Session
International Center for Not-for-Profit Law (ICNL)
Shabnam Mojtahedi, ICNL, Civil Society, WEOG Zach Lampell, ICNL, Civil Society, WEOG Patrick Shea, ICNL, Civil Society, WEOG
Shabnam Mojtahedi, ICNL, Civil Society, WEOG Zach Lampell, ICNL, Civil Society, WEOG Patrick Shea, ICNL, Civil Society, WEOG
Organization's Website
Speakers
Shabnam Mojtahedi, ICNL, Civil Society, WEOG
Zach Lampell, ICNL, Civil Society, WEOG
Speaker TBD, Internet Society, Technical Community, WEOG
Onsite Moderator
Shabnam Mojtahedi, ICNL, Civil Society, WEOG
Rapporteur
Patrick Shea, ICNL, Civil Society, WEOG
SDGs
9.b
9.c
10.2
16.3
Targets: The effective, rights-based enforcement of cybercrime laws can enable a more secure and conducive policy environment for domestic technology development, investments in the domestic technology sector, and innovation. Through a more secure and conducive policy environment, investors, businesses, and researchers would be less vulnerable to cyberattacks, intrusive search and seizure of data by local authorities, or restrictions to their activities and communications based on arbitrary enforcement of online content restrictions (9b). Similarly, universal and affordable access to information and communications technology depends on security online, access to information, and reliable connectivity without arbitrary government restrictions (9c). When laws include vague restrictions on speech and broad investigatory powers without judicial oversight, it is more likely that authorities will target marginalized communities which hinder the empowerment and promotion of the social, economic, and political opportunities provided by secure and universal internet access. Evidence has also shown that cyber threats deter people from accessing the internet, with a particular impact on marginalized communities that are harassed or threatened online (10.2). Laws and their implementation, whether offline or in the digital space, can either promote or directly undermine the rule of law, human rights, and access to justice (16.3) and cybercrime laws that include vague or disproportionate restrictions on internet access and content undermine public access to information (16.10).
9.c
10.2
16.3
Targets: The effective, rights-based enforcement of cybercrime laws can enable a more secure and conducive policy environment for domestic technology development, investments in the domestic technology sector, and innovation. Through a more secure and conducive policy environment, investors, businesses, and researchers would be less vulnerable to cyberattacks, intrusive search and seizure of data by local authorities, or restrictions to their activities and communications based on arbitrary enforcement of online content restrictions (9b). Similarly, universal and affordable access to information and communications technology depends on security online, access to information, and reliable connectivity without arbitrary government restrictions (9c). When laws include vague restrictions on speech and broad investigatory powers without judicial oversight, it is more likely that authorities will target marginalized communities which hinder the empowerment and promotion of the social, economic, and political opportunities provided by secure and universal internet access. Evidence has also shown that cyber threats deter people from accessing the internet, with a particular impact on marginalized communities that are harassed or threatened online (10.2). Laws and their implementation, whether offline or in the digital space, can either promote or directly undermine the rule of law, human rights, and access to justice (16.3) and cybercrime laws that include vague or disproportionate restrictions on internet access and content undermine public access to information (16.10).
Format
Lightening Talk
Hybrid format: All speakers will be onsite, but there will be online moderation for offsite participants
Duration (minutes)
30
Description
Over the past 10 years, governments have sought to adopt new cybercrime legislation or revise existing frameworks to address the growing threats resulting from hacking, online fraud, and cyberstalking. However, if not carefully balanced, cybercrime laws can also impact citizens’ access to the internet and curtail human rights online. Governments have used overly broad cybercrime laws with vaguely worded provisions to criminalize or restrict otherwise legitimate speech and to authorize disproportionate investigatory powers without due process safeguards. Rather than curtailing and punishing cybersecurity attacks that are costing individuals and economies billions of dollars annually, these laws have instead targeted independent journalists, civil society advocates, and members of opposition parties. Meanwhile, the UN General Assembly’s adoption of the UN Cybercrime Treaty has been widely criticized by civil society and the technical community because it lacks appropriate safeguards and increases the risk of abuse.
In this lightening talk, ICNL will deliver a presentation that explains how cybercrime legislation has been implemented in different countries around the world and the impacts their implementation have had on digital rights, access to an open, secure, and interoperable internet, and the prevention of cybercrimes. Internet Society will be invited to join the conversation to explain how it has engaged with governments and other stakeholders to build cybersecurity capacity and to enact meaningful legislation that addresses threats without compromising fundamental rights or the functionality of the internet.
At the beginning of the session, we will ask in-person participants questions to test their knowledge of cybercrime statistics and other facts, and we will complement their responses by asking the same questions of online participants using the Zoom survey function (or through alternative tools like Mentimeter if a different video conferencing platform is used). The PowerPoint presentations will be shared on the screen at the venue as well as through the video conferencing platform so that all participants can follow along with the information being shared. Following the lightening talk, the organizers will stay to answer questions and speak with participants, and the rapporteur will similarly engage with online participants who might have questions.
At the beginning of the session, we will ask in-person participants questions to test their knowledge of cybercrime statistics and other facts, and we will complement their responses by asking the same questions of online participants using the Zoom survey function (or through alternative tools like Mentimeter if a different video conferencing platform is used). The PowerPoint presentations will be shared on the screen at the venue as well as through the video conferencing platform so that all participants can follow along with the information being shared. Following the lightening talk, the organizers will stay to answer questions and speak with participants, and the rapporteur will similarly engage with online participants who might have questions.