Who are the Stakeholders in Internet Governance?



Similar documents
Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives

Internet Technical Governance: Orange s view

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)

COMMUNIQUE. AFRICAN ICT MINISTERIAL ROUND-TABLE ON 42 nd MEETING OF ICANN. Hotel Méridien Dakar, SENEGAL. 21 Octobre 2011

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

African Internet Governance Forum (AfIGF) Girma Dessalegn - AfIGF Secretariat

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

Digital rights under HR international standards. ARTCILE 19 approach on FOE and ICTs

Third Meeting of the Internet Goverance Forum (IGF) Report by Sanjay K Bihani with Stuart Hamilton

Michael Yakushev PIR-Center, Moscow (Russia)

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Draft WGIG Issues Paper on E-Commerce

Daniel Castro. Senior Analyst. Information Technology and Innovation Foundation (ITIF)

ICANN STRATEGIC PLAN JULY 2012 JUNE 2015

CRISP Team Response to the IANA Stewardship Transition Coordination Group (ICG) Call for Public Comment on IANA Stewardship Transition Proposal

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

ICANN- INTERNET CORPORATION OF ASSIGNED NAMES & NUMBERS

ACCEPTABLE USE AND TAKEDOWN POLICY

Cybercrime in the Automotive Industry How to improve your business cyber security

ICANN Engagement Strategy Middle East! Baher Esmat!! MENOG 13! Kuwait, September 2013!

Need to institutionalize and strengthen multi-stakeholder model Establish goals for IG Role for gov t, private sector Self regulatory instead of

COMMENTS OF THE SOFTWARE & INFORMATION INDUSTRY ASSOCAITION (SIIA)

ISCC 103 Quality Management. Quality Management ISCC V 2.3-EU

Honourable members of the National Parliaments of the EU member states and candidate countries,

Cyber Security Recommendations October 29, 2002

Freedom of Expression Online The Role of Internet Intermediaries

RUSSIA CHINA NEXUS IN CYBER SPACE

ITU National Cybersecurity/CIIP Self-Assessment Tool

Charter of Consumer Rights in the Digital World

PLAN FOR ENHANCING INTERNET SECURITY, STABILITY, AND RESILIENCY

Cyber Diplomacy A New Component of Foreign Policy 6

DOING BUSINESS IN INDONESIA E-Commerce

Harmonising Cyber Security Across the Caribbean: CTU Initiatives & Activities

CRS Report for Congress

Establishing and supporting CERTs for Internet security

The Brazilian Internet Steering Committee CGI.br Internet Governance Model in Brazil

National Cyber Security Strategy 2

HiveColab. UGANDA NATIONAL INTERNET GOVERNANCE FORUM 2011 HELD AT HIVE COLAB, NAKAWA Harnessing Internet Development in Uganda

The Open Internet Speech

SUMMARY PRINCIPLES, RECOMMENDATIONS & IMPLEMENTATION GUIDELINES

Report on Canadian Interest in Internet Governance November 2010

Telecom and Internet Regulatory Challenges and Opportunities Names, Numbers, Internet Governance

AFRICAN DECLARATION on Internet Rights and Freedoms

Draft WGIG issue paper on Network and Information Security

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review

Before the House Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security United States House of Representatives

UDRP extension beyond the domain name

ICANN: achievements and challenges of a multi-stakeholder, bottom up, transparent model

TAP Network Response to the Post-2015 Zero Draft

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Forum on Communication for Development & Community Media for Family Farming

2013 Africa Union Framework for Cyber security in Africa

Towards a Common Understanding of the Roles and Responsibilities of all Stakeholders in Internet Governance

CYBER SECURITY STRATEGY AN OVERVIEW

Group Strategic Plan Final Draft

Testimony of. Hearing Entitled Should the Department of Commerce Relinquish Direct Oversight Over ICANN? April 10, 2014

Kenya s Presentation to CAFRAD Conference of ICT Security and Defence Experts Tangier, Morocco, June 2014

GAO Engagement on the Internet Domain Name System Discussion Guide

Expert Q&A on Brand Protection in the Expanded gtld Program

GLOBAL ALLIANCE FOR CLIMATE-SMART AGRICULTURE (GACSA)

.AXA Domain Policy. As of March 3, 2014

Draft WGIG Issue paper on Affordable and Universal Access

The Danish Cyber and Information Security Strategy

Diversity of Cultural Expressions INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION OF THE DIVERSITY OF CULTURAL EXPRESSIONS

If you re not sure of an answer, please leave it blank. If a question does not apply to you please write not applicable.

RECOMMENDATIONS ON FOLLOW-UP TO THE MANDATE

TAP Network Response to the Post-2015 Z ero Draft

CRS Report for Congress

Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines

HUMAN RESOURCES POLICIES & PROCEDURES

Intangible Technology Transfer (ITT) and UNSCR 1540

Cyber Europe Key Findings and Recommendations

Division: Chapter: Policy:

NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

.BIO DOMAIN NAME POLICY v2.0 - Last Update: May 30, Starting Dot Ltd..BIO DOMAIN NAME POLICY - V1.0 - AS OF 30 MAY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Contribution by. Ms. Emily Taylor. Enhanced cooperation. Ms. Emily Taylor Internet Governance Consultant

Misappropriation of Trademarks on the Internet

Before the DEPARTMENT OF COMMERCE Internet Policy Task Force

How do we Police Cyber Crime?

Social Networking and its Implications on your Data Security

The Committee of Ministers, under the terms of Article 15.b of the Statute of the Council of Europe,

Evaluation Results from National Consultation Organizers

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes

CIVIL SOCIETY PARTICIPATION IN THE UNCAC REVIEW MIRELLA DUMMAR FRAHI - CIVIL SOCIETY TEAM LEADER

ROLE PROFILE & PERSON SPECIFICATION JOB TITLE SOCIAL MEDIA MANAGER

Outcome Document of the High Level Meeting of the General Assembly on the Overall Review of the Implementation of WSIS Outcomes

IPv6 Around the World

Draft WGIG Issues Paper on Spam

The Future of the Internet

Working Through the Internet: Intellectual Property, Privacy, and Other Issues for Non-Profits. September 28, 2010

INTERNET MANAGEMENT. Structured Evaluation Could Help Assess Proposed Transition of Key Domain Name and Other Technical Functions

SOCIAL MEDIA POLICY. Introduction

Comments on Draft Report: Review of Generic Names Supporting Organization (GNSO)

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean

Synthesis Report. Towards an effective monitoring and accountability framework for the post-2015 development agenda: perspectives from the regions.

Rethinking Cyber Security Threats

Transcription:

MEAC SIG 2015 Tunis, Tunisia Who are the Stakeholders in Internet Governance? Houda BELKASSEM Morocco

Internet governance is now an active topic of international discussion. Interest has been fueled by media attention to cyber crime, global surveillance, commercial espionage, cyber attacks and threats to critical national infrastructures. Many nations have decided that they need more control over Internet-based technologies and the policies that support them.

Concept of Multistakeholder IG How to make public policy for the internet? What is the approach?

The aim of multi-stakeholder processes are to promote better decision making by ensuring that the views of the main actors concerned about a particular decision are HEARD and INTEGRATED at ALL stages through dialogue and CONSENSUS building.

Importance of MS approach Importance of MS model as a way to govern the Internet. The approach aims to create Trust between the actors and solutions that provide mutual benefits. The approach is people-centered and everyone involved takes responsibility for the outcome. Because of the inclusive and participatory approaches used, stakeholders have a greater sense of ownership for decision made. They are more likely to comply with them.

Who are the Stakeholders in Internet Governance? At the moment, Internet governance involves a wide variety of actors, or stakeholders, as they are often called. Internet actors include national governments, international organizations, the business sector, civil society, and the technical community

Who are the Stakeholders in Internet Governance? Governments Business sector Civil Society Technical Community Academia

I- Governments The governments have had to simultaneously train officials, develop policy, and actively participate in various international Internet meetings.

II- Business sector The main concerns of the business sector was the protection of trademarks. Many companies were faced with cybersquatting and the misuse of their trademarks by individuals who were fast enough to register them first.

II- 1. Domain-name companies Domain-name companies include registrars and registries who sell Internet domain names (e.g..com and.net). They have also been involved in the broader IG policy process with the main objective of reducing the risk of a potential take-over of ICANN s role by intergovernmental organisations.

II- 2. Internet service providers (ISPs) The key online intermediaries, it makes them particularly important for Internet governance. Their main involvement is on a national level in dealing with government and legal authorities.

II- 3. Telecommunication companies Facilitate Internet traffic and run the Internet infrastructure. The main actors include companies such as Verizon and AT&T. Their primary interest in IG is to ensure a business-friendly global environment for the development of an Internet telecommunication infrastructure.

II- 4. Internet content companies Google, Facebook, and Twitter are increasingly active in IG. Their core business model could be directly affected, for example, by government arrangements related to data protection and privacy. Content producers, such as Disney, are also prominent players, concerned about preserving the global outreach and dominance of its products and models for local content development, as well as to protect its copyrights globally.

III- Civil society Civil society has been the most vocal and active promoter of a MS approach to IG. The usual criticism of civil society participation in previous multilateral forums had been a lack of proper coordination and the presence of too many, often dissonant, voices.

IV- Technical community Includes institutions and individuals who have developed and promoted the Internet since its inception. Created the initial spirit of the Internet, based on the principles of sharing resources, open access, and opposition to government involvement in Internet regulation.

Thank you