SlideShare a Scribd company logo
1 of 10
Download to read offline
Commonwealth Cybergovernance Model
Presentation at Cybersecurity Forum
London
5th March 2014
© Commonwealth Telecommunications Organisation
Introduction
• First proposed by CTO in Abuja, Nigeria (9th Oct 2013)
– During Commonwealth ICT Ministers Forum
• The Cybergovernance Model aims to guide Commonwealth
members
– Plan and implement practical actions in policy development
– Regulation and Legislation
– Cross-border collaboration
– Capacity building and technical cooperation
2
© Commonwealth Telecommunications Organisation
Trends in Cyberspace
• Cyberspace provides access to ICT
– Bridging the digital divide and influencing social-economic activities
• Cyberspace is increasingly becoming a global system
– Anticipated to grow from 2-4 Billion users by 2020 (mostly from developing
countries)
• Cyberspace is open, decentralised and empowering
– This has fostered innovation, collaboration and rapid development
• Cyberspace success depends on it’s infrastructure
– Infrastructure should be secure, resilient and available to users
• Cyberspace can also be used for criminal activities
– Cybercrimes, extremisms and other social crimes
3
© Commonwealth Telecommunications Organisation
Commonwealth Values in Cyberspace
• Based on Commonwealth Charter of March 2013
– Democracy, human rights and rule of law
• The Charter expressed the commitment of member states
– Development of free and democratic societies
– Promotion of peace and prosperity to improve the lives of all peoples
– Acknowledges the role of civil society in supporting Commonwealth
activities
• Cyberspace today & tomorrow should respect & reflect the
Commonwealth Values
– This has led to defining Commonwealth principles for use of
Cyberspace
4
© Commonwealth Telecommunications Organisation
Commonwealth Principle for use of Cyberspace
Principle 1: We contribute to a safe and an effective global
Cyberspace
• as a partnership between public and private sectors, civil society and
users, a collective creation;
• with multi-stakeholder, transparent and collaborative governance
promoting continuous development of Cyberspace;
• where investment in the Cyberspace is encouraged and rewarded;
• by providing sufficient neutrality of the network as a provider of
information services;
• by offering stability in the provision of reliable and resilient information
services;
• by having standardisation to achieve global interoperability;
• by enabling all to participate with equal opportunity of universal access;
• as an open, distributed, interconnected internet;
• providing an environment that is safe for its users, particularly the young
and vulnerable;
• made available to users at an affordable price.
5
© Commonwealth Telecommunications Organisation
Commonwealth Principle for use of Cyberspace
Principle 2: Our actions in Cyberspace support broader economic
and social development
• by enabling innovation and sustainable development, creating greater
coherence and synergy, through collaboration and the widespread
dissemination of knowledge;
• respecting cultural and linguistic diversity without the imposition of beliefs;
• promoting cross-border delivery of services and free flow of labour in a
multi-lateral trading system;
• allowing free association and interaction between individuals across
borders;
• supporting and enhancing digital literacy;
• providing everyone with information that promotes and protects their
rights and is relevant to their interests, for example to support transparent
and accountable government;
• enabling and promoting multi-stakeholder partnerships;
• facilitating pan-Commonwealth consultations and international linkages in
a single globally connected space that also serves local interests.
6
© Commonwealth Telecommunications Organisation
Commonwealth Principle for use of Cyberspace
Principle 3: We act individually and collectively to tackle
cybercrime
• nations, organisations and society work together to foster respect for
the law;
• to develop relevant and proportionate laws to tackle Cybercrime
effectively;
• to protect our critical national and shared infrastructures;
• meeting internationally-recognised standards and good practice to
deliver security;
• with effective government structures working collaboratively within and
between states;
• with governments, relevant international organisations and the private
sector working closely to prevent and respond to incidents.
7
© Commonwealth Telecommunications Organisation
Commonwealth Principle for use of Cyberspace
Principle 4: We each exercise our rights and meet our responsibilities in
Cyberspace
• we defend in Cyberspace the values of human rights, freedom of expression and
privacy as stated in our Charter of the Commonwealth;
• individuals, organisations and nations are empowered through their access to
knowledge;
• users benefit from the fruits of their labours; intellectual property is protected
accordingly;
• users can benefit from the commercial value of their own information; accordingly,
responsibility and liability for information lies with those who create it;
• responsible behaviour demands users all meet minimum Cyber hygiene
requirements;
• we protect the vulnerable in society in their use of Cyberspace;
• we, individually and collectively, understand the consequences of our actions and
our responsibility to cooperate to make the shared environment safe; our obligation
is in direct proportion to culpability and capability.
8
© Commonwealth Telecommunications Organisation
Practical Application of Commonwealth Principles
• Commonwealth members can develop individual strategies
– Aimed at addressing unique local needs and social-economic priorities
• The Commonwealth Telecommunications Organisation welcomes
engagement by all stakeholders
9
© Commonwealth Telecommunications Organisation
Further Information Contact:
Mr Lasantha De Alwis
Director of Operations & Corporate Secretary
Commonwealth Telecommunications Organisation (CTO)
Email: l.dealwis@cto.int
Tel: +44 (0) 208 600 3814
10
Q & A Session

More Related Content

What's hot

Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?APNIC
 
ISOC Update
ISOC UpdateISOC Update
ISOC UpdateAPNIC
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityCharles Mok
 
Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)ISOC-KG
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCAFrancis Amaning
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceARIN
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...APNIC
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Technology and participation - Harnessing the emerging power of broadband for...
Technology and participation - Harnessing the emerging power of broadband for...Technology and participation - Harnessing the emerging power of broadband for...
Technology and participation - Harnessing the emerging power of broadband for...Paul Treadwell
 
Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)ISOC-KG
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureFrancis Amaning
 

What's hot (20)

Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
ISOC Update
ISOC UpdateISOC Update
ISOC Update
 
Multistakeholder Internet Governance?
Multistakeholder Internet Governance?Multistakeholder Internet Governance?
Multistakeholder Internet Governance?
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
Technology and participation - Harnessing the emerging power of broadband for...
Technology and participation - Harnessing the emerging power of broadband for...Technology and participation - Harnessing the emerging power of broadband for...
Technology and participation - Harnessing the emerging power of broadband for...
 
net neutrality
net neutralitynet neutrality
net neutrality
 
Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)
 
Internet Governance Backround
Internet Governance BackroundInternet Governance Backround
Internet Governance Backround
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Similar to Session 1.1 Honourable Phillip Paulwell

International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheetbueno buono good
 
2014 04 24 NetMundial Multistakeholder Statement
2014 04 24 NetMundial Multistakeholder Statement2014 04 24 NetMundial Multistakeholder Statement
2014 04 24 NetMundial Multistakeholder StatementRoberto C. Mayer
 
Internet security
Internet securityInternet security
Internet securityBill Chea
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
 
Smart society iot charter eindhoven work in progress
Smart society iot charter eindhoven work in progressSmart society iot charter eindhoven work in progress
Smart society iot charter eindhoven work in progressVenturespring
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfVincent Mwando
 
Futureofmultistakeholdermodel (1)
 Futureofmultistakeholdermodel (1) Futureofmultistakeholdermodel (1)
Futureofmultistakeholdermodel (1)Yasser AlFakharany
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source SoftwareSeaparo Phala
 
Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"ATMOSPHERE .
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2Elisha Quaye
 
seoul-declaration
seoul-declarationseoul-declaration
seoul-declarationmaolins
 
seoul-declaration
seoul-declarationseoul-declaration
seoul-declarationmaolins
 
ISOC Update
ISOC UpdateISOC Update
ISOC UpdateAPNIC
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239 Genti79
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategyBright Boateng
 
Chapter I Introduction.pptx
Chapter I Introduction.pptxChapter I Introduction.pptx
Chapter I Introduction.pptxsolomonmihiret1
 

Similar to Session 1.1 Honourable Phillip Paulwell (20)

International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
 
2014 04 24 NetMundial Multistakeholder Statement
2014 04 24 NetMundial Multistakeholder Statement2014 04 24 NetMundial Multistakeholder Statement
2014 04 24 NetMundial Multistakeholder Statement
 
Internet security
Internet securityInternet security
Internet security
 
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
Smart society iot charter eindhoven work in progress
Smart society iot charter eindhoven work in progressSmart society iot charter eindhoven work in progress
Smart society iot charter eindhoven work in progress
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Futureofmultistakeholdermodel (1)
 Futureofmultistakeholdermodel (1) Futureofmultistakeholdermodel (1)
Futureofmultistakeholdermodel (1)
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"Cloud Services and the "Marco Civil"
Cloud Services and the "Marco Civil"
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 
seoul-declaration
seoul-declarationseoul-declaration
seoul-declaration
 
seoul-declaration
seoul-declarationseoul-declaration
seoul-declaration
 
ISOC Update
ISOC UpdateISOC Update
ISOC Update
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239
 
Info 442 chapter 2
Info 442 chapter 2Info 442 chapter 2
Info 442 chapter 2
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
Chapter I Introduction.pptx
Chapter I Introduction.pptxChapter I Introduction.pptx
Chapter I Introduction.pptx
 

More from Commonwealth Telecommunications Organisation

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Session 1.1 Honourable Phillip Paulwell

  • 1. Commonwealth Cybergovernance Model Presentation at Cybersecurity Forum London 5th March 2014
  • 2. © Commonwealth Telecommunications Organisation Introduction • First proposed by CTO in Abuja, Nigeria (9th Oct 2013) – During Commonwealth ICT Ministers Forum • The Cybergovernance Model aims to guide Commonwealth members – Plan and implement practical actions in policy development – Regulation and Legislation – Cross-border collaboration – Capacity building and technical cooperation 2
  • 3. © Commonwealth Telecommunications Organisation Trends in Cyberspace • Cyberspace provides access to ICT – Bridging the digital divide and influencing social-economic activities • Cyberspace is increasingly becoming a global system – Anticipated to grow from 2-4 Billion users by 2020 (mostly from developing countries) • Cyberspace is open, decentralised and empowering – This has fostered innovation, collaboration and rapid development • Cyberspace success depends on it’s infrastructure – Infrastructure should be secure, resilient and available to users • Cyberspace can also be used for criminal activities – Cybercrimes, extremisms and other social crimes 3
  • 4. © Commonwealth Telecommunications Organisation Commonwealth Values in Cyberspace • Based on Commonwealth Charter of March 2013 – Democracy, human rights and rule of law • The Charter expressed the commitment of member states – Development of free and democratic societies – Promotion of peace and prosperity to improve the lives of all peoples – Acknowledges the role of civil society in supporting Commonwealth activities • Cyberspace today & tomorrow should respect & reflect the Commonwealth Values – This has led to defining Commonwealth principles for use of Cyberspace 4
  • 5. © Commonwealth Telecommunications Organisation Commonwealth Principle for use of Cyberspace Principle 1: We contribute to a safe and an effective global Cyberspace • as a partnership between public and private sectors, civil society and users, a collective creation; • with multi-stakeholder, transparent and collaborative governance promoting continuous development of Cyberspace; • where investment in the Cyberspace is encouraged and rewarded; • by providing sufficient neutrality of the network as a provider of information services; • by offering stability in the provision of reliable and resilient information services; • by having standardisation to achieve global interoperability; • by enabling all to participate with equal opportunity of universal access; • as an open, distributed, interconnected internet; • providing an environment that is safe for its users, particularly the young and vulnerable; • made available to users at an affordable price. 5
  • 6. © Commonwealth Telecommunications Organisation Commonwealth Principle for use of Cyberspace Principle 2: Our actions in Cyberspace support broader economic and social development • by enabling innovation and sustainable development, creating greater coherence and synergy, through collaboration and the widespread dissemination of knowledge; • respecting cultural and linguistic diversity without the imposition of beliefs; • promoting cross-border delivery of services and free flow of labour in a multi-lateral trading system; • allowing free association and interaction between individuals across borders; • supporting and enhancing digital literacy; • providing everyone with information that promotes and protects their rights and is relevant to their interests, for example to support transparent and accountable government; • enabling and promoting multi-stakeholder partnerships; • facilitating pan-Commonwealth consultations and international linkages in a single globally connected space that also serves local interests. 6
  • 7. © Commonwealth Telecommunications Organisation Commonwealth Principle for use of Cyberspace Principle 3: We act individually and collectively to tackle cybercrime • nations, organisations and society work together to foster respect for the law; • to develop relevant and proportionate laws to tackle Cybercrime effectively; • to protect our critical national and shared infrastructures; • meeting internationally-recognised standards and good practice to deliver security; • with effective government structures working collaboratively within and between states; • with governments, relevant international organisations and the private sector working closely to prevent and respond to incidents. 7
  • 8. © Commonwealth Telecommunications Organisation Commonwealth Principle for use of Cyberspace Principle 4: We each exercise our rights and meet our responsibilities in Cyberspace • we defend in Cyberspace the values of human rights, freedom of expression and privacy as stated in our Charter of the Commonwealth; • individuals, organisations and nations are empowered through their access to knowledge; • users benefit from the fruits of their labours; intellectual property is protected accordingly; • users can benefit from the commercial value of their own information; accordingly, responsibility and liability for information lies with those who create it; • responsible behaviour demands users all meet minimum Cyber hygiene requirements; • we protect the vulnerable in society in their use of Cyberspace; • we, individually and collectively, understand the consequences of our actions and our responsibility to cooperate to make the shared environment safe; our obligation is in direct proportion to culpability and capability. 8
  • 9. © Commonwealth Telecommunications Organisation Practical Application of Commonwealth Principles • Commonwealth members can develop individual strategies – Aimed at addressing unique local needs and social-economic priorities • The Commonwealth Telecommunications Organisation welcomes engagement by all stakeholders 9
  • 10. © Commonwealth Telecommunications Organisation Further Information Contact: Mr Lasantha De Alwis Director of Operations & Corporate Secretary Commonwealth Telecommunications Organisation (CTO) Email: l.dealwis@cto.int Tel: +44 (0) 208 600 3814 10 Q & A Session