IGF 2019 Reports

NRIs Collaborative Session on Access

NRI Session
Updated: Thu, 05/12/2019 - 15:18
Universal Access and Meaningful Connectivity
1. Key Policy Questions and Expectations

Policy Questions:

  • How do we ensure that Internet governance processes are truly inclusive?
  • What needs to be done to enhance the capacity of different actors (and especially those in developing and least-developed countries) to actively contribute to such processed and whose responsibility is it?
  • What tools could be developed to promote (better) Internet access for women and girls, older people, people living with disabilities, refugees and other disadvantaged groups?
  • How can we better utilize primary and secondary schools and tertiary educational facilities to promote and to deliver on digital literacy to their communities and should digital literacy be the fourth pillar of education, alongside reading, writing and maths?
2. Discussion Areas:

Many indicated that government support in the form of economic incentives plays a big role in making the Internet accessible. Some suggested that the multi-stakeholder approach is important in achieving success collectively, while others pointed out to the drawbacks of the old models which place too much attention on distinctive roles of different stakeholders. Several voices mentioned the role of educational institutions as both providers and end-users of internet infrastructures. Mostly discussion was focused around the technical aspect of the access, however, some emphasized the importance of the human element and capacity building which will ensure equal access.

Among key points raised:

  • Access to the internet needs to be a universally exercisable right and not only a privilege of the urban population. Today, access is a necessity which enables people to exercise their rights of citizens. Access is the most important enabler of all the other aspects related to the Internet.
  • Providing internet in rural areas costs a lot for private companies resulting in high prices for internet and raising affordability issue. Effective economic policies by governments and advanced pricing models can solve the issue. The return on these investments should be measured in terms of social benefits rather than economic gains.
  • The issue of access can be resolved only through collaboration and cooperation of different members of society. However, the old models of distinct division into different stakeholder groups are already outdated. Synergies are very important to share the lessons learned on previous experiences and solutions that worked.
3. Policy Recommendations or Suggestions for the Way Forward:

Economic: create national plans on access which include government, professional syndicates and academic bodies, increase government subsidies for internet providers, lower tax for community networks providers.

Social-cultural: keep holding regional IGFs, involve most of the actors on this issue, especially civil society

Technical: there is a need for a legal definition of community networks to facilitate the regulation and allow them to grow, implementation and development of community networks, use of renewable energy for sustainable development, creation of local IXPs to reduce the costs.

 

4. Other Initiatives Addressing the Session Issues:

Community networks, infrastructure-sharing by tertiary institutions, free connectivity stations installed and operated by governments, regional IGFs, different pricing models for private operators.

5. Making Progress for Tackled Issues:

    Collective efforts are needed to ensure that all of the needs are met. There is an urgent need to build infrastructures with efficient technology and in a sustainable way. 

6. Estimated Participation:

25 onsite and 3 online
8 women

7. Reflection to Gender Issues:

Yes related that everyone should have access and gender divide should not be our reality anymore.

8. Session Outputs:
IGF 2019 WS #95
Tackling Cyberbullying on Children with Digital Literacy

Workshop
Updated: Tue, 10/12/2019 - 03:27
Security, Safety, Stability and Resilience
1. Key Policy Questions and Expectations

Policy Questions: 

1) Why cyberbullying is essential to be taken seriously by international community and what is the bottleneck to solve this problem?

2) Who/ which stakeholder is primarily responsible for protecting children from cyberbullying?

3) To what extent can digital literacy education increase the capacity of resilience and self-protection of children from cyberbullying?

Expectation:

Through the discussion, we want to appeal to all the stakeholders to take their responsibilities in the protection of children online. And we hope our paticipants share their geniu insights on this issue and come up with practicle solutions to tackle cyberbullying on children, and to enhance their digital literacy. 

2. Discussion Areas:

The discussion is divided into two sections. The first round of discussion mainly focused on explaining the significance and overall situation about dealing with cyberbullying on Children. In this part all of the speakers have a consensus that online children protection is very important and urgent. To start with, rapporteur from CFIS delivered the report of the survey on the situation of cyberbullying on children in China. This report shows that although the percentage of children who once experienced cyberbullying is only around 7 or 8, the actual number of these children is still very large. Representative from UNICEF, Steven Vosloo introduced the basic definition and framework of cyberbullying and digital literacy. He mentioned that Digital literacy refers to the knowledge, skills, and attitudes that allow children to flourish and thrive in an increasingly global digital world, being both safe and empowered, in ways that are appropriate to their age and local cultures and contexts. Steven Vosloo suggested to take holistic strategy to deal with cyberbullying on children and other online risks. Chairwoman from Digital Opportunity Foundation, Jutta Croll stressed that people should realize the severity of cyberbullying, and the core of children online protection is to value the equal right for children to use Internet. Many of the audiences show their agreement to her point. The second round of discussion mainly focused on the responsibility for different stakeholders. In this part, representative from Tencent introduced their practice in children online protection and digital literacy education. Many support what Tencent have done, but a few worried about children’s privilege of online privacy and proposed questions about the usage of children's digital data. Tencent answered that children’s data will be used when and only when criminals happened on children.

3. Policy Recommendations or Suggestions for the Way Forward:

Steven Vosloo mentioned that it was very crucial to actually listen to what children say to cyberbullying. We should really take children's consideration of cyberbullying into the law or policy making process. And to tackle with cyberbullying and other online risks, he suggested a more holistic strategy and localized approach should be adopted. In his words, digital literacy is like a “bullet proof vest”, which give children a protection from bullet but it can’t stop bullets.

Jutta Croll think the core of children online protection is to respect children's best interest. Although the UN-Convention on the Rights of the Child doesn’t have terms specially aimed at children online protection, the basic spirit and principles should be applied when tackling online problems against children. Every stakeholder, not only teachers and children, should take their responsibilities.

Tencent mentioned that as private sectors and leading Internet company in China, they will take more social responsibility on this issue, and making its platform more child-friendly. They will actively cooperate with government and schools, develop the technology to make it more easy for children to complain about cyberbullying and other harmful information online. 

 

4. Other Initiatives Addressing the Session Issues:

UNICEF country and regional offices reporting on 40 initiatives. 25 initiatives aim at building competencies and skills, 19 focus on internet safety (with 8 initiatives covering both). 17 projects work with young children, 16 with adolescents and 3 with both. 23 initiatives are in formal learning contexts, and 24 in non-formal learning environments (with 11 initiatives covering both)

CFIS conducted a survey around China to study the extend of children's awareness of cyberbullying, the way children use to tackle with cyberbullying, and the level of children' s digital literacy. 

Tencent launched a project called HUMIAO, cybersecurity entering school.  It is against pornography and illegal publications on Tencent.  This project is from 2017. Has experienced three years of improvement and upgrade and now tencent already established a comprehensive digital literacy education system which is for children. HUMIAO offers online and offline courses for students, parents and teachers.  The teaching method including role play of case analysis and we will talk about digital literacy, online self‑protection and reasonable usage of the Internet.

5. Making Progress for Tackled Issues:

During the meeting, the speakers mentioned many times that to tackle with cyberbullying on children, we need a holistic strategy. Every stakeholder should contribute to this issue. Steven Vosloo gave an example about a new feature developed by Instagram that could flag the potential harmful comments to the users, which helped in reducing the bad information. The example indicate that we should tackle this issue with comprehensive methods including digital literacy education, new technology like AI, legislation and so on.

 

6. Estimated Participation:

There were 26 online participants.

The total number of women present online and onsite is around 45.

7. Reflection to Gender Issues:

no gender issues involved

8. Session Outputs:

(1) The status quo of cyberbullying of children cannot be ignored, and the international community should work together to address it. In order to promote on-site exchanges and discussions, during the preparation of the seminar, CFIS conducted a questionnaire survey on the situation of Chinese children suffering from cyberbullying, and presented the results of the survey in the form of a report. According to the report, we know that the proportion of children who have actually experienced cyberbullying in China is low. However, due to the large number of children, the actual number represented by this proportion cannot be ignored. The relevant UNICEF report also pointed out that with the rapid popularization and development of the Internet, children are becoming aboriginal people on the Internet. Internet brings opportunities to children, but also comes with risks such as cyberbullying and privacy leakage. Children's online protection is an issue that needs to be addressed jointly by countries around the world.

 

(2) Cyberbullying on children is only a component of children's online protection. In order to better deal with this problem, it should be promoted from both theoretical and practical aspects. The international community should work together and propose a practical theoretical framework to deal with the problem of children's cyberbullying to guide practice. In the process of practice, pay attention to the use of comprehensive governance methods to enhance children's own digital media literacy while strengthening the responsibilities of all parties, and Combining the social and cultural background of the country, put forward the most suitable solution for the country's national conditions.

All responsible stakeholders should take proactive actions. In this seminar, CFIS introduced the attending audience to various work including the Children Online Protection Symposium with UNICEF on children's Internet protection since its establishment one year ago.

The representative from Tencent introduced the “Penguin Accompanied Growth” project, a children’s online rights protection project, and shared Tencent ’s research results and practices in developing children ’s digital literacy education from four aspects: theoretical research, educational practice, platform governance, and social collaboration. experience. Introduced the situational teaching and role exchange modes adopted in the classroom. I hope that through this literacy education, more minors will realize the importance of self-discipline of online behavior, and secondly, they will continue to improve their resistance to stress and stress. Anti-frustration ability to better carry out online life.

Representatives of social organizations from Germany and Nepal also described their organizations' practices in the area of children's Internet protection. The representative of Germany particularly pointed out that although the relevant UN provisions on child protection do not specifically address the issue of children's Internet protection, their basic principles and spirit still apply to the protection of children's rights in the Internet era. The international community regarding children's Internet protection should adhere to the child's own interests as the center, listen to children's voices, protect children's rights and opportunities to explore the online world independently, and find an optimal balance between taking control measures and ensuring that children use the Internet equally and freely Point, combined with science and technology, education and other means for comprehensive governance.

 

(3) Countries should integrate digital literacy education into their school curricula according to their own circumstances. Representatives from all parties considered that cyberbullying on children is an urgent and long-term task. Incorporating into the school curriculum can largely help children properly face and handle cyberbullying and enhance their resilience. The content of children's digital literacy includes both knowledge and skills, as well as attitudes and rights. Education for children's digital literacy should first equip children with basic knowledge of the Internet, basic skills for self-protection on the Internet, the right way to socialize with others, and to deal with cyberbullying. At the same time, it should help children develop a correct attitude to cope with cyberbullying and other issues. To help them clarify their right to use the Internet equally and reasonably, and so on. Children's digital literacy education can put children in “bullet jackets” to prevent a series of cyber risks such as cyberbullying, and improve their ability to use the Internet to explore and grow.

IGF 2019 OF #45
Information Sharing 2.0: privacy and cybersecurity

Open Forum / Town Hall
Updated: Fri, 20/12/2019 - 10:25
Security, Safety, Stability and Resilience
1. Key Policy Questions and Expectations

What are the challenges and opportunities of information sharing?

How do different jurisdictions treat this issue?

What are lessons for promoting cooperation and information sharing

 

 

2. Discussion Areas:

The discussion dealt with untangling some of the conceptual issues related to cybersecurity and privacy, and how to carry out this exercise, when promoting domestic policy.

 

There was broad support for the utility of the discussion, and additional relevant examples were brought up.

Long post-session report phase            

The discussion aimed to highlight the role of domestic legislation and legal rules in order to support cyber defenders. The conclusion was that the EU General Data Protection Regulation serves as an important example in that it clarifies in Recital 49 that information processing and sharing for a cybersecurity purpose is legitimate. Thus it recognizes that cybersecurity protects privacy by preventing attackers illegally accessing  personal data. This specific rule has value because it reduces the level of legal risk to cyber defenders, and reduces some of the complexities that inevitably accompany modern data protection regimes. Thus this policy serves to promote defense.

 

By abstracting from the concrete issue to a more general view of law, technology and policy of this specific issue, the session also highlighted the value of pragmatic dialogues and concrete solutions between technologists and lawyers. Promoting these conversations has value both for domestic policy making, and can also assist promoting better global interoperability of legal frameworks.

 

3. Policy Recommendations or Suggestions for the Way Forward:

From a governance point of view, there is room for more focused discussions on issues which can support cyber defenders. Thus there is value in mapping legal constraints or challenges to cybersecurity best practices. Based on this mapping, there is value in having a multistakeholder,multi jurisdictional discussion amongst relevant professionals to discuss the contours of the issue, and to enable to better scope it. Based on this exercise, productive discussions can be conducted to promote common understandings and ways forward.

 

 

 

Long post-session report phase

             

Many governments are promoting, developing and deploying domestic cybersecurity polices. In this context, government has a role not only as a regulator or operator of the national CSIRT, but also as an institution that can convene stakeholders, assess the need for clearer legal rules, and creating domestic legal change when necessary.

 

The IGF can support these processes as part of a global multistakeholder discussion by bringing together different professions and groups, and global perspectives.

 

 

4. Other Initiatives Addressing the Session Issues:

Short post-session report phase (due 12 hrs after the session concludes): Please share any examples, projects, initiatives mentioned that are addressing the issues tackled in the session. [max. 100 words] 

 

During the session, participants discussed the issue of access to WHOIS registration data, which holds details about the registrants of internet domain names. This data supports decisions about the level of risk from a certain domain name. As a result of data protection analysis, access to this data has changed, and some participants commented that this issue should be revisited.

Long post-session report phase (

During the IGF 2019 there was a parallel discussion about "Use and Misuse of the DNS", which also analyzed in a pragmatic manner the issue of preventing misuse of the DNS system while following accepted principles related to content.

 

This lead to the conclusion that there are other technical and legal issues which affect cyber defenders and that robust discussion can promote dealing with them.

5. Making Progress for Tackled Issues:

Some issues require further technical-legal discussions within the domestic context. The IGF can help in promoting  consistent terminology and analysis, as well as interoperability.

Long post-session report phase

 

The IGF 2019 in Berlin served as an excellent venue to meet global stakeholders, hear viewpoints, share views and allow reflection on the issues from the IGF's unique place in the governance discussion. The themes discussed in the session connected to the general themes in this area, and raised the interest of industry, academia, and non governmental organizations. As such they have proven the discussion valuable and therefore is seems useful to promote this type of discussion in an even more developed manner towards the next IGF.

6. Estimated Participation:

Onsite participants - 50. 

Women - half. 

 

7. Reflection to Gender Issues:

There was no discussion of gender issues. 

8. Session Outputs:

The IGF 2019 in Berlin served as an excellent venue to meet global stakeholders, hear viewpoints, share views and allow reflection on the issues from the IGF's unique place in the governance discussion. The themes discussed in the session connected to the general themes in this area, and raised the interest of industry, academia, and non governmental organizations. As such they have proven the discussion valuable and therefore is seems useful to promote this type of discussion in an even more developed manner towards the next IGF.

Mr. Cormack posted his ovservations here: https://community.jisc.ac.uk/blogs/regulatory-developments/article/laws-help-security-and-incident-response

By abstracting from the concrete issue to a more general view of law, technology and policy of this specific issue, the session also highlighted the value of pragmatic dialogues and concrete solutions between technologists and lawyers. Promoting these conversations has value both for domestic policy making, and can also assist promoting better global interoperability of legal frameworks.

 

These conclusions fit in with some general reflections in this area that came up during the discussions in the 2019 IGF.

First, the concerns about greater divergence and legal unclarity, as described in the "Internet and Jurisdiction Global Status Report" [https://www.internetjurisdiction.net/news/launch-of-worlds-first-intern…]. This report highlights the risk of growing fragmentation because of legal issues that apply to the internet.

In the context of the session on information sharing, a recurring theme that came up was that even when  there is actually no legal conflict between cybersecurity and privacy, the perceived lack of clarity on this issue can by itself have a chilling effect on activities which are legal and socially positive.

Second, the importance of having a constant dialogue between technologists and lawyers. As the importance of technology in society rises, so does risk and legal risk, and these need to be handled. Legal advisors to National CSIRTS face these challenges constantly, and therefore are faced with new challenges and need to create new balanced frameworks to support the cybersecurity mission.

Third, the institution and mechanism for creating more clarity and facing these new challenges can be different between jurisdictions, and depends upon societal factors. While legislation seems the first choice, the issue of technological neutrality and enabling innovation may require other choices, or combination of intuitions.

Fourth, whatever the process for arriving at more clarity, it needs to be inclusive and transparent, and involve a multistakeholder approach.

Finally, having similar discussions and hopefully similar or compatible legal answers across jurisdictions can promote clarity for domestic professionals which may be under foreign rules, and for cross border cooperation.

Whereas there are dedicated organizations to deal with technical aspects of cybersecurity, there is a need to complement this discussion with the policy and legal aspects that can support them, in a multistakeholder fashion. The IGF can promote the global discussion and practical measures that will promote stability and security.  

 

IGF 2019 OF #44 Disinformation Online: Reducing Harm, Protecting Rights

Open Forum / Town Hall
Updated: Wed, 04/12/2019 - 11:12
Security, Safety, Stability and Resilience
1. Key Policy Questions and Expectations

The challenge of disinformation: how can we reduce harm and protect human rights?

Disinformation is a multifaceted problem with no single solution. It is a global issue, with many countries concerned about its potential harmful impact on security, health and societal cohesion. The objective of this panel session is to discuss approaches to tackling disinformation, drawing on international examples and views from government, industry, civil society and academia, and encouraging cooperation and collaboration among partners.

2. Discussion Areas:

The panel discussed the increasing issue of disinformation and manipulation online, with agreement that hostile actor tactics are regularly evolving and that, to counter this, diverse partnerships with representatives from a range of sectors is needed. There was significant discussion on efforts by platforms, particularly by Facebook, with recognition that while the platforms had taken significant steps more could be done. The increasing number of companies selling manipulation services online was raised, with some debate on the need to regulate such companies. Participants agreed that it was critical that the impact on human rights was closely considered before action is taken.

3. Policy Recommendations or Suggestions for the Way Forward:

The debate considered that Governments may wish to explore putting additional requirements on social media platform, including potentially changing the liability of platforms, increasing regulation to set consistent standards or reviewing competition policy. The panellists also consider other steps which could prevent disinformation, including  support for high quality journalism and increased provisions for media literacy. Other issues discussed included whether platforms could take steps like increasing transparency, granting data to researchers, or introducing content labelling to increase awareness of potential source biases. There was wide agreement that the whole community could consider standardising the terminology being used to describe these issues. 

4. Other Initiatives Addressing the Session Issues:

The discussion highlighted a number of measures that are already being taken, including:

  • A Whatsapp announcement on suing commercial companies who seek to undermine their platform

  • Facebook measures, including the new content oversight board, the ‘remove, reduce, inform’ policy, increased takedowns of inauthentic coordinated behaviour which are then publicly announced, and increasing partnerships with researchers.

  • The International Factchecking Network which is professionalising standards for fact checking organisations

It was also noted that some countries are introducing legislation to counter disinformation, including Vietnam, Singapore and Nigeria.

5. Making Progress for Tackled Issues:

The discussion outlined that progress could be significantly improved through increased partnerships between the various communities who are considering disinformation. This should include experts from cyber, tech, human rights, media and journalism. In addition, greater understanding of how users interact with information on social media platforms could be improved, including understanding the cues that that users need to make decisions about the veracity of content. 

6. Estimated Participation:

Please estimate the total number of onsite and online participants: 140

Please estimate the total number of women present onsite and online: 60

7. Reflection to Gender Issues:

There was some discussion on the need to protect human rights on social media platforms, and particularly protecting the right to freedom of speech but also that there should be some recognition of a need to be able to access truthful information. There was no specific discussion on gender. 

8. Session Outputs:
IGF 2019 WS #180 Splinternet: What Happens if "Network Sovereignty" Prevails

Workshop
Updated: Fri, 27/12/2019 - 03:26
Data Governance
1. Key Policy Questions and Expectations
  1. What will be the consequences to a global, unified internet if the ideology of "network sovereignty" increases in popularity among nation-states? In other words, what happens if the global internet becomes fragmented by nation-states as they attempt to exert unilateral control of networks within their borders?
  2. How might "network sovereignty" policies impact long-term social and economic development worldwide?
    • What will the impact be on freedom of expression and freedom of assembly?
    • Is "network sovereignty" beneficial or detrimental in terms of private sector innovation?
    • What are the implications for circulation of news and information?
  3. If "network sovereignty" is not compatible with a multistakeholder model of interest governance, what is the role of civil society, technical communities, and multilateral organizations to make sure that our current form of internet governance is maintained?
2. Discussion Areas:

There was broad support among panelists for increased efforts to ensure that the internet remains one, interoperable global network. All speakers opposed so-called "network sovereignty" advocated by some governments which give them total control over information and data flows within their geographic jurisdiction. This policy position was deemed to be in diametric opposition to the type of multi-stakeholder internet governance endorsed by IGF processes. Some speakers noted the impact internet fragmentation would have an human rights, such as freedom of expression and freedom of assembly, while others noted the detrimental economic impact of limiting information flows. Audience members espoused concern not only about government control of the internet, but also the growing dominance of US-based tech platforms. Panelists agreed that this is a parallel concern, and should also be addressed by an increased emphasis on truly multi-stakeholder governance.

3. Policy Recommendations or Suggestions for the Way Forward:

There was broad agreements that "network sovereignty" doctrine needs to be challenged by research and reporting that shows how it is detrminental to human rights and social progress. Audience members suggested the creation of a Dynamic Coalition to address the challenge. Panelists noted that one of the core ways to address this is by strengthening multi-stakeholder governance and forums like the IGF. Discussions around IGF Plus are one venue where this can addressed. Likewise, there was agreement that developing countries needed more assistance in developing tech policy - right now they often replicate what others governments are doing without always understanding the consequences. This is, in fact, one way that "network sovereignty" policies are spreading in developing countries.

4. Other Initiatives Addressing the Session Issues:

The Open Internet for Democracy Initiative (https://openinternet.global) has a fellowship program this year where six fellows from six developing countries are doing research and analysis of how network sovereignty are impacting human rights in their countries. These individuals are looking to partners with others who are working on similar lines of research.

5. Making Progress for Tackled Issues:

There is broad hope that discussion around IGF Plus will include strengthening multi-stakeholder governance and will incorporate more capacity building opportunities for officials from developing countries. This challenge of internet fragmentation is one that will play out over the medium and long-term, so there is no immeadiate fix. This is why building broader, more inclusive governance structures are important.

6. Estimated Participation:

175 onsite participants. 25 online participants.

90 onsite women participants. Unknown number of online women participants.

7. Reflection to Gender Issues:

The discussion did not directly broach gender issues.

8. Session Outputs:

The session resulted in a number of researchers and policy analysts from different parts of the world (both panelists and audience members) connecting after the session was over to find ways to collaborate going forward. The hope is that this will lead to more IGF panels next year based on research and reporting on the threat that internet fragmentation poses to an open, globally interoperable internet.

IGF 2019 WS #421
IPv6: Why should I care?

Workshop
Updated: Wed, 11/12/2019 - 18:25
Universal Access and Meaningful Connectivity
1. Key Policy Questions and Expectations

The main policy questions are: 1) Why is IPv6 deployment relevant to digital inclusion? 2) How can IPv6 migration affect digital inclusion? 3) What are the impacts if IPv6 is not deployed on the Internet? Our goal is to compare and contrast different points of view regarding digital inclusion in IPv6 deployment in three distinct regions (Europe, Africa and Latin America).

2. Discussion Areas:

The panelists all agreed that IPv6 is an important tool to digital inclusion, putting in evidence questions like scarcity - and the near exhaustion - of addresses, the damage on latency by CGNAT and the broke of the end-to-end connectivity. Other important point raised by the table was the increase of the costs on maintaining side infrastructure to keep IPv4 infrastructure, like the higher prices of addresses in side markets or CGNAT servers. The last point was contested by one of the spectator, who told that if this is true, the market was already moving completely for IPv6.

 

Another important point of the discussion was the reasons to the low rates on IPv6 usage in AFRINIC region, that - as said by Mr. Tamon - is because of the socioeconomic context of the region. Prioritization of other activities and recycle of old networking devices or long term usage of end-user devices makes it harder.

3. Policy Recommendations or Suggestions for the Way Forward:

Some of the actionable policy recommendations that we could make are as follows:

1 - [technical]: Train the technical community to deploy IPv6, such as ISPs, governments and content providers.

2 - Raise awareness of managers of different stakeholders to the importance of IPv6 deployment.

3 - Continue the discussion after the workshop. Schedule a follow-up session within a year to analyse the future status of IPv6 deployment.

4 - Create a working group for further discussion.

4. Other Initiatives Addressing the Session Issues:

There are some initiatives that can be observed in Brazil, Africa and Europe.

In Brazil, NIC.br has been taking many steps towards enabling IPv6 deployment. For example, it has been providing IPv6 training courses to the technical community for over 10 years. NIC.br has also been promoting events and forums for further discussing IPv6 issues and succesful cases of IPv6 deployment.

There are also IPv6 training courses being offered both in Africa (by AFRINIC) and Europe (by RIPE NCC). In Africa, IPv6 consultancy is offered by AFRINIC to help companies and governments to deploy IPv6 in their networks. In Europe, RIPE NCC offers both presential and online IPv6 training courses for the technical community. Particularly in Germany, the German Government is working on deploying IPv6 on all its applications and infrastructure of the network at all levels of the public power.

 

5. Making Progress for Tackled Issues:

One issue that keeps arising when you talk about IPv6 deployment, is reluctance. Indeed, it is still hard to convince the technical community and companies of the urgency of transitioning to IPv6. The arguments for the transition and its different approaches are still unclear to them, so the most important next step is to find different ways of raising the awareness of those communities (technical and private sector) to the urgency of this transition.

 

6. Estimated Participation:

48 people (20 women) onsite

5 people online

 

7. Reflection to Gender Issues:

This issue was not discussed.

8. Session Outputs:

African Network Information Centre (http://afrinic.net)

Brazilian Network Information Center (http://nic.br)

Réseaux IP Européens Network Coordination Centre (http://ripe.net)

Autorité de Régulation des Communications Électroniques et des Postes (https://www.arcep.fr)

 

IGF 2019 Capacity Building for Better Blockchain Governance

DC Session
Updated: Fri, 29/11/2019 - 06:12
Universal Access and Meaningful Connectivity
1. Key Policy Questions and Expectations

How can the Dynamic Coalition on Blockchain Technologies support improvements in blockchain governance? 

How can the Dynamic Coalition on Blockchain Technologies support efforts of the IGF community to use blockchain technology to advance Internet governance? 

How does the agenda of the Dynamic Coalition on Blockchain Technologies overlap and/or intersect with the agenda of other dynamic coalitions? 

2. Discussion Areas:

The session was an interactive design thinking workshop in which the roughly 50 participants split into five groups and worked through a design process for identifying governance topics important to members of the DC community, then brainstorm potential steps the DC on blockchain technologies could take to help resolve or improve those governance areas, then evaluate those brainstormed ideas according to a set of specific criteria designed to maximize potential completion of outputs by IGF 2020 and to maximize the usefulness of the output for both the DC on blockchain technologies and for the broader IGF community. The groups discussed data protection, education and capacity building, creating a multistakeholder framework and principles to guide government adoption of blockchain technologies, a blockchain domain name system, and how to best explore the role of blockchain technologies for the broader goals of Internet governance. 

3. Policy Recommendations or Suggestions for the Way Forward:

In the end, the working groups identified five projects for continued work in 2020: creating an interactive map of data protection and privacy considerations related to blockchain technologies and its applications, creation of educational materials for the general public (both basic explanatory and interactive materials and resources list), developing a set of principles and guidelines for multistakeholder evaluation of government-led blockchain technology initiatives, a blockchain domain name system, and tools for better exploring the potential contributions of blockchain technology for Internet governance. Each group identified a project leader and the next step to take in order to launch work on the output. The DC on blockchain technologies will create working group sub-list serves, and circulate information on what each group intends to do and how to join the work via the main list serve.

4. Other Initiatives Addressing the Session Issues:

It became clear during the session that as the dynamic coalition on blockchain technologies develops these outputs, the DC must consult with the DC on accessibility and the DC on public libraries in order to ensure the outputs are accessible to the broader community and that the DC works with the key institutions that help build community capacity (e.g., libraries). 

5. Making Progress for Tackled Issues:

The focus of the session was to identify issues that the DC could contribute meaningful work toward advancement and progress. The DC must now execute the plans designed during this very interactive session. 

6. Estimated Participation:

According to the sign in sheets the DC asked each participant to sign, about 47 participants worked among five working groups and at least four online participants offered interventions. 18 of those participants were women. 

7. Reflection to Gender Issues:

The session did not overtly address gender issues, except by ensuring that each working group contained at least one or more women among its participants. The governance issues discussed, however, did not overtly consider gender issues. 

8. Session Outputs:
IGF 2019 Dynamic Coalition on Gender and Internet Governance Main Ses

DC Session
Updated: Sat, 14/12/2019 - 00:58
Universal Access and Meaningful Connectivity
1. Key Policy Questions and Expectations

The DC GIG session will be used as a space for knowledge-sharing and learning with Dr. Anja Kovacs presenting research on gender, body and data. The following questions will be discussed:

1. What are/should be the rights and responsibilities for individuals in determining the use of their personal data, and what right do individuals have to determine their own digital identity?

2. To what extent, and how, should accountability, fairness, explainability, suitability and representativity  apply to the use of data and and algorithms,  and how can governance frameworks address these issues in a way that enhances increases inclusion?

3. What role can the implementation of the principles of safety by design, privacy by design and by default as a principle play to secure human rights and achieve increased safety? How can consumer rights and their capacity to protect themselves and their data be reinforced?

 

2. Discussion Areas:

Anja Kovacs was the main speaker on the panel and presented research on complicating the relationship on datafication of bodies. The four other speakers acted as discussants and took the conversation forward by contributing perspectives from political science, legislation and IT. Many audience members engaged with comments and questions about how datafication of bodies can be reworked by putting personhood at the center. Anja argued against an understanding of data as oil or a disembodied resource, and encouraged a reading of bodies’ translation into data that looked at structural harms of data beyond privacy.

A final input by Smita prompted us to think about how the binary code of technology can accommodate non-binary persons. A radical idea that emerged from the discussion was that not being in the data is not necessarily a bad thing and flying under the radar could actually be a productive way of playing an unfair system.

3. Policy Recommendations or Suggestions for the Way Forward:

The session challenges in the way of using data for the benefit of people, but data collection seldom keeps people at the center. Thinking about bodies behind data with special emphasis on gender and marginalised underserved communities.

The policy recommendations include making spaces like IGF inclusive and safe for people of other genders by ensuring that data collection, especially gender specific data, is only collected if necessary, and by ensuring inclusive facilities in the IGF and NRI spaces. This also includes having inclusive gender options at registration to not just ensure participation but also to push session organisers to think beyond the binary of man and women in terms of speakers as well.

4. Other Initiatives Addressing the Session Issues:

An audience member referred to MIT Media Lab's Algorithmic Justice League, which studies facial recognition and examines it in the context of justice and judicial processes.

5. Making Progress for Tackled Issues:

The policy recommendations include making spaces like IGF inclusive and safe for people of other genders by ensuring that data collection, especially gender specific data, is only collected if necessary, and by ensuring inclusive facilities in the IGF and NRI spaces. This is something which can be easily implemented in the IGF ecosystem with some more attention to detail.

 

 

6. Estimated Participation:

Participants: 30 women, 8 men, at least 2 non-binary persons.

Speakers: 4 women, 1 men

Moderator: 1 non-binary

Rapporteur: 1 non-binary

7. Reflection to Gender Issues:

The whole session was on feminist approach to body and data. Gender emerged strongly in the examples presented, as well as a key interaction of the session topic, The body as data in the age of datafication.

The session also pushed to expand the purview of gender beyond the binaries of male and female through explicit examples by both the speakers as well as in interventions by participants. There was also a conversation on the binary gender options at the IGF registration, and on the lack of inclusive facilities at the venue for people of other genders 

8. Session Outputs:
IGF 2019 OF #40 EU Delegation & Youth IGF Movement

Open Forum / Town Hall
Updated: Thu, 20/02/2020 - 18:21
Security, Safety, Stability and Resilience
1. Key Policy Questions and Expectations

Full report available HERE.

2. Discussion Areas:

Full report available HERE.

3. Policy Recommendations or Suggestions for the Way Forward:

Full report available HERE.

4. Other Initiatives Addressing the Session Issues:

Full report available HERE.

5. Making Progress for Tackled Issues:

Full report available HERE.

6. Estimated Participation:

Full report available HERE.

7. Reflection to Gender Issues:

Full report available HERE.

8. Session Outputs:

Full report available HERE.

IGF 2019 WS #403
IPv6 Independence Day: Rest in peace IPv4

Workshop
Updated: Sun, 21/06/2020 - 15:29
Security, Safety, Stability and Resilience
1. Key Policy Questions and Expectations

1 - When would the ideal time be to transition from IPv4 to IPv6?
2 - What role would each stakeholder play in that transition?
3 - How can we plan this transition without affecting Internet Governance principles, taking into account the security, stability and resilience of the Internet?

Our goal is to discuss possible scenarios for IPv4 transition into IPv6 with different stakeholders (government, civil society, technical community and private sector).

2. Discussion Areas:

All the panelists agreed about the importance of IPv6 migration, mentioning some advantages of transitioning to that more modern protocol. For example, according to Mr. Tamon, "We know that IPv6 [sic] like a tree is guaranteed to be good for the internet and what is good for the internet is good for business." 

Still, there seems to be reluctance and lack of information about how to transition from IPv4 to IPv6, as shown by Mr. Moreiras. He shared the result of a survey made with Brazilian ISPs about their points of view regarding turning off IPv4 on the BGP protocol. Surprisingly, the results show that 40% of the providers do not believe that it is even possible to do that because of legacy systems.

Only one spectator from India openly disagreed with the theme of this session, which was called "Rest in Peace IPv4." He stated that "We are welcoming the [sic] IPv6, we are deploying the [sic] IPv6 but at the same time, rest in peace IPv4 I doubt." He believes that some end users in India will not purchase new devices capable of communicating over IPv6, that they will continue using their old devices, so the IPv4 shutdown can not be completely done now - or these users might go offline.

3. Policy Recommendations or Suggestions for the Way Forward:

Some of the actionable policy recommendations that we could make are as follows:

[economic, governance, technical] Raise awareness among decision makers from different stakeholders to the importance of IPv6 deployment.
[technical, economic, governance, socio-cultural] Create mid and long term plans to deploy IPv6 in all Internet segments.
[technical, economic, governance, socio-cultural] Continue the discussion after the workshop. Schedule a follow-up session within a year to analyse the future status of IPv6 deployment.
[technical, economic, governance, socio-cultural] Promote capacity building actions to teach the community and decision makers about the importance of migrating to IPv6.
[IGF, technical] Implement IPv6 in all IGF meeting networks.
[IGF, technical] Create more IGF workshops or an IGF best practice forum in order to engage more people in the discussion of infrastructure development.

4. Other Initiatives Addressing the Session Issues:

During the sesion, the speakers presented some IPv6 projects being implemented in different countries:

  1. Barometer, a project of the French government to show the state of the art of IPv6 deployment in some large Internet companies.
  2. IPv6.br, a Brazilian initiative to disseminate knowledge about the importance of using the new protocol.
  3. The German IPv6 strategy for the federal public administration, also known as IPv6 master plan, through which the government "lead by example" (as per Ms. Bürger)  
  4. AFRINIC Hackathon, a type of training focused on convincing managers and policy makers of the relevance of migrating protocols.
5. Making Progress for Tackled Issues:

In this workshop, all the panelists discussed the importance of IPv6 deployment and how to aid this migration. One thing that Mr. Tamon said and that all the panelist agreed with is that it is important not only to focus on the technical community but on decision makers. In other words, we should focus on those who have the power to make changes in a company, country, government and society. The panelists also agree that we have enough knowledge to deploy IPv6, but something is missing to make it happen, and that is decision makers` lack of awareness. This is an important contribution that IGF makes to the issue of IPv6 migration is that it provides a place for decision makers from different stakeholders to gather and discuss.

6. Estimated Participation:

36 onsite participants (6 women)
7 online participants (3 women)

7. Reflection to Gender Issues:

This issue was not discussed.

8. Session Outputs:

African Network Information Centre (http://afrinic.net)

Brazilian Network Information Center (http://nic.br)

Autorité de Régulation des Communications Électroniques et des Postes (https://www.arcep.fr)

IPv6.br Project (http://ipv6.br/)

IPv6 Barometer (https://www.arcep.fr/cartes-et-donnees/nos-publications-chiffrees/trans…)