C5. Building confidence and security in the use of ICTs
Confidence and security are among the main pillars of the Information Society.

C5. Building confidence and security in the use of ICTs

 Confidence and security are among the main pillars of the Information Society.

  

  1. Promote cooperation among the governments at the United Nations and with all stakeholders at other appropriate fora to enhance user confidence, build trust, and protect both data and network integrity; consider existing and potential threats to ICTs; and address other information security and network security issues.

  2. Governments, in cooperation with the private sector, should prevent, detect and respond to cyber-crime and misuse of ICTs by: developing guidelines that take into account ongoing efforts in these areas; considering legislation that allows for effective investigation and prosecution of misuse; promoting effective mutual assistance efforts; strengthening institutional support at the international level for preventing, detecting and recovering from such incidents; and encouraging education and raising awareness.

  3. Governments, and other stakeholders, should actively promote user education and awareness about online privacy and the means of protecting privacy.

  4. Take appropriate action on spam at national and international levels.

  5. Encourage the domestic assessment of national law with a view to overcoming any obstacles to the effective use of electronic documents and transactions including electronic means of authentication.

  6. Further strengthen the trust and security framework with complementary and mutually reinforcing initiatives in the fields of security in the use of ICTs, with initiatives or guidelines with respect to rights to privacy, data and consumer protection.

  7. Share good practices in the field of information security and network security and encourage their use by all parties concerned.

  8. Invite interested countries to set up focal points for real-time incident handling and response, and develop a cooperative network between these focal points for sharing information and technologies on incident response.

  9. Encourage further development of secure and reliable applications to facilitate online transactions.

  10. Encourage interested countries to contribute actively to the ongoing United Nations activities to build confidence and security in the use of ICTs.

CONTEXT(Help)
-
International EA and BA for Pattern Identification »International EA and BA for Pattern Identification
Transforming the World - A strategy »Transforming the World - A strategy
3 Innovate and Transform Category 30 »3 Innovate and Transform Category 30
Transformation for International Strategy »Transformation for International Strategy
Strategy Approaches »Strategy Approaches
A way to manage the implicit order while accelerating explicit order »A way to manage the implicit order while accelerating explicit order
Plan and Execute the use of tools for Implicit in the Explicit Order »Plan and Execute the use of tools for Implicit in the Explicit Order
Sustainable Development Practical Theory »Sustainable Development Practical Theory
Cross Cutting Service Roles - Service Offers  »Cross Cutting Service Roles - Service Offers
Education »Education
Workforce Development  »Workforce Development
Frameworks »Frameworks
Cybernetics Minimum Viable System Model »Cybernetics Minimum Viable System Model
MVSM - Planning  »MVSM - Planning
Communications Strategy and Delivery Mechanisms »Communications Strategy and Delivery Mechanisms
Call to Action - Now »Call to Action - Now
Answering the Call to Action  »Answering the Call to Action
WSIS From Vision to Action »WSIS From Vision to Action
2014 WSIS Stocktaking Report »2014 WSIS Stocktaking Report
C1. The role of governments and all stakeholders in ICTs »C1. The role of governments and all stakeholders in ICTs
C.10. Ethical Dimensions  »C.10. Ethical Dimensions
WSIS 1. Leave No One Behind »WSIS 1. Leave No One Behind
C.8. Cultural Diversity and  »C.8. Cultural Diversity and
C11. International and regional cooperation »C11. International and regional cooperation
C5. Building confidence and security in the use of ICTs
Few User Designed Models exist »Few User Designed Models exist
Upgrade Lifeline Program with Smart or 4g devices for Internet for all »Upgrade Lifeline Program with Smart or 4g devices for Internet for all
WSIS 1. Leave No One Behind »WSIS 1. Leave No One Behind
+Comments (0)
+Citations (0)
+About