SlideShare a Scribd company logo
1 of 15
Download to read offline
Emancipating, Enriching, Equalising
and Empowering through the use of
ICTs

The Role of the Commonwealth in
Cyberspace
30 October 2013
The Commonwealth

•
•
•
•
•
•

•

54 Member Countries
Nearly  a  third  of  the  World’s  population
Combined GDP over £5 trillion
Mobile subscriptions ranging from 5% to 185%,
with an average of 84%
Fixed telephone lines ranging from 0.3% to
60%, with an average of 18%
Internet usage ranging from 1% to 85%, with
an average of 28%
A thriving hub of technology innovations and
possibly the largest ICT market in the world

2
The CTO
• Set up in 1901
• The oldest and the largest Commonwealth organisation in the field
of ICTs
• support members in using ICTs to deliver effective development
interventions that enrich, empower, equalise and emancipate all
peoples within the Commonwealth and beyond
• Traditional core activities
• Research & consultancy
• Capacity development & training
• Events & conferences
• Cybergovernance and Cybersecurity are focus areas under the
strategic plan of 2012-16

3
Context
• Cyberspace generates enormous social and economic
benefits
• Cyber population is growing
– Improving connectivity – national and international
– Broadband Commission & A4AI on promoting Broadband

• Meeting place of different people & cultures, views &
approaches
• Requires fostering entrepreneurship and innovation while
protecting freedom and liberty
• Where to strike the balance?
• Multi jurisdictional - Both national and international
aspects - interlinked
4
Cybergovernance
conceptualised

5
e-Bay - Community Action in
Cybergovernance
•
•
•
•
•

Population exceeded 100 million by end 2011
Commercially driven community
Multi jurisdictional
Operates on the basis of voluntary compliance
Motivation - Need to belong

6
Divergence
• Multistakeholder approach Vs. State-driven
• Voluntary norms Vs Treaty based
• Brought to sharp contrast at the World Conference on
International Telecommunications (WCIT) in December 2012
in Dubai
• Some concerns about the role of the State in Governing the
Cyberspace through International Telecommunications
Regulations.
• Disagreement  over  “resolving  to  instruct  the  SecretaryGeneral to continue to take the necessary steps for ITU to
play  an  active  and  constructive  role”
• Apparently so far 89 signatories out of 190 signatories

7
Commonwealth in
Cybergovernance
• Commonwealth has a role to play
• Based on the Commonwealth Values agreed at the Singapore
CHOGM in 1971 and reaffirmed in Harare in 1991
• Detailed in the Commonwealth Charter of 2013
(http://thecommonwealth.org/sites/default/files/page/docum
ents/CharteroftheCommonwealth.pdf), particularly
– respect for the protection and promotion of civil, political,
economic, social and cultural rights, including the right to
development
– commitment to remove disparities and unequal living standards
as guided by internationally agreed development goals
– recognise the importance of ICTs as instruments of
development ......... as well as for ........... sharing of cultures,
while enhancing security.

8
CTO’s  approach  to  
Cybergovernance
Develop a set of principles
Based on Commonwealth principles
Arrived through consensus
Involving consultations of a range of stakeholders policy makers, regulators, ICT implementing agencies,
CERTs etc
• Leveraging the strengths of developed countries to
assist developing countries
• That may eventually expand beyond the Commonwealth
•
•
•
•

9
CTO’s  Principles  of  
Cybergovernance
Foster innovation, freedom and understanding
Contribute to economic development
Enable social interactions
Recognise legitimate economic, cultural and security
concerns of members
• Promote multistakeholder partnerships
• Facilitate Pan-Commonwealth consultations and
international linkages
•
•
•
•

10
Progress – so far
• The first consultation of ICT policy makers and
regulators was held on 9th and 10th October 2013 in
Abuja, Nigeria
• Delegates from over 20 Commonwealth countries
– decided that the CTO should take the lead in
developing the Commonwealth Cybergovernance
Model
– committed to support the initiative
Issued the Abuja Declaration
http://www.cto.int/focus-themes/cybersecurity/

11
Next Steps
• A series of regional consultations
• Starting with a Caribbean Ministerial
Consultation on 5th December 2013 in Jamaica
in the margins of the Caribbean
Telecommunication  Union’s  Ministerial  meeting    
• Culminating  in  the  Commonwealth  ICT  Minister’s  
meeting at the Marlborough House in London on
3 – 4 March 2014 where the principles will be
debated and, if thought fit, adopted.

12
Aims & Objectives
• Create a standard all can subscribe to, resulting
in better international cooperation and
coordination
• Act as a beacon for non-Commonwealth
countries
• Provide an assurance to countries that extend
assistance that their aid is properly used
In order to make the Cyberspace a thriving,
innovative and rewarding place

13
How to get involved
• Take part in the consultations – when
invited
• Join related activities – Cybersecurity
Forum 2014 in London (5 – 7 March 2014)
• Participate in capacity building in Cyberrelated subjects through CTO

14
Lasantha De Alwis
Director/Head of Operations Department
Commonwealth Telecommunications Organisation
94-66, Glenthorne Road, Hammersmith, UK
+44(0)208 600 3814
l.dealwis@cto.int

15

More Related Content

What's hot

SATNET Presentation
SATNET PresentationSATNET Presentation
SATNET Presentation
SANGONeT
 
CTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business DevelopmentCTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business Development
segughana
 

What's hot (20)

Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
 
Final project pig garry mukelabai
Final project pig garry mukelabaiFinal project pig garry mukelabai
Final project pig garry mukelabai
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
 
Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa Policy and legal frameworks and Freedom of Expression in East Africa
Policy and legal frameworks and Freedom of Expression in East Africa
 
Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)Isoc barriers to connectivity bishkek (28 april)
Isoc barriers to connectivity bishkek (28 april)
 
Towela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurityTowela_Trans boundary issues in cybersecurity
Towela_Trans boundary issues in cybersecurity
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Isoc report launch maarit 221115
Isoc report launch maarit 221115Isoc report launch maarit 221115
Isoc report launch maarit 221115
 
The Commonwealth Cybercrime initiative
The Commonwealth Cybercrime initiativeThe Commonwealth Cybercrime initiative
The Commonwealth Cybercrime initiative
 
Helping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital WorldHelping Residents Thrive in a Digital World
Helping Residents Thrive in a Digital World
 
Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)Isoc kyrgyzstan bishkek_internet environ (28 apr)
Isoc kyrgyzstan bishkek_internet environ (28 apr)
 
Introduction to Broadband
Introduction to BroadbandIntroduction to Broadband
Introduction to Broadband
 
SATNET Presentation
SATNET PresentationSATNET Presentation
SATNET Presentation
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
World Digital Solidarity
World Digital SolidarityWorld Digital Solidarity
World Digital Solidarity
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009
 
CTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business DevelopmentCTO-Your Partner In ICT Business Development
CTO-Your Partner In ICT Business Development
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 

Viewers also liked

Iremos en quelques mots
Iremos en quelques motsIremos en quelques mots
Iremos en quelques mots
Clément Têtu
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism
Challenge:Future
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
Wajahat Rajab
 

Viewers also liked (13)

Critical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCritical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency Issues
 
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
#NSD15 - Interactions entre sécurité physique et sécurité logique avec une do...
 
Emergency Preparedness - State of the Art
Emergency Preparedness - State of the ArtEmergency Preparedness - State of the Art
Emergency Preparedness - State of the Art
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Iremos en quelques mots
Iremos en quelques motsIremos en quelques mots
Iremos en quelques mots
 
[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism[Challenge:Future] Proactive Counter-Terrorism
[Challenge:Future] Proactive Counter-Terrorism
 
Indian para special forces
Indian para special forcesIndian para special forces
Indian para special forces
 
20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor20140915 etat de l'art sécurisation des sites sensibles personal interactor
20140915 etat de l'art sécurisation des sites sensibles personal interactor
 
Guide amdec (très intéressant)
Guide amdec (très intéressant)Guide amdec (très intéressant)
Guide amdec (très intéressant)
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Formation AMDEC
Formation AMDECFormation AMDEC
Formation AMDEC
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Similar to The Role of the Commonwealth in Cyberspace

ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07
segughana
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy Doc
Alain Nkoyock
 
Wsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryWsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summary
Dr Lendy Spires
 

Similar to The Role of the Commonwealth in Cyberspace (20)

ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07ICT For Economic Development A View From The CTO 12-07-07
ICT For Economic Development A View From The CTO 12-07-07
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy Doc
 
Info 442 chapter 2
Info 442 chapter 2Info 442 chapter 2
Info 442 chapter 2
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
 
Digital divide
Digital divideDigital divide
Digital divide
 
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
 
Communications Development in Saudi Arabia
Communications Development in Saudi ArabiaCommunications Development in Saudi Arabia
Communications Development in Saudi Arabia
 
Wsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summaryWsis10 alf reporting-c1.summary
Wsis10 alf reporting-c1.summary
 
ISOC: IXPs Partnerships
ISOC: IXPs PartnershipsISOC: IXPs Partnerships
ISOC: IXPs Partnerships
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
ISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and BeyondISOC - IXPs in Africa and Beyond
ISOC - IXPs in Africa and Beyond
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy work
 
SPC - e-Agriculture policy work
SPC - e-Agriculture policy workSPC - e-Agriculture policy work
SPC - e-Agriculture policy work
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
National Initiatives ITU
National Initiatives ITUNational Initiatives ITU
National Initiatives ITU
 
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
Bangladesh Initiative for Connecting, Empowering & Amplifying Unified Voices ...
 
Digital Development and Digital Inclusion
Digital Development and Digital InclusionDigital Development and Digital Inclusion
Digital Development and Digital Inclusion
 
Wcit 12
Wcit 12Wcit 12
Wcit 12
 
WCIT 2016 Manu Bhardwaj
WCIT 2016 Manu BhardwajWCIT 2016 Manu Bhardwaj
WCIT 2016 Manu Bhardwaj
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 

More from Community Protection Forum

More from Community Protection Forum (20)

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

The Role of the Commonwealth in Cyberspace

  • 1. Emancipating, Enriching, Equalising and Empowering through the use of ICTs The Role of the Commonwealth in Cyberspace 30 October 2013
  • 2. The Commonwealth • • • • • • • 54 Member Countries Nearly  a  third  of  the  World’s  population Combined GDP over £5 trillion Mobile subscriptions ranging from 5% to 185%, with an average of 84% Fixed telephone lines ranging from 0.3% to 60%, with an average of 18% Internet usage ranging from 1% to 85%, with an average of 28% A thriving hub of technology innovations and possibly the largest ICT market in the world 2
  • 3. The CTO • Set up in 1901 • The oldest and the largest Commonwealth organisation in the field of ICTs • support members in using ICTs to deliver effective development interventions that enrich, empower, equalise and emancipate all peoples within the Commonwealth and beyond • Traditional core activities • Research & consultancy • Capacity development & training • Events & conferences • Cybergovernance and Cybersecurity are focus areas under the strategic plan of 2012-16 3
  • 4. Context • Cyberspace generates enormous social and economic benefits • Cyber population is growing – Improving connectivity – national and international – Broadband Commission & A4AI on promoting Broadband • Meeting place of different people & cultures, views & approaches • Requires fostering entrepreneurship and innovation while protecting freedom and liberty • Where to strike the balance? • Multi jurisdictional - Both national and international aspects - interlinked 4
  • 6. e-Bay - Community Action in Cybergovernance • • • • • Population exceeded 100 million by end 2011 Commercially driven community Multi jurisdictional Operates on the basis of voluntary compliance Motivation - Need to belong 6
  • 7. Divergence • Multistakeholder approach Vs. State-driven • Voluntary norms Vs Treaty based • Brought to sharp contrast at the World Conference on International Telecommunications (WCIT) in December 2012 in Dubai • Some concerns about the role of the State in Governing the Cyberspace through International Telecommunications Regulations. • Disagreement  over  “resolving  to  instruct  the  SecretaryGeneral to continue to take the necessary steps for ITU to play  an  active  and  constructive  role” • Apparently so far 89 signatories out of 190 signatories 7
  • 8. Commonwealth in Cybergovernance • Commonwealth has a role to play • Based on the Commonwealth Values agreed at the Singapore CHOGM in 1971 and reaffirmed in Harare in 1991 • Detailed in the Commonwealth Charter of 2013 (http://thecommonwealth.org/sites/default/files/page/docum ents/CharteroftheCommonwealth.pdf), particularly – respect for the protection and promotion of civil, political, economic, social and cultural rights, including the right to development – commitment to remove disparities and unequal living standards as guided by internationally agreed development goals – recognise the importance of ICTs as instruments of development ......... as well as for ........... sharing of cultures, while enhancing security. 8
  • 9. CTO’s  approach  to   Cybergovernance Develop a set of principles Based on Commonwealth principles Arrived through consensus Involving consultations of a range of stakeholders policy makers, regulators, ICT implementing agencies, CERTs etc • Leveraging the strengths of developed countries to assist developing countries • That may eventually expand beyond the Commonwealth • • • • 9
  • 10. CTO’s  Principles  of   Cybergovernance Foster innovation, freedom and understanding Contribute to economic development Enable social interactions Recognise legitimate economic, cultural and security concerns of members • Promote multistakeholder partnerships • Facilitate Pan-Commonwealth consultations and international linkages • • • • 10
  • 11. Progress – so far • The first consultation of ICT policy makers and regulators was held on 9th and 10th October 2013 in Abuja, Nigeria • Delegates from over 20 Commonwealth countries – decided that the CTO should take the lead in developing the Commonwealth Cybergovernance Model – committed to support the initiative Issued the Abuja Declaration http://www.cto.int/focus-themes/cybersecurity/ 11
  • 12. Next Steps • A series of regional consultations • Starting with a Caribbean Ministerial Consultation on 5th December 2013 in Jamaica in the margins of the Caribbean Telecommunication  Union’s  Ministerial  meeting     • Culminating  in  the  Commonwealth  ICT  Minister’s   meeting at the Marlborough House in London on 3 – 4 March 2014 where the principles will be debated and, if thought fit, adopted. 12
  • 13. Aims & Objectives • Create a standard all can subscribe to, resulting in better international cooperation and coordination • Act as a beacon for non-Commonwealth countries • Provide an assurance to countries that extend assistance that their aid is properly used In order to make the Cyberspace a thriving, innovative and rewarding place 13
  • 14. How to get involved • Take part in the consultations – when invited • Join related activities – Cybersecurity Forum 2014 in London (5 – 7 March 2014) • Participate in capacity building in Cyberrelated subjects through CTO 14
  • 15. Lasantha De Alwis Director/Head of Operations Department Commonwealth Telecommunications Organisation 94-66, Glenthorne Road, Hammersmith, UK +44(0)208 600 3814 l.dealwis@cto.int 15