14 Matching Annotations
  1. Last 7 days
  2. Jul 2022
    1. Title: Resolution on Safeguarding Humanitarian Data

      Resolution on Safeguarding Humanitarian Data addresses the centrality of data for humanitarian actions. It reiterates previous initiatives and resolutions of the International Red Cross and Red Crescent Movement.

      Here are a few key points from the resolution:

      • unauthorised access to data could undermine the principle of impartiality of humanitarian organisations;
      • states and other actors should respect humanitarian purpose of data;
      • work on a digital emblem as a sign to identify data of humanitarian organisations;
      • apply humanitarian principles online as it is done offline.

      Data breaches put humanitThe data breach against the Movement discovered this year has highlighted a growing trend in cyber-operations targeted at humanitarian organisations. Data breaches risk causing severe consequences for the people those organisations serve – those that are already among the most vulnerable. The Movement will reaffirm its commitment and responsibility to implement data protection rules and cyber security measures. It will also emphasize the urgency of protecting humanitarian data and send a call from the Movement to States and other actors to protect humanitarian organisations online as they do offline.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. May 2022
    1. Global Cross-Border Privacy Rules Declaration aims to extend the current APEC Cross-Border Privacy Rules (CBPR) system worldwide.

      It is also an attempt to address the need for a regulatory framework for the cross-border flow of data. The current CBPR system used by APEC countries has been developed over the last 10 years with an international certification system, standard development, etc.

      The declaration is signed by Canada, Japan, the Republic of Korea, the Philippines, Singapore, Chinese Taipei, and the United States of America.

    2. Global Cross-Border Privacy Rules Declaration aims to extend the current APEC Cross-Border Privacy Rules (CBPR) system worldwide.

      It is also an attempt to address the need for a regulatory framework for the cross-border flow of data. The current CBPR system used by APEC countries has been developed over the last 10 years with an international certification system, standard development, etc.

      The declaration is signed by Canada, Japan, the Republic of Korea, the Philippines, Singapore, Chinese Taipei, and the United States of America.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  4. Apr 2022
    1. TITLE: Encyclical LAUDATO SI - On Care for our common home - by Pope Francis

      TEXT: Laudato si' (Praise Be to You) is Pope Francis's encycical with subtitle "on care for our common home".

      In encyclical, the pope critiques consumerism and irresponsible development, laments environmental degradation and global warming. He also sets the basis for his approach towards new technologies.

      24 May 2015

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. United Nations Charter

      The Charter of the United Nations is the founding document of the United Nations. It was signed on 26 June 1945, in San Francisco, at the conclusion of the United Nations Conference on International Organization, and came into force on 24 October 1945.

      The United Nations can take action on a wide variety of issues due to its unique international character and the powers vested in its Charter, which is considered an international treaty. As such, the UN Charter is an instrument of international law, and UN Member States are bound by it. The UN Charter codifies the major principles of international relations, from sovereign equality of States to the prohibition of the use of force in international relations.

      Since the UN's founding in 1945, the mission and work of the Organization have been guided by the purposes and principles contained in its founding Charter, which has been amended three times in 1963, 1965, and 1973.

      24 October 1945

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Journal of Moral Theology dedicated special issue on 'artificial intelligence'.

      An Introduction to the Ethics of Artificial Intelligence Matthew J. Gaudet

      Artificial Intelligence and Moral Theology: A Conversation Brian Patrick Green, Matthew Gaudet, Levi Checketts, Brian Cutter, Noreen Herzfeld, Cory Labrecque, Anselm Ramelow, OP, Paul Scherz, Marga Vega, Andrea Vicini, SJ, Jordan Joseph Wales

      Artificial Intelligence and Social Control: Ethical Issues and Theological Resources Andrea Vicini, SJ

      Can Lethal Autonomous Weapons Be Just? Noreen Herzfeld

      We Must Find a Stronger Theological Voice: A Copeland Dialectic to Address Racism, Bias, and Inequity in Technology John P. Slattery

      Can a Robot Be a Person? De-Facing Personhood and Finding It Again with Levinas Roberto

      Metaphysics, Meaning, and Morality: A Theological Reflection on A.I. Jordan Joseph Wales

      The Vatican and Artificial Intelligence: An Interview with Bishop Paul Tighe by Brian Patrick Green

      Epilogue on AI and Moral Theology: Weaving Threads and Entangling Them Further Brian Patrick Green

      Source: https://jmt.scholasticahq.com/article/34133-table-of-contents-journal-of-moral-theology-vol-11-special-issue-no-1-spring-2022-artificial-intelligence

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: UN Cybercrime Convention (draft by Russian Federation)

      CONTENT: Russian Federation submitted a proposed text for the UN Cybercrime Convention. It is used as one of inputs for negotiations.

      DATE: 29 June 2021

      TOPIC: cybercrime

      PROCESS: Negotiations of the UN Cybercrime Convetnion

      COUNTRY: Russia

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: EU's Digital Market Act (DMA)

      CONTENT: Digital Market Act (DMA) aims to ensure proper functioning of the EU internal market by 'promoting effective competition in digital markets and in particular a fair and contestable online platform environment.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Cybersecurity of EU institutions, bodies and agencies - Special Report by European Court of Auditors

      CONTENT: The audited report of the cybersecurity of EU institutions, bodies and agencies (EUIBAs) concluded that EUIBAs' cyber preparedness is not adequate to cyber threats. It based this conclusion on the following elements:

      • increase level of cyber attacks of EUIBAs in times of pandemic and security crisis. The risk exposure is not likely to stop given global dynamcis.
      • cyber risks are based on technical interconnectenes of EUIBAs (networks, servers). Technical interdependence is not followed by organisational and human one. There is lack of synergies on projects, tools and platforms such as email or videoconferencing.
      • cybersecurity governance is lacking: strategies, policies, risk assessment, etc.
      • cybersecurity training is not always systematic.
      • two main cybersecurity institutions The Computer Emergency Response Team of the EUIBAs (CERT-EU) and the European Union Agency for Cybersecurity (ENISA) are not adequately supported for cybersecurity challenges they face.

      Report proposes a few immediate steps:

      • legal framework for cybersecurity binding rules for all EUIBAs
      • increased resources for CERT-EU
      • promotion of synergies via the Institutional Committee for the Digital Transoformation
      • focus work on CERT-EU and ENISa on the less cybersecurity mature EUIBAs.
    2. TITLE: Cybersecurity of EU institutions, bodies and agencies - Special Report by European Court of Auditors

      CONTENT: The audited report of the cybersecurity of EU institutions, bodies and agencies (EUIBAs) concluded that EUIBAs' cyber preparedness is not adequate to cyber threats. It based this conclusion on the following elements:

      • increase level of cyber attacks of EUIBAs in times of pandemic and security crisis. The risk exposure is not likely to stop given global dynamcis.
      • cyber risks are based on technical interconnectenes of EUIBAs (networks, servers). Technical interdependence is not followed by organisational and human one. There is lack of synergies on projects, tools and platforms such as email or videoconferencing.
      • cybersecurity governance is lacking: strategies, policies, risk assessment, etc.
      • cybersecurity training is not always systematic.
      • two main cybersecurity institutions The Computer Emergency Response Team of the EUIBAs (CERT-EU) and the European Union Agency for Cybersecurity (ENISA) are not adequately supported for cybersecurity challenges they face.

      Report proposes a few immediate steps:

      • legal framework for cybersecurity binding rules for all EUIBAs
      • increased resources for CERT-EU
      • promotion of synergies via the Institutional Committee for the Digital Transoformation
      • focus work on CERT-EU and ENISa on the less cybersecurity mature EUIBAs.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The United States has announced the Indo-Pacific Strategy (February 2022) calling for a free and open, connected, prosperous, secure, and resilient Indo-Pacific region. This strategy aims to limit China's growing influence in the region.

      The Strategy includes prominent digital and cyber elements, as shown below.

      Cross-border data is one pillar of this strategy's commerce aspect. The two other pillars are high labor standards and high environmental standards.

      The call for Open RAN Standards and Technologies aims at limiting the dominance by Huawei proprietary standards for 5G networks.

      Regional digital connectivity in Indo-Pacific with a link to EuroAtlantic regional networks are key infrastructural elements of the Strategy. US digital foreign policy is focusing its attention on two key strategic regions: Indo-Pacific, and Euro-Atlantic.

      In cybersecurity, the strategy calls for "new regional initiatives to improve collective cybersecurity and rapidly respond to cyber incidents." The strategy also calls for the mitigation of online radicalization.

      The Quad is called to support building cyber capacities in South and Southeast Asia and the Pacific Islands.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  5. Mar 2022