21 Matching Annotations
  1. Oct 2020
    1. Finally, a Programme of Action has no ending date:

      Important: PoA has no ending date

    2. First, it offers a process that is inclusive and open to all UN member states, unlike the UNGGE. While the OEWG is more inclusive, it is slower to deliver substantial results, notably due to the diversity of capacities and maturities among the participating states. A PoA, by contrast, allows for concrete discussions and progress within working groups devoted to specific issues. In that sense, a PoA on Cyber could actually combine the best of two words.

      WG as mechanism may be helpful

    3. Usually, a Programme of Action comprises two sets of provisions: objectives and recommendations and rules for monitoring their implementation.

      Mechanism for monitoring of implementation is particularly important part of the PoA

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Submissionby

      Notably missing: US, China, Russia, Brazil, India, but also Australia and Canada (so far)

    2. open, secure, stable, accessible and peaceful cyberspace

      Not the same wording as China and others use, though

    3. relevant multi-stakeholder initiatives

      Opening space for contributions by other fora like Paris Call

    4. could consider if additional norms could be developed over time

      Creating space for possibly developing new norms in future

    5. implementation is currentlyone of our biggest challenges

      Though not all parties would agree on this

    6. The OEWG and 6thGGE could work toagree the modalities of aProgramme of Action,

      I think the proposal comes too late in the work of the current GGE and OEWG to allow those to discuss modalities - even if all parties would agree for the PoA, which is not likely.

    7. acquis

      Acquis - a term increasingly used by the Europeans (probably borrowed from the EU acquis) to denote the current set of norms, CBMs and CB measures agreed thus far. GGE Chair also used the term to emphasise that the acquis is the base, that shouldn't be re-opened. Another word to add to our Speech Generator, for France and EU partners at least

      ||Pavlina||||AndrijanaG||||MariliaM||

    8. recognize the full applicability of International Law to cyberspace.

      Thus, the signatories in a way recognise the full applicability of IL - we can reflect this in our mapping ||Pavlina||||AndrijanaG||

    9. Programme of Action for advancing responsible State behaviour in cyberspace

      France with 40 other countries (Western Alliance mainly still) publishes the proposal for a Programme of Action, which would replace GGE and OEWG after their mandate.

      Good coverage of what this could mean is at https://directionsblog.eu/a-new-un-path-to-cyber-stability/

      ||Jovan||||Pavlina||||MariliaM||||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. US and some other countries to politicize the issue of data security

      Re. TikTok. Interestingly, now China is (nominally) becoming in favour of free flow of data, while US and EU are calling for data sovereignty? Link with WTO? ||Jovan||||MariliaM||

    2. China supports the work of the UN OEWG and UN GGE and hope that these processes will make further progress

      China supports GGE and OEWG, yet no clear connection between those and the rule-making on data security is made: is this a suggested follow-up, a parallel process, part of the two?

    3. data security

      China frames cybersecurity debates as 'data security' also in the UN 1st Committee now, after their Global Initiative on Data Security (which has no reference to any UN process whatsoever)

      We may update our Speech Generator database with these new Chinese lingo and positions

      ||Jovan||||AndrijanaG||||Pavlina||||MariliaM||

    4. develop a set of international rules on data security

      China calls to 'develop new rules', on data security. Indeed, none of the existing rules are about 'data security'!

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Sep 2020
    1. ||VladaR|| This statement by Russia has a few elements:

      • confidence-building on the working/expert level
      • practical solutions
      • borrowing experience and expertise from the USA-Russia cooperation in the nuclear disarmament field.
      • while moving bilaterally - also proposing global agreement.

      ||sorina|| ||StephanieBP|| ||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. development and security

      Development component is emphasized in the security context. This buys support of various developing countries.

    2. data security

      Framing of cyber(in)security as data security. On one hand, disconnecting from other ongoing processes, which allows placing other items in; on the other - would it be also more appealing to the 'opponents' which raise security of data over 5G networks as the key concern?

    3. boosting users' confidence

      Indeed, user confidence in digital products and services is enhanced with secure and stable supply chain. Unexpected but well placed argument.

    4. new development of international division of labor

      Interesting phrase to support global supply chain and technological inter-dependence

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL