Session
Organizer 1: Civil Society, Western European and Others Group (WEOG)
Organizer 2: Private Sector, Western European and Others Group (WEOG)
Organizer 3: Civil Society, Western European and Others Group (WEOG)
Organizer 2: Private Sector, Western European and Others Group (WEOG)
Organizer 3: Civil Society, Western European and Others Group (WEOG)
Speaker 1: Andrew Campling, Private Sector, Western European and Others Group (WEOG)
Speaker 2: Katie Noyes, Government, Western European and Others Group (WEOG)
Speaker 3: Taddei Arnaud, Private Sector, Western European and Others Group (WEOG)
Speaker 4: Makola Honey, Intergovernmental Organization, African Group
Speaker 5: Richardson Lloyd, Civil Society, Western European and Others Group (WEOG)
Speaker 2: Katie Noyes, Government, Western European and Others Group (WEOG)
Speaker 3: Taddei Arnaud, Private Sector, Western European and Others Group (WEOG)
Speaker 4: Makola Honey, Intergovernmental Organization, African Group
Speaker 5: Richardson Lloyd, Civil Society, Western European and Others Group (WEOG)
Format
Classroom
Duration (minutes): 90
Format description: The 90-minute duration is optimal for this session as it allows sufficient time for in-depth discussion on the complex relationship between encryption and public safety, especially given the number of diverse speakers involved. With diverse expert perspectives spanning sectors and geography, the longer session ensures each panelist has ample time to contribute meaningfully. The classroom layout is ideal for this format as it promotes interactive engagement with the audience. Participants will be able to ask questions directly, contributing to a dynamic discussion rather than a passive listening experience. The 90-minute window also allows for live Q&A, case studies, and moderated audience contributions, ensuring the session is engaging and solution-driven. This format balances comprehensive insights from the speakers with time for interactive dialogue, making the session informative and collaborative for both onsite and online attendees.
Duration (minutes): 90
Format description: The 90-minute duration is optimal for this session as it allows sufficient time for in-depth discussion on the complex relationship between encryption and public safety, especially given the number of diverse speakers involved. With diverse expert perspectives spanning sectors and geography, the longer session ensures each panelist has ample time to contribute meaningfully. The classroom layout is ideal for this format as it promotes interactive engagement with the audience. Participants will be able to ask questions directly, contributing to a dynamic discussion rather than a passive listening experience. The 90-minute window also allows for live Q&A, case studies, and moderated audience contributions, ensuring the session is engaging and solution-driven. This format balances comprehensive insights from the speakers with time for interactive dialogue, making the session informative and collaborative for both onsite and online attendees.
Policy Question(s)
1. How can encryption policies balance privacy with the need to protect vulnerable individuals, particularly children?
2. What technical solutions can support both encryption and lawful access without compromising cybersecurity?
3. How can governments, technology companies, and civil society work together to create rights-respecting encryption frameworks?
What will participants gain from attending this session? Participants will:
• Move beyond the debate—focusing on real-world solutions.
• Understand the "weaponisation of privacy" and its implications for child protection and public protection.
• Explore encryption advancements that enable lawful investigations while preserving security.
• Learn from case studies on encryption laws and technical approaches.
• Engage with experts from government, industry, and civil society on collaborative strategies.
Attendees will gain practical, evidence-based insights to help shape encryption governance in a way that prioritises both individual rights and public protection.
Description:
Encryption protects privacy and cybersecurity, but it also presents challenges in tackling serious crimes, including child exploitation. The debate is often framed as governments demanding lawful access versus tech companies defending privacy. However, this polarised narrative does not serve those most at risk, particularly children. At IGF 2024, we explored encryption’s impact on public protection, introducing "the weaponisation of privacy"—the unintended use of encryption to shield harmful activity. Now, Balancing Acts 2.0 moves beyond debate to solutions: Can encryption and safety truly co-exist, and how do we achieve it? This session brings together cybersecurity experts, policymakers, child protection specialists, and human rights advocates to explore: • New encryption models that preserve privacy while enabling lawful investigations. • Case studies on global regulatory approaches and their impact on public protection. • Technical solutions, such as homomorphic encryption and differential privacy, that maintain encryption’s integrity while supporting investigations. • Strategies for global cooperation to align encryption policies with human rights and public protection. Rather than fueling division, this session builds consensus and explores practical innovations that protect both privacy and public protection. Participants will leave with a deeper understanding of encryption’s role in security and public protection, and practical insights on how encryption policies can balance individual rights and societal protections.
Encryption protects privacy and cybersecurity, but it also presents challenges in tackling serious crimes, including child exploitation. The debate is often framed as governments demanding lawful access versus tech companies defending privacy. However, this polarised narrative does not serve those most at risk, particularly children. At IGF 2024, we explored encryption’s impact on public protection, introducing "the weaponisation of privacy"—the unintended use of encryption to shield harmful activity. Now, Balancing Acts 2.0 moves beyond debate to solutions: Can encryption and safety truly co-exist, and how do we achieve it? This session brings together cybersecurity experts, policymakers, child protection specialists, and human rights advocates to explore: • New encryption models that preserve privacy while enabling lawful investigations. • Case studies on global regulatory approaches and their impact on public protection. • Technical solutions, such as homomorphic encryption and differential privacy, that maintain encryption’s integrity while supporting investigations. • Strategies for global cooperation to align encryption policies with human rights and public protection. Rather than fueling division, this session builds consensus and explores practical innovations that protect both privacy and public protection. Participants will leave with a deeper understanding of encryption’s role in security and public protection, and practical insights on how encryption policies can balance individual rights and societal protections.
Expected Outcomes
• Shift the discussion from debate to solutions, fostering constructive dialogue on encryption and public protection.
• Identify real-world case studies where privacy and lawful access can co-exist.
• Explore practical encryption innovations that enable privacy while protecting public protection.
• Encourage global cooperation on encryption policies, ensuring individuals—especially children—are protected without undermining cybersecurity.
This session will provide clear takeaways for policymakers, industry leaders, and civil society, helping to shape practical, rights-respecting encryption policies that recognise both the power and risks of encryption in an era where privacy can be weaponised against public protection.
Hybrid Format: We have successfully organised multiple hybrid panel sessions at past IGFs, ensuring interactive and inclusive experiences for both onsite and online participants. This experience allows us to effectively manage engagement across both formats.
Facilitating Interaction Between Onsite & Online Participants:
A dedicated online moderator will manage the virtual chat, relay questions, and ensure active participation.
Both onsite and online speakers will have equal opportunities to contribute, with seamless transitions facilitated by the moderator.
Ensuring an Engaging Hybrid Experience:
Live Q&A: Both onsite and online attendees can submit questions in real-time.
Scenario-based discussions: Participants will engage in practical encryption dilemmas to foster cross-format dialogue.
Online Contributions: Virtual attendees can contribute via a shared document or chat board.
Complementary Online Tools:
If needed, interactive chat tools or live polling will further engage remote participants.
Our proven track record ensures a highly engaging and inclusive hybrid session.