Organizer 1: Bridget Andere, Access Now
Organizer 2: Laura Bingham, Temple University Institute for Law, Innovation & Technology
Speaker 1: Laura Bingham, Civil Society, Western European and Others Group (WEOG)
Speaker 2: Mercy Sumbi, Private Sector, African Group
Speaker 3: Yussuf Bashir
Speaker 4: Elizabeth Atori, Civil Society, African Group
Speaker 5: Thomas Lohninger, Civil Society, Western European and Others Group (WEOG)
Bridget Andere, Civil Society, African Group
Laura Bingham, Civil Society, Western European and Others Group (WEOG)
Bridget Andere, Civil Society, African Group
Break-out Group Discussions - Flexible Seating - 90 Min
1. What are the obligations of corporate actors participating in the digital identity and digital public infrastructure markets, including multinational enterprises, to perform human rights due diligence? What are the essential elements of an effective enforcement regime for such rules? 2.How can law and public policy incentivize alternatives to centralized, mass surveillance architecture, and move the industry away from military and security dominance agendas? 3.How can the thresholds for seeking accountability be brought within reach of those individuals and groups who have been most negatively affected by the current status quo?
Connection with previous Messages:
Targets: Digital ID systems, as are being introduced around the world, are touted as a solution to financial and social welfare exclusion, healthcare solutions, and access to basic government services. As a side effect of this, governments/authorities continue to create governing frameworks for these systems that link government essential services such as education, social welfare, healthcare, and revenue collection to these forms of ID; further exacerbating the risk of exclusion for particular sections of society from (being part of the achievement of?) the goals identified above. Several examples highlight these issues. 1. No poverty 1.3) Implement nationally appropriate social protection systems and measures for all, including floors, and by 2030 achieve substantial coverage of the poor and the vulnerable 1.4) By 2030, ensure that all men and women, in particular the poor and the vulnerable, have equal rights to economic resources, as well as access to basic services, ownership and control over land and other forms of property, inheritance, natural resources, appropriate new technology and financial services, including microfinance 1.b) Create sound policy frameworks at the national, regional and international levels, based on pro-poor and gender-sensitive development strategies, to support accelerated investment in poverty eradication actions The need for financial inclusion is one of main justifications being touted by governments that introduce digital IDs. They are highlighted as a failsafe way to capture the huge numbers of people who would be considered “unbanked,”those who do not have access to formal financial institutions. The Huduma Bill in Kenya intends to link revenue collection to the huduma namba, further pushing out these communities from financial inclusion. As it stands, persons who do not have identification documents do not have access to financial institutions, or even the less formal online payment platforms. In India, Aadhaar linkage to financial services is said to have disrupted the existing financial system through which welfare payments were being made. 3. Good health and wellbeing 3.8) Achieve universal health coverage, including financial risk protection, access to quality essential health-care services and access to safe, effective, quality and affordable essential medicines and vaccines for all In Uganda, for instance, the ID system is connected to a number of government services including health services and social welfare stipends. It requires collection of biometric data, including fingerprints; while this may not be a problem on initial examination, according to researchers and members of community-based groups, there are entire groups of people who are locked out of registration as they lack fingerprints due to years of manual labour. In addition to this class of people, a large number of citizens in border communities have been denied access to this card and have no way of accessing government services that require proof of ID. The conception of Aadhar in India, saw numbers of persons living with HIV drop out of treatment programs due to requirements to submit their Aadhar number. Their reasons? A fear of their Aadhar data being leaked and people finding out their HIV status. Additionally, experts posit that while the linkage of data may not be automatically happening as feared, databases are being formed on the basis of the Aadhaar numbers being seeded by the private sector that could be used for other purposes; insurance companies, for instance. 4. Quality Education 4.1) By 2030, ensure that all girls and boys complete free, equitable and quality primary and secondary education leading to relevant and effective learning outcomes 4.2) By 2030, ensure that all girls and boys have access to quality early childhood development, care and pre-primary education so that they are ready for primary education In Kenya, the proposed Huduma Namba is set to be issued to children of school going age. With a source document, in this case a birth certificate, being part of the requirements, there is a risk that certain historically unrecognised groups, the Nubian community for example, will be excluded from access to primary and secondary education. 8. Decent work and economic growth 8.5) By 2030, achieve full and productive employment and decent work for all women and men, including for young people and persons with disabilities, and equal pay for work of equal value 8.6) By 2020, substantially reduce the proportion of youth not in employment, education or training Communities affected by a historical lack of access to identification do not have access to the job market, due to barriers to entry related to employment (such as need for tax credentials and security clearance both of which cannot be issued without a national ID), and lack of financial and educational development. The need for a source document, once again, ensures that this problem persists. 10. Reduced Inequalities 10.2) By 2030, empower and promote the social, economic and political inclusion of all, irrespective of age, sex, disability, race, ethnicity, origin, religion or economic or other status 10.3) Ensure equal opportunity and reduce inequalities of outcome, including by eliminating discriminatory laws, policies and practices and promoting appropriate legislation, policies and action in this regard 10.4) Adopt policies, especially fiscal, wage and social protection policies, and progressively achieve greater equality Digital IDs in their design are proactively excluding people, especially based on disability and ethnic origin; leading to further educational, economic and social exclusion
Digital identity is increasingly promoted as critical digital infrastructure for enabling a more connected, equitable and dynamic internet, and a safer and more secure global internet that allows for economic growth and many dimensions of sustainable development. Much of that infrastructure is envisioned, designed and constructed by private enterprises, although the end product is defined as a public good. Many systems, to achieve these goals, employ new technologies that are not widely understood, like biometrics and predictive analytics. Digital identity, by its very nature, is foundational to other more tangible individual, governmental and private sector projects, like banking, healthcare, and education, and promoters in search of maximizing the promise of connectivity and commerce strive for a high degree of interoperability, across these functions. These features pose many challenges to safeguarding human rights while striving for equitable and inclusive connection: Digital identity is poorly defined in the legal and regulatory arena and is not well-understood by policymakers, judicial actors, and implementing agencies Systems with controversial biometric and surveillance components have been deployed in high-risk operating environments without appropriate safeguards or redress mechanisms Insufficient transparency about digital identity systems harms trust and triggers avoidable human rights violations; a lack of clarity on system design leads to the adoption of architecture and individual technical components that cannot be fixed by policy after the fact This session will focus on the question of corporate accountability for human rights promotion and protection, given the significant impact that corporate behavior and corporate innovation play in creating digital identity infrastructure.
- Follow up events and awareness raising publications with regard to considerations governments and their agencies can take to ensure that infrastructures built around essential services remain human rights respecting. - Contributions in evidence gathering, research and expert opinions on ongoing digital identity litigation around the region.
Hybrid Format: - How will you facilitate interaction between onsite and online speakers and attendees? We will build the session around a break-out exercise that is designed to explore case studies in multistakeholder groups, to discuss lessons that can be learned from case studies, what went well, and identify policy gaps and proposed solutions. This component can be planned in a way that facilitates hybrid participation, for example by allowing online audience members to join a single or multiple breakout groups and then integrate into the hybrid discussion about the exercise. The breakout session would be facilitated by speakers and would follow an introductory portion in which the speakers emphasize the need for certain core enabling elements in law and policy that both responsible industry actors and stakeholders in digital identity systems are calling for. - How will you design the session to ensure the best possible experience for online and onsite participants? The breakout and report back functions as a starting point for making sure that the contributions and experience of online participants is fully integrated into the discussion that happens in the room and vice versa. We anticipate that there will be some time for open discussion following a tour de table on the group exercise, and during this time the organizers will closely monitor the various mechanisms for online participants to indicate a desire to make an intervention (chat, hand raise, video gesture, etc). The role of the moderator for this component of the session will be to maintain an inclusive approach to bringing in participants from online and in the room. - Please note any complementary online tools/platforms you plan to use to increase participation and interaction during the session. We would like to use a shared google document to project to participants in the room and online where the breakout groups would take notes of their discussions, where we will gather questions and capture the main takeaways from the discussion as a whole. This can also be used to share resources as it will be more accessible for participants in-person to use such a document than to follow input from online participants through a chat box for instance.
Usage of IGF Official Tool.