C5. Building confidence and security in the use of ICTs

Confidence and security are among the main pillars of the Information Society.

C5. Building confidence and security in the use of ICTs

 Confidence and security are among the main pillars of the Information Society.

  

  1. Promote cooperation among the governments at the United Nations and with all stakeholders at other appropriate fora to enhance user confidence, build trust, and protect both data and network integrity; consider existing and potential threats to ICTs; and address other information security and network security issues.

  2. Governments, in cooperation with the private sector, should prevent, detect and respond to cyber-crime and misuse of ICTs by: developing guidelines that take into account ongoing efforts in these areas; considering legislation that allows for effective investigation and prosecution of misuse; promoting effective mutual assistance efforts; strengthening institutional support at the international level for preventing, detecting and recovering from such incidents; and encouraging education and raising awareness.

  3. Governments, and other stakeholders, should actively promote user education and awareness about online privacy and the means of protecting privacy.

  4. Take appropriate action on spam at national and international levels.

  5. Encourage the domestic assessment of national law with a view to overcoming any obstacles to the effective use of electronic documents and transactions including electronic means of authentication.

  6. Further strengthen the trust and security framework with complementary and mutually reinforcing initiatives in the fields of security in the use of ICTs, with initiatives or guidelines with respect to rights to privacy, data and consumer protection.

  7. Share good practices in the field of information security and network security and encourage their use by all parties concerned.

  8. Invite interested countries to set up focal points for real-time incident handling and response, and develop a cooperative network between these focal points for sharing information and technologies on incident response.

  9. Encourage further development of secure and reliable applications to facilitate online transactions.

  10. Encourage interested countries to contribute actively to the ongoing United Nations activities to build confidence and security in the use of ICTs.

RELATED ARTICLESExplain
International EA and BA for Pattern Identification
Transforming the World - A strategy
3 Innovate and Transform Category 30
Transformation for International Strategy
Strategy Approaches
A way to manage the implicit order while accelerating explicit order
Plan and Execute the use of tools for Implicit in the Explicit Order
Sustainable Development Practical Theory
Cross Cutting Service Roles - Service Offers
Education
Workforce Development
Frameworks
Cybernetics Minimum Viable System Model
MVSM - Planning
Communications Strategy and Delivery Mechanisms
Call to Action - Now
Answering the Call to Action
WSIS From Vision to Action
2014 WSIS Stocktaking Report
C1. The role of governments and all stakeholders in ICTs
C.10. Ethical Dimensions
WSIS 1. Leave No One Behind
C.8. Cultural Diversity and
C11. International and regional cooperation
C5. Building confidence and security in the use of ICTs
Few User Designed Models exist
Upgrade Lifeline Program with Smart or 4g devices for Internet for all
WSIS 1. Leave No One Behind
MESA Model Program Youth Led on Climate Change
Graph of this discussion
Enter the title of your article


Enter a short (max 500 characters) summation of your article
Enter the main body of your article
Lock
+Comments (0)
+Citations (0)
+About
Enter comment

Select article text to quote
welcome text

First name   Last name 

Email

Skip