DC Core Internet Values discussion paper 2017

Similar documents
Section 1: Internet Governance Principles

The Biological Weapons Convention and dual use life science research

TELECOM ITALIA GROUP's SUBMISSION for NETmundial

The Internet of Things: an overview

ServDes Service Design Proof of Concept

GENERAL PRINCIPLES OF INTERNET GOVERNANCE

Digital Swarming. Public Sector Practice Cisco Internet Business Solutions Group

WSIS+10 REVIEW: NON-PAPER 1

Interoperable systems that are trusted and secure

Emerging Transportation Technology Strategic Plan for the St. Louis Region Project Summary June 28, 2017

Analysing Megatrends to Better shape the future of Tourism

(Beijing, China,25 May2017)

Media Literacy Policy

A Mashup of Techniques to Create Reference Architectures

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

COPYRIGHTED MATERIAL. Introduction. 1.1 Important Definitions

Enabling ICT for. development

Children s rights in the digital environment: Challenges, tensions and opportunities

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF

Ecosystem Panel. Public Webinars 13,15 January 2014

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

IGF Policy Options for Connecting the Next Billion - A Synthesis -

Initial draft of the technology framework. Contents. Informal document by the Chair

The Blockchain Ethical Design Framework

BOTSWANA INTERNET GOVERNANCE FORUM (IGF) DISCUSSION PAPER

Preparatory paper: food for thought

Ethics Guideline for the Intelligent Information Society

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group

Engaging UK Climate Service Providers a series of workshops in November 2014

National approach to artificial intelligence

Exploring emerging ICT-enabled governance models in European cities

A Hybrid Risk Management Process for Interconnected Infrastructures

Q1 Under the subject "Future of Work and the New Economy", which topics do you find important?

ADDENDUM 1. Changes Related to the Bachelor of Science in Intelligence Degree:

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA

ITU Telecom World 2018 SMART ABC

)XWXUH FKDOOHQJHV IRU WKH WRXULVP VHFWRU

INFORMATION AND COMMUNICATION TECHNOLOGIES AND HUMAN RIGHTS

GSA SUMMARY REPORT OF EQUALITY CONSIDERATION AND ASSESSMENT OF EQUALITY IMPACT. PGT Ethics Policy. New: Existing/Reviewed: Revised/Updated:

Re: Examination Guideline: Patentability of Inventions involving Computer Programs

ULS Systems Research Roadmap

INTERGOVERNMENTAL COMMITTEE FOR THE PROTECTION AND PROMOTION OF THE DIVERSITY OF CULTURAL EXPRESSIONS

Lex Informatica and Cyberspace

Reports: ITU Trends in Telecom Reform. Level of competition selected services, State of the Global Market and Impact of Market Trends on

BIM+Blockchain: A Solution to the "Trust" problem in Collaboration?

APEC Internet and Digital Economy Roadmap

IoT in Health and Social Care

December Eucomed HTA Position Paper UK support from ABHI

Wireless Internet Routing. IEEE s

EU regulatory system for robots

The world s first collaborative machine-intelligence competition to overcome spectrum scarcity

ICSU World Data System Strategic Plan Trusted Data Services for Global Science

Digital Forensics Lecture 11. Evidence, Reporting, and Action

Global Trade and Personal Data Flows Are the Rules of Engagement Incompatible with Privacy?

Challenges and Opportunities

the Companies and Intellectual Property Commission of South Africa (CIPC)

Operational Objectives Outcomes Indicators

LSCB Pan-Lancashire LSCB Online Safeguarding Strategy

Protection of Privacy Policy

Spectrum Sharing and Flexible Spectrum Use

Vision. The Hague Declaration on Knowledge Discovery in the Digital Age

Summary Remarks By David A. Olive. WITSA Public Policy Chairman. November 3, 2009

2.4GHz & 900MHz UNLICENSED SPECTRUM COMPARISON A WHITE PAPER BY INGENU

Violent Intent Modeling System

CONFERENCE OF PARTIES TO THE CONVENTION ON THE PROTECTION AND PROMOTION OF THE DIVERSITY OF CULTURAL EXPRESSIONS

Digital Preservation Policy

IPRs and Public Health: Lessons Learned Current Challenges The Way Forward

Our digital future. SEPA online. Facilitating effective engagement. Enabling business excellence. Sharing environmental information

Dependable, secure and time-aware sensor networks - Overview

FOSS in Military Computing

Global Intellectual Property Issues

The Inaugural Session of the Internet Governance Forum (IGF) Athens, 30 October - 2 November Summing-up by the IGF Secretariat

ConstantinaMakri. Research Promotion Foundation

4.1 Key result area 1: Securing and defending internet access and rights

ty of solutions to the societal needs and problems. This perspective links the knowledge-base of the society with its problem-suite and may help

Buenos Aires Action Plan

Global Intellectual Property Issues

Current status and new developments in IG capacity building DiploFoundation s capacity building approach in Internet governance

Copyright: Conference website: Date deposited:

Principles for the Networked World

Rotterdam, 13 april 2017 NRC LIVE - DE SLIMME WERELD THE FOURTH INDUSTRIAL REVOLUTION QUESTION CONCERNING TECHNOLOGY & COMPLEXITY

About the Office of the Australian Information Commissioner

14:40-15:10 Gene Editing in New Zealand: Building Social Acceptance of Emerging Opportunities

Wireless Mesh Networks

Chris James and Maria Iafano

Data Protection and Privacy in a M2M world. Yiannis Theodorou, Regulatory Policy Manager GSMA Latam Plenary Peru, November 2013

Managing Technology Risks Through Technological Proficiency A Leadership Summary

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

Dr Nicholas J. Gervassis University of Plymouth THE EMERGING UK DATA PROTECTION FRAMEWORK AND BEYOND

HTA Position Paper. The International Network of Agencies for Health Technology Assessment (INAHTA) defines HTA as:

Paris Messages for the IGF 2018

Meta Design: Beyond User-Centered and Participatory Design

NATIONAL TOURISM CONFERENCE 2018

THE IMPERATIVE FOR DIGITAL HEALTH

COMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT)

March 27, The Information Technology Industry Council (ITI) appreciates this opportunity

Telling the stories of the future: journalism and Internet policies

DIMACS/PORTIA Workshop on Privacy Preserving

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection

ANEC response to the CEN-CENELEC questionnaire on the possible need for standardisation on smart appliances

Transcription:

DC Core Internet Values discussion paper 2017 Focus on Freedom from Harm Introduction The Internet connects a world of multiple languages, connects people dispersed across cultures, places knowledge dispersed (or concealed) across cultures accessible to every culture. The Internet is more than an invention. It is a precious gift to humanity as an opportunity to connect globally and evolve. The Internet connects people and their devices. The Internet is beyond what was foreseen at the time of the invention of its protocols. Its values were not intentionally built in, but contained within and become manifest and understood along its path of evolution. The Internet has become increasingly a support for all kinds of human activity, constructive, destructive and ambivalent as this may be. The Internet has been used to foster never-imagined levels of communication, access to information and creativity, and given rise to businesses and social transformation that reach both those connected and many who are not. Accompanying these generally positive trends, cybercrime, verbal and non-verbal abuse, and interference with human rights have also appeared on the Internet. Some forms of abuse and some attempts to correct or modulate conduct on the Internet may impinge on the way the Internet operates, as may be the case with ways to block content from reaching certain destinations or to restrict the technological features that enable businesses and social transformation. The Dynamic Coalition on Core Internet Values, which began its work as the Workshop on Fundamentals: Core Internet Values during IGF 2009 at Sharm El Sheikh, chaired by then Internet Society President Lynn St. Amour, progressed as a Dynamic Coalition and has deliberated since 2009 on fundamental questions such as What is the Internet? What makes the Internet what it is? to define the Core Values that characterize the Internet. The Dynamic Coalition in its recent deliberations during and between the Internet Governance Forums discussed the recent socio-political developments and the specific threats to the way the Internet evolves and functions. Some of Internet s technical principles seemed to be challenges to adhere to, in their intended form. For instance, the relevance of the end-to-end architecture became questionable in the face of real world threats of the recent past. Such challenges gave rise to the question whether the values are unalterable at all. The Internet is global, open, end-to-end, shared and distributed without central points of control. Value and values are not to be used loosely. Values are what are profound, values are beyond evaluation and debate, values are as understood. Known and respected and beyond notions of utility, relevance or evaluation by any other yardstick. 1

The Dynamic Coalition will seek in its 2017 session to better delimit its scope. Experience from the last few years shows that as one moves from the better-defined technical principles like Interoperability to the broader-sense wordings like Free the ability to even discuss them is lost in a muddle of culturally-tinted points of view, and overlaps more than necessary with the subject matter of other Dynamic Coalitions. Whilst Core Values are imprescriptible, challenges emerge and vary from time to time. One striking feature of the Internet is its ability to evolve with little or no change in its fundamental design principles and the order in which they are prioritized. Further, it has a mechanism, mainly in the IETF, to make the adaptations that become necessary. Further layers like that coordinated within the ICANN ambit, are modelled on the same open processes and have successfully preserved interoperability, openness, etc. and propagated them to the layers above and below the internetworking layer. Core Internet Values - Global The Internet is a global medium open to all, regardless of geography or nationality. - Interoperable Interoperability is the ability of a computer system to run application programs from different vendors, and to interact with other computers across local or wide-area networks regardless of their physical architecture and operating systems. Interoperability is feasible through hardware and software components that conform to open standards such as those used for internet. - Open As a network of networks, any standards-compliant device, network, service, application, or type of data (video, audio, text, etc.) is allowed on the Internet, and the Internet s core architecture is based on open standards. - Decentralized The Internet is free of any centralized control. - End-to-end Application-specific features reside in the communicating end nodes of the network rather than in intermediary nodes, such as gateways, that exist to establish the network. - User-centric End users maintain full control over the type of information, application, and service they want to share and access. - Robust and reliable While respecting best-effort scenarios for traffic management, the interconnected nature of the Internet and its dense mesh of networks peering with each other have made it robust and reliable. To evolve or not to evolve The Internet evolves around the principles that remain at its core. When there is a new development, for instance, wireless modems smartphones or micro-devices the Internet evolves along its path of evolution, without the compulsions to remove any of its values, or 2

without the need to add a new value around which the evolution would progress. What is new is in the realm of evolution, not in the core of values. One could say outright that Core Internet Values are unalterable and that the list of values themselves cannot be amended nor expanded. However, this question has been discussed in past years and when Freedom from Harm was introduced, it appeared to be accepted as an additional Core Value. In fact, debate during last year s session went further, taking evolution for granted, but attempting to define whether there should be enforcement of this value in particular. A starting point was that There should be no overarching system and industry self-certification might be a solution moving forward. That could be true for all Core Values. In the history of the last four decades, Internet design principles have mapped well to some social values which are widespread but not universally accepted, nor free from interpretation. Societies that are against openness have difficulties with the Internet. Companies that act against interoperability cause problems to the Internet. Regulations that make end-to-end difficult make the Internet's life harder (witness Network Neutrality.) So any serious modification and some possible additions to this short, compact, proven list may make the Internet be less of what it is and can be. The proposal is therefore that the DC-CIV work within a framework that assumes immutability over decades. As one of the panellists on the Coalition s session at IGF 2016 mentioned: consider Freedom from Harm in the context of the general principle do no harm. Then this overarching principle is applicable to all Core Internet Values. By extension, Freedom From Harm does not contradict any Current Core Internet Values. Freedom from Harm What is freedom from harm? The Internet needs to become a much safer place and the people that designed it did not foresee misuse of devices. Malware is a technical challenge and there is difficulty in applying software updates across the network, especially for the Internet of Things ( IoT ). Proposal for a new Core Value for the Internet: Freedom from Harm ( FFH ), which should drive the technical community s work in the coming years. Why is this needed? In its core design principles, security was not ignored. The team of people that designed the Internet were using the maximum security available at the time, working with extremely sensitive assets. The security was on the systems, it was evolving fast, and it made little or no sense to implant security into the network itself as it would not scale and would not adapt to innovations 3

without needing to tear down and replace the whole network for each new advance, say, in cryptography. However, today the threats are different, more sophisticated and the range of devices that these threats can affect are more diverse than when the Internet was first invented. How could it be implemented? Without altering Core Values. Transparency One way to face these risks, and adding to the principle proposed, is to introduce/increase transparency and accountability for all responsible players, such as device manufacturers, regulators in charge of approving the sale of devices, software developers, etc. Standards Development Implementation issues could be mandatory for all Standards development. Would the IETF add a section on FFH considerations to RFCs? How would other standards-development organizations (SDOs) treat the principle? 1. Technical means to inhibit harm 2. Detect harm and act against its source, e.g. legal means, prosecution. 3. Moral persuasion: put pressure on programmers and others responsible for products which can be harmful Overall, the accountability of technical standards-makers must be clearer. A Multi-Stakeholder way Is there an Internet way to approach this problem? A multistakeholder, Internet-proper mechanism such as the IETF or ICANN in their respective fields? Coordination Work already being done against attacks (prevention, mitigation, isolation, response, etc.) should be considered. Coordination of such work in an open manner could bring synergies together for a safer Internet whilst avoiding the risk of creating walled gardens. Certification / Good Practice This is found to be a challenge in a network of networks that spans the whole globe. On the one hand, one could foresee solutions in from other fields: for example, the certification of electrical devices in the US through Underwriters Laboratories (UL) thus a cyber-ul could be developed to certify the safety of Internet devices and systems and could operate with partial automation, based on voluntary submissions. On the other hand, safety standards are mostly predicated within a context of national laws. A principle like thou shall not develop bad code isn t working well. Bad systems are being used because they are novel, useful and exciting, with pressure on time-to-market causing some to cut edges. Thus, on a borderless Internet, no safety standards can be enforced. 4

This brings us to the potential for a set of Good Practice Standards which are voluntarily adhered to. These should not be the remit of a single overarching authority. They should be collaborative in scope, open, and should be promoted by all stakeholders, including Government, the Private Sector and Civil Society. Steps forward Focus the DC on CIV to concentrate more on the technical design principle than on the higher layer rights and values, which are much less well-defined, and universally variable. Work with other stakeholders to build a set of Good Practice Standards that will enhance freedom from harm in a technical perspective. It is expected that this work should include collaboration with the Dynamic Coalition on Internet of Things (DC-IOT) in particular. Collaboration with other Dynamic Coalitions is being considered too. 5