada s Action Plan for the Implementation of United Nations Security Council Resolutions on Women, Peace and Security PURPOSE This Action Plan is intended to guide

More information

IGF Policy Options for Connecting the Next Billion

IGF Policy Options for Connecting the Next Billion Introduction IGF Policy Options for Connecting the Next Billion - A Synthesis - More than three billion people will be connected to the Internet by the end of 2015. This is by all standards a great achievement,

More information

Towards a Common Understanding of the Roles and Responsibilities of all Stakeholders in Internet Governance

Towards a Common Understanding of the Roles and Responsibilities of all Stakeholders in Internet Governance 3 April 2005 Towards a Common Understanding of the Roles and Responsibilities of all Stakeholders in Internet Governance 1. Introduction The Working Group on Internet Governance (WGIG) has as one of its

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

How To Strengthen Nuclear Security

How To Strengthen Nuclear Security COUCIL OF TH UROPA UIO N The Hague, 25 March 2014 8193/14 (OR. en) PRSS 187 The Hague uclear Security Summit Communiqué We, the leaders, met in The Hague on 24 and 25 March 2014 to strengthen nuclear security,

More information

Contribution by. Ms. Emily Taylor. Enhanced cooperation. Ms. Emily Taylor Internet Governance Consultant

Contribution by. Ms. Emily Taylor. Enhanced cooperation. Ms. Emily Taylor Internet Governance Consultant THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT 15 TH SESSION 21 25 May 2012 Geneva Contribution by Ms. Emily Taylor Enhanced cooperation Ms. Emily Taylor Internet Governance Consultant

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

Proposed medium-term plan for the period 2002-2005

Proposed medium-term plan for the period 2002-2005 United Nations A/55/6 (Prog. 9) General Assembly Distr.: General 18 April 2000 Original: English Fifty-fifth session Item 120 of the preliminary list* Programme planning Contents Proposed medium-term plan

More information

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT Chairman s draft recommendations on the basis of the consolidated version of the rolling document A. Shaping the outcomes of IGF meetings

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

ASEAN COMMUNITY VISION 2025

ASEAN COMMUNITY VISION 2025 ASEAN COMMUNITY VISION 2025 ASEAN Community Vision 2025 ASEAN COMMUNITY VISION 2025 1. We, the Heads of State/Government representing the peoples of the Member States of the Association of Southeast Asian

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

BORDER SECURITY AND MANAGEMENT CONCEPT

BORDER SECURITY AND MANAGEMENT CONCEPT MC.DOC/2/05 Organization for Security and Co-operation in Europe Ministerial Council Ljubljana 2005 Original: ENGLISH Second day of the Thirteenth Meeting MC(13) Journal No. 2, Agenda item 8 BORDER SECURITY

More information

Global Leaders' Meeting on Gender Equality and Women's Empowerment: A Commitment to Action 27 September 2015, New York

Global Leaders' Meeting on Gender Equality and Women's Empowerment: A Commitment to Action 27 September 2015, New York Global Leaders' Meeting on Gender Equality and Women's Empowerment: A Commitment to Action 27 September 2015, New York EU and its Member States' Commitments to the full, effective and accelerated implementation

More information

CONVENTION ON THE RECOGNITION OF STUDIES, DIPLOMAS AND DEGREES CONCERNING HIGHER EDUCATION IN THE STATES BELONGING TO THE EUROPE REGION PREAMBLE

CONVENTION ON THE RECOGNITION OF STUDIES, DIPLOMAS AND DEGREES CONCERNING HIGHER EDUCATION IN THE STATES BELONGING TO THE EUROPE REGION PREAMBLE CONVENTION ON THE RECOGNITION OF STUDIES, DIPLOMAS AND DEGREES CONCERNING HIGHER EDUCATION IN THE STATES BELONGING TO THE EUROPE REGION PREAMBLE The States of the Europe Region, Parties to this Convention,

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

Rwanda. Strategy for Sweden s development cooperation with 2015 2019 MFA

Rwanda. Strategy for Sweden s development cooperation with 2015 2019 MFA MINISTRY FOR FOREIGN AFFAIRS, SWEDEN UTRIKESDEPARTEMENTET Strategy for Sweden s development cooperation with Rwanda 2015 2019 MFA 103 39 Stockholm Telephone: +46 8 405 10 00, Web site: www.ud.se Cover:

More information

Declaration on the 20th Anniversary of the Barents Euro-Arctic Cooperation. (Kirkenes, Norway, 3 4 June 2013)

Declaration on the 20th Anniversary of the Barents Euro-Arctic Cooperation. (Kirkenes, Norway, 3 4 June 2013) 1 Declaration on the 20th Anniversary of the Barents Euro-Arctic Cooperation (Kirkenes, Norway, 3 4 June 2013) Prime Ministers and other high-level representatives of the members of the Barents Euro- Arctic

More information

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises EUROPEAN COMMISSION HIGH REPRESENTATIVE OF THE EUROPEAN UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY Brussels, 11.12.2013 JOIN(2013) 30 final JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

More information

Ministerial Declaration of The Hague on Water Security in the 21st Century

Ministerial Declaration of The Hague on Water Security in the 21st Century Ministerial Declaration of The Hague on Water Security in the 21st Century 1. Water is vital for the life and health of people and ecosystems and a basic requirement for the development of countries, but

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

2. Cyber legislation harmonization process in Central Africa

2. Cyber legislation harmonization process in Central Africa Introduction 1. What is cyber legislation? 2. Cyber legislation harmonization process in Central Africa The sub-region concerned; Partner international organizations in the harmonization of cyber legislation

More information