Fwd: [Internet Policy] ISOC Community Forum - Community Networking

1 view
Skip to first unread message

Jean-Baptiste MILLOGO

unread,
Jun 22, 2016, 11:05:05 AM6/22/16
to isoc-chapter...@googlegroups.com
FYI
---------- Forwarded message ----------
From: Jane Coffin <cof...@isoc.org>
Date: 2016-06-22 13:35 GMT+00:00
Subject: [Internet Policy] ISOC Community Forum - Community Networking
To: Richard Hill <rh...@hill-a.ch>, "Internetpolicy@Elists. Isoc. Org" <interne...@elists.isoc.org>


Hi All –

Just want to invite you to a meeting next week – Tuesday 28 June @1300 UTC
Message below is in Eng, Fr, and Spanish.


Internet Society


Español abajo | Français en dessous
Hi,
I am writing to invite you to a discussion that is dear to me. On June 28 we will be hosting a special Internet Society online event focused on the work of community leaders that are in the front-line of bringing connectivity to the unconnected.

Be it climbing the Himalayas, driving deep into the country side of India or hand-building antennas at the hills of Sierra Juárez, Mexico, we will talk to people who are taking the Internet to communities previously isolated from the digital revolution.

These are places where basic connectivity can help educate children, connect loved ones or even save lives.

What are the main challenges to their work? How can we help them reach even further? What kind of support is needed? What can we do to help?

If you are interested in helping us answer some of the questions above, please, join us on June 28 at 13h UTC via this link: https://isoc.zoom.us/j/687870801  (only active during the live event)

Please, visit our event page to confirm your participation and check out the speaker list.

Best regards,

Ted Mooney
Senior Director, Community Services
The Internet Society
Hola,

Quiero invitarlo a unirse a un debate que considero muy importante.  El 28 de junio, Internet Society (ISOC) realizará un evento especial en línea donde se abordará el trabajo que realizan los líderes de la comunidad para llevar conectividad a quienes aún no la tienen.

Estén escalando el Himalaya, internándose en recónditas zonas rurales de la India o construyendo antenas en la sierra de Juárez, México, hablaremos con las personas que llevan Internet a comunidades que habían quedado aisladas de la revolución digital.

Son lugares donde la conexión a un teléfono celular puede educar niños, conectar a seres queridos o, incluso, salvar vidas.

¿Cuáles son los principales desafíos de su trabajo?  ¿Cómo podemos ayudarlos a llegar aún más lejos?  ¿Qué clase de apoyo necesitan?  ¿Qué podemos hacer para ayudar?

Si le interesa ayudarnos a responder algunas de estas preguntas, únase a nosotros el 28 de junio a las 13h UTC a través de este vínculo: https://isoc.zoom.us/j/687870801 (solo estará activo durante el evento en vivo). El también evento contará con traducción simultánea para el Español.

Para confirmar su participación y ver la lista de presentadores, por favor, visite la página del evento.

Atentamente,
Ted Mooney
Bonjour ,

Je vous écris pour vous inviter à une discussion dont le sujet me tient à coeur. Nous hébergerons le 28 juin un événement spécial en ligne de l’Internet Society centré sur le travail des leaders de la communauté qui sont en première ligne pour apporter la connectivité aux non connectés.

Que ce soit en grimpant l’Himalaya, en circulant au fin fond de la campagne indienne ou en installant des antennes faites à la main sur les collines mexicaines de Sierra Juárez, nous parlerons aux personnes qui apportent l’Internet aux communautés qui étaient auparavant isolées de la révolution numérique.

Il existe des endroits où la connexion téléphonique cellulaire peut éduquer les enfants, connecter des gens qui s’aiment ou même sauver des vies.

Quels sont les principaux défis rencontrés dans leur travail? Comment pouvons-nous les aider à aller toujours plus loin? De quels soutiens ont-ils besoin? Comment pouvons-nous les aider?

Si vous êtes intéressés à nous aider à trouver les réponses à quelques-unes des questions ci-dessus, veuillez nous rejoindre le 28 juin à 13h UTC en cliquant sur le lien https://isoc.zoom.us/j/687870801 (uniquement actif durant l’événement en direct). Une traduction simultanées en français sera disponible.

Pour confirmer votre participation et voir la liste des présentateurs, veuillez visiter la page de l’événement.

Cordialement,

Jane Coffin | Director, Development Strategy GlobalEngagement Team (GE)
Internet Society | www.internetsociety.org
Email:  cof...@isoc.org
Skype:  janercoffin
Mobile/WhatsApp:  +1.202.247.8429

On 6/22/16, 9:01 AM, "InternetPolicy on behalf of Richard Hill" <internetpol...@elists.isoc.org on behalf of rh...@hill-a.ch> wrote:


The Global Commission on Internet Governance has released its report, see:

  http://ourinternet.org/report

I found this report to be well researched and well written, and worth
reading carefully.  As far as I can tell, it is well aligned with ISOC's
positions and priorities.

For what it is worth, I reproduce below some portions that I found worth
singling out.  There are no page numbers in the report, so I could not
include page references.

Best,
Richard

=======================

CORE ELEMENTS OF A SOCIAL COMPACT FOR A DIGITAL SOCIETY

There must be a mutual understanding between citizens and their state that
the state takes responsibility to keep its citizens safe and secure under
the law while, in turn, citizens agree to empower the authorities to carry
out that mission, under a clear, accessible legal framework that includes
sufficient safeguards and checks and balances against abuses. Business must
be assured that the state respects the confidentiality of its data and they
must, in turn, provide their customers the assurance that their data is not
misused. There is an urgent need to achieve consensus on a social compact
for the digital age in all countries. Just how urgent is shown by current
levels of concern over allegations of intrusive state-sponsored activities
ranging from weakening of encryption to large-scale criminal activity to
digital surveillance to misuse of personal data, and even to damaging cyber
attacks and disruption.

-----

Governments should not create or require third parties to build back doors
or compromise encryption standards, as these efforts would weaken the
Internet and fundamentally undermine trust. Efforts by the technical
community to incorporate privacy-and-security-enhancing solutions into all
standards and protocols of the Internet should be encouraged.

The Commission urges member states of the United Nations to agree not to use
cyber technology to attack the core infrastructure of the Internet.

Governments seeking a peaceful and sustainable Internet should adopt and
respect norms that help to reduce the incentive for states to use cyber
weapons. Governments should agree on infrastructure assets and services that
must not be targeted by cyber attacks.

Businesses should purchase cyber insurance to cover the liability costs of
breaches of their systems. Cyber liability insurance vendors can be
persuasive in promoting best practices in the corporate sector. Cyber
premiums should be higher if best practices are not followed. Insurers need
to have better data to appropriately identify and price cyber risk and to
develop appropriate products. Government regulations should require routine,
transparent reporting of technological problems to provide the data required
for a transparent market-based cyber-insurance industry.

There is a need to reverse the erosion of trust in the Internet brought
about by indiscriminate and non-transparent private practices such as the
collection, integration and analysis of vast amounts of private information
about individuals, companies and organizations. Private surveillance based
on "big data" is often conducted under the guise of a free service. ...

Users should not be excluded from the use of software or services that allow
them to participate in the information age, and they should be offered the
option of purchasing a service without having to agree to give the provider
access to their personal information. International rules are also required
to ensure that the holders of large repositories of data are transparent
about how they collect, use and share user-generated data.

Interception of communications, collection, analysis and use of data over
the Internet by law enforcement and government intelligence agencies should
be for purposes that are openly specified in advance, authorized by law
(including international human rights law) and consistent with the
principles of necessity and proportionality.

... governments should use competition as a tool to expand Internet access
facilities to the maximum extent possible, while investing to ensure
availability when market forces prove insufficient.

The disruption to traditional jobs and skill requirements can create
economic hardship and civil discontent. Rather than attempting to preserve
old jobs by stifling innovation, governments should help workers adapt to
the new economic reality via skills training and educational programs.

The Internet has indeed reached a crossroads. Choices need to be made - and
making no choice is itself a choice. It is all about who should have what
power to control the future of the Internet.

Our advice is based on the belief that only a normative approach can address
the myriad challenges facing Internet governance. We call on governments,
private corporations, civil society, the technical community and individuals
together to create a new social compact for the digital age.

There is a growing concern about the market power and data collection
capabilities and practices of the large Internet platform companies as well
as other private data intermediaries.

The failure to incorporate security as an essential design feature by
vendors and larger customers of the IoT raises concerns that its explosive
growth could result in the "weaponization of everything."

Legal thresholds for lawfully authorized access to communications data must
be redefined to ensure that the aggregated collection of metadata - such as
an individual's full browsing history - are treated with the same respect
for privacy as access to the actual content of a communication, and should
only be made under judicial authority. In all cases, the principles of
necessity and proportionality must be applied.

Governments should not compromise or require third parties to weaken or
compromise encryption standards, for example, through hidden "backdoors"
into the technology as such efforts would weaken the overall security of
digital data flows and transactions.

Individual users of paid or so-called "free services" provided on the
Internet should know about and have some choice over the full range of ways
in which their data will be deployed for commercial purposes. They should
not be excluded from the use of software or services customary for
participation in the information age, and should be offered the option of
purchasing the service without having to agree to give the provider access
to their personal information. Terms of use agreements should be written in
a clear and accessible manner and should not be subject to change without
the user's consent. Businesses should demonstrate accountability and provide
redress in the case of a security breach or a breach of contract.

To assure the public that their data is being appropriately protected,
states that do not already have comprehensive personal data protection
legislation and a privacy enforcement authority with legal enforcement
powers should take steps to create such regimes.

Governments should initiate efforts to develop international consensus on
norms about how to deal with cases where the goal of protecting data comes
into conflict with the requirements of law enforcement or security agencies
to investigate terrorist activity or attacks in an emergency situation. At a
minimum, any solutions should be derived through a multi-stakeholder
process, broadly agreed, and must be subject to legal oversight, governed by
principles of necessity, proportionality and avoidance of unintended
consequences.

Businesses should purchase cyber insurance to cover the liability costs of
successful breaches of their systems.

The market for cyber insurance is immature in comparison to the seriousness
of the threats, and the capital available to the industry is currently
inadequate to underwrite the full risk. Pricing the risk is difficult in the
absence of reliable time series data, making it difficult for insurers to
put a reliable figure on the likely losses from breaches.

More research is urgently needed to support greater accuracy when pricing
risk.

To assist the public to understand and practice the essentials of cyber
hygiene, governments should undertake significant campaigns to raise
awareness and develop the needed skills. Cyber-security awareness programs
should start early, for example, by incorporating cyber hygiene into primary
and secondary education curriculums.

Consistent with the recognition that parts of the Internet constitute a
global public good, the commission urges member states of the United Nations
to agree not to use cyber weapons against core infrastructure of the
Internet.

The disruptions resulting from the rapid spread of the sharing economy are
already being felt.

All levels of government (national, subnational, local), industry, civil
society and the technical community, need to be engaged on the new
regulatory challenges posed by the sharing economy.


_______________________________________________
To manage your ISOC subscriptions or unsubscribe,
please log into the ISOC Member Portal:
https://portal.isoc.org/
Then choose Interests & Subscriptions from the My Account menu.


_______________________________________________
To manage your ISOC subscriptions or unsubscribe,
please log into the ISOC Member Portal:
https://portal.isoc.org/
Then choose Interests & Subscriptions from the My Account menu.



--
Jean Baptiste MILLOGO
Internet Society - Burkina Faso Chapter
+226 74 92 10 10
con...@isoc-burkina.org
Reply all
Reply to author
Forward
0 new messages