{"id":78671,"date":"2015-09-09T08:52:54","date_gmt":"2015-09-09T13:52:54","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=78671"},"modified":"2017-04-07T19:54:02","modified_gmt":"2017-04-08T00:54:02","slug":"quick-look-recommendations-norms-behaviour-ict-countries","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2015\/09\/quick-look-recommendations-norms-behaviour-ict-countries\/","title":{"rendered":"Quick look: New UN recommendations on norms of behaviour for ICT by countries"},"content":{"rendered":"

A summary of the norms, rules and principles for the responsible behaviour that countries worldwide should adopt for ICT in the context of national security.<\/em>
\nIn July 2015, the United Nations (UN) Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security published a report, Developments in the field of information and telecommunications in the context of international security<\/em>. The UN GGE comprises representatives of 20 countries worldwide, and the resulting report sought to examine current and potential threats arising from the use of ICTs by States and to propose actions countries should implement to address those threats, \u201cincluding norms, rules, principles and confidence-building measures<\/em>\u201d (Source: UN<\/a>). Additionally, the Group examined how international law applies to the use of ICTs by countries.<\/p>\n

With regard to existing and future threats and from a national security perspective, the Group highlighted that critical infrastructure is where countries are most vulnerable to cyber-threats and incidents. It was also noted that there has been \u201ca dramatic increase in incidents involving the malicious use of ICTs by State and non-State actors<\/em>\u201d (Source: UN<\/a>).<\/p>\n

In light of the above threats, and in its report<\/a>, the GGE made the following recommendations of norms, rules and principles for the responsible behaviour that countries should adopt, which are summarised below:<\/p>\n

    \n
  1. States should cooperate in developing and applying measures to increase stability and security in the use of ICTs<\/li>\n
  2. In case of ICT incidents, States should consider all relevant information,<\/li>\n
  3. States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs<\/li>\n
  4. States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs<\/li>\n
  5. In ensuring the secure use of ICTs, States should respect Human Rights Council resolutions on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions on the right to privacy in the digital age<\/li>\n
  6. States should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages or otherwise impairs critical infrastructure<\/li>\n
  7. States should take appropriate measures to protect their critical infrastructure from ICT threats<\/li>\n
  8. States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts.<\/li>\n
  9. States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products<\/li>\n
  10. States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities<\/li>\n
  11. States should not conduct or knowingly support activity to harm the information systems of the authorized computer emergency response teams or cybersecurity incident response teams of another State.<\/li>\n<\/ol>\n

     <\/p>\n

    Image credit: \u00a0ammer (FreeDigitalPhotos.net<\/a>)<\/em><\/p>\n

    ___________<\/p>\n","protected":false},"excerpt":{"rendered":"

    A summary of the norms, rules and principles for the responsible behaviour that countries worldwide should adopt for ICT in the context of national security. In July 2015, the United […]<\/p>\n","protected":false},"author":2,"featured_media":18684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[27,11],"tags":[105,32,15],"class_list":["post-78671","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computing","category-ict-tech","tag-cybercrimecybersecurity","tag-information-society","tag-trends","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2013\/05\/Magnifying-Glass-by-ammer-FreeDigitalPhotos.net_.jpg?fit=339%2C370&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-ksT","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/78671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=78671"}],"version-history":[{"count":3,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/78671\/revisions"}],"predecessor-version":[{"id":97066,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/78671\/revisions\/97066"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/18684"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=78671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=78671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=78671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}