Link[1] International Strategy for Cyberspace – Prosperity, Security, and Openness in a Networked World
Citerend uit: Barack Obama - May 2011 Geciteerd door: David Price 9:10 PM 29 October 2011 GMT
Citerank: (13) 121601Safeguard legitimate expression against censorshipSafeguards must be in place to prevent censorship of legitimate content in cyberspace. Ensuring lawful access for users without discrimination or interference.959C6EF, 121671Appropriate principles of behaviourDeveloping and applying appropriate principles of behaviour.8FFB597, 121676Ensuring reliable accessEnsuring reliable and resillient access to cyberspace.8FFB597, 121757Cyberspace is no longer a lawless frontierThe digital world is no longer a lawless frontier, nor the province of a small elite. It is a place where the norms of responsible, just and peaceful conduct among states and peoples have begun to take hold.13EF597B, 121823Intellectual property theft threatens national competitiveness1198CE71, 121824Intellectual property theft undermines innovation1198CE71, 121836End-to-end, worldwide interoperability of the Internet959C6EF, 121883States reserve right to respond by all means necessaryStates possess an inherent right to self-defense, and reserve the right to use all necessary means—diplomatic, informational, military, and economic—as appropriate and consistent with applicable international law iin response to cyberattacks.1198CE71, 121884Open, secure, and reliable cyberspace should be available to allThe virtues of an open, interoperable, secure, and reliable cyberspace should be more available than they are today.959C6EF, 121887Economic policy959C6EF, 121893Stolen IP can amount to billions of dollars of lost valueStolen information and technology can equal billions of dollars of lost value.1198CE71, 121895Harmonize cybercrime laws internationallyHarmonize cybercrime laws internationally by expanding accession to the Budapest Convention.959C6EF, 121901Denounce those who threaten free expression / associationDenounce those who harass, unfairly arrest, threaten, or commit violent acts against the people who use these technologies.109FDEF6 URL:
|
Fragment- States do not, and should not have to choose between the free flow of information and the security of their networks. The best cybersecurity solutions are dynamic and adaptable, with minimal impact on network performance. These tools secure systems without crippling innovation, suppressing freedom of expression or association, or impeding global interoperability. In contrast, we see other approaches—such as national-level filters and firewalls—as providing only an illusion of security while hampering the effectiveness and growth of the Internet as an open, interoperable, secure, and reliable medium of exchange.The same is true commercially; cyberspace must remain a level playing field that rewards innovation, entrepreneurship, and industriousness, not a venue where states arbitrarily disrupt the free flow of information to create unfair advantage. The United States is committed to international initiatives and standards that enhance cybersecurity while safeguarding free trade and the broader free flow of information, recognizing our global responsibilities, as well as our national needs. |