Operationalizing data free flow with trust | IGF 2023 WS #197

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Audience

During a recent discussion on global data flow, stakeholders expressed concerns and perspectives on various aspects of the issue. Daichi, an operator of a local IXP in Japan, questioned the need for establishing a new authority to verify data flow and encryption. This highlights the importance of ensuring transparency and accountability in data handling processes.

Javier Reed from Consumers International emphasized the significance of implementing a redress system in data free flows. This system would enable consumers to seek resolution if any issues arise. It underlines the need for adequate safeguards and mechanisms to protect consumers’ rights and interests.

Jameson Olufi from Africa ICT Alliance highlighted the challenge of data access in the US, particularly regarding the General Data Protection Regulation (GDPR) and its impact on intellectual property. This concern emphasizes the need to balance data protection regulations with facilitating access to data for innovation and economic growth.

Masanobu Kato, representing the private sector, emphasized the role of businesses in proposing solutions for data flow and the potential of trust services. This emphasizes the importance of collaboration between stakeholders in developing effective strategies and frameworks for secure and reliable data flow.

An anonymous academic drew attention to the potential effects of data flow with trust schemes on geopolitical tensions. This observation highlights the significance of considering the broader implications and risks associated with global data flow.

Shota Watanabe from a Japanese think tank raised the question of identifying the most suitable forum for operationalizing Data Free Flow with Trust (DFFT). This highlights the need for careful consideration to avoid duplicating debates and ensure effective implementation of relevant policies and frameworks.

Lastly, Narayan from Nepal proposed the need for common regulations and collaborations to address privacy, security, and intellectual property issues in cross-border data flow. This suggestion emphasizes the importance of international cooperation and the development of cohesive regulatory frameworks to address the complex challenges posed by data flow across borders.

In conclusion, the discussion on global data flow highlighted concerns and perspectives from various stakeholders. These include the need for transparency, the importance of consumer redress systems, challenges of data access within regulatory frameworks, the role of businesses in proposing solutions, the potential impact on geopolitical tensions, identification of suitable forums for operationalization, and the necessity for common regulations and collaborations.

Raúl Echeberría

In today’s data-driven society, our reliance on data is evident. Almost all aspects of our daily lives, such as health services, government services, marketplaces, and e-commerce, are heavily reliant on data. This emphasises the fact that we live in a society where data is the foundation of our services.

The free flow of data is crucial for ensuring that these services are accessible and beneficial to all individuals. In order to reduce inequalities and achieve the Sustainable Development Goals (SDGs), it is essential that there is unrestricted data flow. This means that policies and frameworks need to be established to facilitate and support the free flow of data.

While promoting data flow is important, it is equally important to protect the rights and privacy of individuals. Legal frameworks should be put in place to ensure the safe and secure transfer of data without impeding its flow. These frameworks should strike a balance between enabling data flow and safeguarding the privacy of individuals, creating an environment that encourages responsible data handling practices.

To ensure a secure flow of data, effective local, regional, and global policies need to be developed. These policies should address the challenges associated with data flow and establish standards for secure data transmission. It is vital that data flow is seen as the norm, rather than the exception. By implementing robust policies, we can foster an environment that promotes the free exchange of data and encourages innovation and digital development.

However, there are instances where restrictive policies hinder the free flow of data. These policies prevent individuals from benefiting from digital advancements and impede progress. Policymakers need to be aware of the consequences of such restrictions and strive to create an environment that fosters digital development for all.

In addition to policies that directly impact data flow, other factors can also contribute to internet fragmentation. Policies related to infrastructure, taxes, or content moderation, if not carefully implemented, can lead to fragmentation. A fragmented internet poses a significant barrier to the uninterrupted flow of data, affecting the functioning of digital services.

Addressing these challenges requires collaboration between policymakers and stakeholders. Working together, we can develop effective policies and frameworks that facilitate data flow while ensuring the protection of individual rights. The commitment and cooperation of all stakeholders, including governments, businesses, and civil society, are essential in promoting discussions and finding solutions that benefit everyone.

In summary, data flow is fundamental to our modern society, as it underpins almost all aspects of our lives. Establishing policies and frameworks that support the free flow of data, while protecting individual rights, is crucial. Collaboration and commitment from all stakeholders are key to overcoming challenges and creating an environment that promotes data flow and digital development for all.

David Pendle

The fear of government access to data is identified as a significant threat to the free flow of data with trust. Microsoft’s law enforcement national security team receives just over 50,000 requests from governments each year for user data, contributing to a growing mistrust. Fragmentation of the internet, driven by laws motivated by concerns over privacy, sovereignty, or access to data, deepens this lack of trust.

To address these concerns and foster trust in data flows, interoperable multilateral frameworks are deemed necessary. The Organisation for Economic Co-operation and Development (OECD) process, led by Japan, brings together 38 countries to establish shared principles for data access. These principles include considering legitimate aims, obtaining prior approval, and incorporating oversight and transparency. The United States is actively negotiating data access agreements, and many countries have signed the second additional protocol.

Recognising the importance of balancing privacy and security, technology providers play a critical role as guardrails to ensure that requests for customer data are lawful, compulsory, and align with fundamental rights. While responding to data requests for public safety reasons is necessary, safeguards must protect individual privacy and prevent unwarranted access by governments.

Transparency is essential in establishing accountability within the data ecosystem. Users should be notified when their data is requested, keeping them informed about access to their information. Providers must regularly update statistics to illustrate the actual requests they receive. Transparency reports, published every six months or more frequently, showcase actions taken and promote a higher level of accountability in data handling practices.

Providers should not be compelled to violate the laws of one country to comply with another. Conflicts of laws present a significant challenge, but legal provisions like the comedy challenge in the US allow companies to challenge demands conflicting with laws in other jurisdictions. Companies report these cross-border requests through transparency reports every six months, ensuring the public is aware of the circumstances and potential conflicts.

Establishing more multilateral agreements concerning data requests and privacy is crucial for effective data governance. While bilateral agreements have been pursued, relying solely on them would be lengthy and cumbersome. Implementing more multilateral agreements streamlines data governance, reduces barriers, and facilitates a smoother exchange of data.

Further broad participation and inclusion in discussions concerning data requests and privacy is necessary. The OECD has made efforts to bring diverse voices to the table, incorporating perspectives from privacy advocates, data regulators, law enforcement agencies, national security officials, civil society organizations, and businesses. This inclusivity ensures that various opinions and concerns are considered, guiding the development of comprehensive and balanced policies.

In summary, the fear of government access to data poses a threat to the free flow of data with trust. Microsoft’s statistics highlight the extent of government requests for user data, raising concerns around privacy and trust. To address these fears, interoperable multilateral frameworks, such as the OECD process and data access agreements, are essential. Balancing privacy and security is crucial, with technology providers acting as safeguards. Transparency and accountability are vital in building trust in the data ecosystem. Providers should not be forced to violate one country’s laws to comply with another’s. More multilateral agreements and broader participation are needed to effectively address data requests and privacy concerns.

Maarit Palovirta

The analysis examines various key insights concerning the movement of data in networks, privacy regulations, regulatory coherence, regulatory certainty, geopolitics, and the global market.

Firstly, it highlights that innovations such as virtualisation, cloudification, and 5G are influencing data traffic patterns, resulting in increased cross-border data movement. This suggests a shift in the way data is transported through networks operated by telecom companies. These advancements are seen as positive, as they enable more efficient and effective data exchange globally.

Moving on to privacy regulations, it is noted that the implementation of the General Data Protection Regulation (GDPR) has led to improved trust among citizens worldwide. The GDPR has not only provided a global model for privacy regulations, but it has also inspired other countries to adopt similar frameworks. The sentiment towards this development is positive, as it highlights the importance of maintaining and enhancing trust in the digital space. Furthermore, it emphasises that the internet will only continue to thrive as long as people perceive it to be trustworthy.

In terms of regulatory coherence, it is highlighted that a common basis is needed to promote simplified and harmonised regulations on a global scale. The analysis argues that the implementation of diverse policies across different regions can potentially lead to internet fragmentation, which poses risks to the seamless flow of information. Therefore, some level of interoperability between regulations is deemed necessary to address this challenge.

The significance of regulatory certainty is also addressed within the analysis. It points out that stability for businesses in the private sector is provided through agreements such as data free flow area agreements established by European policymakers with various countries. These agreements, which ensure the free flow of data, offer regulatory certainty to businesses. The sentiment towards this development is positive, as it recognises the importance of predictable and consistent regulatory frameworks for fostering innovation and growth within the private sector.

The analysis touches upon the impact of geopolitics on the telecommunications sector, highlighting that there is a delicate balance between promoting regional competitiveness and avoiding protectionism. Geopolitics is described as being the flavour of the day in several sectors, suggesting that political factors play a significant role in shaping the dynamics of the telecommunications industry. This observation is neutrally presented, indicating that further examination may be required to fully understand the implications of geopolitics in this context.

Furthermore, it is underlined that the global market is crucial for the majority of industries and private sector organisations. The analysis asserts that increasing third-party engagement for cross-border data traffic is essential for sustainable economic growth, aligning with the goal of achieving decent work and economic growth as outlined in Sustainable Development Goal 8.

Lastly, the importance of developing common principles and avoiding the duplication of regulations is emphasised. It is argued that existing regulations in Europe should serve as a foundation, rather than being replicated, in order to achieve regulatory efficiency and avoid unnecessary bureaucracy. This notion is positively viewed as it highlights the need for collaboration and streamlined approaches in regulatory frameworks.

In conclusion, the analysis sheds light on various aspects related to the movement of data, privacy regulations, regulatory coherence, regulatory certainty, geopolitics, and the global market. It underscores the positive impact of innovations such as virtualisation, cloudification, and 5G on data traffic patterns, as well as the positive effects of the GDPR on global privacy regulations. Furthermore, it stresses the necessity of regulatory coherence and simplification on a global scale to prevent internet fragmentation. The importance of regulatory certainty for businesses in the private sector is highlighted, along with the delicate balance between promoting regional competitiveness and avoiding protectionism. The analysis acknowledges the indispensable nature of the global market for most industries and private sector organisations, while also recognising the need for developing common principles and avoiding duplication of regulations.

Sheetal Kumar

The analysis covers various topics related to data governance and protection, providing valuable insights into the key issues and discussions surrounding these areas.

One of the main points highlighted is the importance of a human rights-based approach to data. The analysis emphasizes that frameworks underpinned by human rights principles provide clarity and protection. It also mentions that data protection legislation embodies many required principles. It is argued that cross-border data sharing agreements should reflect human rights standards. This supports the conclusion that a human rights-based approach is crucial for ethical and responsible data governance.

Another important point made in the analysis is the need for inclusive and diverse participation in data governance. It is argued that more digital rights, civil society, and consumer groups should be involved in decision-making processes related to data governance. The analysis suggests that the role of civil society should be reflected in operationalizing frameworks such as the data free flow with trust framework. This highlights the importance of considering a wide range of perspectives and voices in shaping data governance practices.

The analysis also raises concerns about the trend of data localization. It states that reasons and effects of data localization can vary but highlights a World Economic Forum paper that shows data localization does not necessarily help grow the local economy. It further explains that data localization can lead to surveillance and harm rights within a country. This raises the need to carefully consider the implications of data localization and seek alternative approaches that balance security and privacy concerns.

Equitable access to data and the necessary infrastructure are also identified as crucial factors in data governance. The analysis highlights that while data itself is not valuable without interpretation and analysis, there is a lack of equitable access to data and the ability to use it in certain parts of the world. Investment is seen as needed to make use of data in sectors such as health. This highlights the importance of ensuring equal opportunities for access to data and the necessary resources to leverage its potential.

In terms of data security, the analysis emphasizes the importance of technical and legal measures. Encryption is highlighted as an integral part of a security infrastructure for data, whether it is data in transit or data being stored. This underscores the need for robust security measures to protect sensitive data and mitigate the risks of unauthorized access or breaches.

Noteworthy observations from the analysis include the need for thorough assessments of proposed measures before implementation. It is argued that such assessments are crucial to ensure that the measures achieve their intended effect and do not inadvertently increase insecurity. This highlights the importance of evidence-based decision-making and avoiding hasty actions that may have unintended consequences.

The analysis also emphasizes the significance of open and engaged discussions involving a wide range of stakeholders. It suggests that discussions related to e-commerce, trade, data flows, and data protection are not widely accessible or understood. Therefore, openness and engagement from diverse stakeholders are seen as essential in shaping effective and inclusive policies and frameworks.

Overall, the analysis provides a comprehensive overview of the key issues and considerations in data governance and protection. It highlights the importance of a human rights-based approach, inclusive participation, equitable access, robust security measures, and thorough assessments of proposed measures. These insights can inform policymakers, organizations, and individuals in making informed decisions and driving responsible data governance practices.

Carl Gahnberg

The success of the Internet can be attributed to its effective governance, management of the Domain Name System (DNS), and the development of open standards. These factors have allowed for convenient global connectivity and data flows, making the Internet a powerful tool for communication and innovation. The Internet is also designed to evolve and adapt over time, ensuring it remains relevant and efficient.

However, certain regulatory policies threaten the principles of accessibility and open architecture that underpin the Internet. Countries like South Korea, India, and Brazil are discussing imposing regulations that would require online services to pay network usage fees. This could hinder the accessibility and openness of the Internet by creating barriers for smaller online services and limiting innovation.

Another threat to the Internet’s principles is the attempt to prevent the use of end-to-end encryption. Governments argue that this measure is necessary for security reasons, but it can compromise the privacy and security of users. Encryption plays a crucial role in data security and must continue to be supported to protect users’ sensitive information.

To ensure that Internet policies are effective and consider the potential consequences, it is important to include impact assessments as part of the policy formulation process. Impact assessments can help understand the outcomes and ramifications of specific policies and facilitate cross-border data flows. It is also important to preserve certain key policies, such as net neutrality, to maintain a fair and open Internet.

Discussing these important Internet issues in multiple forums is crucial. While all forums may have some barriers to participation, having multiple avenues for discussion ensures a diverse range of perspectives are heard. The Internet Governance Forum (IGF) system, which includes national and regional IGFs culminating in the global IGF annually, is an example of a platform that can facilitate these critical discussions.

Approaching Internet challenges requires a “think globally, act locally” principle. This principle, successfully employed in the environmental and security sectors, is essential when working within a global infrastructure and interacting with a global society. By considering the global context while taking local actions, we can address the challenges facing the Internet comprehensively and effectively.

In conclusion, the success of the Internet is attributed to factors such as effective governance, open standards, and convenient connectivity. However, regulatory policies that threaten accessibility and open architecture, along with attempts to hinder encryption, present challenges to the Internet’s evolution. Impact assessments, multiple forums for discussion, and the “think globally, act locally” principle are important in addressing these issues and ensuring the Internet remains a powerful tool for communication, innovation, and collaboration.

Nwakanma Nnenna

Data flows are essential for economic growth and human development as they are closely tied to human mobility and revenue generation. The value of data is derived when it is moved, processed, and utilized effectively. This positive relationship between data flows and economic growth and human development underscores the importance of data in driving progress in various sectors.

Data plays a critical role in achieving the Sustainable Development Goals (SDGs), particularly in sectors such as agriculture, health, and education, especially in developing countries. Data serves as the foundation for the SDGs, acting as both a product and a catalyst for positive change. An example of this is the International Digital Health and AI Research (IDA) initiative, which demonstrates the significance of cross-border data flows in advancing health research and ensuring quality healthcare services globally.

The successful operationalization of data flows relies on establishing trust, which should not be limited to government involvement alone. Building trust within the data ecosystem requires collaboration and collective efforts involving multiple stakeholders. Therefore, the operationalization of data flows should go beyond governmental boundaries and incorporate diverse entities, fostering trust and promoting effective data management practices.

The governance of internet and free data flows has been criticized for its US and EU-centric approach. It is important to note that the US and EU represent only a small portion of the world’s population, while Asia and Africa are projected to shape the future. Therefore, there is a need for more inclusive and globally representative decision-making in this sphere. Mindfulness is also necessary, as focusing solely on EU-US perspectives does not constitute a holistic and comprehensive approach to internet governance and the free flow of data.

Conversations about data governance should occur in various settings, including normative and legal frameworks. These discussions should address aspects such as data governance and regulations, and establish effective frameworks to guide data practices. Holding conversations in multiple venues, considering both normative and legal dimensions, is vital to ensuring comprehensive and inclusive data governance.

Decisions on data governance should be made under the umbrella of the United Nations (UN), as suggested by Nnenna. Such an approach would facilitate global cooperation and hold stakeholders accountable for their actions. It is important to avoid restricting the conversation to the Organization for Economic Cooperation and Development (OECD) and instead create a more inclusive and representative forum, such as the UN, to address global data governance.

In conclusion, data flows are crucial for economic growth and human development. The achievement of SDGs in sectors like agriculture, health, and education heavily relies on effective data management and flow. Trust, collaboration, and inclusivity should underpin the operationalization and governance of data flows. Additionally, conversations about data governance should take place in multiple settings, and decision-making on data governance should be conducted under the auspices of the UN to ensure global accountability and representation.

Timea Suto

The analysis highlights a growing mistrust in cross-border data transfers, which has resulted in the implementation of restrictive policies such as data protectionism and data localization. These policies have led to internet fragmentation, where data flows are hindered or restricted, impacting global connectivity and the free flow of information. Concerns around national security, privacy, and economic safety have sparked this mistrust among nations.

However, there are calls for the development of horizontal, interoperable, and technologically neutral policy frameworks that can unlock the benefits of data. Such policies would aim to reinforce trust in cross-border data flows, enabling data to flow freely across borders while addressing legitimate concerns. By promoting interoperability and neutrality, these frameworks can boost innovation, competitiveness, and economic growth by facilitating the exchange and collaboration of data across different regions and sectors.

One significant move against internet fragmentation is the concept of Data-Free Flows with Trust, which was coined by Japan. This concept was introduced a few years ago at the G20 summit and has gained attention as a potential solution to address the challenges of cross-border data flows. Efforts are underway, such as the establishment of the Institutional Arrangement for Partnership by the G7, to operationalize this concept and promote trust in data flows.

The analysis also draws an analogy between data flow and human mobility. It highlights the importance of data flow, similar to the movement of people, in generating revenue, driving economic growth, and fostering development. Data is deemed necessary in critical areas such as health, education, and agriculture, supporting advancements in fields like AI research and digital health. The parallel between data flow and human mobility underscores the significance of data in promoting economic and social progress.

Furthermore, trust for data flow is seen as a product of dialogue and cooperation among stakeholders, akin to the aviation business where various entities such as governments, airline operators, and law enforcement work together to ensure a secure and efficient system. Building trust in data flow requires collaborative efforts and an understanding of the responsibilities and roles of different actors.

While recognizing the importance of data flow for development, the analysis also highlights the need to consider policy measures and thinking around data in a holistic fashion. This ecosystem view is essential to avoid inadvertent consequences that may arise from one-dimensional or fragmented policies. Taking into account the various dimensions and interconnectedness of data governance can lead to more effective and balanced approaches.

In conclusion, the analysis emphasized the challenges posed by growing mistrust in cross-border data transfers. However, it also highlighted potential solutions such as developing technologically neutral policy frameworks, promoting the Data-Free Flows with Trust concept, and recognizing the importance of data flow for development. By fostering trust, cooperation, and a holistic approach to policy-making, nations can unlock the full potential of data and promote global connectivity, innovation, and sustainable growth.

Jakob Greiner

The analysis provides an in-depth examination of several important aspects related to data flows and their implications for competitiveness, innovation, trust, and security. One key finding is that over 90 percent of EU-based companies send their data to the United States. While this may be beneficial for the US, it raises concerns regarding the potential impact on Europe’s competitiveness and innovation. The heavy reliance on data flows towards the US could potentially hinder Europe’s ability to leverage its own data for economic growth and technological advancement.

Furthermore, the analysis reveals that almost 70 percent of global internet traffic runs through the proprietary networks of just a few companies. This finding highlights the need for greater balance and regulation within the internet ecosystem. With such concentration of data flow within a few companies, there is a risk of monopolistic control and potential limitations on innovation and competition. It becomes essential to ensure that data flows are more evenly distributed and that regulations are in place to prevent unfair practices.

The importance of trust and security in data flows is underscored throughout the analysis. It is argued that no data flow should occur if trust and security are compromised. The European Union (EU) has developed a stringent regulatory framework to protect the data of citizens, public bodies, and companies. Additionally, the Europe-U.S. agreement aims to establish an equal level of data protection, striking a balance between security concerns and the free flow of data. These efforts are crucial for building a foundation of trust and maintaining the integrity of data flows.

However, while emphasizing the importance of the principle of free flow of data, it is cautioned that this principle should not undermine security and trust. There is evidence to suggest that an increasing number of companies and individuals are seeking to localize their data and impose restrictions due to security concerns. This shift towards localized data and restrictions is driven by the need to safeguard sensitive information and mitigate risks associated with the access and storage of data outside Europe. This trend presents a challenge as it has the potential to impede the free flow of data and hinder global collaboration. Striking the right balance between the free flow of data and security becomes imperative in this context.

Another significant point highlighted in the analysis is the need for global alignment in data flows. To ensure trust and security, it is advocated that there should be a common approach adopted by nations to regulate data flows. This aligns with the broader objective of the Sustainable Development Goals (SDGs), particularly SDG 9 (Industry, Innovation, and Infrastructure) and SDG 17 (Partnerships for the Goals), which emphasize the importance of global cooperation and partnerships.

Moreover, the analysis reveals a conflict between different laws, making it challenging for cloud providers to adhere to regulations across borders. This emphasizes the importance of establishing global data flows that provide assurance of data accessibility while respecting and adhering to legal requirements. It is essential to find a balance that allows for seamless data flow while addressing concerns related to privacy, security, and compliance.

The analysis also stresses the significance of legal certainty for both consumers and enterprises. Ensuring clarity and harmonization of laws across nations is essential to foster an environment of trust and confidence. Legal certainty provides the necessary framework within which businesses can operate, and consumers can trust that their data is being handled appropriately.

Finally, the analysis recognizes the importance of supporting local companies in becoming global players. When local enterprises have the opportunity to expand globally, it can lead to economic growth and job creation. Incentivizing local companies to place their data on a global scale can contribute to their competitiveness and allow them to tap into new markets and opportunities.

In conclusion, the analysis presents a comprehensive overview of the various facets of data flows, their impact on competitiveness, innovation, trust, and security. It emphasizes the need for balance, regulation, and global alignment to ensure that data flows are both efficient and secure. Building trust and maintaining legal certainty are crucial aspects in this process. Ultimately, by striking the right balance and fostering international cooperation, data flows can be harnessed to unlock economic growth, promote innovation, and achieve the Sustainable Development Goals.

Session transcript

Timea Suto:
No chamber of commerce convened Yes, we’re getting at the end of the day here, Jakob. We don’t see you on the screen, but I can hear you. Now I see myself. Can you see me now? Ah, there you are. Perfect. Hello. Hi. Hello, Jakob. Hi, Nina. Hi, Carl. Good morning. Oh, sorry, afternoon. Good afternoon, evening, morning, everyone. It’s so great to have the IGF vibe again and have everyone here with us. We’re going to give it one more minute to see if anybody else still wants to walk to the door and everybody find their seats. And then we’re going to jump right through it. All right. I think we are ready here in the room in Japan. Glad to have all our online speakers with us as well. So, hi, everyone. My name is Timo Schutter. I am Global Digital Policy Lead at the International Chamber of Commerce. Welcome to the session number 197, Operationalizing Data-Free Flows with Trust, that the International Chamber of Commerce convened at this IGF. It is a topic that we’ve heard a lot about already in the past day and today and a lot more in the past years, especially amid the global health, financial and geopolitical crisis that we’ve been living through. We’ve seen how these pose risks to the very functioning of a rules-based, multilateral system and acting policy frameworks that enable the open, interconnected, and interoperable. interoperable nature of the internet has really proved essential, and we’ve talked a lot about that in the past years. Trusted global data flows are really the engine that moves the internet, that moves innovation, competitiveness, growth, and they are a powerful catalyst of socioeconomic empowerment. However, despite this agreement that we have around their usefulness and potential, we see a growing trend of mistrust in cross-border data transfers, and due to many various concerns such as national security, privacy, or economic safety, and the fear that these very important goals could be compromised if data transcends borders. And this increasingly fuels restrictive policies and measures like digital protectionism, data mercantilism, data localization, and others, which really deepen internet fragmentation, segregation, segregating information that underpins a broad range of socioeconomic activities and undermining cybersecurity protection, for example. Unilateral policies such as this exacerbate existing divides and may result in a patchwork of conflicting regulations, discouraging individuals, businesses, governments participation in a global economy. What the International Chamber of Commerce has called for repeatedly is horizontal, interoperable, and technologically neutral policy frameworks that are really able to unlock the benefits of data while respecting fundamental human rights, including the right to privacy and protecting public safety. This, in our opinion, would reinforce trust in cross-border data flows, boost additive innovation, and tap into that socioeconomic potential, the benefits that data has to offer. So there have been notable developments that progress such frameworks that go against the grain of this fragmentation of the data policy space, and there’s one of them that is the most quoted these days, with no coincidence that we are here in Japan, is the data-free flows with trust concept that Japan coined a couple of years ago at the G20 summit. Other elements that move towards this direction of enabling policy frameworks are the OECD’s Declaration on Government Access to Personal Data, held by the private sector entities, and work also in the G7 now to operationalize the FFD with the establishment of the Institutional Arrangement for Partnership. So there’s a lot of work ongoing to try and set frameworks for data governance. What we’re trying to do today with the panel here and online is to try and make sense of some of these, try and think about why we are talking of data first, secondly why we are talking about data flows, what are the potential here, what are some of the risks, and see how we move forward to truly operationalize this concept of data-free flows with trust. So with me today, online and here on the panel, I have a panel of experts that have dedicated a lot of time and thought to this topic. So without any further ado, let me introduce them real quickly and then we’ll start the conversation. So first we have with us online Ms. Nena Nakoma, board member of International Digital Health and AI Research Collaborative. Then sitting to my right, Ms. Sheetal Kumar, head of Global Engagement and Advocacy at Global Partners Digital. To my far left, Mr. Raul Echibiria, Executive Director, Latin American Internet Association. Online with us, Mr. Carl Gamberg, Director of Policy Development and Research at the Internet Society. To my far right, Mr. Dave Bundle, Assistant General Counsel, Law Enforcement and National Security at Microsoft. To my left here, Ms. Marit Paloverta, Senior Director of Auditory Affairs at the European Telecommunications Network Operators Association. And online with us as well, we have Mr. Jakob Greiner, Vice President for European Affairs at Deutsche Telekom. Thank you so much, Jakob. So to start off our conversation, I’m going to turn to first to four of our speakers and ask them to think about what are the commitments that we’ve had on cross-border data flows and how are we looking into some of these risks and fragmentations that threaten those commitments that we’ve had for maintaining data flows. What I’d like our speakers really to talk a little bit about is sharing their views, what steps have been taken so far to operationalize cross-border data flows and what are some of the necessary principles to enable this. We have a lot to go through, so without further ado, I’m going to turn first to Nnenna to discuss the importance of data flows and their implications in the development context.

Nwakanma Nnenna:
Hello, everyone. Thanks, Tamir, for having me. So I love to use illustrations. They make things come alive for us. So for those of you who traveled, you are in Kyoto. And when we’re talking about data flows, it is not very different from traveling. So you book a flight, you get to the airport. you go through security, you hop on the plane, you trust that you will arrive at your destination, which most of you have. And it is in the arrival of everyone that we can have this and other sessions. And we enrich ourselves for the whole week and we each go back to the airport, take our flights, go home and continue the work. So my visual illustration of data flows is actually the same as human flow. So flows follow flows and data flows is not very different from human flow or what we call human mobility. Now, why is this very important to me sitting in Abidjan in West Africa today? The one thing that is important to me is that there is revenue involved. There is money to be made. And this is like Timia said in her opening speech, it is about growth, it’s about growing economies, it’s about growing people, growing countries, growing continents. And as an African, this is very, very important to me. So data flows for me is first of all, a human development issue. The other point is in the SDGs, we all recall that when we were fighting for these, we said data was at the basis of the SDG, data was a product, data was a driver and all of that. So we cannot reach our development goals without data. That one is a principle that the whole world has accepted. And while we are working on these principles, that is where our session today comes in, how do we operationalize this? I come from IDA, the International Digital Health and AI Research. And everyone knows that AI is built on data. And if we don’t have… data we cannot function, whether it’s in its research. Now, applying this to health is really very important to me. We have the principles of data anonymization, I do agree. So, as IDER, our whole raison d’être is built on cross-border data flows. And I want to submit that in many developing countries, we actually need data in agriculture, we need data in education, we need data especially in health. And if data doesn’t flow, it’s like people don’t come. So, for me, data flows are very important in critical areas of development. Now, operationalizing it is why we are here. The principles, the understanding. So, I’m speaking to people who are travelers, and I want to come back to my initial illustration. We all know that International Air Travel Association exists. It is not run by government alone. There is someone here from law enforcement, there is someone here from the network operators. Network operators like airline operators, right? And then there is this guy who will check you in, who is just the national security person, right? And there’s the other one who will stamp your passport when you arrive, make sure everything is in order. It’s a whole ecosystem out there. And that is why it is important that we agree. It is not a government-only issue. And that is my biggest submission today, Tamir. I know that some governments have challenges with the internet and how it is built and how it runs. And I want to bring them back to the point that you should not be afraid. We can build trust together. Despite the fact that governments alone do not run aircraft, the aviation business still grows. Governments still get their taxes, people like me still get my miles, and you all get your photos with the pilots and all of that, and we all come to Kyoto, enrich ourselves, and go home and keep enriching ourselves. So here are my submissions. I know my minutes are few, but please let’s understand that flows follow flow, that data flows are like human mobility, we can call it data mobility, and that this is revenue creation. It is in moving, it is in confronting, it is in being used that data gets value, and this movement, this free flow of data, having it in a trusted environment is of use to every single one of us, that it is even more critical for people like me in developing countries, for someone like me in digital health, for someone like me in AI research. Thank you very much for having me. I’m glad that I can participate online, and I’m happy that I can contribute to the flows. Thank you. Thank you,

Timea Suto:
Nana. This was very inspiring, and thank you for bringing it down to very clear comparisons. I think sometimes when we talk about data flows, it’s become so esoteric, and you really made that relatable. So thank you for that, and thank you for sharing the perspective also from your home country and your own experience that sometimes is so missed in some of these conversations. And thirdly, thank you for making it clear that trust is based in dialogue and cooperation. I think we take good note of that. Shita, Nana mentioned getting back to the basics and make sure that operationalizing data flows really reiterates some of the principles that we’re all committed to. What are your views on that, and what are those commitments, the baseline principles that you think we should all make to uphold data flows?

Sheetal Kumar:
Thank you, and thanks for having me. Okay, great. Thank you, Tamea. It’s good to be here and to talk about a topic that is embedded in so many of the discussions that we’re having at the Internet Governance Forum. I wanted to highlight two points which I think are cross-cutting and important when it comes to principles. One is the importance of a human rights-based approach, and the second is the need to address trends such as data localization and the types of measures that you mentioned earlier, sovereignty, etc., that lead to or that stem from mistrust and that also affect a human rights-based approach. And then finally, I wanted to touch upon one point which I think we aren’t seeing reflected enough perhaps in principles, which is about equitable access. to data. So on the first point, of course, we do need to recognize that there is a difference between personal data and non-personal data. And I know that fellow panelists will speak to some of that. But either way, frameworks that are underpinned by human rights principles will create and enable clarity and protection of data that is so critical for trust. And that’s why I think data protection legislation embodies, of course, a lot of the principles that we require that need to be implemented effectively when it comes to personal data. And for that reason, all cross-border data sharing agreements should reflect and must reflect human rights standards. But on this point, I think one of the areas that perhaps we’re not seeing enough engagement with different stakeholders is on the topics of data governance, particularly in some parts of the world where perhaps these discussions are more difficult to access, expensive to engage with. And I just wanted to note that colleagues from Consumers International, and I know some of them are here, held the Day Zero event yesterday where they were addressing some of these discussions and reflecting the need for more digital rights and civil society and consumer groups to be involved in discussions relating to data governance more generally. And that also is important to look at the full process. So while the framework that you’ve mentioned, data free flow with trust, considers legal mechanisms, it’s important to also consider what happens after data flows when it’s stored, the whole lifecycle, and how consumers can ensure that their rights are respected throughout that lifecycle. And you mentioned the Institutional Arrangement for Partnership, which is looking to operationalize the framework. That’s an example of where I think it’s very important to reflect the role of civil society in that. And there’s a nice infographic on the website that you can access, and there are different stakeholders illustrated there. But civil society, I think, still needs to be reflected in that. It is missing at the moment. Data localization, I mean, this is something that in the data free flow with trust framework is recognized to be a barrier, of course, to data flows. And it stems from various different well, different reasons are given for data localization, but as it shows, the World Economic Forum paper on the framework shows that whatever the reasons that are provided for requiring, forcing data localizations, or forcing data to be stored in servers in country, it doesn’t have the effects that is supposedly intended, which is growing the local economy. It actually has detrimental effects to the local economy, and in fact, can lead to surveillance and the harming of rights in country as well. So finally, I know I’m running out of time. I just wanted to point to the, I think Nena maybe made a mention of this, the importance of recognizing that data, and this might sound controversial, maybe I should start it with this, data in and of itself, data’s not valuable in and of itself. You need to make it valuable, you need to interpret it, analyze it, and do something with it for it to have value, and that requires broader infrastructure, so it requires, of course, technical knowledge and capacities, broader physical infrastructures and knowledge infrastructures, and that is not always the case, and so you need to invest in that, and in some parts of the world, there isn’t equitable access to data, and an ability for civil society and researchers to make use of data for health, for reasons, and in other industries and sectors as well, so that needs to be addressed. So let me stop there, and I’m happy to pick up some of those points later.

Timea Suto:
Thanks so much, Sheetal. It was a lot that you managed to pack in the small amounts of minutes that we’ve allotted you, but thank you for bringing it full circle, making sure that we know why we want to talk about data, and really what creates the value of data, linking it back into what is its potential, but also reminding us that we need to commit to making this work, and making data usable, and making sure that it respects all kinds of expectations that we have to it, and that includes really having everyone around the table. Thank you for that. So now with these reminders of what is the value of data, and what are the commitments that we need to have in place to make use of that value, I want to turn to my next two panelists and talk a little bit about the risks that we face. If we don’t do that, if we don’t make these commitments. So Raul, Nena has mentioned some of the developmental risks here that we are facing, but what is your perspective sitting at the helm of ALAI, and some of the risks that we might have from an economic or governance perspective if we don’t make these commitments?

Raúl Echeberría:
Good afternoon, thank you very much. Thank you for the invitation to speak at this panel with so distinguished colleagues. I was thinking on the, I like the analogy of Nena, with the aviation system, and I was thinking that I have suffered a few flight cancellations in the last few months, so maybe that could be the equivalent to internet shutdowns. But I think that many people speak about, that speak, say that we are living in a economic, database economy, and I think that is not totally true. It’s not completely true. We are living in a database society, not everything is based on data, as Sheetal and Nena said before. And all the, every public and private services that people access to are based on data, and I’m speaking about health services, government services, but also marketplaces, and e-commerce, and everything. But sometimes we think that data is only a problem that has to be, has relation with internet platforms or marketplaces, but data is everywhere. So that’s the reason why we need the data to flow freely, and that, to enable that those services are available for everybody and create benefits for everybody in the world. Obviously, there are rights to be protected, and so I agree with Sheetal about the human rights approach. This is very important, and this is why we need legal frameworks to. to ensure that the data transfer and data flow is secure, but create the conditions for that safe data flow, but not the contrary. That’s the objective of the public policy. That should be the objective of the, not to block the data flow, but to create the safe conditions, the appropriate environment for ensuring that the data is being available in the way that is needed, but protecting the rights of the people. The free data flow should be the norm, not the exception. To ensure that secure data flow, the secure flow of data is important to have a good, we need to have good local policies, but also interoperable and regional and global approaches. What we are witnesses is that there are different kind of policies that imposes restriction to the flow of data, and so creating restriction for people to be benefited with a digital development. Sometimes are very specific policies like data protection policies that when we discuss, that is very common that there is some, that people misinterpret, policy makers misinterpret what is an international data transfer, for example, and that some people think that is like a box with the data that I’m sending through DHL to somebody else, and so we need to block this kind of transfer, except that there are agreements and consent from the people, but for example, think as when we are coming to Japan, and we are trying to book a hotel from my country, I book a hotel in Japan through a platform that is incorporated in a country in Europe, but it’s using a payment platform that is based in the United States, and so the data is flowing through the companies and that are based in different jurisdictions, but it’s always a part of the same contract of services, so it’s difficult sometimes to explain to policy makers this concept, and so based on good faith, but trying to protect the rights of the people,

Timea Suto:
but so sometimes,

Raúl Echeberría:
policies impose a restriction to data flow and we are dealing in this at this moment we are dealing with this exactly with this case in at least three countries in Latin America but sometimes it’s other kind of policies that that has nothing to do with apparently with data transfer but policies that deal with the infrastructure level or even taxes or content moderation but or a law proposes that that include the possibility to block applications in some conditions and so that’s creating a very fragmented internet and it’s clear that a fragmented internet is the perfect scenario to block the data flow because it’s impossible to do it’s like to cross a river without a bridge or without a boat that’s it so the yeah I think that’s the one of the problems that we have to work or one of the challenges if we have to work much more with the with the with policymakers and to trying to get to achieve a better understanding of those concepts that are flow fragmentation but we have also to work with among all stakeholders not only with governments and we need two more points we need the models to evaluate and to analyze the the impact of proposals policy proposals data flow and fragmentation and I think that’s the last one is we need a strong commitment Sunday among all stakeholders to not promote policies from each stakeholder group or to not promote policies that potentially could lead to to fragmentation just because this is aligned with the interests of one specific group so that I think it’s those three points are what I leave to for people to suffer feeding the discussion thank you thanks so much role and thank you for noting that very

Timea Suto:
complex policy space and really what we have to take away from it is to look at policy measures and our and our thinking around data but also other matters that my impact data in a holistic fashion in an ecosystem view to make sure that we hear from everyone and we don’t inadvertently have consequences when we don’t intend to have them. Still on this topic of trying to figure out some of the risks that we are seeing around fragmenting the policy, technical governance, economic space around data, I’m turning to Carl online to share a couple of his thoughts on what are the technical risks in fragmenting the policy space around data governance.

Carl Gahnberg:
Thank you very much. And first of all, thank you very much for the invitation to this panel. I regret I won’t be able to be there on site, but I’m really looking forward to the conversation here and also to follow the rest of the discussions this week. I think kind of a useful starting point to think about data flows and conversely the risks of technical fragmentation is to kind of recognize that when we talk about the Internet and why it’s been so successful, it doesn’t only come down to kind of specific technologies that you might hear about, it doesn’t only come down to technologies like packet switching or even the Internet protocol, it really also includes how you make use of those technologies, how you puzzle them together, how you operate them, how you allow them to evolve and so forth. So, you know, one of the reasons why we’re talking about Internet governance, for instance, and the importance around the management of DNS or IP addressing or the value of open standards development is that they’re not just sort of quote unquote nice to have, they’re really kind of intrinsic to this model of networking that we have in the Internet and what’s made it so successful. So that’s also why at the Internet Society, we tend to talk about the Internet exactly like that. We talk about it as a way of doing networking, that is, it’s a model of how you do networking. And seen from this perspective, the Internet has some networking features that in themselves kind of contribute to this operationalization of cross-border data flows and they’re inherently linked to principles. So from a technical point of view, these principles help ensure that you have a infrastructure that is extremely accessible, that it’s extremely efficient in terms of expanding connectivity and by extension data flows, both within and across borders. So for example, a very kind of simple principle in the Internet, but that is extremely efficient is that, let’s say that you’re a new network that would like to join the Internet, then all you really need to do is to negotiate a interconnection with one other network that is part of the global Internet. And that allows your network to also be part of the global Internet. So it’s kind of this magical feature that you only really need one interconnection to one network and suddenly you have connectivity, global connectivity to everywhere in the world and by extension data flows all across the world. So that’s really important principle in the Internet that sort of help operationalize global data flows. But another important piece of this is that, you know, the Internet is built to evolve. It’s it’s really good at adapting and evolving over time. And this really comes down to this principle about using open standards and having an open architecture in the Internet because you can kind of upgrade the Internet over time. You can take bits and pieces of the Internet and you can improve them without having to tear down the whole thing and build it up again. No, you can sort of upgrade bits and pieces of the Internet along the way as you see the need evolve. And we’ve actually seen this this important principle play a big role in ensuring cross-border data flows with trust specifically. And this relates to what happened about a decade ago when I’m sure people are familiar with the Snowden revelations and the the revelations that brought awareness to systemic surveillance of Internet communications. And as some might remember, this provoked like a very strong reaction from the Internet community in all parts of the Internet community, of course, but including amongst governments that wanted to restrict data flows across borders. So, for instance, there were some governments at the time that even wanted to prevent traffic from traversing networks in the United States and to interfere with a routing system to prevent these cross-border data flows. Now, of course, this also provoked a reaction in the Internet’s technical community that that to great efforts of strengthening the Internet and to prevent these types of attacks on the Internet and the ITF even adopted some new guidance in its its standards development processes where pervasive monitoring of this kind that was revealed in the Snowden revelations is to be understood as a technical attack towards the Internet and that the ITF community should try to mitigate those types of risks in the design of protocols. So this was kind of enabled through this open architecture because the community could upgrade existing technologies by adding security, notably in the form of encryption, to ensure that you could have a greater greater trust in data flows and notably cross-border data flows. Now the reason why I’m sort of bringing up these two cases and links to these principles is that we’re seeing threats to the Internet right now which are, they could result in Internet fragmentation they’re targeting precisely these two principles that I just mentioned, the Internet accessibility and the ability to facilitate these cross border data flows, but also the ability to secure data flows through encryption. So on the one hand, for instance, we see extremely worrying trend in countries like South Korea and you and India and Brazil, where there are policy discussions about imposing regulations that would require online services to pay large telecom operators so called network usage fee. So this would affect be a new form of termination fee that would be imposed on the network. And not only with this of course violate net neutrality the principle of net neutrality. It would also sort of undo the fantastic progress that we’ve seen in many of these countries over the past decade in terms of promoting safeguards for the free flow of data through net neutrality rules, but importantly it also kind of violates this important principle about the Internet about the reach ability and accessibility of the network and for those who haven’t seen it I would really recommend the Internet architectural board actually wrote a contribution to the EU’s consultation on this topic, highlighting exactly this and how these types of regulations could violate these principles around accessibility and cause Internet fragmentation. But we’re also seeing, of course, on the other hand, this threat towards securing data in transit so we see a very worrying trend where governments are now trying to prevent the use of end to end encryption, for instance, so the very technology that kind of helped enabled continued cross border data flows in the wake of the Snowden revelations is suddenly under threat and at risk of being outlawed in some jurisdictions so it’s not, it’s not hard to see how this would impact cross border data flows where the that enabled continued flow of data in the wake of a harsh attack on the trust of the network, namely through surveillance, how the prohibiting of such use of a technology and the prohibiting of an open architecture, in fact, would in turn translate into limiting cross-border data flows. So I think when we’re talking about policy frameworks for the future, we also must recognize that there are existing ones that we should also highlight and that are important to preserve like net neutrality, for instance, but also that there are principles in the internet around this open architecture that are extremely valuable to also have recognized. So that’s why we at the Internet Society also advocate for this idea of doing impact assessments kind of to what Roel mentioned, where you would take a look at the internet, kind of what you would do in the environmental space, but you do the same for the internet and you think through what are the consequences of some of these policies and what policies are actually helpful in terms of facilitating cross-border data flows. But I’ll stop there and I’ll hope we can discuss more of this later on. Thanks so much Karl and thank you for taking us down to the basics of the internet

Timea Suto:
itself and the technical functioning of the internet and reminding us that we need to take this ecosystem view in which all stakeholders or sectors of industry and really all actors, policymakers and all of us around this room need to think about what is it that we’re trying to achieve, protect and how we’re working around those not to create consequences that none of us were intending to do. So to make the bridge really between now, we’ve talked a lot about the value, the risks, what is it that we do to make this workable and bridge the conversation from here into actually operationalizing the FFD. Let’s talk a little bit about these elements of trust that you’ve all sort of kind of referred to already, what is it that we need to have in place to mitigate some of these risks and how we move forward really to have those trustworthy environment that enables the data flow. So to start first on this, I’m going to turn to some of our industry speakers. Dave, how do you see this from the Microsoft perspective and what are some of these causes and drivers of risks that we need to think about

David Pendle:
as we aim to build trust? Thanks Tamim. So I sit on Microsoft’s law enforcement national security team which is the team at Microsoft that receives just over 50,000 requests from governments each year from around the world seeking data pertaining to well over 100,000 users. And this work, the handling third-party government requests for data, it is often at the center of this trust discussion as we’ve already seen a bit. And technology providers, for better or worse, are often at this the center or the crossroads of this debate between security and privacy generally. And we do play a public safety role, I think, an important one. Governments need to obtain certain data under appropriate circumstances to investigate serious crimes. I think most folks agree with that. We also play, I think, also another important role as kind of a fundamental guardrail to ensure that requests for customer data are lawful, compulsory, and are consistent with fundamental rights including the right to privacy. But this balance between privacy and security is often in tension and I think that’s what often leads to a lot of mistrust. And to be blunt, really the fear of government access to data has emerged as a pretty significant threat to data free flow with trust. And the reactions to that mistrust ultimately threaten the foundation of the internet itself. I mean, the World Wide Web now is governed by a web of often conflicting and increasingly restrictive laws. Whether these laws are motivated by legitimate privacy concerns or legitimate sovereignty concerns or competition concerns, or a desire, as was mentioned before, to kind of maintain access to data in a country, either through data localization or attacks on encryption, the rules that govern lawful access to data around the world are increasingly resulting in a more fragmented internet. And that presents some pretty significant risks, many of which have already been discussed quite thoroughly on the panel and at IGF and across the world. The loss of connectivity and leaving people in regions and countries behind and out of the digital transformation is probably the most significant one. The undermining of the global digital economy and the trillions of dollars in trade that’s at risk, also very significant. Some risks of fragmentation are probably less discussed. The risk to public safety, most serious crimes have some connection to the internet. And governments, generally, if they are rights-abiding and rule-of-law governments, there’s a legitimate need to seek certain data under appropriate circumstances to kind of counter serious crime. In cybersecurity, that was mentioned. I think, Tamayo, you mentioned that at the outset. It’s not often discussed, but the fragmentation of the internet is essentially putting blinders on to certain portions of the internet that cybersecurity professionals who are trying to detect and counter sophisticated cyber attackers aren’t going to be able to see what’s happening. And in fact, at Microsoft, I think it’s over now. 40 trillion signals a day through kind of a global threat landscape are analyzed every single day trying to detect the cyber threats and tell our customers and users. if they’ve been compromised and prevent that compromise from happening. Again, when you put those blinders on, it has pretty significant impact on cybersecurity. But in my view, this perceived tension between privacy and security, which is at the heart of this mistrust, is in many ways, in important ways, exists more in theory than in reality. And I say that because when governments sit down to discuss these issues related to lawful access, and these are tough issues, but when they sit down to actually talk about what they do, they tend to agree. And they tend to agree on some of the basic rules of the road. And the OECD process, I think, just proved that. So the OECD process, which Japan was a major driver of, bringing together 38 countries in a pursuit of data free flow with trust. 38 countries sat down, and they brought in their privacy experts and their national security and law enforcement experts. They talked about what they do. And they came up with multiple principles from legitimate aims. These authorities can be used in pursuit of legitimate aims. It cannot be used to suppress dissent or go after people because of their race or religion or other protected statuses. Prior approval, oversight, transparency, redress. The governments tend to kind of follow rights respecting governments tend to follow the same principles when seeking access to data. And this could be a blueprint for promoting the free flow of data generally. We ultimately need more than shared principles. We need binding agreements. And there has been some progress in the last year on those as well. Data access agreements, the US has been negotiating several with different countries, including one in negotiation right now with the EU, along with the EU-US data privacy framework, also important. Last year’s signing of the second additional protocol by over a dozen countries was a kind of a significant step forward. But looking ahead, we still need a lot more. It’s clear we need interoperable multilateral frameworks that reflect kind of the nuances of this debate and frameworks really that recognize, again, the legitimate need for governments to access data, at least certain types of data for public safety. I don’t just work on policy at Microsoft. I’m in the compliance business as well. And just since sitting here, I’ve received emails and alerts that there have been emergency requests coming into our team. We have a team that staffs those 24 hours a day. Every day of the year, there is a legitimate public safety need to respond to these kinds of requests when they’re appropriate. And significantly, the need for broader inclusivity, because a lot of those agreements I talked about are essentially transatlantic agreements, and that leaves much of the world out of the picture. So that’s one big area of need. And a framework that kind of reflects that trust is earned. For data to flow freely, there must be adherence, again, to rights-protective standards and the rule of law. And that is really at the core here, because if you’re not respecting the human rights of all of the users, then that framework is woefully inadequate. So much has been accomplished, especially over the last year, but much more remains to be done.

Timea Suto:
Thank you so much for that reminder and setting out some of the goals that we should be striving to. You’ve talked a lot about, we’ve all talked a lot about data. Haven’t really made a distinction between data that is personal, data that is non-personal. There are obviously very different risks attached to either or the other, and then neither of those are really monoliths in themselves. So there’s a lot of nuance to unpack here. We won’t endeavor to do all of this in this panel, but I will ask the next two panelists to focus on some of the different elements of this. So, Marit, I’m turning to you next. As we’re talking about the trust that we need, what is it that we need to attach, what elements of trust that we need to attach to global data flows when we talk about privacy protection and protection of personal data? Okay, so thank you, Teme.

Maarit Palovirta:
I’ll try and respond to the exact angles that you’re asking, but thankfully, we also have Jakob after myself who can maybe then compliment. So maybe I’ll just frame a little bit from the telecoms operators’ point of view, because indeed, we heard a lot of things already, and many of the buzzwords were already mentioned. But if you think about data traffic, of course, I mean, all this data traffic is really underpinned by the networks, and who runs the networks? Well, it is the telecom operators. So of course, for the companies that we at Aetna represent, this is really the bread and butter of our everyday work. And there’s a lot of innovation happening at the moment, a lot of things changing in the way of data traffic patterns, et cetera. So there’s a lot of talk about virtualization, cloudification, 5G, and all of this is great, but what it means that the way that data is moving in the networks is changing, and also the fact that now data is being stored not so much in the center, but more on the edge which means that the linkage between the device and the edge computing, that is also becoming different. And then, of course, with all of this, we also need to look at the cross-border collaboration aspect as data, of course, needs to move globally. So in order to provide telecom services at a global level, operators need collaboration. with vendors, with partners, with different kinds of providers and in fact with this virtualization the role of these third-party providers just increases. And then if you add on top of that I think it was Nenna who mentioned AI, IOT, that are these new technologies that are really powered by TROs data so then we are really looking at more and more traffic and also then more and more kind of cross-country traffic. So then moving to the policy framing and especially the privacy issues. So in the past years and I guess the European Union in a way was a Kickstarter here because the GDPR happened I think it was 2018 and well for better or worse you may argue we don’t want to be judging here but well this new framework provided stability in Europe but it also then made somehow a global model if you like for a regulatory framing for privacy issues. And of course there are different variations but there was a kind of a wave of other regulatory procedures and processes elsewhere in the world in Africa, South America, Asia etc. And while you may say whatever you like about the privacy regulations I think that one thing is clear is that these new regulatory developments actually have improved trust and confidence among citizens and we should also keep in mind that of course the internet is only used for as long as people feel that it’s trustworthy. So we are trying to find a balance between on one hand innovation and the economic activity but also then with privacy and it needs to be a balanced approach and this has been traditionally of course a European point of view but we also think that that could be interesting to other parts of the world. And then you know if you now think about the regulatory discussions that are happening well very much here in Japan as well but elsewhere in the world in parallel on artificial intelligence and data governance there is in our view also need to establish common basis to promote some kind of regulatory coherence and simplification on a kind of global scale. So I think it’s maybe not realistic to say that we will have exactly the same thing everywhere but that there is some level of interoperability between regulations so that we actually have a kind of functional regulatory framing for private sector parties as well and for businesses. On the internet fragmentation there was already a lot of talk I mean you know just maybe to say and to link back to these policies that well you if you look at it only from that point of view you can of course say that there’s a risk for fragmentation with these policies if everybody you know implements a different type of policy. But then we should keep in mind as I already mentioned that these policies also often have a positive impact on the internet for example increasing trust. So we should be a little bit you know mitigated the way we look at these issues because they often have two facets. Of course I mean going into Carl’s comments on open standards I mean I think many people and most people agree and us included I mean this is the starting point for an open internet and there is no need or you know it would be risky to start meddling with that. Then we can look at commercial practices which is often debated as well and net neutrality came up I mean again Europe I mean it’s one of the few places where we do have a regulation on the open internet which ensures free flow of traffic and this has been the case quite a long time now and well now we hear that the US is again starting the discussion on that same topic as well. So there can be also business practices I guess we talk sometimes about walled gardens you know this type of environments that also could then cause fragmentation on the either connectivity side but also on the on the content side. So then looking at the you know way forward and Timea you mentioned at the beginning some some keywords and I have to be boring but only to agree in that we also believe that you know the the kind of good balance and whereby we promote innovation and including things like global digital commerce. However then we also kind of keep the rights and values in the background is best achieved through a regulatory framework that is horizontal so not sector specific flexible, interoperable and also technologically neutral. And as already as well said so we need to also then see how we can promote cooperation and broadening of the jurisdictional horizons in order to make sure that the interoperability then factor is well somehow well clearer and also practical. And from a European perspective of course so just to go back to David’s comments as well so the European policymakers have started agreeing making loads of data kind of data free flow area agreements between several countries, not only the US, but also Japan and South Korea. And from private sector’s perspective, this is really great because it provides regulatory certainty. And we would also then encourage our policymakers in Europe to expand these agreements and make sure that they also then come to the other parts of the world, such as Asia, Latin America and Africa. So I’ll stop there, thank you.

Timea Suto:
Thanks so much, Marit. And yes, I don’t want to repeat your points because we agreed on a lot of things. And time is also short. But I will turn to our last panelist for this segment. And we’re staying in Europe, we’re actually moving to Europe because we’re gonna have Jakob join us online. If you’d like to build on what Marit said and what Dave as well, on building these elements of trust. And maybe if I can ask you to focus a little bit on non-personal data transfer sharing and the flow of non-personal data and what are the elements of trust that we need to attach to that. But of course, feel free to, as Marit set you up, to add to whatever points that she said earlier. Okay, thank you, Tamir.

Jakob Greiner:
I hope you all can see and hear me and the internet is working well. I really liked how Nena set the stage with her airplane flight routes introduction. And I’d like to come back to that maybe occasionally in my next five minutes. Just to say, first off, I think this whole panel shows that we all agree that data flows are super important to tackle some of the most pressing challenges today, be it environmental, economic, health, safety, but also economic challenges. I think Nena said money needs to be made and is being made with data flows. I fully agree. The question that I would like to raise, being also an operator that is very much European-centered, but also has a global footprint and being present in the U.S., is the money or is the data flow fair distributed today in our internet ecosystem? And to start talking about data flows, I think first we need to take a look also at the internet. internet ecosystem of today. The free flow of data has for long been the very essence of the internet, but I would also say it’s safe to say that over the past years this architecture and our view has also changed quite fundamentally and these changes have also an impact on the way data is being used and transferred. What do I mean by that? And I give you an example of the U.S. where we are present on both sides of the Atlantic. When you look at today where global internet traffic runs, then it’s almost 70 percent running through the proprietary networks of a few companies. These companies have actually gradually expanded their own private infrastructures, their terrestrial networks, their backbones. You could basically more or less say they are like a private airport while telecom operators are the public airport. And the difference is that the public airport is subject to a lot of rules and regulation while the private airport doesn’t have the same regulation, although we are all basically huge airports connecting the world. And this is a disbalance that I think needs to be taken into account when looking how data flows are today globally flowing. Second, when it comes to the distribution of global data flows, and again here taking the EU-U.S. example, we are our largest partner when it comes to data flows, but the distribution is unfortunately rather one-sided. So, it somehow seems the planes from Europe are starting flying across the U.S., but they’re somehow not coming back. Over 90 percent of EU-based companies send data to the U.S., and that is great for the U.S., but it’s not so great for the competitiveness and innovation that is happening in Europe. I’m just describing a status quo. I’m not saying where the flaws are, but that’s a fact that I think needs to be taken into account when we’re talking about data flows being an economic driver. We just see it’s rather one-sided than reciprocal. And then I would like to come to what Timia asked me to answer, which is the notion of trust. Of course, coming from Europe, trust and security is essential, and there should not be any data flow if trust and security are undermined. We have seen that Europe has, over the past years, developed quite a dense regulatory framework to ensure that citizens, public bodies, but of course also companies can rely on the protection of their data. And what started with the GDPR and the protection of personal data is more and more moving now also towards safeguards for sensitive non-personal data, trade secrets, intellectual property, such as by the recently adopted EU Data Act. And we welcome that because trust for companies is not only perceived to lie within personal data, but of course also non-personal data. A good example where you could clearly see that there’s globally, I think, a need to balance legitimate security concerns with the free flow of data is the recent, what is it now, the fourth attempt to have a stable US-EU privacy framework agreement so that companies can exchange data based on an equal level of data protection. I think that’s something very welcome from the perspective also of a European company, but I think now it is very important that the implementation of this framework shows its teeth, that, for example, the restrictions to the access of data by security and intelligence agencies on the US side is now really happening based on these agreements. And by that I think we can see that there is a balance reachable between legitimate security concerns, but at the same time also the free flow of data. And then let me move lastly to the area of cloud, because I think Margit said it before, the whole internet, the whole economic activity globally is moving more in a virtualization, cloudification atmosphere. And if we’re looking at the cloud policy that is happening at the moment in Europe, some might say, well, as David said, this could lead to fragmentation. This is, you know, rather almost protectionist what’s happening because data flows are being restricted. There is localization happening, but it’s happening for a cause where we believe this is actually not against the free flow of data principle. It actually provides the security and trust that is needed. So data flows are happening. What do I mean with that? If you look today at the concerns of European businesses, almost 70% of cloud users consider that access to their data from outside of Europe is a risk. And that’s why they are not putting their data enough in the clouds of cloud providers. And that is not again because of personal data only, but also because of industrial non-personal data. And so in our view, it’s only consequent and right that data flows here are restricted and localized. That is what the EU Data Act has been aiming for. And that is also right now what the current discussion around cloud certification security scheme is aiming towards. So by that increasing trust, increasing security, and by that in the end, ultimately leading to more global data flows, not less. So again, I think it’s not about, you know, nations like the European Union trying to somehow take a step in the different direction, but it basically follows the need for more trust and security when flows are happening. So to sum it up, I think it’s vital that we on a global level have a common approach to data flows, but building trust requires addressing an uneven distribution of data flows as it is granted. It also means the changed nature of the internet architecture needs to be taken into account and also the need to ensure that effective protection of data, be it personal or non-personal data, is happening where it is stored and where it is processed. And by that I think we all aim for the same goal, enabling data flows with trust. Thank you very much.

Timea Suto:
Thanks so much, Jakob, and thanks for bringing the points really full circle and in pointing out that fragmentation can happen from very different aspects, but also if we don’t step up our game and set policies that enable trust and policies that enable to enable secure, trusted data flows, then we are going to end up in a situation where we have a patchwork of regulations that actually go against the purpose of why we wanted them in place in the first place, which is to enable digitalization, to enable data flows that drives the development of our societies, of our economies, of our personal developments that we all strive for. I have gone a bit over time than what we planned for this first part of the panel, and we did want to give some time for the audience to ask questions. I received two questions online, and I’m sure there’s some in the room. So while those of you who might want to have a question, put your hands up or start lining up at the microphone. I’m going to ask the panel the two questions that we received online. One is about security, and one of our question askers is asking how we can ensure a state-of-the-art security to protect user data, and the other question is really around safety, trust, security as well as how can we make sure that we don’t end up with one specific group or actor or stakeholder taking control of data, and what are some of the checks and balances that we can have around that? So as people in the room think about if they want to ask a question, I’m going to see if one of our panelists might want to respond to some of these questions around security. Sheetal.

Sheetal Kumar:
Okay, I was just saying, I think Carl made a good point earlier about security and how both technical and legal measures are required to ensure that data is kept securely. One of the technical measures is encryption, and whether it’s data in transit or data being stored, it is really an integral part of a security infrastructure for data, and what we are seeing, I think that you spoke to, Carl, and others here, is a misalignment sometimes, unfortunately, of different attempts to address different issues that are actually quite connected or because they’re not aligned with a human rights-based approach

Timea Suto:
end up doing more harm than good,

Sheetal Kumar:
and one of the ways to address that is to definitely ensure that engaging. with all stakeholders and using tools like internet impact assessments or human rights impact assessments to assess whether proposed measures are actually going to achieve the intended effect or not and what other options there are to proportionally and actually do what is intended instead of perhaps with the aim of providing more safety in the end you actually create more insecure technology. So that I think was a key point that was shared earlier and I hope responds to the question. On the second question of preventing biases and

Nwakanma Nnenna:
prejudices, I think that globally we have this, I don’t know, I’m trying to use a word that is contained, a diplomatic word. We kind of beat our chest, we have this orthoglorification of saying once the EU framework and the US framework agree then the whole world agrees. I think that is not correct. The US is 300 million, the EU is about 450, that’s 750 million out of 8 billion, that’s less than 10% and I do not think that we should follow in this very particular way, we should follow the way we do international travel. Having London, Paris and New York be the hub of our lives, I think that we should fight against. The future of the world is in Asia, the future of the world is in Africa, humans are the people who create data and I think that my own plea to ICC is that as we go ahead, we need to be mindful of the fact that EU-US does not mean global. That’s just my point today. We’ve been doing it in travel, we’ve been doing it with visas, we’ve been doing it in many other flows, we should ensure that internet and free data flows should not be an EU-US issue. Thank you. Thanks Nnena.

Timea Suto:
And I think we have a good testimony into the globality that if you would see the people who are lining up here to ask questions from the panel, I hope that they will bring in some of the diversity of points of view that you’re asking. So I’m going to ask all of you to put your questions up. I hope you will be brief and then I will ask the panel to try and address them collectively. So

Audience:
I’ll start here then I go there and then we go back and forth. Please. Okay so I’m Daichi. I’m operator of the local IXP in Japan. So I have I would like to ask an opinion about authority to verify the data flow or data itself is trustful or not. So if there is a possibility to establish new authority to verify the data flow or encryption is correct or not. So I would like to confirm this. Thank you. Gentleman over here. Yes hi I’m Javier Reed from Consumers International and I think that Shital was mentioning some of the results from our meeting yesterday with several consumer groups in the region and elsewhere. I think that the question that was raised was about what happens not just when how we send the data but what happens afterwards and I think for consumer trusts in the trust in the DFFT one of the things that we are finding is that consumers want to know that they can actually get redress if anything goes wrong. That it’s not like a fire and forget you know which is what we see unfortunately in many situations when we look at data free flows. So I was wondering how do you see this redress working and when we talk about operationalizing how can we operationalize the redress in a way that generates consumer trust. Thank you so much for that. Jameson. Okay thank you very much. Great panel. My name is Jameson Olufi Africa ICT Alliance. We have a comment and a question. The first comment is regard to the influence of GDPR regard to data flow and as Ndena said you know data flow is not just about GDPR or EU and USA. But what we are seeing now is that the whole world is following the first step of EU in that regard. But we need data flow for business and from business. So we need data flow or interoperability and then some form of of course control. It’s very necessary. But here you should set the lead if they want it to be free flow indeed. The number the question that is to Pedro. See I want to ask you how do you cope with accessing data that data is in the U.S. now based on GDPR is closed. Okay and how do you access it concerning your need for intellectual property protection and attacks and what have you. Thank you. Thank you. Please. Thank you. Masanobu Kato from Japan representing a private sector. And well since we are you know talking from the private sector ICC point of view, I’m just wondering if you have any ideas from business side to have a good solution on this. We talked about some commercial solutions which may not be working right now, and encryption is another technological question which have some issues, for instance, for neutralities and so on. But in Japan, I heard in some debate recently that a trust service can be a solution, maybe a local solution or could increase more localisation, but there is some thinking of this kind where you can, you know, commercial sector or business sector can make an actual proposal. Are there any such activities or initiatives at the ICC or you have some ideas about this? That’s my question. Thank you. Thank you very much. Please, madam. Hi. Hello. I’m an academic. I have a question regarding telecommunication systems. So a few years ago, the deployment of 5G technology led to a global crisis, and then we saw some submarine cables being rerouted or some submarine cable projects being cancelled. And then recently we saw that certain countries would not authorise satellite broadband services by styling, for example, because it’s a US company. So my question is, do you see the data flow with trust schemes also de-intensifying these geopolitical tensions regarding the global telecommunications infrastructure? Thank you. Thank you for that. Hello. Sorry, we’re just alternating microphones, so we’re going to go here first and then I’ll turn to you. Please. Okay, thank you. Good afternoon. My name is Shota Watanabe. I’m working for a Japanese think tank. And my question is, which forum would be better for operationalising DFFT? Because there are so many forums discussing DFFT. For example, Prime Minister Abe mentioned World Trade Organization when he started DFFT and then we have a lot of other organizations such as OECD which deal with like government access declaration and recent establishing the Japanese government is now plan to establishing IAP as a new forum. So what kind of forum would be better and how can we avoid the duplication of the debates among these forums? Thank you. Thank you so much. Please, sir. Hi everyone. This is Narayan from Nepal. So when we talk about cross-border flow of data, it’s very difficult to have some homogeneous regulation and we have to think about some common standard and principles. In this context, so do you think that like our title, we should have some single free institution or forum, as you said, which should work on this common privacy, security and intellectual property sort of things? And if not, how the countries, developing countries and economies like US, EU and Japan should collaborate and work with the developing and LDC countries? This is my question. Thank you so much. Thank you for everyone for asking your questions. It’s really great to see that in this huge room, all the input of our panel was not lost and it’s really interaction. It’s really strange looking at such a big room, but I’m glad that you’re all here with us and engaged in the conversation.

Timea Suto:
So we’ve heard about six, seven questions here regarding how do we make sure that trust is enabled with the right authority and clarity and who can access it and who can’t. Questions around redressing, having redress mechanisms for any violations of rights. Questions on how do companies cope. with such a fragmented environment, especially when they are required to provide that data for public safety reasons. Questions on how do we find commercial solutions? Can we find commercial solutions on these challenges? Is there geopolitical tension that risks to be heightened? Is there a way to, which is the best forum to address some of these questions? And how do we include LLDCs in some of these conversations? So as I’m going to ask my panelists to share their final remarks from this conversation, I’m going to extend the one minute that we gave you to two minutes and try and pick your question or pick some of the questions that were asked and then perhaps leave us with a lesson that you think we should learn from today’s conversation and the global state of play around data governance. I’m going to go on in the order that you all have spoken because some of you have been silent since you first spoken. So I’m going to turn to Nnenna first, if you want to pick one or two of these questions and share your last remarks. Thank you, Tymia.

Nwakanma Nnenna:
And thanks everyone for your rich contributions. I would love to speak to the duplication of forum and where we should be having these conversations. Conversations are a great thing. Normative conversations are great, but legally constraining conversations are more important. So my answer to that question would be, let’s have conversations in multiple places. Let’s have normative certain conversations at global level. But when it comes to decisions, let’s make them firm so we can hold stakeholders responsible and that rather that this will be done at a global level. most preferably under the UN umbrella, because we’ve seen things. I’m speaking as an African, speaking from West Africa at this time. I don’t think OECD should be the place to hold conversations that will be of global constraining value. So I’d rather that the WTO, the UN, and its related agencies be the places where we make these decisions, even while we have conversations. I think that is why we come to the IGF. That will be my submission. Conversations must continue at global level, at regional level, private partnerships, national levels. Let’s have these conversations. Even within civil society, we have human rights issues that we can reflect on, think tanks, but then when it comes to global decisions, let’s make them at UN level. Thank you.

Timea Suto:
And have a great evening. Thank you so much, and enjoy the rest of your day. Thank you for being here with us. Sheetal, your takeaways, and maybe some responses to questions we’ve been asked. Thank you. Just to respond to the point about where to have discussions.

Sheetal Kumar:
I think as Nana said, they are being had in various places, but not everyone can access them, and not everyone understands or is engaging with the different ways that these conversations intersect, whether they’re around e-commerce, trade, and data flows, or data protection, and the standards that protect data, the technical standards. So there does need to be much more, I think, openness and engagement from a wider range of stakeholders in these spaces, not necessarily the creation of new forums. And what I would say as well is in relation to whether it’s protecting personal data or non-personal data, which as we heard earlier, both obviously require strong levels of protection. What we would like, I think what we need to see, and what we have in some cases, is legal frameworks that provide for that. We need to see them implemented, and to respond to the point about remedy, we need to see what is provided for, the rights that are provided for, for example, in legal frameworks around remedy actually implemented. And a leveling up, but leveling higher, I think, to higher human rights standards, or to human rights standards across the board, and that will allow for the trust, which we’ve been discussing, to manifest. because if we have those high standards across the board, across jurisdictions, that will support the trust and enable free flow. And then finally, to that point that I made earlier about the importance of ensuring that we have the broader infrastructures in place for people to make use of data for more equitable access, which is particularly important as we’re talking about artificial intelligence and harnessing that. Fundamentally, that’s about data processing, right? So the ability to do that requires a wide range of capacities, and I think we need to pay attention to that as well. Thank you.

Timea Suto:
Thank you so much, Sheetal. Raul. Thank you very much.

Raúl Echeberría:
I think that’s the, in his intervention, Jacob brought some new issues to the discussion that probably we deserve an entire session to deal with. So I will just refrain to a few comments, but I was going to say exactly what Nena said before about the fact that the war is much more than United States and Europe. And I understand that in some cases, the players, the holders could feel that there are unequal relations, but the history is plenty, and is still, unfortunately, plenty of unequal relationships between countries and regions. And coming from Latin America, I think that’s our relation with, the history of our relation with Europe is plenty of those cases. And while some people could think that there is no protectionism in some measures that are being discussed or promoted in Europe, being seen from outside of Europe, they look protectionist. And this is exactly what I say before when I say that we have to be careful that in good faith, when some stakeholders try to promote policies that, in their views, are good for fixing market failures or problems, we have to be very careful with the consequence that those policies could bring to the whole internet, not only for one country or one region. So we need a strong commitment among stakeholders that we will defend and work together for a not fermented internet. I agree very much. much with what Mario said before about that the good policies bring certainty, more security and trust, and I agree very much with that. But the problem that we face is that not all the policies are good, and not all the proposals are good. In regions like Latin America, where we deal with many different jurisdictions, more than 30 countries in Latin America and the Caribbean together, and so every country promoting their own different policies, we have to be very careful because the risk of those policies creating chaos or negative impacts instead of certainty is very big. Coming back to the European thing, one thing that we live in in Latin America is that there is a huge tend to copy and paste policies from Europe, policies that could be good for Europe. I’m not arguing against that, not necessarily are good for Latin America, and I guess that same happens with Africa, but with Africa I don’t want to make an opinion on that. So we need more work among all stakeholders, try, as I said before, to promote the discussions about the concepts of fermentation, the importance of data flow, and need to make the policymakers understand what is at risk in the policy development that somebody they are not aware of. Thank you.

Timea Suto:
Thank you, Raul. Just mindful of the time, we have about eight to ten minutes for the rest of the speakers, so I do encourage you to try and be short with your answers. We’ve had a lot of engagement from the floor and that is always good, but we need to manage the time as well. Karl, over to you for some last considerations. Thank you.

Carl Gahnberg:
I’ll try to keep it short, but I wanted to address something that I think addressed some of the questions that we received from the participants, or I think helped address some of those questions, and that goes to really highlighting the importance of encryption and continued support for use of encryption, because a lot of the questions that I heard about, for instance, data localization, or the physical infrastructure, or restrictions on interconnecting physical infrastructure, a lot of those challenges you can kind of resolve by allowing data to be encrypted, because it takes the locality or the importance of locality out of the equation. So for instance, I’m sitting in Switzerland, if my data is here in Switzerland unencrypted, then it’s much safer on the other part of the world other side of the world if it’s encrypted on that other side of the world so locality and and sort of safety is not one to one when it comes to data but it’s rather making sure that you have the technical means to secure the data like encryption that is so important and that also allows us to have this global network if we can actually secure the cross border data flows. The other thing I wanted to address was the question around which for to talk about this. And I think to Nina’s point, the to ensuring kind of inclusiveness in these discussions are really important I think in that regard, it’s important to consider that all of the four that we can think of have some form of barriers to participation. And I think it’s important to actually allow these discussions to happen in multiple for us. And I’m not too worried about duplication of discussions, as long as there is a path to a shared discussion and I think the IGF system is actually quite good in that regard. When you look at it in terms of national and regional IGFs that then is met with a crescendo of the global IGF every year so I could, I could see the IGF structure coupled with other for us being actually very useful vehicles for for facilitating participation. Then finally we had a question around sort of principles in in thinking about this globally and I think there’s, there is a principle that I know been used in both the environmental space and I know it’s used security, which is that you And I think that’s a really good model for us as we’re thinking about addressing these challenges that you should always be a global perspective in what you’re doing because the thing that you’re working with is a global infrastructure is a global society that we’re trying to interact with. So to think globally while you’re doing these things locally is extremely important. Thank you.

Timea Suto:
Thank you, Carl. Dave.

David Pendle:
Thank you. I’ll try to be brief. I know addressing at least the one question that was addressed to me, how does a provider kind of operate and comply in this like web of conflicts of laws I think is a really important question and one of our kind of like fundamental principles is that we should not be forced to violate one country’s laws in order to comply with another’s. That’s just a really critical point and there’s obviously a lot of concern about U.S. laws in our world and I understand that. One thing that’s fortunate about U.S. law is that it does account for the ability to challenge a demand where it conflicts, where there’s a true conflict within another country’s laws. It’s called a comedy challenge, not the kind that makes you laugh, but ends in I-T-Y. And we do report every six months on all of the cross-border requests that we get. That’s something we include in our transparency reports and I think that transparency generally is kind of the path toward accountability across the board and ensuring that users are notified when their data is requested, ensuring that everyone understands what authorities can and cannot do, and ultimately either the government or provider community putting up statistics every six months or more often to kind of show what is actually happening can dispel a lot of concerns and myths. Really quickly on the appropriate forum, certainly we need broader participation. The OECD did get some things right and then they brought a lot of people to the table that haven’t sat at that table before together, including privacy voices and data regulators, DPAs, and law enforcement, national security folks, with some input from civil society and business. I think we need more input. We also need more multilateral agreements generally because if you start counting up how long these bilateral agreements take, it will take years to cover all of the countries in the world unless we start going more multilaterally. So that’s one of the, I think it’s time for the governments to kind of start rolling up their sleeves and get to work on that.

Timea Suto:
Thanks, Dave. Mai?

Maarit Palovirta:
Yes, so maybe I’ll comment on the question on the geopolitics. I mean, it appears that geopolitics is the flavor of the day a bit everywhere, not only the telecommunications sector. We may talk about electronic vehicles or other things. There is a little bit of this at the moment in the world. What I would like to emphasize, though, is that from our perspective as a private sector, well, association representing the private sector, it is a very thin line between promoting the competitiveness of a certain region and being outright protectionists. So I think that it’s a very fine line to walk. And for like any industry or any private sector organization in this, well, in this globe today, most of us do need a global market for some purpose. And I was in the beginning making comments about the increasing third-party engagement for cross-border data traffic, for example, with the new developments in the telecom industry. So I think that that’s good to keep in mind. Maybe just quickly on the institutional framing, it’s good to have discussions. It’s good to see how we can develop these common principles. And here I’m not trying to push for any European model, but there are then regions such as Europe who already have regulations in place on many of these things, who are first movers, whether it’s good or bad. So it’s also then very important from our perspective not to duplicate or create something that’s bad. will be then another layer on top of it. But if it’s principles, if it’s things like that, we, I think, can fully endorse that. Thank you.

Timea Suto:
Thank you, Marit. Jakob.

Jakob Greiner:
Yeah, I very much like what Karl said, think globally, but act locally. I think that that is the vision for, you know, for every local company in all our nations. But if you want to incentivize these local companies to place their data, for example, in a cloud, as I said before, share it, let it flow globally, then you need to give these companies also assurances that data cannot be accessed. And David highlighted it. I think there are conflicts between different laws at the moment that make it very difficult for cloud providers to really adhere to one or the other, but in the end, they need to. And so the solution at the moment that some nations are going is to say, well, let’s find frameworks that, for highest sensitive data, prevent data access. And if that means that only a local cloud provider should be the main company dealing with the data, then that is the solution that at the moment is working. I think coming back to Raul’s point, of course, me, I’m very much looking at the EU-US focus, but you’re fully right. And that goes in the question of global fora. These rules should, if possible, be harmonized as much as possible. And there should be fora where governments get together and really outline what they are doing. Because rules on foreign ownership, data localization, I talked a lot about Europe. These rules exist in the US as well, and I’m sure they exist also in other nations. So I think coming together, making kind of a mapping and best practices of what is happening on the legislative side across nations, not only in the EU-US, should be the way ahead. Because in the end, ultimately, both consumers and enterprises and companies like such as myself want legal certainty. I think that’s the most important. And if we get that by harmonizing these rules globally, then we can also enable global data flows

Timea Suto:
and not only local data flows. Thank you so much. And thanks really for being here. We finished almost on time. All that’s left for me is to summarize, which I won’t do because we ran out of time. No, really. Just to note on the account of last words, some of the things, we were talking about how we operationalize this concept of data-free flows with trust. And I think we drew out quite a few good lessons here that are worth mentioning, even if it’s just telegraphically and without really any effort here to be comprehensive. The value of partnerships you’ve highlighted, the value of having all stakeholders at the table, which includes making sure that forums are open for stakeholder participation and for that global inclusiveness that we all talk about when we talk about data. It also needs to happen at the policymaking level. When we are talking about technology and how technology can actually help in some of these issues, thinking about encryption and thinking about transparency, thinking about interoperability, both at the technological level, but also the levels of policies. When we think about what are good regulations, what are good policy principles upon which we start acting, you’ve all mentioned, again, thinking interoperably, having a risk-based approach, creating safe spaces for dialogue and for sharing best practices. And then when we talk about the role of business, I think it was very clear not to put business at the middle around some of these ping-pong of jurisdictional, legal policies. policy conversations, but really make sure that business is at the table, that all stakeholders are at the table, and we think holistically and in a multi-stakeholder fashion about the normative principle-based conversations, but then make sure that those trickle down at the local level into clear implementation, into clear capacity building. So that’s what I really captured, and it’s really a telegraphic summary. There’s a lot more that we can say about this. There’s a lot of resources that we put onto the website of this session, including some of the ICC papers, but also a number of the papers and reference material that speakers have mentioned today. I do encourage you to take a look. We’re still here until the end of the forum, so come to the ICC basis booth and find us, and we can share some of that with you as well. So I wish you all a good rest of your debates, and a huge thanks to my panelists, both online and here on the panel. Thank you, and have a great rest of your day. Thank you. Thank you. Yes? Well, are you around still? Yes. Pretending I can and nothing? Not ICANN, not yet. Not IJF only, but all the rest of things, yes. I will see you around. Yes, sure. How about at least in person? I do, I do. Can I ask you a question? Yeah. Well, I guess yes, in person. Have we not? Are you not a IGF student? It’s been like years, yeah, but I think we’ve met. I will, since you’re here, I just wanted to see if you wanted to find time to grab a coffee or something. Yeah. Do you use WhatsApp or Signal? Both. Oh, that’s great. Yeah. Do you know what it is? 650, sorry, just my phone number? Yes. Yes, US is one, yeah, sorry. Yeah, yeah, okay. 650-441-0365. You just message me. I don’t know if that’s. I’ll give you a call. No, it definitely turns into a call. I know. Hopefully I’ve got that right. I have to update it for things that came up today that are going on tomorrow, so that’s why I’m hesitant to say the exact time. I wanted to make sure that I connected and that way we can message each other. I thought it was an awesome panel. Oh, thank you. Yeah, it was good to have this. Yeah. and and and and and and and and and and and and and and and and and and and and and and and and and and and

Audience

Speech speed

150 words per minute

Speech length

1045 words

Speech time

418 secs

Carl Gahnberg

Speech speed

186 words per minute

Speech length

1937 words

Speech time

623 secs

David Pendle

Speech speed

185 words per minute

Speech length

1600 words

Speech time

519 secs

Jakob Greiner

Speech speed

172 words per minute

Speech length

1639 words

Speech time

573 secs

Maarit Palovirta

Speech speed

173 words per minute

Speech length

1581 words

Speech time

549 secs

Nwakanma Nnenna

Speech speed

151 words per minute

Speech length

1351 words

Speech time

537 secs

Raúl Echeberría

Speech speed

157 words per minute

Speech length

1465 words

Speech time

561 secs

Sheetal Kumar

Speech speed

166 words per minute

Speech length

1445 words

Speech time

522 secs

Timea Suto

Speech speed

161 words per minute

Speech length

3784 words

Speech time

1413 secs

Opportunities of Cross-Border Data Flow-DFFT for Development | IGF 2023 WS #224

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Audience

The analysis delves into various aspects of cross-border data, open data, and data protection. Shilpa, a researcher at the University of Melbourne, sheds light on the complexities and challenges associated with cross-border data and open data. She highlights the importance of understanding India’s experience with data privacy and protection laws. Specifically, Shilpa mentions the establishment of India’s Data Protection Act as a result of a judgment on privacy standards. She also discusses the concerns surrounding India’s Aadhaar identification system and its impact on data privacy.

One recurring concern throughout the analysis is the invasion of privacy and the potential negative impacts of data collection, particularly in relation to predictive advertising. It is noted that corporations often collect as much data as possible to sell products and services, raising concerns about privacy invasion and manipulation of consumer behavior for targeted marketing.

There is also skepticism about who truly benefits from the creation and sharing of data sets. This skepticism raises questions about the need for open data and the beneficiaries of such datasets. Shilpa explores the need for clearer definitions and distinctions between open data and the concept of Data-Free Flow with Trust (DFFT), underscoring the importance of differentiation.

The analysis further acknowledges the varying approaches to data flow regulations in different regions. It highlights the need for emerging economies to adopt a different approach to data flow regulations to address their specific needs. Furthermore, it mentions different versions of data flow regulations, such as the Data-Free Flow with Trust and CPBR proposed by the US, as well as the Chinese version of closing all data. These differing approaches reflect the need for data governance models that align with specific circumstances and development goals.

The risks associated with adopting a deductive global approach to global frameworks are emphasized. The analysis recognizes the tensions that arise from balancing data protection against the free flow of data. It raises concerns about the potential negative impacts of a one-size-fits-all approach to data regulations, underscoring the importance of considering specific country-level needs and circumstances.

Building trust is highlighted as a fundamental requirement for data governance in multilateral environments. Trust can be established through adherence to norms, standards, and law enforcement. Additionally, transparency in data processing is identified as crucial for building trust between data processors and data subjects. Without transparency, concerns about how data is used and processed may undermine public trust.

The analysis also acknowledges some specific cases related to data leaks and accountability. It suggests that Google should face consequences for data leaks and might be required to pay fines if it leaks user information. It raises concerns about private certification, particularly with large companies like Google. Doubts are expressed about the ability of small private certification agencies to effectively handle issues with such large companies, especially when governmental bodies, like the Federal Trade Commission (FTC), face difficulties in this regard.

In conclusion, the analysis emphasizes the complexities and challenges associated with cross-border data, open data, and data protection. It underscores the need for clear definitions and distinctions between different concepts, such as open data and DFFT, as well as varying approaches to data flow regulations. Building trust through transparency and accountability is seen as vital for effective data governance. The analysis also raises concerns about privacy invasion, the manipulation of consumer behavior through data collection, and the role of large companies in data certification and accountability. Overall, the analysis provides valuable insights into the complexities of the data landscape and highlights the importance of careful consideration of data-related policies and regulations.

Kathleen McGowan

The analysis highlights the importance of prioritising data sharing across borders to promote socio-economic development. Kathleen McGowan argues that data should be viewed as the ultimate stranded asset and emphasizes the need to harmonise data sharing within and across borders.

Trust is identified as a major challenge in leveraging the power of data. The analysis acknowledges that trust deficits around data can be obstructive and that trust divides are likely to persist due to current geopolitical realities.

Creating value from data poses similar challenges for both developed and developing economies. No country or economic bloc has found the perfect balance for extracting value from data. The absence of a federal data protection law in the United States exemplifies the challenges faced by even highly developed economies in this regard.

The analysis also addresses the issue of data exploitation, particularly concerning data produced by individuals in developing countries. It argues that external entities often exploit this data without benefiting the local economy. Data localization, driven not only by national security concerns but also by a sense of data exploitation, is seen as a response to this problem.

Investing in the right governance models is crucial for establishing confidence in cross-border data flows. Current models of data trust and stewardship are considered limited, and data sharing should be the rule rather than the exception, with all stakeholders involved in decision-making processes.

Digital public infrastructure (DPI) and digital public goods (DPG) play a key role in data flow. DPI has gained prominence during India’s G20 presidency, aiming to create highly inclusive tech stacks supporting public sector service delivery and private sector innovation. Digital public goods are open solutions designed for interoperability and privacy.

The generation of data from digital public infrastructure is viewed as instrumental in solving global problems. It offers the potential for more representative and inclusive data.

Strategic data management is seen as an area where emerging economies can benefit. The analysis suggests that these economies should consider data as a strategic asset and adopt an approach different from the laissez-faire model of the United States and the state-driven model.

Finally, the concept of the “fourth way” is proposed as an alternative approach to data governance, presenting an opportunity for countries to leverage data in a way that better serves their economy and society. Kathleen McGowan agrees with this approach, highlighting its potential advantages.

In conclusion, the analysis underscores the need to prioritize data sharing across borders for socio-economic development. It addresses challenges related to trust, creating value from data, and data exploitation. The importance of investment in governance models, as well as the role of digital public infrastructure and digital public goods, is highlighted. The concept of the “fourth way” offers an alternative to traditional data governance approaches. Overall, the analysis provides valuable insights into data management and its implications for global development.

ATSUSHI YAMANAKA

The importance of data exchange and digital technologies in healthcare services in developing countries was highlighted by John Philbert and ATSUSHI YAMANAKA. They emphasized the crucial role that data exchange and digital technologies play in improving health services and outcomes in these countries. The need for secure and safe data exchange to ensure confidentiality and privacy of patient information was stressed by ATSUSHI YAMANAKA.

ATSUSHI YAMANAKA also argued for the inclusion of the voice of developing countries in creating an international framework for data exchange. He believed that their unique experiences and perspectives can contribute to the development of inclusive and equitable policies that address the specific challenges faced by these countries.

The promotion of data ownership and a right-based approach to data transactions was emphasized. The Rwandan government was cited as an example, having established a data protection office under the National Cyber Security Authority to protect data while allowing flow and respecting privacy. This approach recognizes the importance of user-based control in data transactions.

The support of development partners was deemed crucial in creating a conducive environment for data transactions. ATSUSHI YAMANAKA highlighted the role that academia, private sectors, and civil societies can play in supporting the creation of such an environment. Learning from each other’s experiences was identified as a valuable process.

Creating conducive mechanisms for free data flow requires a multi-stakeholder approach. The Internet Governance Forum (IGF) was cited as an example of a platform that encourages collaboration and dialogue among different actors to address challenges related to data flow.

Concerns were raised about data exploitation and data colonialism in developing countries. It was noted that developing countries often feel that their data is being exploited, and that information flow is skewed in favor of certain countries or organizations. This calls for addressing power imbalances and promoting a more equitable distribution of benefits from data transactions.

Bilateral organizations were urged to support the creation of an ecosystem that promotes trusted data flow. This emphasizes the need for cooperation and partnerships between countries and organizations to establish frameworks and mechanisms that ensure data is exchanged in a secure and trustworthy manner.

Government involvement was highlighted, emphasizing the importance of providing the right information and tools to government officials to ensure safe data transactions. Sharing of good practices and interactive dialogues with governments were also supported.

The transaction of data should not be solely driven by economic or social benefits, but should also consider global benefits. Certain types of data, such as climate and forest data, were highlighted as global public goods that can benefit society as a whole. A broader perspective beyond economic considerations is necessary for responsible and ethical data transactions.

ATSUSHI YAMANAKA advocated for integrating the free flow of trusted data into discussions about digital public goods and infrastructure. Data, particularly data related to natural resources and threats to them, was considered a public good that promotes transparency and collective action to address environmental challenges.

In conclusion, the importance of data exchange and digital technologies in healthcare services and beyond was emphasized. The need for secure data exchange, the voice of developing countries, data ownership, and the involvement of development partners were highlighted. Conducive mechanisms for data flow require a multi-stakeholder approach. Concerns were raised about data exploitation and colonialism. Government involvement, sharing of good practices, and considering global benefits were stressed. The notion of data as a public good and responsible data transactions were emphasized.

Mayumi Miyata

Mayumi Miyata discusses the concept of Data Free Flow with Trust (DFFT) in the context of development, aiming to facilitate the safe and transparent participation of developing countries in the international data market. She emphasizes the need to integrate DFFT into development programs and policies to anticipate future cross-border data exchanges and maximize data utilization.

Miyata highlights the importance of providing developing countries with the necessary infrastructure and environment to participate in the data market. By incorporating DFFT into development programs, countries can create an environment that encourages their active involvement in the international data market, leading to data-driven socioeconomic development.

Additionally, Miyata emphasizes the significance of multilateral stakeholder involvement in creating mechanisms to promote the free flow of trusted data. She argues that this involvement is crucial for addressing imbalances in data exploitation and rectifying the skewed flow of data, which often leaves developing countries feeling exploited. According to Miyata, it is essential to address these imbalances to ensure that developing countries can capitalize on the potential of their own data.

Miyata also advocates for the establishment of global standards for data transactions that extend beyond economic and social benefits. She provides examples of legal barriers encountered in data sharing, such as restrictions on data-sharing during a COVID-19 telemedicine project involving 12 countries. Some countries, like Indonesia, have limitations on exporting data from their hospitals, while national security concerns can restrict the sharing of environmental data, such as forestry data. Miyata believes that global standards would help overcome these obstacles.

In conclusion, Miyata supports the development of frameworks or global agreements that facilitate data sharing and transactions for global benefit. She suggests that disassociating personal information from data can make projects more feasible, and highlights the advantages that a framework would have provided in their COVID-19 telemedicine project. Overall, Miyata believes that integrating DFFT into development agendas, involving multiple stakeholders, and establishing global standards can enable developing countries to safely participate in the international data market.

Jean Philbert Nsengimana

The analysis highlights the importance of striking a balance between openness and data protection in relation to cross-border data flow and digital data governance. It recognises that data has become a valuable resource, often referred to as the “new oil,” which both state and non-state actors seek to exploit. Therefore, regulators and policymakers have a responsibility to safeguard the sovereignty, privacy, security, and digital rights of users while also promoting openness.

In the context of Africa, the analysis points out the potential benefits of cross-border data in bringing together the continent into a digital single market. Africa is currently in the process of creating the largest free trade area in the world, which could have significant economic and developmental implications. The report suggests that digital infrastructure, powered by wireless networks and satellites, can play a crucial role in connecting different parts of the continent. By transcending borders, this interconnectedness can foster collaboration and facilitate seamless data exchange.

Additionally, the analysis highlights the need to amplify and strengthen African voices in global digital data governance. It argues that although global platforms like the Internet Governance Forum (IGF) play a critical role in shaping digital data governance norms, it is important to adequately represent the perspectives and interests of African regulators and stakeholders. Strengthening African voices within the IGF can help ensure that decisions regarding digital data governance align with Africa’s unique social, economic, and political circumstances.

In summary, the analysis underscores the significance of considering both openness and data protection in cross-border data flow and digital data governance. It highlights the potential benefits of cross-border data for Africa, particularly in terms of economic integration and digital connectivity. Furthermore, it emphasizes the importance of including and empowering African voices in global digital data governance forums. By doing so, a more inclusive and representative approach to digital data governance can be achieved, leading to fairer outcomes for all stakeholders involved.

Chrissy Martin Meier

During the discussion, the audience raised several important questions related to data localisation and its potential impact on fragmentation. The primary concern was how to achieve data localisation without exacerbating the issue of fragmentation further.

One question that arose was regarding the role of the Institutional Arrangement for Partnership (IAP), spearheaded by Japan. Unfortunately, further details about the specific role of the IAP were not provided in the given context. However, it can be inferred that the IAP may have some relevance in addressing the challenges and complexities associated with data localisation and fragmentation.

Another question raised by the audience was related to the integration of the SWIFT system and the new financial transaction system spearheaded by the BRIC member nations. The specific details of how these two systems will fit into the broader framework of data localisation and fragmentation were not elaborated upon. However, it can be assumed that integrating these systems would require careful consideration and coordination to ensure that they align with the larger goals and objectives.

Additionally, the audience sought clarification on how country-led efforts to establish their own digital currencies, often referred to as Central Bank Digital Currencies (CBDCs), will fit into the picture. Unfortunately, the discussion did not provide specific insights into how CBDCs would be incorporated and their potential impact on data localisation and fragmentation.

It is clear from the audience’s questions that there is a concern about balancing the need for data localisation with the potential risks of increasing fragmentation. Addressing this issue requires careful planning and collaboration among stakeholders to establish harmonised frameworks and standards. While the specific details and answers to the audience’s questions were not fully addressed, the significance of these concerns was acknowledged during the discussion.

Tojima Hitoshi

Both speakers emphasize the significance of data flow with trust in achieving digital transformation and development goals. JICA, or the Japan International Cooperation Agency, has recognized the value of digital technologies in improving the efficiency and effectiveness of their cooperation program. This indicates their understanding of the potential benefits that can be derived from incorporating digital solutions into their operations. The Government of Japan, on the other hand, has been actively promoting the concept of data-free flow with trust (DFFT) since 2019. This demonstrates the government’s commitment to facilitating the secure and unrestricted movement of data.

The notion that data is referred to as the new gold is echoed by both speakers. Data is recognized as a valuable asset that contributes to the progress of nations. By viewing data in this way, it becomes evident that its free and secure flow is vital for unlocking the full potential of digital transformation. Furthermore, the speakers highlight the need for trust in data flow. Trust ensures that data is handled with integrity, confidentiality, and accountability. It establishes a foundation on which digital transformation and development can flourish.

The speakers’ positive sentiment towards data flow with trust reflects their belief in its transformative power. They argue that allowing data to flow freely, securely, and with trust will enable nations to fully leverage the benefits of digital transformation. With the overarching goal of helping partner countries achieve tangible development outcomes, JICA recognizes that data is instrumental in accelerating progress towards the Sustainable Development Goals (SDGs). This reiterates the importance of data in driving socio-economic development and highlights its role as a catalyst for achieving the SDGs.

In conclusion, both speakers advocate for data flow with trust as a critical prerequisite for digital transformation and development. JICA’s adoption of digital technologies and the Government of Japan’s promotion of data-free flow with trust demonstrate their commitment to harnessing the power of data in their efforts. By recognizing data as a valuable asset and emphasizing the need for trust, they provide a compelling argument for the free and secure movement of data. The speakers’ positive sentiment underscores the significance of data in accelerating progress towards the SDGs and achieving tangible development outcomes. Overall, their insights shed light on the essential role that data flow with trust plays in unlocking the full potential of digital transformation and driving sustainable development.

Gordon Kalema

The importance of formulating a data ecosystem that prioritizes people’s understanding and comfortability is emphasized in this collection of arguments. It is argued that a data ecosystem should be designed with a focus on ensuring that individuals have a clear understanding of how their data is being used and feel comfortable with its handling. This sentiment is supported by the observation that there has been a grey space in discussions around data where uncertainty existed.

Policies play a crucial role in creating a conducive data ecosystem. Rwanda’s implementation of a data protection and privacy law two years ago is cited as an example of the importance of policies. It is noted that a grace period of two years was given for people to understand and adapt to the new regulations, and from October 15, a cut-off date will be implemented. This demonstrates the role of policies in shaping the data ecosystem and providing a framework for data protection.

Balancing regulations with people’s comfort and understanding is deemed necessary. The argument is made that while regulations are important for safeguarding data, they should not hinder people’s ability to comfortably navigate the data ecosystem. Transitioning from a regulatory focus to a people-centric approach is highlighted as a valuable lesson, with an emphasis on putting people first before policies.

The potential for developing countries to be part of and even lead the data economy is mentioned. It is noted that data understanding and the data ecosystem are still uncertain areas in which everyone is learning. This suggests that developing countries have the opportunity to actively participate in and shape the data economy, potentially taking on leadership roles.

The significance of creating granular procedures and policies that can be easily understood by consumers is underscored. The example of Gordon’s country, where data protection and privacy laws were enacted two years ago, highlights the need for policies that are accessible to the general public. It is implied that simply having a legal instrument is not enough, and that policies must be designed with consumers’ understanding in mind.

The intentional structuring of organizations and dedication of resources to drive data discussions are emphasized as important factors. The establishment of a data protection office under the National Cyber Security Authority is cited as an example of intentionally structuring an organization to train people and facilitate discussions on data protection and privacy. This highlights the importance of organizational commitment and resource allocation in advancing data-related initiatives.

The role of data protectors is presented in a new light. It is argued that their duty extends beyond protecting data to also facilitating the flow of data and ensuring privacy. The perspective that data protectors should be conservative and solely focused on data protection is challenged, and a broader understanding of their role is encouraged.

Driving the digital conversation is seen as dependent on patience, awareness, and people’s ownership of the process. It is suggested that creating a culture of understanding, where people realize the importance of data in powering AI tools and digital innovations, is crucial. This implies that active engagement and participation from individuals are key factors in driving meaningful discussions around data and its applications.

To build a strong and sustainable data ecosystem, leveraging support from countries and international organizations is deemed essential. The argument is made that common protocols, tools, processes, and frameworks or policies should be put in place through collaboration with external entities. This suggests the need for partnership and cooperation at a global level to establish cohesive and effective data management practices.

The private sector is portrayed as having an important role in supporting emerging economies in terms of tools, processes, and policies. The argument calls on the private sector to contribute to the development and advancement of data-related initiatives in emerging economies, potentially by providing resources and expertise.

Promoting more innovations and championing transformative digital tools that are paired with useful data is posited as a way to increase understanding and appreciation of data’s value. It is suggested that when people can see the practical applications of data through innovative tools, they are more likely to grasp its significance. Therefore, a deliberate focus on encouraging and promoting innovative solutions is advocated.

Rwanda is portrayed as open to being a data champion. The country’s willingness to embrace and advocate for data-related initiatives is highlighted, suggesting a commitment to playing an active role in shaping the data ecosystem on a global scale.

The significance of the youth in the digital industry is emphasized. With over 70% of the population in Rwanda being below the age of 35, it is argued that young people are not only users and consumers of digital technologies but also bring disruption to the industry. This highlights the potential of youth involvement in driving digital innovation and growth.

Transparency in data sharing may be hampered if institutions are not comfortable sharing low-quality data. It is suggested that lack of transparency might be due to institutions trying to hide something harmful. This observation highlights the potential challenges in achieving full transparency in data practices and the importance of ensuring data quality.

Emphasizing data quality is suggested as a means to promote transparency and openness. It is argued that by focusing on data quality, institutions may feel more comfortable in sharing data, resulting in increased transparency. This further underscores the interplay between data quality and transparency in the data ecosystem.

In conclusion, this collection of arguments highlights the importance of formulating a data ecosystem that prioritizes people’s understanding and comfortability. Policies, balancing regulations with people’s understanding, the role of developing countries, granular procedures and policies, intentional organizational structuring, data protectors, driving the digital conversation, leveraging support from countries and the private sector, promoting innovations, and youth involvement are all key considerations in shaping an effective and sustainable data ecosystem. Additionally, the challenges of transparency, data quality, and the role of Rwanda as a potential data champion are also addressed.

Jean-Jacques Sahel

The analysis explores various aspects of cross-border data flows, privacy, and security in the digital economy. It emphasises the need to balance data flows with trust and privacy. Data flows are integral to our daily activities, both economic and personal. However, it is crucial to address the trust deficit between users and companies. To achieve this, public policy frameworks must embrace the free flow of data and avoid threats related to data localisation.

Moreover, the analysis advocates for open, interoperable, and standards-based regulatory models for data management. Progressive data transfer solutions have emerged in countries like Singapore, Brazil, and Japan, including certifications, consent for adequacy agreements, and interoperable privacy laws. The global cross-border privacy rules (CBPR) system is highlighted as a trusted mechanism for facilitating data flows between jurisdictions.

The inclusion of voices from developing countries in ongoing discussions about global frameworks for cross-border data transfers is also emphasised. Interoperable standards and certification systems can be applied globally, and the right voices are essential to ensure the global applicability of these frameworks.

The analysis acknowledges the role of companies like Google in providing access to information, especially in developing countries. Google sees itself as an information company that enables people worldwide to access relevant information. The internet has revolutionised access to information, and Google’s tools and products have played a significant role in facilitating this accessibility.

The importance of businesses, particularly small and medium-sized ones, understanding and integrating privacy practices for trusted data flows is highlighted. Certification requirements and good practice standards for data privacy exist, and businesses can adhere to them. Google has invested in funding advisors to help businesses understand these requirements and implement them. Embedding privacy practices directly into products through privacy by design principles is also deemed possible.

Privacy and security are considered crucial in handling data. Google’s experience and understanding of good practices in privacy and security are cited to underscore the need to incorporate privacy and security in both product creation and transactions.

The analysis emphasises the need to raise awareness and understanding of privacy and security principles among users and the business community. It is argued that this awareness reinforces trust and ensures the adoption of good privacy and security practices.

Regarding data localisation, the analysis suggests that the decision should be based on the nature of the data and its potential use. Examples, such as health data during the COVID-19 pandemic, demonstrate cases where data localisation may be necessary for the benefits it brings. However, the analysis does not explicitly endorse or reject data localisation in general.

A strategic approach to handling data, rather than a purely regulatory approach, is advocated. It is suggested that this approach should consider empowering regions, strengthening local economies, reinforcing local content creation, and other factors relevant to the specific goals and needs of each region.

Transparency is encouraged in terms of privacy and security. While acknowledging the existence of cultural differences, the analysis believes that a baseline level of good practices in privacy can be universally achieved. Reference is made to ISO-type security standards as a precedent for globally accepted standards.

Cooperation is deemed necessary for addressing the challenges related to cross-border data flows. The analysis highlights the difficulty of swiftly achieving a full global solution but suggests starting by creating connections between certain countries and gradually expanding from there.

Lastly, the analysis rejects the idea of having separate privacy and security standards for developed and developing countries. It argues that such separate standards would perpetuate disparities and hinder the goal of reducing inequalities.

In conclusion, the analysis emphasises the need for a balanced approach to cross-border data flows, incorporating trust, privacy, and security. It promotes open, interoperable, and standards-based regulatory models, the inclusion of voices from developing countries, and access to information. The significance of businesses understanding and integrating privacy practices, as well as raising awareness and understanding of privacy and security principles among users and the business community, is also highlighted. The analysis advocates for a strategic approach to data handling, transparency, and cooperation while rejecting separate standards for developed and developing countries.

Session transcript

ATSUSHI YAMANAKA:
a minute or so. We’re still waiting for one more expert to join in person. So thank you so much for your patience and we shall actually start in a minute or so. We’re still waiting for one more expert to join in person. So thank you so much for your patience and we’re still waiting for one more expert to join in person. So thank you so much So maybe I think we shall start actually. We have one more expert actually who’s going to join in person but he’s trying to find his way here. He just informed me that he’s somewhere. Ah, here he is. Yes. Yay, yes. So good afternoon for all. Thank you for actually coming to this session called Opportunities of Cross-Border Data Flow. I’m a senior advisor on digital transformation at JICA, who is actually privileged to be a moderator for this particular session. We actually have a very distinct expert here from the government of developing countries and also the private sectors, international organisations, umbrella organisations for the development partners, so we could have a very interesting discussion and we urge you, actually, to think about the critical questions, so we can throw at them. The sequence of the event is going to be we’re going to have an opening remark from Mr. Hitoshi, he’s a CDO of Japan international co-operation agencies, JICA, which is actually Japanese co-operation agencies for helping the developing countries. And basically he’s my boss, basically. So he’s going to have an opening session, followed by a different speakers, who is going to give a lightening talk of the contextualising, what it means for DFFT for development or data transactions for development. And then we’re going to go into the Q&A sessions, moderated Q&A sessions that I’m going to actually throw them, a few questions, but after that we’re going to open the floor to you. And we also urge, basically, active participation from the online participants. So we actually have the online facilitator, Chrissy, she’s going to facilitate the process online, so please actually send questions to Chrissy in the chat box so that she could actually moderate the session online. So let’s start, and may I actually pass it to Mr. Hitoshi, chief digital officer of Japan international co-operations, for his opening remark. Mr. Hitoshi, chief digital officer of Japan international co-operations, for his opening remark.

Tojima Hitoshi :
Thank you, Atsushi. Good afternoon, konnichiwa, ladies and gentlemen. Welcome to this roundtable session on opportunities of cross-border data flow. I’m going to start with a brief introduction of DFFT. I’m going to start with a brief introduction of DFFT. As Atoshi introduced me, I’m Tojima Hitoshi, Chief Digital Officer of JICA, Japan International Cooperation Agency, a bilateral institution committed to advancing the socio-economic development of emerging nations through Japanese ODA, official development assistance. At JICA, we have embraced digital technologies to enhance the efficiency and effectiveness of our cooperation program, always overarching goal of helping our partner countries achieve tangible development outcomes. In 2022, we introduced our DX vision and launched a practice known as Global Agenda for DX, as you can see at the entrance of this forum. Their primary objective is harnessing digital transformation to improve the well-being of all individuals and to build resilient societies that ensure safety and provide diverse opportunities. However, to fully unlock the potential of DX, we acknowledge that data, often referred to as the new gold, must flow freely, securely, and with trust. Since 2019, the government of Japan has been at the forefront of promoting the concept of data-free flow with trust, DFFT, emphasizing the transformative role of data in what late Prime Minister Abe aptly termed society 5.0. We firmly believe that data is a critical asset for the development of nations, a powerful tool that can accelerate progress toward DX. the SDGs, yet data alone is insufficient. It must flow and transact securely to realize its full potential. In this endeavor, we are also mindful of its challenges of data governance, sovereignty, cybersecurity, privacy, and personal information protection. In this session, we have gathered experts from government, public and private sectors, civil society, and importantly, all of you, both here in Kyoto and participating online. We encourage open and free discussions on the challenges and opportunities of data flow and transactions, particularly within the context of developing countries. Your inputs are invaluable as we collectively work towards creating models that maximize the benefit of DFFT. Lastly, I extend my sincere gratitude to our co-organizers, Daya and Google, for their invaluable support in facilitating this crucial discussion. I anticipate today’s conversation will be engaging and constructive, making a substantial contribution to the advancement of DFFT for development. Thank you very much. Arigatou gozaimashita.

ATSUSHI YAMANAKA:
Thank you, Tojima-san, for your opening remark. So now we’re going to go into the lightning sessions. We’re going to have five distinct experts here. We’re going to have, first, Ms. Miyata Mayumi. She’s the chief representative of JICA Tunisia office, but she used to be a director of the STI DX office in JICA. She’s going to talk about the DFFT for development concept of DFFT. And then we’re going to pass it on. on to Mr. John Philbert and Sengimana. He’s the Chief Technical Advisor of Africa CDC. He’s going to be also online. And then we’re going to pass it to Gordon Karema to my left here. He’s Director General of the Ministry of ICT and Innovations in Rwanda. And then to Kay McGuinn. She’s a Senior Policy Advisor of Digital Impact Alliance. And the last but not the least, Mr. John Jack Sahel, Asia-Pacific Head of Content Policy and Global Head of Telecommunication Policies of Google. So, Miyata-san, can I pass the floor to you? Miyata-san, maybe your mic is muted. Sorry.

Mayumi Miyata:
Can you hear me? Yes? Yes, we can. And also, I’m showing one slide. Yes, it’s fine. OK. So thank you very much. This is Miyata from JICA. I’m very delighted to be joining this session as an ex-director in charge of the ex in all the JICA projects and programs. And one of the things that I did with my colleagues is to conceptualize a so-called DFFT in the development context. And here, I’d like to explain this slide, which is also made available to our session page on the IGF website as a background paper. So the concept of DFFT for development, as we propose, is summarized in this sheet. And so the background is that developed countries are positioning data utilization as a source of national power. And they’re promoting them to get more data. Promoting them. and then getting more data and circulating them more data and then getting more values at the end. On the other hand, there are still many areas in developing countries where the infrastructure and environments are still at fragile stage and not maybe at that level. So what is the DFFT for development? Is to realize data-driven socioeconomic development of developing countries through enabling them to participate into international data market in safe and trusted ways. So in order to push this agenda, how can we do that? So on the right-hand side, we have laid out some elements here. And so in the white space, this is a kind of typical system architecture diagram starting bottom from infrastructure, data layer, data integration platform and data space services and having overreaching regulations institution on the right side. And blue highlighted areas are the kind of entry points where we thought quite useful to kind of package DFFT together with our development programs, for example. So support for a system operation deals with the regulations institution. Some of the intervention in our programs deal with digital strategy for our entire country or region or entire sector or industry. So in those exercises, it’s good to think about the cross-border data flows in a trusted ways. And another, secondly, is the data utilization. So we have a number of projects where we did. dealing with specific applications in energy or mobility, or in health, for their specific purposes. And when we support this, when we implement those programs, we also anticipate future cross-border data exchanges, so that we don’t hinder their potential of data utilization. So here are the kind of framework for thinking that we like to propose. And some of the detailed explanations are given on the following slide. I’m not going to explain all of them. And in the session, I would be happy to share some of the concrete examples and the challenges I would like to hear from other panels and the participants. Thank you very much.

ATSUSHI YAMANAKA:
Thank you, Miyata-san, for the concise, actually, concept of explanation, the concept of DFFT for development. As Miyata-san mentioned, the data without flow, data without transaction is data, no data, right? No gold, basically. So it’s very, very important for us to see what would be the safe and trusted ways of transacting data. So that is really the concept behind the DFFT for development. So now let me also pass it to Jean-Philippe Bernseng-Imana. He’s a Chief Digital Advisor for the CDC Africa. So she’s actually advising on a lot of health-related data, which is critical in terms of privacy and also safeguarding as well. So Jean-Philippe, can you actually have a lightning talk for you for five minutes? Absolutely. Thank you so much, Toshi-san.

Jean Philbert Nsengimana:
Good afternoon, everyone. So it’s half past 11 p.m. here, and I’m only here because Toshi-san is my good friend, and today he’s surrounded by two other… very good friends and colleagues, Kay McGowan and Gordon Kalema. Otherwise, I’m sure there is enough expertise in the room to dissect this topic. My name is Jean-Philippe Ntsengimana. I’m the Chief Digital Advisor at the Africa Centers for Disease Control and Prevention, and also work as serve as Senior Advisor at the Digital Impact Alliance. So the theme of cross-border data is extremely interesting and timely in the African context because of several reasons, but I will only talk about three reasons. Number one, Africa is uniting in the world’s largest free trade area. Previously fragmented into 54 markets, since 20… …a historic shift is… consumers. And while most of the other types of cross-border infrastructure such as roads and railways are lagging behind, digital infrastructure powered by wireless networks, satellite that are border agnostic constitute the only means to meaningfully interconnect the continent in the immediate term. So there is no question that cross-border free flow of data will benefit Africa’s vision to unite into a digital single market. Number two, I want to address the issue of openness and sovereignty and protection of data. Openness is good. It’s the only thing that would allow us to really harness the benefit of data, but we are extremely conscious also that there are many forces, state and non-state backed forces, as my previous predecessor speaker talked about, that seek to exploit the data as the new… new oil coming from Africa. So African regulators and policymakers must balance openness while protecting not just the sovereignty, but also the privacy, the security, and the digital rights of the users. And the only way to do that is through collaboration between different stakeholders who can enable appropriate data flows while safeguarding sensitive information. And this is particularly important when it comes to health data. People, as they move across borders, they need continuity of care. But at the same time, they can also transmit pathogens and propagate outbreaks leading to pandemics. So that control that balances protection and openness is very important. And it’s a challenge, not just an African challenge, but a global challenge to be able to handle. Number three, IGF is there to enable a global digital data governance. And I’m happy to see that this year the African voices are there. But this needs to be increased and be strengthened. Africans must lead in governing cross-border data to meet the continent’s needs, first and foremost, while enabling the global interconnected economy. By working together, we can build consensus on solutions such as localized health data storage, increased internet exchange points, and harmonized regional data regulations. So those are the three points I wanted to submit. And I’m really looking forward to a great conversation and a great IGF. Thanks so much. Over to you.

ATSUSHI YAMANAKA:
Thank you, Joseph. Thank you, John Philbert. And he actually had a great, actually. insight into the balance between the openness and also protecting the privacies, but also about sovereignties of the countries as well. But you know, he also mentioned about how Africa is moving forward with one digital market. So if we are lagging behind other countries in the world, actually if we are lagging behind, I think Africa as in many of the innovations such as like M-Pesa or mobile monies, I think they may actually have the best example of it. So what do you think, Gordon, Mr. Gordon Kaleva, he’s a DG of Ministry of ICT.

Gordon Kalema:
All right, good afternoon everyone. Great to be here on this conference. I want to first of all thank the organizers of the session. I think it’s at the right timing, at a time where we are discussing the internet we want. I think it is equally critical that we start discussing the kind of data ecosystem we want. Greetings from Rwanda, and I want to give my remarks from the perspective of a policymaker. I come from the Ministry of ICT Innovation, we do policies, we put in place frameworks, and as my predecessor speakers mentioned, as the global economies attempt to move into data value, creating processes, creating frameworks, it all starts with the role of respective countries. What is it that you do as a country, and what is it that you do as an individual in contribution to this ideal data ecosystem? And definitely we can see that we are moving from a gray space, a kind of a phase where the discussion around data is quite uncertain. It’s something that people have been shy away from talking about and increasingly we are seeing now countries and organizations and individuals being more open. So how do we encourage that? As a policymaker, and I want to use some examples of our own experience back home, we put in place a data protection and privacy law two years ago and we realized that before we get into the actual implementation we needed to give an ample time for people to be comfortable and understand the topic. So we gave sort of a grace period of two years and I’m glad to mention that today on 15th, this month of October, we are celebrating the cyber security month and on 15th that’s when we are going to be having our cut-off date. So I wanted to highlight the role of having policies in place. So we need to be able to have policies, laws and institutions strengthened, but then importantly we need also to realize that we are working with people, we are working with humans before the balance between going with what the policy says, what the law says and also allowing people to be comfortable with the topic and take ownership is very key. So the transition we’ve had has taught us a lot of lessons that I’ll be able to share maybe in the next opportunity, but for us it was a highlight. People first before policies. Thank you. Thank you Gordon. So

ATSUSHI YAMANAKA:
it’s very very important actually to see the perspective of the people first. I think a lot of IGF is based on the human rights issues, so it’s really important that how can you actually ensure the people first policies in terms of the FFT for development. is also being entertained on that. So may I pass it to the DIO, Ms. Kay. She’s actually Senior Policy Advisors on Digital Impact Alliance. Basically, Digital Impact Alliance is an umbrella organization for the development partners in the area of digital technology or digital support. So, Kay, can you actually give us perspectives on the DFA?

Kathleen McGowan:
Yes, of course. Good afternoon, everyone. First off, I’d like to thank my friends at JICA for organizing this session and the partnership with DIO and framing this important conversation. As Atsushi-san just mentioned, the Digital Impact Alliance, or DIO, as we’re better known, is a platform for public and private development funders to work together to improve investments in digital technology in order to accelerate socioeconomic development and ensure that digital policies and systems are grounded in the rights and aspirations of people. So I, too, am really happy to hear the theme here. So it’s wonderful to have an excuse to visit this beautiful country, beautiful city, but this is also a hugely important topic. Data-free flows with trust are often associated in policy circles with international trade and commerce. In particular, among and between the world’s largest economies. And while this is, of course, true, it’s also an incomplete way to think about data-free flows with trust, right? This idea of establishing the rules and mechanisms to enable safe cross-border data sharing also has tremendous potential to advance socioeconomic development for everyone. And that includes all countries, but it’s, I think, especially relevant right now to countries and communities that are working to close gaps. such as access to formal financial services, quality education, universal health care. And then when you move beyond borders, the impacts of climate change and disease or pandemic are just a couple of examples that feel particularly tangible to all of us today. So all to say the opportunities for digital free flows with trust to solve global challenges, I would say are limited. And so I was asked to speak about the opportunities as well as the challenges. And I do truly believe that we can’t even quite fathom what the opportunities are, especially with the advent of AI as we’re seeing this. Fortunately, I think the challenges, while they are real and they’re formidable, they are not limitless, at least I hope not. I’m not naive, we’ve already heard people talk about the fact that there are going to be datasets that countries will not share, or at least they will not share broadly due to national security concerns or to protect economic interests. And yet we also know that there are vast amounts of digital data that could be safely shared for the benefit of humanity and people while respecting these security issues and sovereignty. So economists like to talk about stranded assets, right? Resources whose value are not fully realized. And I like this analogy because data, whether it’s locked up in a commercial platform or in a government server, I think as we move more and more into the digital era, data is the ultimate stranded asset. And I think that’s, you know, we’ve heard references to data being similar to oil or gold, but you know, in fact, it’s not, right? It’s a non-rivalrous resource. It’s not finite. There’s no scarcity. concern that should incentivize hoarding. In theory data is infinitely reusable and of course I don’t need to explain to anybody in this room or online the just exponential rate at which new data is being generated now which is only going to increase. So when you think about the unrealized power of stranded data assets to provide the insights and create solutions for both global and domestic challenges, I think harmonizing both data sharing within borders but data sharing across borders is a really urgent priority that doesn’t get the attention it deserves and I do applaud the government of Japan for keeping this on the global policy agenda. So I would argue that the real challenge to unleashing the power of data to advance human development, it’s not technical, although there’s a lot of technical work to be done, but it’s trust, right, which is why I think DFFT is so aptly named. We know that today’s geopolitical realities mean that some of these trust divides are not going to be closed, at least not in the foreseeable future, but I bet that most trust deficits around data can be addressed with serious investment in building and governing data sharing models and tools that give data holders the confidence they need. And these are data holders, they could be commercial actors or public institutions, but I think we can find the tools and the rules, so to speak, to unlock useful data safely, responsibly, and as you guys have put it, to let it flow. Thank you.

ATSUSHI YAMANAKA:
Thank you, Kay, for that. Actually, exponential growth of the data is really something that we would like to explore. And then what Kay actually mentioned about tools for actually safeguarding and utilizing this. I think this is going to be a very, very pressing topic for the next speaker, Mr. Jean-Jacques Chahal. He’s from Google. So oftentimes Google has been criticized maybe from the circles, saying, okay, this is actually data oligopolies. But at the same time, I think tools and also some of the services and products that they can offer has also had tremendous, actually, potentials for developing countries as well. So can I pass it forward to you, sir?

Jean-Jacques Sahel:
Thank you very much. Yes, I think you can hear me. And thank you, Asushi and the Japanese government, for organizing this session. And it’s really good to see many of you in the room, including some faces that I’ve seen since very early IGFs. So thanks for being back. So I wanted to share our perspective and touch in particular on public policy framework, following on a little bit from what Gordon was saying. And hopefully we’ll have a good dialogue taking it a little bit further. And when I think about this topic, I think about information. You know, it’s a really timely discussion to have, because it’s about, on one hand, how we protect our users, how we reinforce their trust, but also how we can boost our economies and making the most of the global nature of the Internet and of information flows, something we haven’t always had, something that the global South hasn’t always had. And so we need to think about how we can capitalize on all the positives in this debate as well. It’s quite obvious, I think, to all of us that today data flows underpin a lot of our day-to-day activities, whether economic or personal. You know, the value and the convenience of the global Internet rely on the free flow of information, whether it’s because we can collaborate, like today, with a conference call that brings colleagues from Rwanda and other parts of the world to just talk to us, as if we were in the same room, pretty much, although it’s a very, very big screen, to see Jean Philbert. Or, you know, being able to buy or sell items online, to obtain information, etc., etc. The ability to work seamlessly, to transact, even when we have massive challenges like we’ve just had with the pandemic. We were able to maintain economic activities and also some semblance of social activities in ways that we just couldn’t have thought about just 10 or 20 years ago. And we need to think about how we preserve all that good whilst also having the right protections in place. And I think that’s what goes to the heart of this debate, because threats to data continue to grow. On one hand, you’ve got, you know, trust deficits between users and a company, or indeed between users and a country, or foreign countries and foreign organizations, people being worried about daytime issues, and we’re at an important inflection point in these debates. Now, if we think about it from a legal and policy framework, companies largely rely on contracts for transfers. And contracts have their place, but they’re not necessarily right for every transfer, and they don’t do much to ensure trust between governments or our users. And so we really need to think deep down, how can we avoid a world where we have information winners and information losers, privacy winners and privacy losers? We need to get into a situation where we don’t have countries that have access to new and innovative technologies and countries that don’t. And the only way to avoid that is to avoid artificial barriers to access information and to access technology at physical borders. Instead, we can think and we should think about ways that ensure that both ensure privacy and facilitate cross-border data flows. And I think we see that also when, you know, recently we’ve got the public consciousness focused on things like generative AI, and I think that’s thrown up considerations. about some products that have had privacy built in, you know, privacy by design, and the need for that to happen and to build it into this whole new wave of transformative products that we’re seeing it. And that approach of privacy for design has allowed a number of product companies to launch new products with privacy built in, thinking about local privacy laws and how to meet privacy expectations and how to reinforce user’s trust. And we really need now to think about that as we expand the system. We need to get to a better place because data transfer underlies so much of what we do today as a society and as an economy globally. And companies on their own cannot solve the trust deficit on data. We need, well, the sort of things we have today, we need governments, civil societies, citizens, and industry to come together to work towards a sustainable and global model for a trusted digital economy. And we’ve seen many governments active in this area. Well, Japan, for one, right, during both the G20 and then now this year with G7, with governments calling for frameworks that support the free flow of data with trust. And so how do we do that? So we think that governments and industry and other stakeholders can work together to accomplish this goal of marrying cross-border data flows with trust, with the respect of privacy, and users’ expectations. And we need to think about public policy frameworks that embrace the free flow of data, but avoid the most restrictive types of data localization, which actually could threaten resilience and cyber stability. We need to think about how to have interoperable privacy frameworks, privacy laws. We need to think about cybersecurity standards that are risk-based, that are practical, and to think about the mechanisms that underpin all that with cross-border enforcement of those mechanisms. And all of that will come through open, interoperable, and standards-based regulatory models. All this is feasible, and it’s in the process of happening. We’ve already seen progressive data transfer solutions in countries like Singapore, even Brazil, or Japan in the last few years, right, with each of those creating toolboxes for data transfer solutions. That includes things like certifications or consent for adequacy agreements. And those sorts of processes of toolboxes encourage or promote trust and offer a range of options that companies can use in order to offer privacy-compliant products and solutions, including a cross-border for the data flows. Now we need to think about a sort of multi-country, multilateral approach to all this. And so there’s a number of initiatives that we can consider. For instance, the global cross-border privacy rules, CBPR system that’s emerged recently, which is one of the important steps towards enabling a continued and trusted set of data flows between participating jurisdictions, where we have interoperable frameworks and protections that are valid across those borders. And if we do this right with these new initiatives, these new collaborations, we can end up with increased confidence from users, from customers, from business partners. That’s how we look at it as well. But if we also do it right, importantly, for all sorts of organizations, big and small, that work in this space, we can end up with reduced compliance costs, because you have interoperable frameworks across jurisdictions. We can have consistency of enforcement, which, again, is important for companies of all sizes. And again, if we do this right, we can have improved data security. And with all that, let me try and conclude with a focus – I mean, to me, it’s all obvious that it should serve for for development and the Global South, but we need to make sure that the Global South has the right voice. So we need, as we have those discussions at international level about creating or fostering and taking on interoperable regulatory and standards frameworks, we need to make sure we have voices from developing countries from the Global South present. We’re lucky here at the IGF, as Jean-Philippe was saying, that we have voices from across the world’s regions. We need to have more of that in some of those fora where the global frameworks for cross-border data transfers are being discussed. Countries from all over the world need to take that space. And that need to translate then into, well, small and medium-sized companies or companies of all sizes in all countries of the world. I think the beauty of having interoperable standards and certification systems is that if they’re done well, with the right voices involved in developing them, they can be applied in any company, potentially anywhere in the world, and those companies can then trade and exchange data with anywhere else in the world. That’s a real promise. I think we’ve already seen it in the past few years, but we need to reinforce it now in a system that’s trust-based and that various jurisdictions can be comfortable with. So, let me try and finish. I think there’s a bit of work to do, but we’ve made a lot of progress in the last few years in trying to figure out what might be the right regulatory frameworks, what might be the detail of those data protections and trust-building initiatives that we can bake into companies’ practices through things like certifications. And now we just need to really broaden that model, deepen it, raise awareness of it, and make sure that the right voices are involved in taking it forward. So, much, much more I’d love to discuss, and hopefully we can move into that in the dialogue. Thank you again for having us. No, thank you.

ATSUSHI YAMANAKA:
Thank you, Jack. Actually, he mentioned a lot of, actually, points, but I want to point out, especially the compliance costs, I think, like interoperability frameworks, where everyone… actually can abide by it, that would actually reduce the compliance cost. And another thing I would like to actually point out is I think the importance of the voices from the developing countries to be part of the process. Because oftentimes when you think about data flow, digital technologies, their voice is not yet, I think, has been heard enough. But when you actually create that kind of framework, international framework, the best examples, they are really the next future, basically. So their voices and their inputs must be part of the process, as well as the frameworks that we’re going to create. So thank you so much for actually framing the discussions. Next I’m privileged, actually, since I’m a moderator, I could ask questions first. Since John Philibert, unfortunately he’s in Las Vegas right now, but not for gambling, but he has a very important conference on the health conference. But it’s already almost 12 o’clock, 12 something for him. So let me actually ask him questions first so he could actually go to sleep. So John Philibert, health sector is one of the key sectors where privacy, as he mentioned, is utmost concern, right? However, in order to expand the health services, especially in developing countries where the needs are the most, it is critical to have this secure and safe data exchange. And you mentioned about, you know, the health across the borders. You know, wherever you go, you should actually have a healthy environment. Do you think the developing countries who need these services the most, these establish in such regime? JP, can you hear me? Oh, maybe he went to sleep. John Philibert, are you there? I do not see him online any longer, so. Oh, he’s gone? Yes. That’s very unfortunate, because we wanted to actually hear the perspective of the health perspective, but okay. All right. So let’s actually move on. Maybe we can ask him questions later on online, as I can basically, you know, put it into the report when you actually compile the report. So maybe I can ask John Jack, maybe, with JJ and JP. How can we ensure free flow of trusted data without compromising privacy and national securities? You mentioned that a lot about it. What should the roles of private sector like Google, where they are the big data keeper? I wouldn’t say holder, but the keeper, and also the support of the transactions. What the role should be? It’s a tough question, by the way.

Jean-Jacques Sahel:
I think it can go into a lot of directions. I would say the way I look at it as a starting point is one of the reasons I like to work for Google is that it sees itself as an information company. So for a lot of the products that we have, we allow people to access information, information that’s relevant to them. It’s the basic mission of the company to try and help people or make the information universally accessible and relevant to what users want. And deep down, that’s what I care about, is being able to allow people to access that information. As I said earlier, this is not something that we’ve always had. I grew up in a world that didn’t have the Internet. I think for some of us, that sounds weird. When we didn’t have the Internet, we had very limited access to information. And this was especially true in developing countries. The way that the Internet has enabled us anywhere in the world to have access to tremendous amounts of information, but also some of the underlying technological aspects, is just tremendous. And we should always keep that in mind. So then we get into… So, that’s a role of some of us in the industry where we can help through our various tools and products for people to access information, which I think is an important dimension of the topic. Then, what can we do in terms of trusted data flows? Of course, we can respect the privacy principles, okay, and that’s the gist of what I was saying. I think we’re in a situation where there’s a lot of understanding now of some of the key elements that should feature in good practice privacy, and I think there’s ways to encapsulate that in good practice standards and certification requirements, and that’s in process. But then there’s the next step. The next step is, I was trying to allude to this, is we need to mainstream those protections. We need to help companies be aware of those basic protections, and so we need to work with especially small and medium-sized businesses and everywhere in the world. So, we’ve put in a bit of money, for instance, as a company to help to fund some advisors that can help the companies in understanding better the certification requirements, for instance, and how they can put it in place, and generally speaking, we’re trying to use our various activities to engage with developers and sort of companies that are active online to share those practices with a wider community. Then as we look ahead, I think we can think about how some of the products that we build, which are privacy by design themselves, but could perhaps embed some of the good privacy practices and therefore be used by small and medium-sized businesses. It doesn’t have to be Google. I mean, there might be some specialist actors that develop tools that help companies to sort of integrate those good practices in their day-to-day. So I think there’s both a sort of technical, operational angle to how we can help. the wider industry to take up good practices and then there’s sort of evangelism, if you will, about making sure people are aware of what’s out there. Thank you. Thank you, John Jack. I think

ATSUSHI YAMANAKA:
that he’s alluding to a very important point about mainstreaming or some of the good practices. And I think, Gordon, I think government actually has a lot to actually work needs to be done in terms of advocacy, right? And, well, John Jack was mentioning about mainstreaming advocacies for private sectors, small and medium enterprises, but to the citizens as well. How would you actually, what do you think the government, like in Rwanda or elsewhere, especially in developing countries, how could you, the government, could actually advocate and also trying the citizens to understand the benefits of, you know, the free flow of the data and then what data-enabled economy can actually bring to them? And also, how can you actually ensure that the security and also the privacy and trust underpinning this DFFT is also being advocated and so they feel safe in this kind of environment?

Gordon Kalema:
All right. Thank you, Toshi. Such a great question and a tough one. I will start it off with maybe a scenario. There is something which was mentioned around how developing countries should be able to be part of the process. I would rather mention that the developing countries, or let me say economies, have the potential to actually lead, not just be part of the process, but also lead the process. Because the data understanding and ecosystem and the way it is turning out to be is a kind of space that is still uncertain for most people. And everyone is struggling, everyone is learning, that’s what I believe. And so this role goes in all directions, as you mentioned. There is a role for governments, there is a role for private sector, there is a role for organizations, academia, and so on. And I wanted to highlight a few lessons we’ve learned, again, coming from the government, wearing the government hat. I just wanted to share a few highlights of what we’ve been doing, just to try and drive the point home. Because we need to, again, shift away from just discussing the ideal environment to an actual environment we are living in. I mentioned earlier that we put in place a data protection and privacy law two years back, and we realized that actually just having a law was not enough. We had to do all the global benchmarks you can think of. And then we realized that actually having an instrument in place is not going just to be useful, we needed to also have more granular procedures and policies that are going to be easily understood by the consumers or by the people. And so we had to highlight the role of those who could be data contributors, data controllers, data disseminators, just to make sure that everyone knows their positioning. What is it that I can contribute to this topic? So that’s one. Number two, we also realized that actually we needed to have fully-fledged institutions. And when I say institutions, I don’t mean just the typical government institutions. You could be working in a private organization, you could be working in an international organization, regardless of the size of your company. you the reason it is very important to be intentional in the way you structure your organization work and try to make sure that there are people who are dedicated to drive this whole discussion. So what we did back home we put it in place a fully fledged institution called a data protection office that sits under National Cyber Security Authority and then we had to train people. Now we realized that actually the largest part of the training we relented was to be able to create a culture that tells people that your job is not to protect people. When we are hiring, when we started to train, everyone thought my job is to protect data, is to be conservative, is to stay on data, don’t touch the data and people felt like we need to have a group of army and police officers around the data office and it took to be intentional to tell people that actually their job is not to protect data, is rather to allow data to flow and protect privacy in the process and it’s different. So that’s pretty much what we did and then also that came along with awareness as I mentioned people first. You can have right policies in place, you can have institutions in place, you can have all these things, you can do awareness but it is very important to be patient for people to be aware of this. We realized that the only sustainable way to drive this whole conversation is when people are taking their own ownership. If you’re going to create single digital ID which something that we’re doing, we realized how do you make sure that people have data in their hands and they can allow authentication by themselves and in a process they become comfortable and start to realize that actually with digital innovation that are coming up with the generative AI tools, it’s all sitting on data. And our people, most people will not know, it’s not just obvious, that people are going to know that when I’m using an AI tool, when I’m using any intelligent solution, actually at the back it’s powered by data. So not until you’ve driven the point home and people are very comfortable to understand that actually whatever you’re doing is in the interest of the economy, in the interest of people, then it’s going to be sustainable. Thank you.

ATSUSHI YAMANAKA:
Thank you Gordon for that. Actually, it’s very, very important that the data owners, I think a lot of people do not, you know, they don’t realize they are the data owner, you know, of their own data. And I think that was a very good example of how Rwandan government actually realized that and trying to advocate, yes, you are the data owners, yes, you are actually in control. We keep the privacies, but we also help you to transact these data so that your life, your livelihood is going to be much better than today. So I think that’s a very, very important concept that we should advocate. That’s also the rights-based approach, right? So that is very important. Now, what could, like, development partners could do to support that, okay? You know, because we’re here, really, to support that. The private sectors, civil societies, academia, we’re all here, right? But at the same time, we’re here so that we can, you know, we can actually support development partners in this, create these conducive mechanisms to take advantage of this. What do you think we could do to support them? Of course, we would learn from them as well, from the experiences, but essentially, what can we do to actually co-create this environment?

Kathleen McGowan:
Yeah, so, great question. And I think I’m going to start by pushing back a little bit on this idea that the challenges are so different between developed and developing economies. One of the things that I find most fascinating about this question of how do you create more value for more people from data is that no country, no economic bloc has really figured out the perfect balance. And so I think you’re right about global cooperation. I mean, if you look at my country, I work for a global organization, but I come from the U.S., and we still don’t have a federal data protection law, much less a coherent approach to ensure that the value of data is fairly shared, right? And as Jean-Jacques is well aware, if you look at the case that the U.S. government is making right now against Google, it is all about access to and control of data. So this fundamental question of how do you balance those rights is, I think, something that nobody’s figured out, and that is a collective challenge that requires a huge amount of collaboration, both within policymakers and multilateral institutions, but also bringing in all of the other data stakeholders, including civil society and, of course, the private sector. I will just add one caveat to this, that I do think there’s one issue that does play a little differently for people from developing economies, and that’s the sense that data that is produced by people in their country is being monetized elsewhere without benefiting the local economy fairly. And so, you know, where we think about this tendency towards locking down data and data localization, we like to kind of easily tag that as a poor choice to national security concerns, but I think there is a real sense of exploitation that’s fair and needs to be addressed. Right? You know, all the more reason to ensure that the benefits of data flow both ways. Right? But to your question, I do think there’s been very little investment in trying to find the right governance models and mechanism, those rules and tools that I referred to. to earlier that will give decision makers the confidence to enable cross-border data flows. Right? There’s been some good work to set up data trusts and data stewardship models, but they’re really limited. As Jean-Jacques said, you know, we’re either operating in a commercial contract area or in academia or research, you’re finding these bilateral kind of one-off agreements. And so I think the time has come for us to settle on a few different broadly accepted, well-governed mechanisms that make data sharing the rule rather than exception. Right? But to do that, you have to have all stakeholders at the table, which I think is the role of funders of multilateral organizations, and ensure that these conversations are not just multilateral between governments, but also multi-stakeholder, right? Because everybody has vested interests here. Thank you.

ATSUSHI YAMANAKA:
Thank you, Kay. Yes, you’re completely right in the sense that I think it is really, you know, multi-stakeholders approach is necessary, because conducive mechanisms we cannot create, like one entity cannot create conducive mechanisms. And if you want to really have agreement or general consensus rather, not agreement, but consensus, in order to actually promote the free flow of data, I think it is very, very important to have multilateral stakeholders, multi-stakeholder approach that’s exemplified here in IGF. But also, going back to the data sort of colonialisms, or maybe data oligopolies, I think this is a, you know, I work mostly in developing countries, and then I also feel this, that they feel like their data is being exploited. And the flow of data, or flow of information, is skewed to one So they really feel like, you know, they are being exploited. They actually have a lot of data, but they cannot actually capitalize this. So I think that particular point, I think, has to be rectified if we are going to really promote the free flow of untrusted data. So, Miyata-san, you know, we are a bilateral organization, right? Bilateral organization. What should organizations like us, bilaterals, can actually support creating such regime or the ecosystem, maybe, to promote the trusted data to flow?

Mayumi Miyata:
Yes, thank you, Tsushi-san. As we are working with the government, and also we are kind of developing practitioners, you know, working through projects, so, I mean, the debate of the policy, like making the legal frameworks and all, I think this is done more at the, I mean, government-to-government level through the ministries and policymakers. But I think we are there to kind of pass those information, update it. And also, like what Ms. Kay has said, that the available tools that make people confident to pass the data to others, that’s also we can share. And the things like what we’ve just heard from the Rwanda case, I think that a lot of the government officials that I’m interacting with, they’re quite, yes, aware of the opportunities, that’s no question, but for the risk, it’s quite hard to narrow down their risk that they’re facing. So they kind of blindly block everything from outside. And they’re saying that, okay, all the data were concerning the government you know, it’s concerning with the national security. So, we’ll put everything physically in their territories or something like that. It’s not well, like, studied, like in Rwanda, because you have benchmarked everything. That’s not the case for many countries. So, I think these kind of good practices or sharing, yes, what you just said, the benchmarking are quite important for us as a development partner to pass this kind of information and knowledge. And then also really having a dialogue with the government, what could be, what is really the focus risks that they have to tackle in terms of national security, also in the personal information

ATSUSHI YAMANAKA:
sphere. Thank you, Miyata-san, about that. So, it’s really how can you actually ensure that we give them the right information and right tools, I think, for them to be comfortable on, you know, transacting data and so on. And for that, I think, John Jack, I think you mentioned about tools that Google has created, and many other, actually, companies are creating. But at the same time, a lot of government is concerned, because you hold a lot of data. You know, probably you, Google knows more about, you know, me than myself, right? In this, actually, devices that we all carry now. They know, you know, they know secrets, our secrets here. So, how can you ensure that the right tools, how can you ensure, like, a company like Google can give them the trust, so that, okay, yes, we could actually, are comfortable, actually, transacting data, or basically, you know, they don’t feel like they’re being exploited. What can you do to ensure that? Thanks, Asushi. How many hours have we got?

Jean-Jacques Sahel:
Look So I was mentioning before I think We have Over the years. I think we’ve got to a certain experience and understanding of what are some of the key Foundational elements if you will in terms of good practices in both privacy and security, so I think We need to embody that to reflect that in both how we build our products and then in the ensuing sort of exchanges and transactions so That’s an ongoing process Sorry, there’s just so many facets of the question. I’m trying to think what would be most helpful I Think in terms of You were thinking earlier I was listening to Gordon and then someone made a point about Doing things differently or not between a global South and a global North when I’m listening to Gordon He’s doing the things that any country should be doing doesn’t matter where in the world And so I think I wouldn’t particularly Distinguish between different regions in that sense. I think over there at some level privacy is a cultural Connotation so you might have some slight differences between certain cultures there are those foundational elements that I think we can share generally and I think we need to Reflect that in cross-border mechanisms. So things that companies can build In their products and in their transactions and that governments around the world are happy with because they’re mirrored or interoperable frameworks across jurisdictions, so you have a baseline of Protection and therefore of trust but net that needs to come with a set of other supporting policies and here again, I’m Gordon has mentioned some it’s about raising awareness. And again it that it’s not about Rwanda. It’s not I think it’s true in every jurisdictions Whether it’s the US or Europe, etc We need to build that understanding amongst users as well as in the business community about those principles and why they reinforce trust and how. So there’s quite a lot of work which is about policy initiatives beside the regulation. And then in terms of the sort of the ownership of data and economic potential, if you will, I think we need to be mindful of realities, like simple examples, but with a lot of difficulties behind. Remember during COVID, we’ve been talking about health data and there are certain health data that are very, very personal. So you might want to keep them localized. But then think about COVID, we had to be able to analyze data in order to come up with analysis of the trends of the pandemic and then come up with solutions to it. And that’s true in most areas of medical research. So I think that’s where the complexity goes. We need to not have, it’s not a Mannequin choice between, yes, you should localize data or no, you should not localize data. It’s about which kind of data, what can be helpful? How can you exchange it? What makes sense? And again, I think there’s a lot of evidence already about how you do that, but we need to have that conversation and build this understanding. And then you move on to the next step in terms of empowering certain regions. It’s not, again, just a choice of, yes, we should keep our data here or not. It’s about what you’re gonna do with that data. So Jean Philbert, for instance, mentioned IXPs, right? If you think about data flows, a lot of the internet traffic that is going in and out of Africa actually transit via other regions of the world. That doesn’t have to be the case, right? And it’s not because the Europeans are somehow dictating where that traffic goes. It’s just the way that it’s worked historically for the past 20 years. It doesn’t have to happen. You can build internet exchange points. You can have the data routed locally. That doesn’t cost a lot of money. And actually, then it saves a lot of money. And it can, if it goes well, and it needs to be- accompanied with public policy initiatives, it can reinforce local content creation, it can reinforce local economies, et cetera. So I think that’s where you need to think about it as a strategy, not as a regulatory approach, but as an overall public policy strategy within which there’s regulation and within which there’s cross-border cooperation. Sorry, that’s a lot of, I could go on for a while.

ATSUSHI YAMANAKA:
Well, I know that I’m actually giving a hardball question. So that’s the beauty of actually inviting a company like yours, Google, to actually be part of this discussions. But a lot of, actually, I won’t actually go into the discussions of infrastructures, but before I go into it, a lot of actually data discussions, data transaction discussions is actually, even today, I think it’s all about the economy. And then, let’s say Greece, like health and so on. But there are actually beyond that. Some of the data flows, I think, is beyond that, such as climate data, that we all need to share all this data. Or like some other, for example, forest data. Data is about waters and so on. That actually is a global public good, isn’t it? So that’s also some of the elements that we need to think about it. Not only the data transaction for the economy, but can you do actually data transaction for global goods? So, Miyata-san, you were actually mentioning before we did the discussions, briefing sessions. Do you think you can give us an example of such, the data transactions or sharing of data, which goes beyond just simple economies or simple social benefits, the global benefits?

Mayumi Miyata:
Yes. Maybe, as earlier speakers have mentioned, COVID was one good example. And with our experience, we had a telemedicine project during the COVID-19 with 12 countries. And maybe this could be one area that I can share. So this project connected medical staff working for ICUs in top hospitals in each country. And we had a number of ICU specialists to advise other ICU doctors and nurses on particular patients that hospitals were dealing. And in this project, we had a kind of a legal binders because like, for example, in Indonesia, the hospitals could not take any of their data outside their hospitals, not even their frontier. So we had to make a legal agreement that we don’t touch on their data. And then, so like as earlier speaker said, some of the information we actually, we had system to connect directly to their electrical medical record system, but we couldn’t because of this legal limitation. And then, so I think maybe there are certain ways of course, technically to tackle that we don’t draw the personal information and then just important elements that is needed in the doctor’s diagnosis or maybe have a statistical data for the global trend. But if I think that, yes, it’s if we could, yeah, I think if we had a kind of a framework or certain agreements globally that are some kind of standard that we could have made this project much more easily. So this was something that we learned. And I think for the environmental information as Atsushi-san mentioned, like forestry, these are kind of data also I heard in some countries that are very restrictive because of the national security reason. And so, yes, of course, it’s important when this disaster happens, for example, like the fire outbreak, but the countries are not really ready at this stage, I think, to share everything like that in one hand. So maybe this is what I can say from my side. Back to you.

ATSUSHI YAMANAKA:
Thank you, Mineta-san. Actually, that’s actually a nice segue into the public goods discussions. I think some of these data should be public goods as well, I think. And also, John Jack mentions about infrastructures, you know, creating IXP in Africa, for example, of common friends like in ICANN, he’s really pushing for that. But should that discussion, should the data flow, would be also part of the discussions about the digital public goods or digital public infrastructure that we’ve been all talking about throughout this year, you know, with the G20, the presidency of India is really pushing for these public infrastructures, and also digital public goods. So Kay, should this concept of free flow of trusted data should be part of the DPI-DP discussions? I know you’re passionate about that, so. Yes.

Kathleen McGowan:
Well, I’ve been waiting for a few weeks for this question, so thank you. Wholehearted yes. You know, as Atsushi-san mentioned, digital public infrastructure as a policy priority has gotten a huge boost in the last year, thanks to India’s G20 presidency. And if you look online for this phrase, digital public infrastructure, if it’s not familiar to you, you’ll find that in a nutshell, it refers to an approach to using open protocols and open standards to building out highly inclusive foundational layers of national tech stacks, right? In the shorthand for DPI, it’s usually considered the kind of trifecta of digital identity systems, digital payment systems, and then secure data exchange. And the key, of course, is that they have to be designed, deployed, and governed to be highly inclusive. They have to serve both public sector service delivery, but also private sector innovation. And they have to be interoperable to do all of this. And so countries like Estonia kind of came up with this approach decades ago. And then in the last 10, 15 years, India has really brought it to scale. And some of the impact that we’ve seen there is quite extraordinary in terms of radically accelerating financial inclusion, right, and dramatically improving service delivery, something that they found very, very helpful during the pandemic when governments around the world were looking for mechanisms to be able to seamlessly get social protection or stimulus payments to folks to help them keep going. And so if you think about the goal of digital public infrastructure, it’s really to enable the production of data that is highly relevant to solving global problems, right, whether it’s around financial resilience or health data. You can, by creating these DPIs that reach more people, not only are you getting more data, you’re getting more representative data, right? And I think especially as we, you know, kind of speed into the generative AI era, having that highly representative data of the realities that people face is going to be really important. to be increasingly important to making sure AI tools work for everyone. And again, that then is linking interoperable, highly representative data within countries and ensuring that it can easily move across borders when needed and as appropriate. And so I think absolutely we should, you know, as this momentum is growing for digital public infrastructure scaling, we should absolutely be embedding the concept of cross-border data flows and how you harmonize them into that. And then did you want me to say a word about digital public goods? No, sure. Okay. We also want to give a floor, you know, the questions. Yeah, of course. So just very quickly, these two, DPI and DPG in my world are often kind of used together and sometimes conflated. And a digital public good is really an open solution that can be reused and improved by different countries. And it’s improving an increasingly popular way to build digital public infrastructure. And it’s interoperable and designed, you know, with privacy in mind. So it’s got some challenges, but a lot of upside.

ATSUSHI YAMANAKA:
Thank you so much. I think the benefits of actually the DFFT and DPI and DPG, I think we all agree on that. But how can you, Gordon, how can you actually, you know, like developing countries could put together voices together so that they could really shape the discussions and have a meaningful input, which would, you know, which would benefit actually developing countries? How can you actually put these voices together? And then I promise you I’ll open up the floor after him.

Gordon Kalema:
Thank you, Ashish. And I feel like at this stage I would love to hear more from the audience. But just to shed light on two things, which crossed my mind with your question, you know. and again in a way to summarize, going continental, allowing data to flow across continents, across the globe, I think one of the ways is to leverage the support from countries, first of all, and then international organizations to put in place common protocols, tools, and processes, and frameworks, or policies. That’s very key. Every time you want to engage a country or an external organization that involves two countries, often the discussion around laws and policies comes on top. So as we think through how to build a strong data ecosystem that is going to be much more sustainable, we need to be intentional again in the way we create those policies that are going to make everyone comfortable countries. And thankful, we are here in a forum like this. We need more of these forums. We need more discussions. We need to see the role of private sector, which was my second point. In my earlier remarks, I dealt much on what the government is doing, but I would love to this time pass the challenge to private sector. What is it that you can do? How can you help emerging economies to be strong in terms of tools, in terms of processes, in terms of policies? And also, what we’ve learned as something that is important is to drive this conversation with useful tools. You know, every time again, one of the easiest ways to get people to understand the value of data is when you have a tool that is part of with data being used. So we need to have a deliberate focus on promoting more innovations as countries. We need to see private sector, academia, organizations, companies, come work with governments and specifically emerging economies to tap into those opportunities to create very transformative digital tools that are going to help people. And with that, then the discussion around allowing data to flow, releasing data from different ministries, could be health, could be agriculture, could be education. The discussion is going to be much more easier. So in a nutshell, I think for us we’ve had our own test as a country. This is an open invitation to everyone that is here. We have much more welcome to Rwanda. Come, let’s have this discussion. Let’s create champions on different platforms. Sometimes it works when you create champions. I’m not going to be shy to say that Rwanda is happy to be a champion. We are more than happy to be that. So anyone here in the room, you’re more than welcome to visit Rwanda, the land of a thousand hills. We are focused on data. Thank you.

ATSUSHI YAMANAKA:
Well, thank you for the promotions of Rwanda, by the way. But as I promised, I will open the floor for questions. Oh, yeah. Well, people are. So, please. Yes, yes, please. Actually, you have to stand over there to the mic. Otherwise, well, we have so many questions. I’m not sure if the organiser would allow us actually to entertain so many…

Audience:
questions, please go ahead. Hi everyone, my name is Shilpa, I am a researcher at University of Melbourne and my focus of my research is cross-border data and I also work on open government data and I come from India and I found really interesting your point that you know you were giving, you’re talking about DPI’s coming from India, especially India’s stack and Aadhaar problem. I mean Aadhaar, we started with like the UPI system, digital internet identity systems etc and after doing that you know in between we had the problem of privacy and problem of like what if the government is surveilling us, what if they’re misusing the data and then we had this one judgment which set up the privacy standards for us because as far as people know that you know India just came out with the Data Protection Act before that we didn’t have, we had like set total rules and policies but then now we have a completed, I mean like before that you know it was this judgment which basically laid down guidelines for us and it limited the access of this data, right. It did not talk about like sharing of data even among the government organization, forget about sharing with outside of India. So that’s one point that I wanted to clarify and the question is, sorry, it’s just a point I wanted to make. I find this panel really interesting because you know you’re talking about cross-border data and open data, like why do you need to talk about open data when we’re talking about cross-border data because data can flow but it doesn’t need to be in a data set. I mean like who are we helping if we’re creating data sets? Are we really helping governments? Are we really helping domestic industries? Are we helping giant corporates like Google? So I think the panel maybe got a little, I don’t know, I was seeking some clarity but but I never got it. So I thought like, I’ll just give you this opportunity.

ATSUSHI YAMANAKA:
So the question is the clarity between the open data as well as to the free flow of data. I think we, who do you want to actually ask the questions to be fair to?

Audience:
I mean, anyone can reply. And then, you know, I just wanted to like give you this food for thought that, you know, I hope you know that, you know, we have this massive problem of privacy invasion and predictive advertising, which is about collecting as much as data as possible by corporates or that. They can sell us more products and services even when we don’t want it. So when we talk about like creating data sets and giving it outside the border, who are we really helping at this point?

ATSUSHI YAMANAKA:
No, thank you so much, actually. So maybe we can actually have a few questions because otherwise we will never finish and they’re going to kick us out. So please, actually. So the question number one is the difference between open data and the DFFT. And question number two.

Audience:
Hello, everyone. My name is Tevin Gitonga and I work actively on the topic you’re talking about. I work for a development agency. That’s the German Development Corporation. And I work on, I had a data governance team and I’m from Kenya where I was basically hired to figure out how does a development agency work with a data protection authority. And that’s what I’ve been doing for the last two years. And one of the things that I maybe I was curious about is a few, like two weeks ago, we had an interesting event where we brought about the East African data commissioners together. Unfortunately Rwanda wasn’t there, but we had Uganda, Tanzania, Uganda, and the discussion was on data flows and exactly what you’re discussing here. And perhaps what I’m trying to figure out and maybe you can help me figure out my assignment is what’s the best option? Because we had the data commissioners, we had private sector, both international and local, we had civil society, and we were trying to discuss what’s the best option? for an emerging economy, because what was clear was for the developed economies, there are different versions. There’s the Data-Free Flow with Trust, I think led by Japan and the EU. There’s the CPBR by the US. There’s also the Chinese version of closing all the data. And perhaps what I’m trying to figure out is do we need a new version for developing countries? Which version aligns best to economies that are at very different levels growing? There are laws that are very different levels from, I’m talking about ground lessons of what I do on a daily basis here. Things are very different. We have, for example, in Africa, the AFTA that’s coming up that has a whole clause on digital trade. And perhaps, so my question is what is the suggested solution? So the question is, so what, should it be actually a new set of rules for developing countries? Yes, that’s a good question. Okay, so please, actually, very concise. I will give you like 30 seconds for the questions. What do you think are the risks of taking a deductive global approach to global frameworks, global rules, global protocols? I see a tension between the way the abstract question is being framed about balancing protection against free flow with the kind of very specific needs and examples we’re hearing from people like this gentleman. What that balance looks like will be different in every case infinitely depending on which countries, what type of data, what the incentives are in the market for private companies, what the culture is, social trust, digital literacy, media access, all of this. And if we want, as you said in Rwanda, the solutions to be economically sustainable and driven by need, is it a mistake? Are there risks, either practical or normative in pursuing global frameworks?

ATSUSHI YAMANAKA:
Thank you, so the question is the risk of deductive approach protections versus free flow information. All right, go ahead.

Audience:
Thank you very much, my name is Taichiro Fujino, I’m a fellow here over at JPNIC. address in Japan. My question is about a mechanism for building trust in multilateral environment. In general, trust in security and safety will be achieved by a norm, standard, and importantly a law enforcement. For instance, when Google leak my information, then I can accuse Google or maybe Google will pay fine to my government, so that’s really easy. But on the other hand, in multilateral environment, we need to trust that the counterpart will delete or do something for me. So my question is, again, what is the mechanism for building trust in DFFT or multilateral environment? That’s all. So the question is mechanism of creating trust in the DFT. Okay, perfect. And then? Okay, thank you very much. I’m Ibrahim Mohamed Mohamed from Nigeria, a digital asset officer from Office of National Information and Technology Development Agency as a scholar, as well. We have had, it is crucial, important when it comes to data, privacy, security, but my concern is I have not had like transparency when it comes to processing the data. Because for you to end trust, there is need for you to explain to us how you utilize our data, how it’s being processed. So that’s my concern.

ATSUSHI YAMANAKA:
Okay, the question is, how can you ensure transparency in the data to end trust? Yes. Okay. Please.

Audience:
Hello, I’m very interesting panel. Thank you so much. My name is Minako Morita-Yaga, University of Sussex in the UK. My question is, what kind of data governance is suitable to achieve DFFT, especially for development? The reason I said that is I observe that ignoring the different type of data governance existing in the world is DFFT is not achievable. Let’s say there are three types of data governance in the world now, the market-driven type. type, which the US is promoting, and then on the other hand, human rights-centric approach, which the EU is promoting, and then state-driven data governance, which China is promoting. And I observe so many developing countries are following China, that state-driven approach, where so many of them are strictly measurement of the local requirement, or the open source code requirement, and so on. And without discussing it, I think DFFT is impossible. Thank you. So the question is, what kind of data governance models that should be available, based on these three. So, 30, 10 seconds. Hello, my name is Hassan Habib. I’m from Djibouti. I’m also a JICA scholar. So my question is about the use, like how you want them be more included in such kind of process, how the opportunities that you perceive are like you saw for this kind of in the DPI and the data public, so thank you so much. Sorry, how are the opportunities of using DPI? Yeah, like include… Oh, for the use. Yes. So what are the, okay. Sorry, please. Yeah, hello. I’m Javier Ruiz from Consumers International. I have very brief comment, which is that I hope that the next time we have a panel talking about consumers, we have more consumer organizations there, because I’d be like a panel on gender, not having any women would feel a bit weird, you know, so hopefully for the next one, we’ll get more representation from a broader constituency. My question is actually mainly for Jean-Jacques and Google, because Google is supporting CVPR quite publicly. Your previous council last year came out, but one question is like, are you certified and with the previous APEC regime? And it’s not like particularly the question is, we’ve been, I was looking at the… reasons why companies sometimes don’t certify and there are costs, but also the fear of the audit, you know, that you actually have to open up your systems, you know, and that’s, it would be interesting, you know, from a very large company, how do you see private certification working, you know, as a scalable global thing, you know? If, as I understand, you haven’t actually certified in the system that you’re proposing, and then the, but more importantly, do you think that actually the FTC and other governments in the world are actually struggling to deal with Google, that a private certification agency in a small country will be able to actually handle any issues? The issue is basically, how can you actually see the private certifications, especially in the European countries? Well, how can you deal with private certifications when the FTC is struggling to deal with Google? How can a small private certification agency, I mean, I think it’s a very interesting, it’s important because not in every country you have a state, a good state infrastructure to make companies accountable, but for a small private companies, you know, it may be hard to actually deal with a company like Google. Thank you. So, yes, so Chrissy,

ATSUSHI YAMANAKA:
I think I also give like a few, can you actually summarize some of the questions so that we can throw out the panels here?

Chrissy Martin Meier:
Absolutely. We had a few questions on data localization, which I think were perhaps answered in the discussion, but I will say in between, how do we, but, you know, have data localization without making fragmentation more serious? What is the role of the organization spearheaded by Japan called the Institutional Arrangement for Partnership, the IAP? Another question on how does the SWIFT system and the new financial transaction system spearheaded by the BRIC member nations going to fit in to all of this? Same with the country-led efforts to have their own digital currencies, CBDC, how will that fit? Those are the main questions from the audience. Thank you, Chrissy. So I will stop the questions here.

ATSUSHI YAMANAKA:
So can I actually answer, I think there’s questions about the governance models. Anyone would like to actually take the questions on that?

Kathleen McGowan:
Okay, so I completely agree with that paradigm, the global sort of landscape that the professor laid out, and I would say that’s exactly why there’s a need and an opportunity for countries to take a fourth way, right, especially emerging economies that have a lot to benefit from thinking about data as a strategic asset. They don’t need to follow the full-on laissez-faire model of the U.S., but I would certainly hope that there are options that are better for the economy and better for society than following a state-driven approach.

ATSUSHI YAMANAKA:
Transparency for data, and the rule of law for new rule of law, would you like to take it? Okay, so, Jean-Jacques?

Jean-Jacques Sahel:
Yes, so yes to transparency, obviously with a lot of detail underneath that could be discussed. I think just linking it to a couple of the points that were made by other people in the room, we do, even though there are certain different systems, there are some basic elements that I think most people would agree with in terms of what does good look like in terms of both privacy and security, and I think transparency is part of that. And we shouldn’t shy away from, there was a question about global versus local, right? It’s very difficult to get to a full global solution very quickly, but you can start by building bridges between certain countries and hopefully grow. If you look at the, it’s not a perfect comparison, but still, in the security world, we’ve seen some good standards emerge over the years, ISO type standards for cybersecurity that are now pretty well accepted. frankly, worldwide. I don’t think there’s any reason, apart from there are cultural differences here and there, as I’ve mentioned before, but I still think that we can get to a situation where you have at least a pretty good baseline of good practices in privacy, as well, in a similar way as what we’ve seen happen with security. So it’s going to take some more work, but I do think it’s feasible, and I don’t think it has to be a different system for developing countries versus developed countries, because actually, that’s a big risk of having disparities in perpetuating disparities.

ATSUSHI YAMANAKA:
I think that answers the questions about laws and the governance models, right? And also the transparencies, and then also certifications, as well, I think. I’m sure there’s more people who want to talk about it, but I think that’s also part of the answers. Would you like to actually add on that?

Gordon Kalema:
Yeah, just two things. One, there is a question which caught my attention around the role of the youth. I think it came from you. There is something we are doing back home, and realize that actually, every time you have the kind of population where over 70% are the people that are below 35 years, there is a very strong role they can play in terms of leading the way into this industry, I would say. One, because they’re users, they are consumers, they are troublemakers, let me say that. And so, everything you’re doing, could be policies or laws, it is very important to get these people at the center stage. So yes, there is a very strong role of the youth into this discussion. The other one, which I wanted to contribute to, is around the transparency. Again, one thing we’ve learned is that often, people share away, one of the reasons why people are not transparent is because they’re hiding something that is harmful, or they’re just intentionally planning something against you. One thing we’ve learned is that every time could be institutions or organization or a department is you see they’re not comfortable to share data or they’re processing data and the process is not a little bit clear is because of the quality. So every time you’re dealing with low quality data and people are not comfortable to put in limelight the results, then the easiest thing to do is share away and hide. So as we discuss this, I think which is an element we had not talked about, as we attempt to put in place policies, as we attempt to push data to flow, it is very important to build quality data as well because with quality data that’s one of the ways that is going to make people more comfortable to open, even be more transparent. Thank you.

ATSUSHI YAMANAKA:
Thank you so much. They’re going to kick us out. So I wanted to actually get the final words from them but I think they’re going to kick us out because there’s going to be next session. So thank you so much for participating in this very important discussions. Please give a round of applause for the rest of the team and the discussion should continue. Thank you so much. Thank you. Thank you. Okay, okay, guys, I’d really like to take a picture of you guys. Okay, of course. Okay, I’ll take a picture of you guys. Okay, see you. Okay, I’ll take a picture of you guys. Okay, I’ll take a picture of you guys. Okay, I’ll take a picture of you guys. Okay, I’ll take a picture of you guys.

Chrissy Martin Meier

Speech speed

162 words per minute

Speech length

131 words

Speech time

48 secs

Gordon Kalema

Speech speed

150 words per minute

Speech length

2151 words

Speech time

860 secs

Jean Philbert Nsengimana

Speech speed

131 words per minute

Speech length

549 words

Speech time

252 secs

Tojima Hitoshi

Speech speed

120 words per minute

Speech length

456 words

Speech time

229 secs

ATSUSHI YAMANAKA

Speech speed

157 words per minute

Speech length

3433 words

Speech time

1308 secs

Audience

Speech speed

182 words per minute

Speech length

1902 words

Speech time

628 secs

Jean-Jacques Sahel

Speech speed

188 words per minute

Speech length

3432 words

Speech time

1098 secs

Kathleen McGowan

Speech speed

152 words per minute

Speech length

2055 words

Speech time

812 secs

Mayumi Miyata

Speech speed

143 words per minute

Speech length

1228 words

Speech time

514 secs

Next-Gen Education: Harnessing Generative AI | IGF 2023 WS #495

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Moderator

The Digital Trust and Safety Partnership brings together technology companies, including Microsoft and Google, to develop industry best practices for trust and safety. This collaboration aims to create a safer online environment for users by addressing potential risks and harms associated with digital technology.

One key focus area for the partnership is the work stream on digital safety risk assessment. This involves conducting human rights risk assessments, data protection impact assessments, and AI or algorithmic impact assessments. By comprehensively addressing these risks, the partnership aims to identify and mitigate potential harms.

The partnership advocates for the adoption of a risk assessment framework in online safety. This involves identifying risks, reducing them, mitigating harm, and repairing any damage caused. Reporting incidents is also emphasized to ensure accountability and learning from past experiences.

In addition to risk assessment, the partnership recognizes the importance of understanding risk factors and measuring their impact. This helps in developing effective strategies to address online safety issues.

The World Economic Forum’s coalition is commended for its ability to bring together experts from different fields to determine best practices for digital safety. This collaborative effort ensures a holistic approach and cross-sector knowledge sharing.

The Global Coalition for Digital Safety actively counters digital harms through media literacy initiatives. By promoting media literacy, the coalition aims to combat disinformation and educate users about safe online practices.

Involving different stakeholders, organizations, and companies is emphasized throughout the discussions. This inclusive approach promotes innovation and fosters fruitful discussions in tackling online safety challenges.

The issue of technology-facilitated abuse is highlighted, emphasizing the need for comprehensive safety measures that protect all individuals, not just those traditionally considered “vulnerable.”

Furthermore, the importance of gendered safety by design is stressed. Companies need to understand how online abuse affects women differently and incorporate measures to address these challenges. It’s also important to recognize and adjust when gendered safety measures fail.

Support for small and medium-sized companies in achieving online safety is recognized. These companies often face resource constraints, and tools such as the Digital Trust and Safety Partnership and eSafety risk assessment tool can assist them.

The discussion also emphasizes the need to incorporate online safety considerations into privacy design. Ensuring transparency about data collection and its use for safety purposes is crucial.

Finally, the challenges of creating global solutions for online safety that are locally sensitive are acknowledged. Localized and culturally sensitive approaches are crucial to address the unique challenges faced in different regions.

In conclusion, the Digital Trust and Safety Partnership, in collaboration with the World Economic Forum’s coalition and the Global Coalition for Digital Safety, aims to develop industry best practices for trust and safety in the digital realm. Through risk assessment, stakeholder involvement, gendered safety considerations, and support for small and medium-sized companies, the partnership strives to create a safer online environment for all users.

Audience

The Global Coalition for Digital Safety, initiated by the World Economic Forum, is a multi-stakeholder platform aimed at addressing harmful online content. It includes members from tech platforms, safety tech players, government regulators, civil society, international organizations, and academia. The coalition’s work is divided into four work streams: developing global principles for digital safety, digital safety design and innovation, digital safety risk framework, and media information literacy for tackling disinformation. The principles aim to address specific harms such as child exploitation, terrorism, violent extremism, and hate speech. The coalition emphasizes the importance of diverse collaboration, transparency, evidence-based solutions, and understanding the interconnectedness of online issues. It also highlights the need for comprehensive assessment of risks, tackling the challenges posed by immersive and invasive technologies, and sharing best practices. The Digital Trust and Safety Partnership, consisting of companies like Microsoft and Google, is working on industry best practices. The coalition focuses on gendered safety, involvement of non-Western corporations, and engaging diverse voices. It also recognizes the challenges faced by underserved communities and emphasizes the importance of privacy impact assessments. Leveraging data with transparency, developing scalable and culturally sensitive solutions, and involving youth and community participation are key aspects of the coalition’s work. Overall, the coalition aims to create a safe and inclusive online environment through collaboration and best practices.

Connie Man Hei Siu

During the discussion, the speakers explored the differentiation between cybersecurity and online safety, highlighting their distinct focuses and roles. The Web was mentioned as a platform that specifically centres its efforts on cybersecurity aspects.

Cybersecurity is primarily concerned with protecting infrastructure and data. It emphasises preparedness for potential cyber attacks, including safeguarding critical systems, networks, and data centres from unauthorised access, intrusion, and theft. By prioritising the security of essential infrastructure and sensitive information, cybersecurity aims to prevent and mitigate potential damage and disruptions caused by cyber threats.

On the other hand, online safety primarily revolves around ensuring safe and secure user experiences. Its objectives include addressing and combating harmful content present on the internet, such as cyberbullying, explicit or inappropriate materials, and scams. Online safety initiatives aim to create a safer online environment, especially for vulnerable groups like children and teenagers. This involves educating users about potential risks, raising awareness of safe practices, and implementing content management strategies to filter out harmful content.

The speakers agreed on the importance of establishing a clear distinction between these two areas. Differentiating between cybersecurity and online safety allows for appropriate allocation of resources and attention to address the specific challenges and objectives related to each domain. It also enables effective collaboration and coordination among policymakers, industry professionals, and users.

Throughout the discussion, it became evident that cybersecurity and online safety are interrelated but require separate strategies and approaches. While cybersecurity focuses on protecting critical infrastructure and data, online safety centres on safeguarding users’ well-being and ensuring positive digital experiences. Recognising the distinctive roles of cybersecurity and online safety is essential for the development of comprehensive strategies that enhance digital security and foster safer internet environments.

In conclusion, the discussion emphasised the importance of differentiating between cybersecurity and online safety. The Web’s attention to cybersecurity aspects, along with its focus on protecting infrastructure, data, and preparing for cyber attacks, was highlighted. Online safety, on the other hand, centres around combating harmful content and building a safer online environment for users. Recognising these distinctions enables the implementation of targeted measures and collaborations that promote both cybersecurity and online safety, ultimately contributing to a more secure and user-friendly digital landscape.

Session transcript

Audience:
of the Global Coalition for Digital Safety, and then I will hand the floor over to our co-chairs to share part of the work that we’ve been doing since we started the coalition last year. While our time is limited, we also value your input, so towards the end we will open the floor for questions, comments, and your insights regarding the upcoming challenges in online safety. I know there are too many, but at least we want to hear what you think are the main issues that we should be addressing and how we can tackle from the coalition. So, that said, the Global Coalition for Digital Safety is a multi-stakeholder platform launched by the World Economic Forum, and its goal is to promote global cooperation in addressing harmful content online, which includes both illegal content, but also legal content that is also harmful. Our members represent various sectors, including tech platforms, safety tech players, government regulators, civil society, international organizations, and academia. You can find the list of our members on our website, that I can share it later, but the work of the coalition began last year in response to growing challenges related to content moderation, child protection online, and it evolves as we see a generative AI basically everywhere, as you can see here at the forum today. To tackle these issues effectively, we have divided our work into four work streams. The first one is the work stream on global principles for digital safety, and this work stream addresses how international human rights principles apply in the digital context. Early this year, in January, these principles were published and were developed in a multi-stakeholder way, and Kearney, one of the co-chairs, together with Ian Redman from the We Protect Global Alliance, will share more details soon. Secondly, we have the work stream on digital safety design and innovation, and this group identified technology, policy, and processes and design interventions that are needed to advance digital safety. This group is led by Julie here, and also by Adam Hildreth from CRIBS, and the group has already made significant progress, including the recently launch of the typology of online harms, aiming at creating foundational language for online harms. So, thirdly, we have the digital safety risk framework, focusing on the new regulatory requirements that are currently in the scene, and this work stream has developed a risk assessment framework, and is currently working on measures to evaluate the effectiveness of digital safety systems and interventions. So, this group is led by David here, and is also co-chaired by Hill Whithead from the online safety group director of the Ofcom. So, lastly, and before I give the floor to our co-chairs to share more of the nitty-gritty of the work we have done, this year we have launched a work stream on media information literacy for tackling disinformation. This is our most recent work stream, and it aims to emphasize the importance of media information literacy for enhancing digital safety with a focus on disinformation, and Angela here is one of our co-chairs, together with Sasha Havilik, chief executive officer of the Institute of Strategic Dialogue. Well, without taking more time, I will now pass the mic to Courtney first, to provide more insight into the global principles on digital safety. Courtney?

Moderator:
Well, thank you very much, and thanks to the World Economic Forum for

Audience:
bringing us together for all of this work, to be perfectly honest. I wanted to provide just a little bit of background on the principles that was articulated, and just be clear, the question we sought to tackle was how can we meaningfully apply fundamental human rights principles to a digital world in an actionable manner for key stakeholders, government, technology companies, and civil society, and the principles actually came about after the result of some intensive discussions, expert interviews, and consultations among a diverse group of global experts, policymakers, social media, and tech platforms, safety tech companies, and civil society, and academics. You can access the full principles on the World Economic Forum website, and although it may not sound like the most interesting part, I encourage you to start at the appendix, and the over 25 resources that we cited, talking about how many times we’ve been adopting digital safety principles to address specific harms, and that was critically important, whether it was child exploitation, or terrorism, and violent extremism, or hate speech, and the purpose here was to take it up a level, and understand what are the fundamental principles behind all of that, but those resources are still important. So at the outset of the principles, we make a really fundamental point, and that is to articulate the important role civil society plays, help bridging the gulf between public and private institutions, including amplifying the voices of the underrepresented, and most vulnerable, and keeping that in mind, I just wanted to give the high-level notion across the ecosystem, meaning for all of the stakeholders, we said that supporters of the principles should collaborate with diverse stakeholders to build a safe, trusted, and inclusive online environment, enabling every person to enjoy their rights in the digital environment. Second was to seek insights and diverse perspectives from civil society to inform policymaking, understanding emerging harms, and support inclusive and informed decision-making. Third was clearly the need to support evidence-based solutions to assess, address, and advance digital safety, and prevent harm. Fourth is the critical role that transparency must play in approaches to, and outcomes to advance digital safety for a collective response, and lastly, we said that important to recognize the particular importance of helping vulnerable and marginalized groups to realize their rights in the digital world, including the importance of defending children’s safety and privacy online. These were the collective principles across the ecosystem, but following the model that has been so effective in other multi-stakeholder collaborations, we then go on to articulate what this means in practice by sector, for government, for tech companies, and for civil society, and I encourage you to take a look at that. Now we’re in that next phase of the principles, and what did we all commit to? At the core, we committed to fundamentally make decisions and take actions aligned with these principles, and a core responsibility was to raise awareness of these principles across the online ecosystem, including through active promotion, targeted outreach, and the encouragement of multi-stakeholder adoption. In the past year, this has been at the heart of oftentimes how we have conversations with global regulators. It is at the heart of how we have conversations across multi-stakeholder coalitions looking at a specific harm, and one of the most important pieces here is the goal of having all stakeholders hold others to account, that at the end of the day, we’re here for fundamental principles. We know when it comes to a safety perspective, you can have some heated debates among stakeholders, and aligning to these principles helps find the right collective response across the ecosystem. So we hope that these become a living document. They’re intended to be both content agnostic, technology agnostic, and really hold us account as technology evolves, and to be perfectly honest, the landscape of harm evolves. And they are to be that kind of guiding light that brings us back to have healthy discussions about how we shape that work. I got to give big thanks to many in this room for helping build this collective action, and if I don’t put it crisply enough, one of the most important points remained how we continued throughout the process to ensure there was enough external engagement and consultation to be truly inclusive about the development. So I look forward to further of our discussion, but I think I’m supposed to pass the baton to Julie.

Moderator:
Thank you for all that foundational work, and what I love about this project is that it is truly multi-stakeholder, but the different pieces connect really nicely together like a piece

Audience:
of the puzzle. And so I think there is general consensus that principles-based frameworks are going to be the most successful. I can say that as a regulator and as someone who spent 22 years in the tech sector, but I’m going to go back to what Albert Einstein once said, and that is you cannot solve a problem with the same thinking we used when we created them. So by the same token, we cannot hope to effectively address online harms if we don’t identify them, call them out, understand their interrelatedness, and their impacts. And so while there always be differences in interpretation and gravity, it’s really important that we’re speaking from the same lexicon. And I can tell you as a regulator how many times I’ve heard, particularly from startups or companies that aren’t quite startups, I’m thinking about Zoom. In late 2019, they had 10 million active daily users. By April, once we were fully into lockdowns around the world, they reached something like 300 million daily active users. And then the Zoom bombing started happening. And of course, it was named for them. They had to go offline. They had to fix their systems. They lost trust. As a government agency, I’m still not technically allowed to use Zoom. So how do you kind of quantify that loss of trust and what that might translate into loss for a particular online safety product? So understanding the harms and calling them out is important because if we don’t know what the problems are, then we can’t come up with effective solutions. So we all take different approaches to this. And we did some work through our safety by design principles and risk assessment tools of trying to assess online harms as we saw them played out. But we realized we had a perfect opportunity with the Digital Content Safety Working Group to really broaden and expand this. And my partner, our co-chair in this, was Crisp Thinking, a risk intelligence group based out of the UK that was just acquired by Kroll, Adam Hildreth. Brilliant thinkers. They’re doing risk intelligence. So they brought a very different perspective, but you get to a better place when you have those perspectives. So when you’re thinking about online harms, effectively everything that goes wrong in the real world and in humanity can also be playing out online. So we could have created a 300-page tome that was extremely exhaustive. We decided not to do that. And there are lots of different ways you can slice and dice and cut these issues. So a common taxonomy is around content, conduct, and contact. So we use that as one set of framing. But then what we decided to do was to actually group the harms. And we also wanted to differentiate illegal content, which is clearer, and which the companies have different sorts of systems for addressing. There are different technologies to address those issues versus the legal but harmful, what is often referred to as lawful but awful, content as well. But we wanted to find a way to bucket them. And this is where, once we broadened this out, there was a whole lot of discussion about where things belong and where they interplayed. But we ended up ultimately with six categories. Again, I think really well aligning to the principles as well as to a range of human rights that need to be balanced. And so those are threats to personal and community safety, harms to health and well-being, hate and discrimination. The fourth is violence of dignity. Things like image-based abuse, sexual extortion is a manifestation of that, that we’re all dealing with at the moment. I’m looking at Boris. Invasion of privacy, and then deception and manipulation. And you could think of that as any form of social engineering, whether it’s scamming, whether it’s grooming of children, whether it’s misinformation. So you can see that these are broad categories. What we tried to do was then list them. So these are the kind of the current typology of harms. The next step of the project, and this is going to be really interesting, is will the harms of the future simply be supercharged? You know, when we think about immersive technologies and the, you know, when you have full sensory and hyper-realistic worlds where things are happening in real time and private spaces, are things just going to be more visceral extreme? Or are we going to have different kinds of harms? I mean, there are companies right now working on haptics that will simulate the feeling of a bullet wound. There’s a whole new industry around teledildonics. Do I need to explain to you what teledildonics are? Okay. Well, any sort of connected vibrators and sexual tools and haptic suits that will help you feel sexual pleasure, which could be great for someone who is, you know, a quadriplegic or a paraplegic, but if you’re experiencing sexual assault in the metaverse, it will feel like a real sexual assault. But then when we get into beyond immersive technologies into invasive technologies, neurotechnology, nanotechnology, chips implanted in your brain, thinking about what is the last bastion of freedom of expression and freedom of thought when, you know, employers can, you know, read your mind. Already companies like Amazon and Walmart are using these types of tools that go into your ears to manage productivity on warehouse floors. Great applications for truck drivers who might be falling asleep once they start going into the REMs. It will wake them up. But what if, you know, Elon Musk sticks a chip in and it, you know, I don’t know, it fizzes out, it defaults. You know, I don’t know what you do then. Anyway, so it’ll be a creative way to think about can we anticipate what future harms, again, will it be supercharged or will there be a whole new set of harms that we’ll have to engineer out misuse around. And then finally, this is the positive part of the work that we’ll do in conjunction with the risk assessment tools is looking at best practice and safety by design interventions that work, innovations that work. All these companies are dealing with the same wicked problems that, but their platforms are different. But what can we learn from each other in terms of what is working? You know, every platform wants to have a safe, more positive, less toxic platform. We have to remember that it’s when we’ve got humans in the frame, they’ll always find creative ways to misuse that technology. So what do we learn from that? So hopefully the suite of materials will end up being quite successful and used and, you know, help us on that pathway

Moderator:
to a safer online world. Thank you, Julie. David, do you want to continue?

Audience:
Great. So I’m David Sullivan.. You may have heard of the organizations that my other co-chairs work for. You may not have heard of the Digital Trust and Safety Partnership. So we bring together technology companies with different types of products and services to develop industry best practices for trust and safety. And our members include my colleagues from Microsoft and Google, among other companies I see in the room. So it’s been my pleasure to co-chair the third work stream on digital safety risk assessment. I’ve been doing that together with my co-chair, Jill Whitehead, from the UK Ofcom regulator. And so the question that we were asked to respond to is how not just digital companies, but all of us in the sort of multi-stakeholder world can assess risks to digital safety and also try to measure the impact of interventions to address those risks. And risk assessment, you know, I think has become a very hot topic in the world of online safety. You have many different regulatory regimes that require some sort of risk assessment that are taking place. And our role in this work stream was not to develop, you know, how one should comply with online safety regulations in Australia or in the UK or in Europe or in Singapore, but instead to try to distill higher level guidance that whether you are a company or you are in government or regulator, civil society, that you can use across all of the different jurisdictions and around the world where these types of risks are manifesting. So I think in addition to the outputs, and I’ll talk a little bit more about what we have done and what we’ve planned, I want to emphasize, I think, the really valuable process that the World Economic Forum has brought to bear in this coalition. So in our work stream, we recognized that companies and others have been doing all kinds of risk assessments related to the digital space for years, whether it’s human rights risk assessments, data protection impact assessments, artificial intelligence or algorithmic impact assessments. And so we wanted to gather as much expertise as we could to learn what is already being done in order to help figure out what is the right contribution that we can make. So we gathered that input and then we spent, you know, sort of in conversations with Julie or her colleagues joining from very late in the middle of the night or sometimes very early in the morning for me in the western U.S., virtual discussions where we were able to kind of distill a risk assessment framework with a few steps to it, really about identifying risks, reducing those risks, mitigating harms that have occurred, repairing harm, and then reporting. And we coupled that framework with a bank of case studies based on existing practices. So we had a case study about the work of the Digital Trust and Safety Partnership. We had a case study about the safety by design approach from eSafety in Australia. We had a case study about AI and Microsoft, among several others. And we published those case studies in the risk assessment framework earlier this year. Moving forward, as has been mentioned, our next deliverable is going to be a report about risk factors and ultimately about metrics and measurement where, again, we are not trying to do the work of the regulators or do the work of the regulated, but I think try to bring together all of these actors and figure out what are some approaches that work, what are best practices that can be used by everyone to underpin all of these emerging, whether it’s regulatory or voluntary efforts that are happening around the world, so that we have a more informed approach to this critically important aspect of assessing and addressing risks to safety online.

Moderator:
Thank you, David. I will leave the floor to Angela now to share more about it.

Audience:
I think you heard the thank you. So what is interesting and different about the fourth work stream here is we haven’t actually really started yet. We have our first meeting coming up in December. And so what I’m happy to do here today is share a little bit of context about the media literacy to counter disinformation work stream, but also really want to solicit your ideas and inputs into we’re really scoping out how we’re going to approach this problem. So first maybe just a little context on why does this work stream exist? I think we all know if you’ve been in any of the kind of harms conversations, you’re hearing about mis and disinformation, we’re constantly talking about how do people know how to interact with the information that is online? How do they know that it is, you know, good information, authentic information from someone they can trust? Well, that’s really, really difficult in this age. And there’s a ton of different initiatives in both the public and private sectors really thinking about media literacy. But one of the things that WEF wanted to do, and we think is a really interesting contribution, is really understand the topology of those different initiatives. Which communities are these initiatives focused on? We know historically, for example, that a lot of effort has been given to media literacy and information literacy for the youth. But at the same time, all of you are also interacting online and not necessarily always having the skills that we need to be able to do that. So the first effort that we thought would be a really useful contribution was assessing the landscape and understanding a topology of the initiatives that have been around for media literacy. Which community are they targeting? Are there underserved communities, for example, consistent with the principles that Courtney was talking about? How are we thinking about vulnerable populations in this space? The second thing that we were then thinking about is making sure that everyone understands also the importance of this issue, maybe a call to action that really helps bring forward focus on this. And then finally, the last thing that my co-chair, Sasha, and I just talked about, I think a week ago, Augustina could tell me if I’m wrong, is really thinking about the spaces of intervention, almost like a kill chain. There’s a lot of focus on intervention at the individual user, at the point of interaction with harmful content. And there’s a lot of space upstream of that where we could be talking about what’s going on in the platform environment. What are we doing in safety by design? But also off platform, what’s going on in the education environment? How are we thinking about integrating media literacy into the day-to-day operations of businesses, not just the tech companies, but businesses on an ongoing basis? So those are a couple of the different things that we are thinking about as we approach media literacy to help counter mis- and disinformation. Really again, making sure there’s a call to action to understand the importance, a topology of the environment, and then really highlighting some different interventions that could exist along the user experience. So again, just a couple of thoughts on what we are considering in terms of our approach, and would welcome any thoughts or solicitations from folks who are attending. Thank you.

Moderator:
Thank you, Angela. And thank you to all my co-chairs for sharing all the work that the Global Coalition for Digital Safety has been doing. And I have to say that I joined a couple of months ago, six months ago, and I’ve been impressed by the amount of work and the level of engagement that we have from our members. So I invite you all to read the reports and stay tuned about the upcoming work on the coalition. You can, if you Google Global Coalition for Online Safety Web, you will find everything. Thank you, Google. But also, if you want to chat more about this work, you can find me at the ICF this week. And now I think that we have time for questions, comments from the audience. So we would love to hear your views as well. Yes.

Audience:
Thank you very much. I’m Ken Katayama. I’ll speak in my academic role. I have a role at Keio. Speaking from Japan, I had a conversation earlier with Julie, but the difference between digital safety, cybersecurity, freedom of speech, this is very blurry in Japan, at least as a Japanese, I feel. And Angela also knows I work very deeply in cybersecurity. Some of the stuff that you were mentioning today, we in Japan deal within the cybersecurity framework, so to speak. So how do you respond to that? I agree with what all of you are saying, but I guess as a Japanese, how do we bucket what you’re saying into what we’re doing in Japan? Thank you.

Moderator:
Maybe Courtney wants to answer that.

Connie Man Hei Siu:
Okay. Well, at Web, for example, the way that we’ve differentiated cybersecurity from online safety is that we have a center on cybersecurity that is focusing on understanding how we protect infrastructure, how we protect the data, how we prepare for cyber attacks. And then from the online safety piece, we are framing it as how we tackle harmful content online, so we are focusing on the content layer here and what are the user experience and how we can build a safer internet from the user’s perspective as well. So that would be the first point to your question. I don’t know if my colleagues want to add anything. I was going to point to Julie. I’m laughing. A little bit in the work on the typology of harms that I think is pretty critical to help. I mean, I’ll put a frame as we think about it. It truly is, if you’re thinking about the digital safety space, my definition, how we think about it from a governance at Microsoft is a online content and conduct intersecting with personal harms. That is distinct from platform harms.

Audience:
That is distinct from economic harms. But I think the typology work that the working group really hits home here. The interesting space that starts blending, as we all know, is what may have been in a cybercrime space in a fraud or manipulation. Now when those are targeting at a more vulnerable populations, you start seeing an intersection here. I think we need to do it from a typology of harms because then the interventions, although some may be similar from a cybercrime perspective, they are very different as well. And you want them to be different because you want to be enabling productive, positive technology intervention, not halting interaction with technology. In a criminal context, that is probably the best outcome. So the intervention methodology also differs. In full disclosure, we were just saying all roads lead to Microsoft. I spent 17 years there. Ken and I know each other there. Of course, Courtney is there and Angela. And I were in Trustworthy Computing together. And more than 10 years ago, I was asked to develop the first trust and safety strategy and business plan. And then it was sent back to me because I had to explain to our executives, who were deep cybersecurity experts or privacy experts, well, what do you mean by trust and safety? And what we eventually landed at is any kind of personal harm that results with technology facilitating some form of interaction. It’s when people are interacting online, whether it’s via chat, social media, DM. It’s covered here, dating, gaming platforms, and all those things. And we’re often asked because we’re having debates. And Maria mentioned this in our session with Jacinda Ardern and Maria Reza. I think of security, privacy, and safety as three legs of the stool. And if one of them is out of balance, then the stool falls over. But right now, we kind of have a bit of a false binary on you have to have, if you have absolute privacy, there’s absolute privacy or absolute safety where there’s probably the truth that there has to be a balance that exists. And when I think about cybersecurity, I think of the systems, processes, and technologies. Again, safety regulation is tending to move more from just content regulation to more systems and processes. We’ve got powers to do both. And I would actually argue that while I do think systems and processes over time will hopefully help to lift online safety standards broadly, one of the most important things we do is remediate harm in real time. And I’m not sure that that will happen purely through systems and processes. The way that targeted online harassment now happens is by targeting individuals who may be part of vulnerable groups, but that has an impact on democracy and society, individuals. So I think we still need a combination of both, because if we’re not bolstering the humans and helping the humans and serving as that power balancer, then we’re going to have a lot of damaged individuals walking around. Thank you.

Moderator:
There’s another question there. Please go ahead.

Audience:
Hi. My name is Chang Ho. I’m a lawyer coming from Japan. And just my question is, is there any kind of non-Western companies, like corporations involved in the engagement of the stakeholder process? And do you have any plans to make it known for, let’s say, Asian companies in East Asia, for example, here in Japan or South Korea? There are many other non-Western platforms, like Line or the Kakao and so on. I mean, just wants to know if you have any plan. I mean, WEF has an office in Tokyo, for example. I mean, not sure. I mean, maybe you can just build some partnership with the local office here. So, yeah. Thank you.

Moderator:
Thank you. Well, one of the reasons of being here at the IGF is to talk to different companies, different stakeholders, because we want to continue bringing different perspectives into the coalition work. So any ideas of organizations we should be involving that are relevant for the discussion that we are having, please reach out, and we will be happy to have a conversation. Yeah, I would just add to that quickly, just that, yeah, I think there is concerted outreach right now, that both for this coalition, as well as for our own digital trust and safety partnership, involving companies from other parts of the world is critically important. And so that’s something that, yeah, I’m here to talk. We have a booth in the exhibition hall with as many folks as possible. And I know that companies like Line and Kakao have really been leaders in different areas of this space and have worked with Line and other coalitions. And so I think it’s really, the time is now for companies like that to get involved.

Audience:
Hi, I’m Sherry Cram Talabani. I am a human rights lawyer, and my organization, Seed Foundation, is a protection actor in Kurdistan, Iraq. Their online violence results in honor killings, sexual exploitation, abduction, financial exploitation, human trafficking. So my question was similar. How do you intend to engage the developing countries to ensure that the risks that individuals face in these environments, with high levels of gender inequality, with high levels of violence generally, how do you intend to engage those communities? I think it’s relevant to the typology of harm, which I think in our part of the world across the Middle East is quite different than maybe other places. So that’s my question. Thank you. I can start that. Well, I’m myself, I’m from the Global South. So since I joined the initiative, I’ve been reaching out to organizations in Latin America and Africa to try to get them involved in the work that we are doing, because we believe that, as I said before, the more voices we have, the better prepared we can be for tackling the harms that you just mentioned. So at the coalition level, we are doing a lot of work in terms of outreach, connecting with organizations, not only private companies, but also civil society, governments. And we are open for conversations with any organization you think should be relevant. So happy to chat about your work as well after this. But again, it’s very important that we bring as many voices as we can to this conversation. And as I said before, the coalition is very solid in terms of the level of engagement and the commitment that we have. So the foundations are really strong, and bringing in more voices will make it even more stronger. I might just add, again, Workstream 4 is just scoping out how we’re going to move forward. But my co-chair, Sasha and I, and Augustina will remember this, we talked specifically about how we wanted to make sure in that topology of understanding what’s out in the environment, making sure that we were reaching out to countries of different status, right? Whether it’s the global north or the majority world, really making sure that we were having a broad understanding of that environment. And then we started to talk a little bit, again, this is anticipating maybe some of what could happen in the future. Maybe there might be things where there are different model countries to be able to help move up and do some capacity building and media information literacy. Again, not promising that that’s the direction that we’re going, but one of the things that we were thinking about in scoping out our work is making sure that it is representing a diversity of the community. Just to, I think I’m expanding on that comment for a second. If I go back to one of the fundamental principles, you’ve got representatives here in co-chairs, so I don’t mean to speak for everybody, but that are investing additional resources and time outside of their day jobs because we are from some of the larger organizations who can handle global trust and safety teams. The goal of this work then was to build a scalable model for small, mid-sized companies to understand the landscape and resources that would help them scale their trust and safety capabilities. Now, even as a global company, what you just articulated to me is one of those gaps that we genuinely know would be so valuable to scale knowledge and capacity building across the trust and safety. What are the kind of, I’ll call it regional threat assessment landscapes that would be meaningful for us to think about? That might be a space that can be the growth projector, but I am acknowledging what we are hoping to do is really bring those resources to bear for all tech companies and platforms to understand the risk and the tools that they need. Hi, Hélène Molinier from UN Women. I would be very interested to hear how do you bring a gender lens in everything that you do because I think we’ve heard a lot about safety in neutral terms during your presentation and just want to bring the attention that when we talk about violence online and all the crimes I think that you just brought up, these are crimes that are in majority affecting women. So, I think it’s important when we look at safety and that we don’t talk about women as a vulnerable group because women are half of the population. They are not a vulnerable group. It’s really something that should be front and center of everything that we do when we design safety and I look at our principles. I look at the typology. I think it’s great, but I think it would be even greater if we could have a chapeau, especially if you’re building a model that helps build the capacity of smaller firms or people that don’t have as much as information of view of this typology, that we really make that something front and center in the work that we do. Thank you.

Moderator:
Thank you for that comment. The UNFPA put on a really important meeting on Saturday that had me get up at 4 o’clock in the morning and write a 20-page paper where I was trying to draw the strings together of what is technology-facilitated abuse, how does it manifest differently against women. Often we’re thinking about targeted online abuse, but one of the programs that we deal with are women who are in family and domestic violence situations in 99% of cases, technology-facilitated abuse through harassing texts, through microaggressions in banking transactions, through drones over safe houses and other manipulations of technology is used to further isolate, stalk, harass, intimidate their former partners, a form of coercive control. And then I started thinking about gendered safety by design, and I was really trying to rack my brain and think about is there an example that I can come up with of a company that designed, understood how online abuse manifests differently against women, you know, rape threats, death threats, about appearance, fertility, supposed virtue. I can’t actually think of one. I can only think of fails. Like the air tag, I remember when that came out in April 2021, I was like, oh, that’s great for me because I always lose my keys in the bottom of my bag. But gosh, this could be such a potent tool for those who want to surveil their former partners, and we, you know, we wrote to the company and just said what kind of safety by design assessments did you use? Well, we looked at privacy by design, and I’m like, well, two years later, and kudos to Google and Apple, but they’ve now just announced that you will get notifications when there’s a Bluetooth tracker or AirPods that are detected on your device that might be following you. But in that intervening period, we had so many cases where women experiencing technology facilitated abuse had eventually, they couldn’t find out why their partners knew where they

Audience:
were. One of them, we found the air tag was in the wheel of their car wheel bank. But these are small devices that can follow people anywhere. So I would love to think about what gendered safety by design looks like and work with one of these great companies here to see if we can, you know, find a use case and apply it.

Moderator:
Thank you, Julie. Any further questions or comments? There is one there. If you can stand up and come to the mic here. Thank you.

Audience:
Thank you for the panel. That’s been very impressive. My name is Kohei. I’m working on privacy by design. So I’m very interested in your session due to some of the risk assessment purpose. I talked with some of the smaller, medium-sized companies so far in terms of the privacy impact assessment. But for them, it’s very challenging because it’s a lack of resources, lack of the budget or many, many kind of the burdens for them to achieve this goal. So you mentioned some of the great initiative to make an assessment, right? But in this case, how to support any kind of the, any sectors who is in lack of the resources, who is in the help, even they want to protect the safety for all the citizens. Do you have any advice for them? So I think the, it’s a terrific question. And I do think that one of the highlights of this coalition is that its outputs are very digestible, sort of scalable entry points into more detailed and resources that can sort of build a ladder for companies that are wherever they are in their sort of journey towards maturity when it comes to online safety. And so starting with the coalition outputs and things like the appendix to the principles that Courtney mentioned, the taxonomy, the case studies that we’ve put out on risk assessment. From there, there are a number of things that I would also point to that I think can be valuable. Our framework at the Digital Trust and Safety Partnership, it really is scalable in that the practices we’ve set out for trust and safety are things that can be used by companies at different stages and where the level of intensity of assessment of a company’s practices depends on the size and scale of the company, but also on the risks that it faces. And I think we need to look at both of those things, not just look at the biggest companies in the world because small companies can sometimes have products that have very specific outsized risks. I would also highlight some resources that Julie’s team, the Safety by Design Assessments, have an assessment for startups, I believe. Yeah, I’d just say that these are free. Just look up eSafety, Safety by Design, Risk Assessment Tools. We have one for startups. We’ve just developed a free MOOC with the Royal Melbourne Institute of Technology, 12 hours of coursework in your spare time. But just to walk through the principles. I’m just gonna pick up on one thread you said, which is that you focus on privacy by design. So my encouragement would be all the resources we just referenced are critical to be built in when people are thinking about privacy by design. It’s time at the very beginning of privacy by design when you were thinking about what data you’re gonna collect and how you’re gonna utilize that data to be completely transparent that safety is a legitimate means and need to be leveraging the data for that purpose. And so these resources help you understand the harms in the world that will happen because of technology facilitated and that must be stated as to why data is leveraged for these safety purposes. The speaking from someone who has helped, I’ll call it retrofit that, for many of our privacy experts across a specific company, that is at its core helping people understand, yes, to be perfectly honest, there is some minimized data collection that needs to happen to help advance your safety online when interacting with these tech platforms. And we are gonna be transparent as heck about that, but that’s important to be building in by privacy by design. Thank you. One final question, right? Yeah, please go ahead. Of course I have to be the final question. Hello everybody. First of all, I just wanna say it’s beautiful to see the regulator next to the regulator. I hope there’s, with one in between, yeah. It’s beautiful. Thank you. Boris from SWGFL and full disclosure, David Wright, the CEO of SWGFL is also the lovely member. And it might be a million dollar question. Global cooperation and multi-stakeholder approach, I think it’s almost evident, is a way forward. But the question is on the scalability of issues which Julie mentioned on the harms of the future being supercharged. And with your lessons and learnings from developing global tools that have to have local sensitive solution. My question is how do we ensure that the solutions scale with the size and the impact of the issues and the challenges that we see, especially as we are seeing global issues that require local sensitive solutions. And most often those solutions are not developed from the global South, but the global developed West. And those solutions then have a completely different impact. Thank you very much.

Moderator:
Very interesting question.

Audience:
And you deserve the million dollar question. I am an optimist about this inflection moment of generative AI to build more linguistic and cultural sensitivity to how we do this. If we do this right from the outset, we should have learned the lessons of the last 15 years. And it’s time to take those lessons into practice as we look at data training sets for generative AI at the outset. That is how to build in to your point. We know safety has localized, it needs a local lens. We need to understand the linguistic and cultural implications, but guess what? The promise, the capability of generative AI can turn that at scale if we build it from the foundational building blocks upright. I wanna believe that we have learned those lessons. We’re gonna have to put them in practice, but there is some already very, very promising concepts about how you start being much more nuanced and appropriate in your intervention methodologies from a safety perspective when you turn generative AI for the promise for good. So hold us all throughout the ecosystem account to do just that, but then we really need some innovators to think about how to build that scalable across the ecosystem from a safety lens. I guess I’m using Australia as a microcosm for the global world, but we found that the only way that you can develop authentic tools and prevention methods, and this probably goes to a technology, is through co-design. So we have a youth advisory committee that helps us develop our scroll campaign, which is for young people. It’s language and concerns developed by young people for young people. We did the same with our Learning Lounge LGBTQI plus materials, all of the consultation, all of the vendors that we use come from the community, and it was very courageous for a government agency to use eggplant emojis, I have to say, and we even used some peaches. But anyway, co-design is the way to go where you can scale that. Final word, David? I would just say, I do think that meaningful involvement, I’m not saying anything anyone hasn’t already said, that we need to all be in this together and hash it out, and I think that that is how we figure out something that is much more deliberate and better from the outset. Thank you, David.

Moderator:
Well, I think we have time to wrap up the session. Thank you very much for joining us today. You can find the reports that were just presented on the Global Coalition for Digital Safety website, and I know we could spend more and more hours discussing these issues, but we still have three days more at the ICF, so feel free to reach out and connect with any of us, with me, if you want to know more about the work of the coalition, or if you want to get engaged, or if you have ideas of organizations we should be engaging, please reach out. Well, see you around, and thank you very much again. Thank you so much. Thank you.

Audience

Speech speed

173 words per minute

Speech length

7105 words

Speech time

2467 secs

Connie Man Hei Siu

Speech speed

184 words per minute

Speech length

205 words

Speech time

67 secs

Moderator

Speech speed

166 words per minute

Speech length

976 words

Speech time

352 secs

Opening and Sustaining Government Data | IGF 2023 Networking Session #86

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Audience

In Kuwait, the importance of open data governance and sustainability is highlighted through the efforts of an Automated Systems Company. This company focuses on governing and sustaining open data to government entities. The emphasis is on ensuring that open data is effectively managed and utilized by government bodies in Kuwait, promoting transparency and accountability.

Similarly, in Sri Lanka, the government is actively working on various personal data collection initiatives. It recognizes the need for data governance models to ensure that personal data is collected and managed in a responsible and secure manner. The aim is to strike a balance between utilizing personal data for development and innovation while protecting individual privacy rights.

Advocacy for open data is taking place in the Maldives, where Women in Tech Maldives is playing a significant role. This advocacy seeks to enhance transparency and public access to government data. By promoting open data, the Maldives aims to foster innovation, drive economic growth, and encourage evidence-based decision-making.

In terms of research, a researcher from the University of Melbourne is studying the political implications of open government data. This research aims to understand how data governance practices can influence political processes and decision-making. By investigating the relationship between open government data and politics, insights can be gained on how to effectively utilize data for democratic governance.

Data management is a crucial aspect of government operations, and the National Centre for Information Technology in the Maldives is responsible for managing government data. Proper organization, storage, and sharing of government data are necessary to ensure effective decision-making and efficient public service delivery. However, it is noted that within the same entity, government departments often do not share data, highlighting the need for improved coordination and collaboration.

The COVID-19 pandemic has showcased the importance of open data in crisis response. Indian and South Korean models of open data were successful in the pandemic as they allowed governments to track people and manage emergencies effectively. However, it is argued that open data initiatives should be tailored to align with each country’s specific goals and agenda, rather than imitating models from elsewhere. Contextual factors such as security concerns need to be carefully considered.

The issue of data quality is raised in India, where a research case highlighted the problem of inadequate data details despite data being open and machine-readable. This led to wastage of public resources. The research emphasizes that quality standards and ethics must precede open data initiatives to ensure the accuracy and usefulness of the data being made available.

At the Internet Governance Forum (IGF), the balance between different themes such as freedom of expression, freedom of information, security, and privacy is discussed. It is recognized that different countries may have varying definitions and understanding of personally identifiable information. The need to find a balance between these themes to foster a supportive and inclusive digital environment is emphasized.

It is important to note that open data initiatives should be adaptable to changing governments. What may be acceptable and appropriate in one government may change with a change in leadership. Governments should be cautious and considerate of potential shifts in data access and use as political circumstances change.

Efficient government data management and transparency are key to effective governance. Top management must have access to timely and accurate data to make informed decisions. However, it is acknowledged that there may be challenges in accessing data within middle and lower levels of government, highlighting the need for improved transparency and data sharing within government structures.

Opening up data brings both opportunities and risks. It may lead to increased transparency, community engagement, and proactive governance. However, organizations may also be reluctant to share data due to concerns about damaging their reputation. Finding the right balance between openness and risk management is crucial.

A top-down approach to instigate open data is advocated. Bureaucrats may be occupied with daily work and not prioritize publishing information. The onus is on top leadership to recognize the importance of data and foster a culture of openness within government agencies.

Lastly, a noteworthy observation is that more open data can reduce the need for individual information requests. In Sri Lanka, the Right to Information Act permits individuals to request information, but opening up data sets can provide access to information without the need for individual requests. This can streamline the process and enhance government transparency.

In conclusion, the importance of open data governance and sustainability is underscored by various initiatives and research efforts across different countries. Proper data governance models, data quality standards, and ethical considerations are essential for effective utilization of open data. The balance between different themes such as freedom of expression, security, and privacy must be carefully managed. Governments, researchers, and advocacy groups all play a vital role in promoting open data and driving transparent and accountable governance.

Kait Holm

The development of the Open Data Portal ‘Bayanet’ in the UAE was a collaborative effort between the Telecommunications Regulatory Authority (TRA). The project involved various essential steps, including identifying and exploring data, cleaning and converting it, ensuring its quality, and sustaining it in the long term.

One of the significant challenges faced during the project was the inconsistency in how data was documented, making it difficult to consolidate and analyze effectively. Moreover, there was a disparity in the units used across data from different Emirates, further complicating the process of integrating and comparing data.

Another notable challenge was the need to convert data between Arabic and English. This language barrier required meticulous translation and interpretation to ensure accurate and consistent data. To address these challenges, the project enlisted the support of two data auditors, a language editor, and Kait, who examined each dataset meticulously to ensure its quality.

Furthermore, a Hackathon for Happiness was conducted, demonstrating the significance of the data and its potential applications. This event served as a platform to encourage engagement and collaboration, highlighting the importance of open data in driving innovation and societal well-being.

To sustain the value and relevance of the data, continual updates and maintenance were emphasized. Trainings were conducted to educate ministries on how to consistently update their data, ensuring its accuracy and timeliness. This effort led to the creation of Bayanet AI, an artificial intelligence system trained using the initial data published. This innovation facilitates efficient data analysis and enables users to benefit from the insights gained through the Open Data Portal.

In conclusion, the development of the Open Data Portal ‘Bayanet’ in the UAE involved a comprehensive process of finding, exploring, cleaning, converting, and ensuring the quality of the data. Overcoming challenges such as inconsistent documentation, unit disparity, and language barriers was vital to achieving the project’s goals. The emphasis on continual updates and the creation of Bayanet AI reflect the importance of sustaining open data to maintain its value and relevance. The successful implementation of this project highlights the UAE’s commitment to fostering innovation, promoting transparency, and harnessing the potential of open data for societal development.

Winnie Kamau

During the Zoom meeting, Kat requests that all participants introduce themselves in the chat to facilitate communication and acquaintanceship. This act of self-introduction is meant to encourage interaction and connection among attendees. Additionally, Kat wants to personally introduce the individuals present in the room.

By encouraging participants to introduce themselves in the chat, Kat provides an opportunity for them to share their background, expertise, or other important information with the group. This helps create a sense of community and camaraderie among the participants.

Kat’s intention to introduce those present in the room emphasizes the importance of acknowledging and including everyone, regardless of their location. This inclusive approach fosters a welcoming environment and ensures that every participant feels valued.

Overall, Kat’s request for introductions in the chat and the intention to introduce individuals in the room reflects a commitment to promoting open communication, collaboration, and unity within the Zoom meeting. By creating opportunities for participants to connect and get to know one another, Kat cultivates an atmosphere that encourages productive discussions and meaningful interactions.

Kat Townsend

The analysis highlights the importance of open data governance and transparency, with a focus on various key points. Firstly, Katherine Townsend, who has eight years of experience in the US federal government, currently works with Open Data Collaboratives and advocates for open data and government transparency. Her expertise in governmental advisory roles makes her a valuable asset in promoting open data initiatives. Additionally, Katherine has advised governments in countries such as Ghana, South Africa, Kenya, and the UAE, indicating her broad experience in the field.

Partnership between internal and external actors emerges as the most effective strategy for open data governance and sustainability. By working together, these actors can pool their resources, knowledge, and expertise to ensure the successful implementation and maintenance of open data initiatives.

Developing a culture of openness and providing training for both government officials and the public is crucial for fostering data governance. It is important to educate civil servants and individuals outside the government about the benefits of open data, as well as the social impact of their work. By doing so, a deeper understanding of data handling and the potential advantages of open data can be fostered.

To garner government support for open data policies, it is recommended to build a prototype that demonstrates the benefits of opening up a non-controversial dataset. This can help showcase the potential advantages and convince other government officials to get on board with open data initiatives.

Public announcement of open data initiatives plays a significant role in engaging public support and sustaining it. When open data is published, efforts should be made to rally public support through effective communication campaigns. This ensures that the public is aware of the initiatives and can actively participate in utilizing the data for various purposes.

Open data should be both technically and legally open, allowing for its reuse and redistribution. This means that the data should be easily accessible in a machine-readable format and should not be subject to restrictive usage or redistribution policies. The concept of open data encompasses the ability to use, reuse, and widely redistribute the data.

Efficient distribution and usage of open data are crucial for its economic and social benefits. It is necessary to convince governments and agencies to open up their data so that it can be effectively utilized. The analysis suggests that organizing events like hackathons can demonstrate the need for open data and its potential applications, further supporting the argument for its distribution.

Striking a balance between freedom of information and privacy and security is essential in open data policies. There are contextual differences in what is considered personally identifiable information, and a change in government can lead to a change in the perception of appropriate data. Therefore, policies must ensure that data openness does not compromise citizens’ privacy or security.

The quality and applicability of data are important aspects of open data initiatives. It is crucial to ensure that the data provided is reliable, accurate, and applicable to specific needs. The analysis highlights cases where insincere actors claim their data is open but fail to provide high-quality and applicable information. This emphasizes the importance of opening data with specific applications in mind.

The analysis suggests that every country should have its own open data policy tailored to its unique needs and goals. Since different countries and even subnational entities have differing needs, a one-size-fits-all global open data policy may not be feasible. Instead, individual countries can develop policies that align with their specific goals and circumstances.

Government entities may be hesitant to open up data due to the fear of criticism or damage to their reputation. However, engaging the community and framing data openness in a positive and proactive manner can help overcome resistance. By highlighting the benefits of open data and fostering a sense of community ownership, government entities can gain public support and overcome their fears.

Identifying a specific stakeholder who can champion data openness within a government entity is crucial for making incremental progress. This stakeholder can leverage their influence and advocate for open data initiatives, thereby creating a conducive environment for change and implementation.

Despite the challenges posed by bureaucratic systems, efforts to organize and share data can still be worthwhile. It is important to recognize that bureaucratic offices are often busy with administrative work and may not realize that making certain information public could actually facilitate their own processes. By raising awareness and demonstrating the benefits, bureaucratic entities can be encouraged to embrace open data initiatives.

Lastly, transparency and open data can help build reputation and facilitate civil activities. Certain countries already have laws in place that demand the publication of government data. By making data open and transparent, governments can build public trust and foster civil society initiatives.

Overall, the analysis provides valuable insights into different aspects of open data governance and transparency. It emphasizes the need for partnership, training, prototyping, public engagement, and careful consideration of privacy and security. By implementing these recommendations, governments can utilize open data to improve decision-making, foster innovation, and achieve sustainable development goals.

Session transcript

Winnie Kamau:
Yes, Kat, I can hear you. I can hear you. Yes, so if in Zoom you can just introduce yourself, that would be great, in the chat so that you all can get a chance to meet each other. And I’d love to do the same for the people who are in the room.

Kat Townsend:
So I’ll start. My name is Katherine Townsend. I spent eight years in the U.S. federal government and have been advising governments in Ghana, South Africa, Kenya, UAE, and local, domestic, and around the world on open data and open data policies. And I work with a group of others who we have various day jobs, but because we believe so strongly in government transparency, this collective is called Open Data Collaboratives. So if you would like to follow on with any of these slides or any of the people involved, that is the link there. I will say it’s case sensitive, so just follow it directly. And you’ll see I’m here by myself. Others did not get their visas, so unfortunately many are, it’s in the middle of the night. They may join, but I do have a colleague who is on and supporting, so thank you all for joining today. I think what I’d like to do is just take a moment to take you all through, but it would be helpful for me to understand what roles you’re in. This is a networking event, so the point is for us to really see and meet each other. So do you mind if we just go around a little bit and speak about, just to say, you know, either what role you’re in or why you chose to come to this session, what kind of you’re looking for, and then I can sort of tailor on what would be most useful. And I’d just ask those on Zoom to do the same, please. Thank you.

Audience:
Hello. Good morning, everyone. My name is Qusai Al-Shati. I’m from Kuwait. I’m the chairman of Automated Systems Company, and we are interested in how to sustain. I’m sorry. Make sure your face is filmed. Oh. Yeah. We are mostly interested in how to govern and sustain open data to government entities because they are our clients. Thank you. My name is Varuna Dhanapada. I am from the government of Sri Lanka. I’m a civil servant for 23 years. I have also served in New York as a diplomat where the Sustainable Development Goals were composed, and I was part of the open working group. So I found it quite interesting, this subject. The government of Sri Lanka has many personal data collection initiatives, and it finds it very essential for data governance models that applies to all stakeholders of this subject. Thank you very much. Good morning, everyone. My name is Nisha. I’m from the Maldives. So I’m one of the co-founders of Women in Tech Maldives, a nonprofit organization which was actually established in order to empower women. But currently, I think we are the only functioning IT nonprofit in the Maldives, and we do advocate a lot for open data, which is why I choose to be in this session because I’m looking forward to learning from you and maybe going back home and trying to get our government and our other offices to implement this. Thank you. Good morning, everyone. My name is Shilpa. I am a researcher at University of Melbourne. I am an academic. I used to work as an assistant professor at an Indian university, and my research is on data governance, and I am trying to look at data not from an economic perspective but from a political perspective, and hence, I really wanted to see the capacity of how open government data can protect or guarantee political values, I mean, specifically constitutional values. That’s what I’m here for. Hi, I’m Aishit Mahat from Maldives. I’m in government, National Centre for Information Technology. I’m working in IT service management. Hi, I’m Aisha. I am also working in the National Centre for Information Technology. It’s under the Ministry of Information Technology, so we kind of manage the government data. We have the data, and we are developing systems that are taking and using this data, so this session is really good for me to know more about it, so I feel it. Maldives.

Kat Townsend:
Yeah. Thank you. Australia, Kuwait. Beautiful. Okay, thank you all for taking that time, and I don’t know if I said it, but I’m from the U.S. That wasn’t very evident. Okay, and then just to know who is online. Okay, if you all want to introduce yourself a bit on the chat, I’m happy to read out so that others in the room know. Okay, so I just have three examples that I wanted to run you all through of different ways that the people I’ve worked with and the people on our team have approached government data. So, to know about our group, who we’re coming from, so we have, thank you so much, so we’ve worked, founding members worked in the U.S. State Department, USAID, White House on the U.S. Open Government Data Policy, and from that, we built out a platform that was shared around the world, and really took this to other countries, and what we have been working with is with youth and startups, academics, to try to build these coalitions and have about 4,000 people across our network that we engage in fairly regularly. If I could share anything about the strategy for how this works well and sustained, there’s a lot of people who try to change by shouting from the outside and saying you must open data, and then there’s people working really hard on the inside trying to convince their colleagues. The most effective is to have a partnership where you’re working together, so in any way that the government can find people on the outside that are championing the work that they’re doing and saying this is what we need and we’re so supportive, you can use that advocacy to make changes inside government and sort of vice versa. So that would be the, perhaps it feels very obvious, but finding that collaboration and finding your counterparts is what’s going to make it work and sustain. So just three countries, and I’m just checking my time here. So the first I’ll share, and it is about 3 o’clock in the morning for Florence, so I’m sharing her slide deck, but this is Florence Tofa, and she has an external organization, so she has a women in tech organization in her country, and built relationships with the government and learned from them that they wanted to build out an open data portal. So I think some of the basics about what is open government data, it seems like you all are working on this, you study it very well, but to just think about sort of the history of how this came together, a lot of this has been pushed and supported out of the north, but it’s presented as just a different kind of platform that can be used for government to be responsive to its citizens, to improve service delivery, and to have better partnerships and also better transparency and accountability. It will depend on your context of whether you want to share it as an accountability strategy or, as worked very well in the United States, as a way of supporting GDP growth and making a lot of funds, and that was very appealing to people within government to want to help others to open up data, if you were able to say that we would unlock what we said a trillion dollars worth of growth. Currently, there’s about 122 countries that have open data portals. There is a group called the Global Data Barometer that takes a measurement each year of the quality of data. If there is gray, that doesn’t mean that there’s nothing, that just means that they didn’t include them in the study, there’s not data there. Just to be clear, what open data means, it is both technically and legally open. There’s a lot of times that we’ll have data available and it’s just a PDF on a website, you can’t search for it, it’s very difficult to find, it’s buried in, but it’s called open. The quality of a machine being able to track and identify and pull in so that people can run their own analysis, this is a baseline requirement for open. I am sure I’m saying things that you all already know, but it’s sometimes helpful to just reset, are we all talking about the same thing? Legally open. We have also had many experiences where we have, legally it’s open. What that means is that you have to physically travel to an office and then you have to rent out a book with 1,600 pages of text and then you can only read it there and they say, well, it’s open. That is technically open or that is, to the letter of the law, legally open, but it’s described as being able to use, reuse and be able to redistribute widely. Here are some of the arguments that we’ve made. Improved social value, public services, more transparent and more efficient government. This is really something that we find is that open data really improves government efficiency because if you know what you should be public and what needs to be private, you really have to organize your own systems very well so that you can make that determination quite quickly. These are just some stats that have been used by the European Data Portal to make the case when they were developing their own portal. Again, it’s truly dependent on the context that you’re working in, whether it’s regional, national or subnational, understanding what are the cases and now there’s so many cases about open data. What is the story that you need to tell that’s going to say that’s the kind of growth that I want or that’s the kind of social change that I want? This is providing a legal context for open data. Role of open data policy. You can do all the work within your teams and the organizations that you’re working with to build up these platforms and to build up these relationships and to open information, but unless you really have either a law that says you must do this by default or at least a government policy, the second someone changes their job or that roles and responsibilities shift, all of that work goes away. In addition to training up how people are working and really getting them on board, you need to have a document in place that everybody can point to and say this is what we’re acquiring and this is what our values are. This is the portal that they built. This is now about 10 years old. It looks about the same. It is very hard to change. Once you do lock something in place, just know, as you all know, it’ll be there for a while. Anytime that you do this, it’s not just about, all right, we got the law in place and we’re requiring them to do this and then they have to. Well, that’s not going to sustain. People want to be useful and they want to help for the most part. How can you build their capacity so that they feel a sense of ownership themselves? Working to develop that culture of openness, really training people outside of government and also the civil servants so that they understand what they’re doing and how their jobs change day to day and also the social benefits of the work that they’re undertaking. Because anytime you implement a new policy, regardless of the topic, but for sure open data, you have to do a lot more work and it takes time. If you want a civil servant to add even more time to their work, being able to link it to the social impact that they will have is very vital. This is a methodology that we use. We use hackathons. Hackathons have been around for years. The benefit of hackathons, especially with policymakers and politicians, is that it is visceral. They can see people using the data. They show up. You can teach them something small about how to interact. I find maps are extraordinarily helpful. So if you have a mapathon, because then they can visually see what they’ve done. They see the data and they see it mapped out. And then they can feel connected and part of the community. So I think social events are really, really vital. It’s also a place where youth are very comfortable. Love that. So I recommend, and you’ll see throughout here, we have hackathons in each of these. There’s a reason for it. Okay. So that’s Ghana. And this, let’s see, this is about 350 students on a Saturday. Florence runs these about once a month. You do not have to have that frequency. She’s very impressive with the community that she crowds. But I do think that there is, you know, knowing that there’s that consistency, that there’s a space to go where people can show up and they can contribute and where governments can show up and they can meet members of the community is really helpful. All right. So this is the work that I did to come into this space. It’s the open data policy out of USAID. And we started with trying to open up agriculture data. And I will say, just to say why agriculture data. In, it is important when you’re trying to figure out what data set you could make open is to choose one that people will not find terribly controversial. So there’s many, any data set could be controversial for sure. Land use is very controversial. But at least in the context of crop yield and weather patterns, this was seen as much more neutral. So it was much easier to create a prototype about let’s open up this data set and just show how the process goes than if we had chosen a data about health or women and children or security, anything like this. So there was sort of an effort to just rebrand into something called a data palooza. So you might see case studies of this. I think we’ve sort of reverted the language. But there’s a lot of this sort of process of not just hosting a hackathon but actually going through the cycle of opening data, writing a policy on data, bringing the people together, engaging with the data, bringing out some prototypes. types and then using that to iterate on what the process can be continuing and going forward. So this is a hack from with about eight different countries joined, which might seem, you know, at the time it was sort of before we had a lot of, you know, this is all Skype, and it was sort of before we had a lot of awareness that this could happen, but this was the first hackathon at USA that the foreign arm of the U.S. government had ever run. And sort of from that, we built out a prototype, and we built out a prototype of how to open up data, and we built out the open data policy. So if I were to condense sort of what those learnings were, if you are within government or if you’re working outside and you find your champion, really important to find a catalyst. What you need is a prototype or a paradigm of what it could look like. And once you have a prototype and you have a story, then you can share that around and people will say, that’s what I want to do. How do I replicate that? So you find your colleague, you find your contributor, you find your person who is right there with you and saying, yes, how do we open this? If you don’t have a friend in this, it’s pretty hard to do this all on your own, and I don’t say that to discourage, but just it’s really important to find a friend to, you know, a lot of change, a lot of government change happens because you have a small group of really committed people. So as I mentioned, try to choose a topic that’s not controversial just to start. You can go controversial later, but try to find one that is easy to tell the story on. Figure out who you actually need to have on your side. It’s not going to be always the people who are first to raise their hand, but you often will need to figure out who approves from legal, who approves from privacy, if you have a privacy laws and requirements, who are the subject matter experts, the people who actually collected the data or who are in charge of it, that you need their approval. And so actually mapping out all of the steps that you would need to go through, really important to build that plan. When I did this, I realized that you would have to go through 47 different people’s approval, which is a lot, but even just the act of writing out those 47 steps, we could say, all right, well, this is too much, so how can we tighten this up smaller and smaller, but really building out what that workflow would be from collecting a data set to making it open meant that we could put a real process in place. I always recommend including media and communications people in the beginning because you need storytellers. And often, especially for those of us who’ve worked in government, you do so much work and then you try to share it with the world and hope that everybody’s excited, but they weren’t part of the process, and so they don’t own it in the same way. And so I would just bring in their storytellers as early as possible. And then making time for implementation and institutionalization. One of the big flaws that we have for policymakers in general is that we will write a policy and then we will think that it’s done. And if you don’t take time to actually change people’s jobs, change people’s work plans, then it won’t sustain and it won’t stick. So all of these things that I’ve said, there are guidelines, there are job descriptions, there are case studies at that website. It is a U.S. lens, but it has been forked and taken around the world. So I would definitely recommend, it’s all written on GitHub, so it’s easy to copy and share around, but if you’re looking at job descriptions or at any sort of guidance on running the hackathons or anything like this, that is a location. And so after that prototype, that development work, we have the development data library, data.usa.gov, cuts across all different sectors, and it does sustain. So this was under the Obama administration. We’ve had a president since then that was not very interested in transparency and collaboration. This stayed online. And it stayed online because there were groups of civil servants that sustained it, because it was already part of their work and it wasn’t just something that political groups sort of put in place and then left. So I think I’ve talked through this. Again, find the data set and write down each step of the process. I created a working group with the approvers. It was really important and beneficial within USAID to actually take notes and share those out around the world. Often work happens in silos or it only happens at headquarters and nobody knows what others are working on. So sort of demonstrating we’re working on open data and we’re also going to work in the open was really important. And then synthesizing and then, as I said, taking those 47 steps down to eight. And then when you publish, you try to get the public on your side. So for sure you have your external person, or if you’re working externally, you are the external person, and as soon as that data goes up, that’s when you hit your communications campaign. Isn’t this wonderful? We want more of this. Look at all these things we can do to change it. Because it’s not just about that one data set, it’s all the other ones that can follow. And then the last example, and just because you’ve heard my voice chatting for a while, I’m going to see if it’s possible for Kate to, is it possible to have a virtual speaker join? Might be a little complicated. All right. We have Togo, Ethiopia on the line, and there’s a few others who haven’t introduced themselves. Kaitlin Home. And Kate, I don’t know, you have the slides in front of you. It’s just about five, and then hopefully we can take the last ten minutes to just hear from people in the room. But it would be maybe if we have her face side by side. If it’s too hard, I can just run through them. She’s unmuted. Great. Kate, can we hear you? Yes. Can you hear me? Can you hear me? Hello? Yes. We can hear you.

Kait Holm:
Oh, okay. Perfect. Okay. So I will talk to you guys a little bit about some of the work that we did in the UAE, opening up and building their open data portal called Bayonet. This was done originally in partnership with the Telecommunications Regulatory Authority and was done as an initiative from the UAE, which is a conglomeration of seven emirates. It was done as an initiative to bring together some of that very decentralized data that they had in order to create a national platform. And as part of this, we hosted a hackathon for happiness, which really helped us to both show and establish the fact that there was a need for this data, as well as how people intended to use this. Because there’s always a little bit of a tricky dance with helping to convince governments to open their data and illustrating, one, that there’s a need, but two, specifically what types of data might be most useful or most valuable. So in this case, the UAE was really interested in innovation, as well as the possible economic benefits that might stem from that. So this hackathon for happiness that we created in partnership with universities took place across all seven emirates and really gave us a large swath of data on who might be interacting with these published data sets and how these interactions might produce applications that may have economic benefit, social benefit, or benefit for civil society. So like I’d mentioned, this hackathon took place with across, I think, about six weeks or so, all seven emirates with universities, but it also included people from industry. It included civil society members. So it gave us a pretty large data set to pull from. There were some challenges with building this open data portal. In particular, one of the challenges you can see here that we had was converting data between Arabic and English, making sure that both were represented. As you can see on this slide, these are some of the steps that we followed. First step was finding the data. This was quite a bit of a challenge because the data that had previously been published had mostly been for internal documents or kind of organizational metrics. So we had to go to each of these different ministries or agencies. Some data we got was from university libraries, really, really difficult to find pieces of information at certain points. Once we did this, though, we then had to look and explore how the metadata, so how that information had been gathered, how it had been cataloged, and this was all part of an initiative to, as I said, federate or nationalize the data. So we were combining data from one emirate that may have, for example, let’s say it’s on camel populations, may have taken this data and only looked at camel populations around watering sources, but there might have been another that only measured camel populations in rural regions or mountainous regions. So understanding that metadata was a real key in order to create more complex and comprehensive data sets that included information about the entirety of the UAE. Once we were able to understand that, the next step was to clean this data. Like I mentioned, sometimes these internal documents and metrics were not always clear or consistent about how they were documenting the data and what types of units, for example, they would use. And then we had to convert the data. This is that slide you see now, or the image you see now, and part of this was sometimes the data would come in Arabic, sometimes it would come in English, but it was really important that we made it accessible in both English and Arabic. And this could be a bit of a challenge because, especially with the Arabic font, a lot of programs won’t recognize that that is a font or a script. So there was quite a bit of a challenge in figuring out how to either scrape that data or how to input it in a way that would be machine-readable across multiple platforms. The next step then was to ensure the quality. And this was done, we had in each data set, we had over 2,300 data sets that were published in each one. We had a language editor, we had two data auditors, and then I personally looked through and viewed every single data set to make sure that this data set matched the initial source material and wasn’t duplicative of other information that we had published previously. Last step was sustaining the data, so working with ministries themselves and making sure that they knew how to publish and continue to publish that information. And this links us into the last point here, which was on training and visualization. So part of that was training the ministries on how to continually update their data, why it was important, and how to follow up. And then visualizations came in the form of trainings that are hackathons, how to help students produce visualizations based on the data and metrics they’re working. And excitingly, we can see that this project has gone on to be quite significant as the UAE has expanded upon this and now developed Bayonet AI, which was trained based on this data that we initially put up for work for Bayonet. So here’s an example of what it looks like when you look at the landing page for the Open Data Portal, and you can search here using any of the terms that are included in the datasets in both Arabic and English, as well as tags, which we added as part of the metadata and any of the text in the metadata. OK, then this next slide, this is actually a picture of us at the hackathon at the Sharjah Planetarium. In fact, you can see Cat in the corner. Hi, Cat. And this image shows one of the teams presenting their work to one of the shakes. So then we have, I think, Cat, I’m going to let you take it from here, is that if there is anything I missed, please feel free to add it.

Kat Townsend:
That was awesome. Thank you, Kate. OK, so just it’s a it’s not a terribly complex formula what we run through, and it just takes a bit of grit of work and some time. If the if we were able to start a little bit on time, this is the kind of breakouts that I would ask you for. I think probably the the third, you know, I am happy to help you all and we are happy to help you all run through any of these. And if you’re able to answer these three questions, then it will be we will be even more effective in helping you chase down. OK, how do we get that prototype together? So what data is possible to make open? Who can you work with to actually do the work to get that data open? And I think it’s really important to tell the story and answer the question. It’s sort of the if this, then that framework. If you open this data, then that impact will happen. So, you know, for example, if we knew about Internet quality and cost, we could build maps of companies that were supposed to deprive that service, and then we could allocate funds the way that they’re intended to, to improve people’s connectivity, something for IGF. But truly, any way that you can get it into this framing, it’s so much more impactful if you say here’s how I will apply that data. And here’s the here’s the impact that it will make. And then I don’t know if the last slide comes up for you. It might need a refresh. Maybe the deck does. But otherwise, I’ll just share it on the Zoom. It is just the context. And it’s just a slide that has the links. Yes, there we go. Great. So these are the links that were shared today and just context if you are interested and if you want to follow up with any of us, because I know we’re at about four minutes. OK, so with that, does anybody have any questions or want to share their experience? Yeah, please.

Audience:
Thanks. Yeah. Oh, thank you. It’s it’s really not I don’t think it’s a question or something, but you know, it’s it’s just I told you, like, I’m researching on data governance and one of the aspects that I’m doing is open data. And I was doing this particular research. not comparing the models but then you know just focusing on Indian and the Korean the South Korean model of open data because I found that you know they have been like doing a fantastic work especially during pandemic including I mean India and South Korea have been really promoting open data including data related to the pandemic lockdown and you know people who were inside and outside and all of that which is why it was easy for the government to track people that you know if people are hiding and how to reach them in case they in case emergency in in situations of emergency with of course that you know we realize in it that it it’s it’s a there’s a possibility of being used all these tools used as surveillance right and one of the things that I mean of course now that’s really to do like a personal data but then in South Korea there was also this particular problem that you know Google for many years very persistent to ask the location of certain kinds of buildings within the geography which South Korea did not want to reveal for the fact that because of North Korea and the potential damage that I mean the potential attack that they could create in the critical infrastructure so now that is non personal data so that maybe maybe the point I would like to raise to everyone who is thinking from the government’s perspective if they want to open data personal or non-personal you really need to see your country’s goals or agenda that you want to meet and not just follow the model that is going on in every other world because they may have different values they may have different targets to meet but what is that you want to do and the second point I really wanted to because because there was this one particular research which happened in India and they were just analyzing that you know what kind of data they have been released and the problem was that the quality of data and it’s not just in India but it’s pretty much everywhere yes it’s machine readable it looks fantastic how it is there but then you know if the data is the the the the juice is actually in the details of the data if it is not detailed it is pointless you were just wasting public resource then so just having to say that you know we have an open data initiative but it doesn’t do anything because it doesn’t give enough information to be used so which is why like you know before opening data I would say that quality standards like having standards and ethics is the first thing that a government should work on or anyone that wants to work on I mean that’s exactly what happened in India that you know they open data but then they did not have those values and now they are this problem that you know what do we do with all these things there’s so much wasted a public resource now so now but things are getting on track they are working on these things so I mean like that’s just a lesson I thought like I could share with everyone reaction to that I do think for sure all of this work is a

Kat Townsend:
balance between as many of the themes that we have at IGF it’s freedom of expression freedom of information and it’s security and privacy and what looks like personally identifiable information in one context is going to be different around the world which is why you know the UN doesn’t have a global open data policy that it pushes each country and some it’s even subnational needs to change and it’s also what seems fine in one government and then you change governments and it is a completely different situation so trying to start with again those more neutral data sets data sets that are a bit more about what the government does and less about people is sometimes can be helpful there and then for sure on the quality of the data yeah don’t you can definitely have insincere actors who check a box look we did all this work to make it open and now you’re still complaining as they will say to civil society all the time that’s where the application is really important so you don’t just have open data for open data sake we’re opening this data in order to apply it here and so you can see that as a full package of stories we just don’t have it as a resource but here’s where it’s it’s being used in service so if they are consistently seeing this is the kind of data that is useful this is the kind of data that’s just fluff then you can make it possible to have some sort of catalyst and better examples there

Audience:
the thing is that government data although it is a structure but it is not organized they have the format of a structure data but actually the data itself is not organized so oh sure in that case we are talking about government data so it is public data that’s what we are looking for of economic value of social value how to make government whether the slide that says how to improve public services transparent government efficient government how you would convince the decision maker and what controls comes under each line that tells him if this is achieved if we can format the government data in forms of sets again non-controversial neutral available to all what controls you would apply here or indicators that you will tell to the decision maker if this is met you will perform better taking consideration bureaucracy is heavy in the government you can you can find the departments within the same government entity and they don’t share data right and now you’re talking about open data to others so you’re talking about the top management who may not know the real data within the middle and lower levels and they need it and they know that they need it so how you would convince them that such approach is can be efficient we do have a law of freedom of information but to what extent it’s an into effect that’s a question so I think

Kat Townsend:
your question would benefit more from diagnosing let’s try to figure out what the topic is but I think what I hear is what are who are you trying to convince so actually identifying who the stakeholder is not just government in general but can you find one team one leader who has the power to say I can at least I maybe can’t open up every ministry but I can open up one section in my ministries information I hear that I hear that and it’s but it is hard and so and I will say that just one of the things that governments that companies anybody non-profit anybody gets concerned about is that they don’t want to look bad everything is their reputation so they get very scared of opening up data because they don’t want it to be messy and shows that they didn’t do well and they’re very Chris so now you give them an option where instead of being criticized heavily okay let us help you let us help you with a good story about how you’re being proactive you’re showing your information you’re being transparent you’re bringing in the youth with these hackathons you’re bringing in the community and then thank you so much and and I it is important to have top-down but you need to give them a story you a few examples of here’s how we’ve changed and look there’s stories in the in the newspaper about how great this is and I’ll just I’ll say I am sure your context is difficult and I’m sure Sri Lanka is difficult and I’m sure Maldives is difficult and I can only offer that in the US government that the offices don’t share data with each other the offices don’t organize the data very well themselves if you ask a Freedom of Information Act they say well we’d have to find that data it’ll cost you $20,000 do you want to pay $20,000 for us to answer your question so it’s there’s there’s not a perfect model there’s only all of us trying to build slightly better models for how we can have better government systems so just to say that it’s all of these resources that we’re sharing is is that attempt to try to bring that sort of information sharing into these different spaces that are reticent to do so so but are you saying that you don’t think it’s possible without a top-down approach how we would

Audience:
create the commitment governments are bureaucrats but they are too much in deep of their bureaucracy a daily work yes he has 20 individuals every day for a license for a permission he’s busy with that to finish their work yeah now we are asking him to publish information yeah I’ll tell you really let me finish who’s in front of me yes right yes he would not realize that publishing the would make his life easier yes or himself or his organization so bureaucrats are always busy with their daily work they are inside the box they are not out of the box yes now I’m not saying that this is the right approach but it is our perception that the the top leadership would always see the case because they need information to make the right decision so they would say yes we want certain information to be public and set information for us to know yeah in order to make the right decision rather than they say what’s the case here or what the case there and what the case here and wait for a week or ten days and he need to make the decision yesterday right right because the formation is not or suddenly there is a crisis or a political issue that just came up and suddenly he’s exposed yes right so you know that there is no there is no mindset for open data there are countries that has laws that force government entities to poor data yeah and to a specific format this format of time gets outdated or or that mechanism is at the time it was done it was good but then there is more data needed more information needed but it didn’t get updated for and so it become all that nobody is now using it and there is demand to modernize it you’re not wrong it’s I see I say the hand so I just want to make sure that other people can show because if the point is networking people can help each other it’s not just yeah in Sri Lanka there’s initiative we joined open government partnership in 2015 and 16 there’s a lot of civil society activities around it and the government also responded I think they we could submit the second hybrid report into for the 2019 to 2021 after that I am not sure of what is happening but Sri Lanka is a law of right to information so if if the data sets can be more open and open there’s no need for individuals to send requests before for search the paper documents and all other things so so it’s kind of a win-win situation so more open you are with with what government can show to the people who are the stakeholders request I think I think that’s very true I will say that usually and if you

Kat Townsend:
okay so we’re just gonna close out usually if you’re looking at the people who submit Freedom of Information Act requests they want a very specific data set that and often it’s from a journalist perspective it’s accountability which is vital it is hard to get civil servants to convince their bosses to get excited about accountability because it doesn’t feel good to get yelled at and if you want to get people to be excited about transparency you give them a positive story of why it will be in their interest to open it up and if that is you’re helping the youth you’re building businesses you know there’s a nice story in the newspaper in general everybody cares about their reputation and when you build those models you can shift perception and then yes as happened it took 15 years for the US to do it but now we finally have a FOIA website that is easy to use as before it was not at all it does take time and so it’s that nothing that you build today is going to be modern in five ten years and it is about those communities and consistency but it’s a global community there’s a lot of people working on this and we want to work together so we really appreciate your time you

Audience

Speech speed

160 words per minute

Speech length

1899 words

Speech time

712 secs

Kait Holm

Speech speed

143 words per minute

Speech length

1121 words

Speech time

471 secs

Kat Townsend

Speech speed

189 words per minute

Speech length

4756 words

Speech time

1513 secs

Winnie Kamau

Speech speed

53 words per minute

Speech length

59 words

Speech time

67 secs

Legitimacy of multistakeholderism in IG spaces | IGF 2023

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Hortense Jongen

The importance of collaboration with various stakeholders is highlighted for effective governance and policy-making. The Netherlands has been actively engaged in working with a broad array of stakeholders since around 1200 to ensure protection against the North Sea. This long-standing collaboration reflects the significance of involving diverse groups in decision-making processes.

The Internet Governance Forum (IGF) is another example of a platform that promotes stakeholder engagement in discussions on an equal footing. Stakeholders from civil society, technology, business, and government come together to exchange ideas and perspectives. This inclusive approach fosters a more comprehensive and well-rounded decision-making process, leading to more effective governance and policy outcomes.

However, there are concerns regarding the uneven distribution of stakeholder representation in the Internet Corporation for Assigned Names and Numbers (ICANN). It is noted that there are 182 members from government and 38 observers in ICANN, which is not equivalent to the 193 member count of the United Nations. Additionally, during the recent ICANN meeting, there were discrepancies in the number of government members and observers present, indicating an imbalance in geographical representation.

To address this issue, there have been calls for greater diversity in representation, particularly for the next round of generic top-level domains (GTLDs). Currently, there is a heavy Western bias in the distribution of registries and registrars. It is argued that more diversity is needed to ensure representation of different languages and scripts. This demand for diversity aligns with the global goals of gender equality, reduced inequalities, and peace and justice outlined in the Sustainable Development Goals (SDGs).

In conclusion, working together with various stakeholders is essential for adequate governance and policy-making. The Netherlands’ collaborative approach reflects the long-standing tradition of involving diverse groups in decision-making processes. The IGF provides a platform for stakeholders from different sectors to engage in dialogue, leading to more comprehensive outcomes. However, there is a need to address the uneven distribution of stakeholder representation in ICANN, with calls for greater diversity in future GTLDs to ensure a fair and inclusive internet governance system.

Jordan Carter

The analysis highlights the crucial importance of deepening and broadening participation in internet governance to enhance its legitimacy. It argues that inclusive participation plays a significant role in boosting the credibility and acceptance of initiatives related to internet governance. However, there is currently a deficit of participation from Global South participants, indicating an urgent need to address this issue.

One key factor in enhancing participation is effective funding. The analysis asserts that financial resources must be made available to ensure that individuals without economic means can actively participate in internet governance discussions and decision-making processes. By providing necessary support, such as travel expenses or technological resources, financial barriers can be overcome, allowing a wider range of voices and perspectives to be included.

Furthermore, the analysis suggests that upgrading the procedural legitimacy framework of internet governance is necessary. It recommends reviewing and adopting the foundations of internet governance used in the 2020s, specifically referring to the roadmap developed during the NetMundial process in 2014. By building on this existing framework, internet governance can be strengthened and made more effective, ensuring the inclusion of diverse stakeholders and promoting fair decision-making processes.

In addressing emerging policy questions, the analysis emphasises the need for new processes and institutions to deal with the changing landscape of the internet. As technology advances, new policy challenges arise, and it becomes crucial to determine the appropriate stakeholders for each issue. This requires careful consideration and deliberation to ensure that all relevant actors are involved and their perspectives are considered.

An advocate for a more inclusive, procedural, and adaptable approach to internet governance is Jordan Carter. According to Carter, a broader base of participation is essential for a truly democratic and effective governance system. Carter also encourages a review of the foundational procedures used in internet governance, suggesting that improvements and adjustments may be necessary to address the evolving needs of the internet ecosystem. Moreover, highlighting the importance of institutional innovation, Carter emphasises the need to engage the appropriate stakeholders, ensuring that relevant expertise and perspectives are included in decision-making processes.

Overall, the analysis stresses the significance of deepening and broadening participation in internet governance for its legitimacy. It highlights the deficits in participation from Global South participants and emphasises the importance of effective funding to overcome economic barriers. Additionally, it suggests upgrading the procedural legitimacy framework, establishing new processes and institutions, and engaging appropriate stakeholders to address emerging policy questions. Jordan Carter’s advocacy supports these points, emphasising the need for inclusivity, procedural improvements, and innovation in internet governance.

Elise Lindeberg

In the context of internet governance, there is a growing recognition of the importance of inclusive participation and its direct influence on the legitimacy and success of the multi-stakeholder model. This model aims to involve various stakeholders, including governments, civil society, academia, and the private sector, in decision-making processes related to internet governance. However, surveys and research indicate that there is a significant number of crucial voices and stakeholders who are not aware of or involved in these discussions, presenting a serious challenge to the model’s legitimacy.

The lack of inclusive participation places a responsibility on the participants currently involved in internet governance to address this concern. It is argued that in order to ensure the credibility and effectiveness of the multi-stakeholder model, broader communities should be meaningfully engaged in decision-making processes. This requires finding ways to include perspectives from underrepresented groups and ensuring that diverse voices are heard and taken into account. By doing so, the multi-stakeholder model can truly reflect the needs and interests of all stakeholders involved.

Another argument put forward is the need to strengthen existing forums rather than creating multiple new ones. One representative of a small state expresses concerns about the practicality and efficiency of following discussions in multiple forums. She suggests that reinforcing the forums already in place can lead to better utilization of resources and expertise. This approach can also foster deeper engagement and allow for more focused discussions. By consolidating efforts and resources, the internet governance community can maximize its impact and effectiveness.

Furthermore, the sharing of best practices and tangible measurable results within the internet governance community is advocated. A report from ODA highlights the potential for more focused dialogues between experts, leading to the identification and dissemination of best practices. It is proposed to measure the work done within these forums to increase clarity on the impact achieved. This can help draw more groups into the discussions and encourage participation from diverse stakeholders. By sharing and utilizing meaningful results, the internet governance community can enhance its effectiveness and drive positive change.

In conclusion, inclusive participation, the strengthening of existing forums, and the sharing of best practices and measurable results are highlighted as crucial aspects in ensuring the credibility and success of the multi-stakeholder model in internet governance. By addressing the challenge of inclusivity, streamlining efforts, and encouraging collaboration, the internet governance community can enhance legitimacy, drive meaningful outcomes, and foster a more inclusive and representative digital landscape.

Nadia Tjahja

Nadia Tjahja, a PhD fellow at the United Nations University and the Free University of Brussels, is conducting a thorough investigation into the legitimacy of multistakeholderism in internet governance. This exploration is being carried out through three publications that provide insights into the topic. Tjahja’s objective is to facilitate meaningful participation from various stakeholders and social groups in multistakeholder initiatives such as ICANN, ITF, and IGF.

The research reveals that youth are playing a critical role in creating new spaces within the Internet Governance Forum (IGF) when they perceive that the existing processes do not effectively engage them. This highlights their agency and underscores the need for inclusivity in internet governance. However, a challenge to meaningful engagement arises in the form of tokenized participation, where individuals or groups are given superficial representation without having a genuine impact on decision-making processes. This issue emphasises the importance of analysing and understanding the reasons why meaningful participation for such individuals is not feasible.

Tjahja’s research suggests a pyramid of participation, drawing on the elements of Arnstein’s ladder, to illustrate how individuals integrate within the IGF. This conceptual framework provides insights into the various levels of engagement and elucidates the failure of tokenized participation to enable meaningful involvement.

Furthermore, the significance of continuous evolution and feedback in youth participation at the IGF is highlighted. The YouthDIG initiative actively engages previous participants to gather their feedback and suggestions for improvement. Participants are also given the opportunity to join the YouthDIG org team, empowering them to implement the changes they desire. This approach fosters a dynamic and responsive environment, prioritising the voices of young individuals in shaping internet governance.

The analysis of Tjahja’s work underscores the importance of promoting diverse and inclusive participation in internet governance, particularly within multistakeholder initiatives. It also sheds light on the challenges posed by tokenized participation and the necessity of continuous evolution and feedback. By addressing these issues, the aim is to create a more equitable and effective framework for shaping the future of internet governance.

Corinne Cath

Internet governance organizations, although they may appear open in their procedures, often adopt culturally closed practices that exclude minority voices. These practices are reinforced by language barriers, limited accessibility, and cultural dynamics within these organizations, resulting in a lack of diversity and representation among the group that has clear access. Notably, findings from extensive participant observation and interviews within the Internet Engineering Task Force support these arguments, demonstrating the detrimental impact of exclusionary cultures on minority participation in decision-making processes. To address this issue, it is crucial to acknowledge the value of the multistakeholder model and actively work towards overcoming exclusionary and discriminatory practices. By doing so, we can ensure that all voices are heard and that decision-making processes are inclusive and equitable. Furthermore, it is concerning to observe growing corporate influence over Internet infrastructure, accompanied by increased surveillance practices, which poses a threat to the space for civil society within Internet governance. These trends highlight the erosion of democratic principles in Internet governance. In conclusion, addressing exclusionary practices is vital to promote diversity, inclusion, and the value of the multistakeholder model in Internet governance. Simultaneously, efforts must be made to counter the rise of corporate power and protect the space for civil society. Only by actively confronting these challenges can we guarantee a just, equitable, and representative Internet governance system that reflects the global Internet community.

Session transcript

Nadia Tjahja:
Good morning, everyone, and thank you very much for coming to this launch event on the legitimacy of multistakeholderism in Internet governance spaces. My name is Nadia Tjahja and I’m a Ph.D. fellow at the United Nations University, Chris, and the Free University of Brussels. And today, I am pleased to invite you to explore three publications that look at the legitimacy of multistakeholderism. So today, we’ll have a presentation online from Dr. Hortense Jonge from the Vrije Universiteit in Amsterdam. Then, it will be followed by Dr. Corinne Kaat, who sent in a presentation speaking about loud men talking loudly, exclusionary cultures of Internet governance. This will be followed with the launch of my publication on youth participation in Internet governance. And followed by these three publications, there is the Internet Governance Roadmap, Improving Multistakeholderism for Tomorrow, to provide us a perspective for the future. After this, we will invite you to come to the microphones and share your reflections and your ideas, but we would like to also question three questions. How can multistakeholder initiatives promote meaningful participation from diverse stakeholders and social groups? The second question, what is the relationship between inclusive participation and the legitimacy of multistakeholder initiatives? And the last question, what lessons for other multistakeholder bodies can we draw from the different ways in which the three multistakeholder bodies at the focus of this session, so in this case ICANN, ITF, and IGF, and aim to promote participation? To help us in these reflections and these discussions, we invited two discussants. So I would like to thank you very much to Elise Hever from the Dutch government, andElise Lindeberg from the Norwegian Communications Authority for joining us here today. So I would like to invite my co-moderator, Dr. Hortense Jonge, who is here with us today. who’s joining us online to start the first presentation.

Elise Lindeberg:
Thank you very much for your attention. Good morning, everyone. Sorry, let me just try to set this up. Can you all hear me? Yes, we can hear you. OK, great. Thank you so much. The presentation that I’ll be giving today, it was part of a larger research project that I worked on together with Professor Janet Schulte on legitimacy in ICANN, specifically the levels, the drivers, and the implications of legitimacy. I can only give a snapshot of some of the findings today and some of the key publications, but on each of the slides, I listed the key publications that give a lot more detailed information about each of these findings. But the publications, they all stem from one research project which asked a question, how far and on what grounds does multi-stakeholderism as a mode of global governing gain legitimacy? And specifically in this project, we measured the levels of legitimacy beliefs toward key multi-stakeholder apparatus, ICANN, and to try to identify what generates or what limits those legitimacy beliefs. And we studied this by means of a couple of hundreds of interviews with members of the board, with members of staff, the community, as well as also with several outsiders to ICANN. And we conducted this project between 2018 and 2019. So I think also in the next presentation’s legitimacy, it is interpreted in many different studies in vastly different ways. And in this study, we understand it as. as the belief and the perception that a governing body has the right to rule and also exercises that right appropriately. So concretely, we are interested in the opinion that ICANN has the right to formulate and administer certain rules for the global internet. So we understand legitimacy as underlying confidence in an approval of a governance arrangement, which encompasses a lot more than just passing support for a particular measure and instead entails deeper faith in the governance apparatus as such. And why do we focus on legitimacy? Well, both the literature, as well as many people that we interviewed, they indicate that legitimacy can help a governor. So in this case, ICANN to acquire mandates, obtain resources, attract participation, take decisions, and vice versa, if a governor does not have legitimacy or lower their lower legitimacy beliefs, it might be more difficult to acquire mandates or obtain resources, for example. So one of the first publications in this project, we sought to identify the levels and the patterns of legitimacy beliefs towards ICANN. On this slide, I’m summarizing the key four findings. I will pay most attention to this, and then I will be spending a little bit less time on different explanations for this. But when it comes to the different levels of legitimacy beliefs towards ICANN, we find that taking all audiences together, average levels of legitimacy beliefs towards ICANN are neither so high as to warrant complacency, nor so low as to prompt alarm. So we also find that these legitimacy beliefs towards ICANN generally correlate with closeness to the ICANN regime. So it’s fairly secure legitimacy on the inside, amongst the board, the staff, the community, and then it gets somewhat more wobbly the further we get removed from the ICANN core. Several exceptions aside, legitimacy believes within the ICANN sphere. So board community staff show limited variation by stakeholder group, by geographical region or by social category. And we also find that there’s no glaring of killer’s heel of vulnerability in any quarter, but also no striking concentration of greater ICANN champions, with the exception perhaps of staff and board who have notably stronger legitimacy beliefs. Then a key question of course is how can we explain these legitimacy beliefs? And how can we understand why some people have more confidence in ICANN than others? So in a series of publications, we are trying to find out what are the sources, the drivers or the causes of legitimacy beliefs. So what conditions can be fostered or attacked in order to bolster or undermine legitimacy beliefs. And we focus specifically on three types of explanations, organizational drivers, so institutional drivers that have to do with ICANN as an organization, the way it works, its procedures, its purpose, its performance. Individual drivers that lie with the people who actually ascribe or do not ascribe legitimacy or have confidence in ICANN. And societal drivers that have to do with broader societal structures. I’ll very quickly go over some of the key findings but here on the bottom of the slides, you can also see some of the publications that discussed this a lot more extensively. But we do find that actually a large number of institutional sources are positively associated with legitimacy beliefs toward ICANN. Think for example of accountability, fair decision-taking procedures, timely decision-taking and several aspects related to the purpose or the mission that ICANN stands for. We also find that several individual level drivers. of ICANN are positively associated with legitimacy in ICANN. So it matters what a member, a participant, a perceiver, so to say, someone who ascribes or does not ascribe legitimacy as a member of the ICANN board and staff, who notably have higher, on average have higher confidence in ICANN than members from the ICANN community. And people who feel that they have benefited personally from ICANN and its policies also tend to accord or more likely to accord legitimacy to ICANN. And finally, we looked at several societal level drivers or explanations of legitimacy in ICANN. And what I’m focusing on here specifically is perceptions of structural inequalities, for example, based on age, ethnicity, race, gender, geopolitics, language. And to sum up, actually a very extensive discussion, but we found that a lot of participants perceive structural inequalities in ICANN, do find them problematic, but that most of them do not in my mind their confidence in ICANN with the exception perhaps of inequalities, problematic inequalities based on the geopolitics, so between the global north and the global south. So to summarize, legitimacy understood as approval of ICANN as a governance mechanism for the global internet is important. We find that ICANN has fairly secure legitimacy amongst its insiders, then it starts to wane off a little bit gradually the further we get removed. And we find multiple and variable drivers of these levels of ICANN legitimacy beliefs. So there’s not a simple formula available to solve all legitimacy challenges. And we also believe that knowing what levels of legitimacy beliefs prevail in what quarters and what kinds of forces shape those legitimacy beliefs can nevertheless contribute to more informed and nuanced policymaking. Thank you very much.

Nadia Tjahja:
Thank you very much, Hortense, for your presentation. Then I will share my screen, and we’ll show the presentation of Dr. Corinne Kath, who is unfortunately not able to be here today. And you should be able to see it now. I think we can’t hear her, so the sound is not connected. Am I screen sharing? Yes. So do you know why the sound is not working for the presentation? So while I wait to figure out what is happening with this, I propose I’ll just go straight into my own presentation. So her presentation is a pre-recorded session, so she’s not actually with us online. But thank you so much for paying attention, because otherwise if she was still talking, that would have been a little bit awkward for all of us. So in the meantime, I’ll share my own screen again and start my own presentation. We did it in order of the year of publication. So we started with Dr. Hortense Junge first, Corinne Kath, who just published earlier this year. And I am pleased. that I am going to launch my publication today. So, fortunately I don’t need sound for mine. Nope, that’s not my presentation slides either. I think I’m confused now. So, while I figure this out, could I kindly ask, I’m sorry to have to put you on the spot like this, but Mr. Carter, please, could you share your vision for multi-stakeholderism while we’ve sorted out technical issues?

Jordan Carter:
I can, yes. Thanks, Nadia, and good morning everyone who’s in the room and good evening or good night wherever the rest of you might be online. I was hoping to be riffing a little bit more off the content that had come through in the other presentations, so I’ll actually be quite brief at this point. OUDA is the Australian Demand Administration. We operate the .au ccTLD for Australia. And the reason that we put together a roadmap on internet governance was simply to try and provoke some discussion and dialogue among the internet community about the ways that internet governance might need to be improved to make it more functional for the deeply complicated digital governance environment we all face in the 2020s and beyond. Because of the nature of this launch event, I just wanted to focus in on a couple of aspects of legitimacy and to do that, relating to some of the things that we said in the roadmap. It’s not a promo thing, but you can find the roadmap and read it on our website if you like, ouda.org.au. So I think there are three. We talked a bit about the importance of deepening and broadening. that we’re offering, that more broadly based participation is going to enhance the outcomes and outputs that come from Internet governance processes, for the same reason that we say that they work at all. If you get the right mix of stakeholders, if you get the right mix of stakeholders, you’re going to get the right results. So I think that’s a really good point. The idea is that the solutions that get developed by that process will be more likely to work and will be more likely to be accepted by the participants and by other people who can rely on the right expertise as having been present. So that goes to one of the discussion questions. Our view is inclusive participation does enhance the legitimacy of these initiatives. And one of the challenges and one of the, it’s a bit of a truism in some of the institutions that have been talked about already that most of the protagonists are from particular regions of the world and that there are deficits of participation if you want to take a deficit model from Global South participants, from people who are not from Europe or North America in particular. And one of the things that I think is material to that is providing effective funding approaches so that people without the economic resources to be able to participate have opportunities to do so in a meaningful way. And another which I think will come up in one of the other presentations is about the culture of these affairs. It’s been 10 plus years since I attended my first ICANN meeting as an example. And some people were very friendly and welcoming. And some people were very off-putting and arrogant. And I’m sure it’s the same experience today. And I come with a set of attributes and cultural capital that means I will have had an easier journey into some of that than other people do. The second thing I want to talk about in terms of legitimacy is the procedural legitimacy that can come from agreed decision-making frameworks, if you like, the constitution of Internet governance. One of the things we articulated in our paper was the notion that there should be a review of the foundations of Internet governance, how it is practiced in the 2020s and beyond. We leaned a bit on the roadmap that was developed in the NetMundial process in 2014 as an example of that kind of framework, but there are other normative and procedural frameworks that are out there about how IG should work, and our view is again that if you assemble the breadth of stakeholders and the diversity of stakeholders that are required, the legitimacy of those underpinning frameworks will be enhanced. And the third one I’ll just briefly mention is the institutional innovation question. There are some policy questions these days that have emerged in the technology milieu that are on the agenda at Internet governance events like this. You know, you’ll have noticed by now the focus on AI at this year’s IGF. It isn’t immediately obvious that the right assemblage of stakeholders to deal with Internet governance questions is automatically going to be the right assemblage of stakeholders to deal with other policy questions. So it might be the case that new processes and institutions are needed to deal with new policy questions that become quite remote from the Internet, which is an essential service for many of these technology stacks, but that might engage very much different stakeholder groups. And if we keep trying to shoehorn all of the issues that relate to the Internet, and issues that don’t relate to the Internet but that make use of the Internet, into a single framework, then the Internet governance system isn’t the Internet governance system anymore, it’s just the governance system. It’s just running the world. And so we do need to think about the boundaries of the material that we’re dealing with, and the necessary stakeholders that we need to engage within those boundaries. to build the legitimacy of the work that is done within them. So I hope that’s progressed a few thoughts. I saw some nods and some head shakes, which is perfect by my point of view. And I’ll pass back to you, Nadia. Thanks.

Nadia Tjahja:
Thank you so much for your comments. So hopefully I have figured it out quite right now. And we will be able to see Dr. Kareem Kath joining us on the screen.

Corinne Cath:
And the title of this panel suggests, and given I’m not there in person, I will be giving some guidance on the slides as we go. So next slide, please. So in this brief talk, I will try and do three specific things. Provide a bit of an introduction to the PhD research that I’ve done, specifically looking at internet governance cultures and their rougher edges. Summarize some of my key findings as I have published them in a recent report called Loud Men Talking Loudly on the Exclusionary Cultures of Internet Governance, which was a report that I published for the launch of the Critical Infrastructure Lab at the University of Amsterdam. The report is on their website. And also go check out their work if you haven’t heard of them yet. They’re really wonderful. And then I’ll hand over to the next speaker or Q&A or whatever Nadia thinks is best. Next slide, please. So by way of introduction, my name is Kareem Kath. I’m an anthropologist of internet governance. I wrote an ethnography of the Internet Engineering Task Force and finished my PhD. Ph.D. in Oxford in 2021. I currently work at the University of Delft where I’m doing postdoctoral research on the politics of cloud computing, but this particular topic remains near and dear to me. Next slide, please. So what I’ll be doing today is present some of the research that derives from my Ph.D. where I wrote an ethnography about an important Internet governance body called the Internet Engineering Task Force, and the Internet Engineering Task Force is one of the oldest Internet governance bodies that makes key protocols and standards that enable networks to connect. And I know the importance of the role of the technical community is top of mind for many of you in the room, and I think this research, research that I’ve done, sort of speaks to both the capacities and the limitations and the importance of including civil society explicitly into the work that the technical community does. And you can also find my Ph.D. research, which is published on my website. Next slide, please. Now I know that all of you have better things to do than to read a hundred and odd, 180-odd page academic thesis, so let me just summarize some of my findings about the exclusionary and sometimes discriminatory aspects of Internet governance organizations for you as I’ve outlined in the report that you can see over there. No, sorry, over there. Next slide, please. In the report, as in some of my other academic work, which is based on multiple years of fieldwork and participant observation within the Internet Engineering Task Force, as well as numerous semi-structured interviews with people who work in these kind of spaces, I really ask the question of how suitable certain Internet governance organizations are for civil society participation, and what this tells us about Internet governance. intergovernance cultures and how those can be both open and exclusionary at the same time. And the reason why I think it is important to look at this is because if all of us didn’t, to a certain extent, believe in the importance of the openness of intergovernance or the value of the multistakeholder model, we wouldn’t be here participating in the IGF today. Especially for some of us, because for some of us it’s the dead of night. And this is all very true, but I’ve also found that two things can be true at the same time. The multistakeholder model can be important and can be a valuable model for governing the Internet and other technologies. And at the same time, the practice by which it is done can be discriminatory to minority voices, especially those of civil society, representing human rights values, the voices of women and voices of people from the majority world. And if we want to maintain the openness of the multistakeholder model, we need to, with some urgency, address these ways in which intergovernance cultures can be exclusionary and discriminatory. And as I’m sure you know, I’m not the only one stressing the urgency of dealing with some of the inequities that are inherent to who can afford to be part of Internet governance communities. Tackling these inequities, I believe, is a better and a preferable route than, as some others have suggested, restating Internet governance in a multilateral fashion. I believe that pursuing a multilateral approach, just because the multistakeholder model is one that is less than perfect, is perhaps throwing out the baby with the bathwater. But at the same time, I also believe we need to go much beyond deepening and broadening participation, as some people advocate for, as participants are still going to be, especially minority voices, are still going to be incredibly unlikely to stay involved. when the cultures in which they are expected to participate are going to be hostile to their needs and to their presence. Next slide. So my report lays out what loud men as an organizational culture in some internet governance organizations costs us when we’re striving for an internet that serves a diverse public interest. Next slide, please. And some of the findings that I want to share with you today are on this slide. So what we see is that many seemingly open, many seemingly accessible internet governance organizations where key debates about internet infrastructure or policies happen, where web standards are discussed, where the functioning browsers are discussed, et cetera, are, even though they seem procedurally open, are culturally closed off, can be hostile, can be surprisingly hard to participate in, especially for civil society folks, especially for women, and again, especially for participants in the majority world. And what happens is these exclusionary cultures create this invisible barrier that makes it extra hard for these groups to be able to participate, even though they are bringing a very, very much needed noncommercial public interest perspective to debates about technical functioning of the internet. And while many civil society participants in this room might not be surprised by these findings or by these different hurdles and barriers that I outline in the rest of my research, there is comparatively little, at least academic documentation of this type of hostility in existing research literature or even in policymaker conversations about internet governance. And it is another topic that we need to put on the table if we are to maintain the good bits of the multistakeholder model. Next slide, please. And we often tend to talk… about how open Internet Governance Organizations are. And that’s true along some axis. I found, however, that there is a bit of a disconnect between procedural openness, which is a slightly lower bar that many Internet Governance Organizations will meet, to some extent at least, and actual accessibility. And this disconnect, in part, stems from different cultural dynamics. What we see is that Internet Governance Organizations routinely tend to cater to particular groups of people, taking their assumptions and their expectations as the standard, and doing not enough to accommodate and anticipate different perspectives and needs. Now, for example, we are all here, primarily speaking English to each other, right? So English is often the working language in a lot of these organizations with an American orientation towards the market as the primary form of governance also being very endemic. Meetings occur at different sites across the globe. Again, IGF being but one example of that. And a lot of these locations are incredibly hard to access for people from the majority world who face all sorts of visa challenges and a heavier financial burden when it comes to traveling. Same for people with caretaking responsibilities, with employers that cannot foot the bill for long distance travel, for people with disabilities, et cetera, et cetera. It becomes very hard to participate. So the group that is left is a group that can participate, but it’s a smaller group, often one that is much more homogenous than the Internet community that they end to serve. And it is these subtle and cultural ways in which the day-to-day functioning of Internet governance can exclude groups that need to be heard. And if we take ourselves serious as a community, then we need to address these rough edges in earnest. Next slide. So the open multi-stakeholder model of Internet governance, in which all different parties joining and using the network contribute to decisions about its functioning, is integral to the Internet’s success. Now, this is especially crucial at this moment in time when we see that corporate power over Internet infrastructure is growing, government and private surveillance is growing, and the space for civil society to act is shrinking. So for better or for worse, Internet governance organizations are still a place where the public can claim a seat at the table. But in order for that seat to actually lead to anything concrete, much more work is needed to ensure that these Internet governance bodies live up to their promise of being accessible and open to all. And the work that I’ve done provides one entry into showing why that is not always currently the case. And so what I hope is that if you take away one thing from this presentation, let it be this. Internet governance organizations may be procedurally open, but they can be culturally closed off and unwelcoming in practice. And the gap between the rules on paper on the one hand and this reality in practice can be explained in part for the exclusionary effect of its cultures. And it is these cultures that make it difficult for civil society to be able to join decision-making processes they so urgently need to join. And again, understanding how this plays out should curb our impulse to position Internet governance organizations also as naturally capable of delivering us an Internet that answers to the public. It’s unfortunately not that simple. So coming to my final words here. Designations of Internet governance organizations as exemplary in this regard often depend on ignoring or at least disregarding the exclusionary effects of cultural dynamics in favor of surface-level procedural access. And we as a community can and must do better. And not just for our own sake, but also to push back arguments made by detractors to the multistakeholder. stakeholder model. And I think that the fact that we’re coming here today is a clear sign of the fact that we as a community can and must do better. Thank you so much.

Nadia Tjahja:
Thank you very much to Dr. Corinne Kath for sharing her presentation. So it’s been my pleasure to share my own presentation about youth participation in internet governance. So my research for my PhD has been looking at multistakeholderism in internet governance. And specifically, the stakeholder group that I’ve chosen was youth. We always talk about meaningful youth participation. Our common agenda asked for looking at mechanisms on how to engage our youth in policymaking processes. We have spoken about an IGF working strategy on the inclusion of youth. We have the IGF youth track. And so one of the things that I set out to do is to understand youth in these spaces. And for this, my research looked at an agent of change, youth meta-participation at the IGF, where I looked at how youth are creating new spaces within the IGF when they see that the processes that they’re getting involved with do not reflect or engage in the manner that they find approachable or that they have access to. So they use existing mechanisms within the IGF to create new spaces, or they create additional spaces that align with the values of the IGF. I created a policy brief on youth participation in internet governance with recommendations on how youth can be further integrated. And for this year’s Annual Symposium of Giganettes. I presented the youth participation on regional and global level, the dynamics of meaningful youth participation. And with this latest article, I proposed a definition for what is meaningful participation which is based on the definition from Malcolm and the definition I came with was aiming to capture the extent to which the processes in question are effectively designed to incorporate the viewpoints of youth participants into the development of internet governance policies in a balanced way, this being the essential feature from which this subset of multi-stakeholder processes can claim democratic legitimacy. Building on that, I used a revision of Arnstein’s ladder. Arnstein’s ladder looks at non-participation, tokenism and citizen power and when they describe Arnstein’s ladder and use case studies, they use each rung and give an example. But what I find with the Internet Governance Forum that it is an ecosystem. It is more than just this individual component is separate from each other. So I proposed a pyramid of participation. I used elements of the ladder to propose a pyramid in which we see how we integrate within the IGF. So we integrate first. You’re sitting here today and I’m speaking with you now and our other speakers shared their thoughts and ideas with you about their research, about the work that they’ve done, their perceptions, their interpretations of what they see and what they’ve researched. So you’re being informed. But we will open up the floor and we’ll have reflections from our discussants and have asked them to consult, to provide input, to exchange. And this is how we integrate. We become familiar with content and with processes. But at some point… you come into this leadership position, you come here as a partnership, maybe some of you are session organizers and you collaborate with the community to create your sessions. And maybe some of us will work closely with the IGF Secretariat as consultants or a form of a facilitator where you have delegated power to facilitate particular positions. And I mentioned before when these structures are not achieving the aims and goals that you have, you can go into meta-participation where you feel you have some control to create the systems that you want, which can be used through processes of the IGF or creating your own processes aside that you align with the IGF. And then of course what Arnstein’s Ladder talks about is tokenized participation and this is something that when I created the Pyramid of Participation I believed that it was outside of the scope. I believe that when we have purpose, we want it to be meaningful. And there is a tokenized processes, but tokenized processes were not included in this study so when we felt that there were tokenized activities or things that were interpreted as tokenized, it means that meaningful participation has failed us. And then in this research that I’ve done I analyzed it through the lens of why and how they are not able to meaningfully participate rather than looking at it as this process was made to tokenize you. I believe that we want to have meaningful participation and sometimes we fail and how did we fail that. So here are just a few examples. Using the Pyramid of Participation and interviews with European participants from EURIDIC and YouthDIG, I looked at which activities that they participated in and what they felt was their purpose and how they thrived, but also how they felt that the structure or their personal ambitions failed them. So, when they come into the integration part where they’re informing and consulting at EuroDIG, they were learning about the content, they were learning about how EuroDIG works, the processes. They assessed what was the structure accessibility. Are you capable of engaging or not? And they learned that when you are part of the EuroDIG community, this can lead to responsibilities and that’s a form of integration. You then move towards a natural way into the leadership positions. But, on the other hand, when we see that meaningful participation has failed is when personal reasons, motherhood, for example, or fatherhood, or they found that their career opportunities were not aligned with their ambitions or they had structural reasons why they were not able to engage. For example, when there are time zone problems, when there are different opportunities that were not aligned such as the topics of that year doesn’t align with your personal ambitions. And then we go through this entire system at both EuroDIG, but also at the global IGF. So, at the global IGF, we looked at the different ways participants attend from YouthDIG to EuroDIG and to the IGF. And where were they capable of contributing on the informing consulting level, but also where meaningful participation had failed. And therefore, I am pleased to share with you, because of my research and the support of the EuroDIG Secretariat, I was able to look and reflect on YouthDIG, the Youth Dialogue on Internet Governance. governance, the pre-event for youth to Eurodig, for them to learn about the context in which Eurodig will present that year, to learn about the processes and how to integrate into Eurodig community. And based on this, I created a publication which you can find at the Eurodig booth, which talks about the Eurodig philosophy. If you remember the definition of meaningful participation, remember that we spoke about structure, about how to contribute and how youth are continuously evolving. And this publication reflects on how we approached YouthDIG, how can we integrate them and how can we further their continuous meaningful participation. And we hope that you will reflect on this publication and also come back to us with feedback because it’s always the importance that we have with YouthDIG that we always engage our participants to ask them if they come back next year, how would you do it? What would you change to make your participation more meaningful? They give us our feedback and then we invite them to join the YouthDIG org team to implement what they would like to see, the change that they would like to see. And that is what this publication hopes to do to further continue this discussion about how can we continue meaningful participation from the regional to the global IGF. So thank you very much. I would then like to ask our discussants for their initial reflections of our three presentations and the questions that we had. And in the meantime, if you have any comments or questions, please do come to the microphone. But then I would like to ask Ms. Lindenberg if you could start with your comments.

Elise Lindeberg:
Thank you. And thank you for being invited. Well, there’s a lot of questions you asked us. So what is the. relationship between inclusive participation and the legitimacy of the multi-stakeholder model. I don’t think anyone questions that there is a strong link. We discuss it all the time, also in the high-level panels, that ensuring inclusive and meaningful participation from the border communities, the core, is crucial for the multi-stakeholder model. And that some of the research and surveys that you mentioned now shows that there are several important voices, stakeholders, that are not aware of the discussions we have in internet governance. And of course, that’s a huge challenge for the legitimacy of the multi-stakeholder community. And lays the great responsibilities of us who are already participating in what we should do with that problem. So I don’t think anyone questions the importance of discussions like this. And what can we do then? Well, I think that one thing we should look into is also the various forums that we have. As a small state, I represent the Norwegian government. We are a bit concerned if we have a lot of arenas that we discuss the same topics. Because it is challenging to follow all the different discussions, if it is a lot of different forums. And I’m not talking about the forums that are national or regional, because that feeds into this discussion and is very important. But we should also, I think, concentrate on making the forums we already have stronger. So that’s one thing. Making the most out of the existing structure we already have. And I also think that we should go deeper into sharing best practices. within the IGF and the multi-stakeholder community. I think the report from ODA shows that you have room within the multi-stakeholder system like IGF for more focused dialogue between experts and sharing best practices. I think that’s one thing that would make it even more meaningful to participate and would draw broader groups into the IGF and multi-stakeholder discussions. So, good sharing of practices. Maybe we should also start to measuring what we are doing in some way to see how we impact the involvement of the Internet in these forums because it is discussions, but we also need to see some meaningful results for others to take from this community and take home and to make best practices more shared. I think that’s one thing that we can contribute more to. Yes, thank you. Thank you very much.

Nadia Tjahja:
And then quickly, Miss Hortense, if I could have your reflections.

Hortense Jongen:
Yes, thank you. Yes, so I’ll try to keep it really brief because I already saw we’re over time. But, yeah, coming from the Netherlands, working together with a broad array of stakeholders is very common. We’ve been pollering since approximately 1200, and that was to protect ourselves from the North Sea. And we’ve done that with a broad array of stakeholders. So I could maybe say it’s in my veins to talk with stakeholders, but it’s not something that’s always common for governments to do. And I think that’s very special about the IGF, that we’re talking together on an equal footing and that we have the opportunity to talk with civil society, with the tech community, with the business community, and with governments. that it’s not government inviting you to say whatever you think and well okay thank you we’ll see you next year but I really hope for for meaningful participation and I just wanted to reflect briefly on ICAN as I’m the Dutch GAC representative so that’s for the government stakeholder advisory advisory committee in ICAN and about participation in ICAN I still don’t see that all governments are represented in ICAN at the moment there are 182 members from government and 38 observers so that’s not the 193 that the UN counts as as government but also at the last ICAN meeting there were 73 government members participating and eight observers I didn’t do a quick regional check but it’s I’m pretty sure it’s not an equal distribution across the world and despite the fact that it’s not equal in in the GAC it’s even less equal I’m pretty sure in the other stakeholder groups so I personally hope to see with the next round of GTLDs which so that’s generic top-level domains and I would hope to see that this stakeholder group becomes more diverse with a broader array of of top-level domains in other languages and other scripts and ensuring that more registries and registrars are equally distributed across the world and that it doesn’t have this immense Western, immense Western grouping where they are currently. So, yeah, that would be two of my reflections on your questions, and hopefully we can have one or two remarks from others, thanks.

Nadia Tjahja:
Thank you very much. I fear that there’s not a lot of time left over because the opening ceremony will start soon, and I think that everybody would want to join that. But certainly, I do not believe that this conversation has to stop here, and I’d be welcome, and also my colleagues are also keen on furthering the discussion, but I would like to thank you all so very much for coming here today in reflection, and I apologize for the technical problems that we had today that we could not engage better. But I would also like to thank very much the staff for doing their very best to ensure that everything is running smoothly, but also the captioners that are writing things live, and those who are interpreting into English and Japanese for their services here today. So thank you all very much, and we hope to continue this conversation. Have a really lovely IGF. Thank you. Thank you.

Hortense Jongen

Speech speed

127 words per minute

Speech length

412 words

Speech time

194 secs

Corinne Cath

Speech speed

163 words per minute

Speech length

1912 words

Speech time

704 secs

Elise Lindeberg

Speech speed

163 words per minute

Speech length

1716 words

Speech time

633 secs

Jordan Carter

Speech speed

183 words per minute

Speech length

1014 words

Speech time

332 secs

Nadia Tjahja

Speech speed

159 words per minute

Speech length

2364 words

Speech time

890 secs

Jointly Share the Responsibilities in the Digital Era | IGF 2023 Open Forum #22

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Ren Xianliang

Digital technology is having a significant impact on traditional industries, with the process of digitisation, networking, and intelligence gaining momentum. This transformation is driven by the increasing adoption of digital platforms and the exponential growth of cross-border data flows. Traditional industries are undergoing a digital revolution as they strive to operate more efficiently and effectively.

The importance of digital governance as a global issue is also acknowledged. Digital governance refers to the set of rules, policies, and frameworks that guide the use and regulation of digital technologies. While the need for effective digital governance is recognised, there is currently uneven development of digital governance capabilities among countries. Some countries are better equipped than others to address the challenges and risks associated with the digital age. Additionally, there is growing competition in the digital governance model as countries vie to establish themselves as leaders in this field.

Universal connectivity is identified as a vital goal that needs to be achieved. Despite progress in expanding internet access, around 3 billion people worldwide remain unconnected. The argument is that every person should have safe and affordable access to the internet by 2030. This highlights the need to bridge the digital divide and ensure equal opportunities for individuals, regardless of their geographic location or socio-economic status.

Furthermore, there is a call for more global cooperation and unity in digital governance. The rapid pace of technological advancement and the associated risks and challenges necessitate collaboration between nations. Countries must work together and share responsibilities to effectively address the challenges of the digital age. The World Internet Conference (WIC) is committed to building bridges and promoting closer and pragmatic global cooperation in digital governance.

In conclusion, digital technology is transforming traditional industries through increased digitisation, networking, and intelligence. Digital governance is recognised as an important global issue, although there is a need for more consistent and inclusive development of digital governance capabilities worldwide. Achieving universal connectivity, ensuring internet access for all, is a crucial goal for achieving digital inclusivity. Finally, global cooperation and unity in digital governance are essential for effectively addressing the risks and challenges of the digital age.

Xuanxin Zhang

The analysis highlights the increasing importance of digital technology governors, data governors, and digital platform governors as crucial topics in today’s digital era. This recognition indicates the growing significance of effectively governing and managing these areas to harness their potential for digital productivity. The positive sentiment surrounding this argument suggests an optimistic view of the opportunities that the digital era presents.

One of the key recommendations derived from the analysis is the need to enhance mutual trust through dialogues and exchanges to mitigate digital security risks. The supporting facts emphasise that global security threats are becoming more permanent, posing significant challenges. Moreover, the rapid development of new technologies and applications has introduced new risks to digital security. To address this issue, it is proposed that think tanks should innovate and establish platforms to facilitate cross-disciplinary and cross-field cooperation. This collaborative approach is seen as essential to effectively prevent and manage digital security threats.

Another important aspect highlighted in the analysis is the significance of a sound digital governance ecosystem in promoting digital innovation and development. The supporting facts underline the basic guarantee that such an ecosystem provides in fostering an environment conducive to digital advancement. The positive sentiment associated with this argument suggests an acknowledgement of the critical role of digital governance in driving progress in the digital realm.

Furthermore, the analysis recommends guiding multiple parties to actively participate in building a sound digital governance ecosystem. By engaging and involving various stakeholders, a comprehensive and inclusive approach to digital governance can be achieved. This broad participation ensures that the system takes into account diverse perspectives and interests, leading to more effective and balanced governance practices.

Lastly, the analysis asserts the importance of promoting cooperation on digital governance to improve the global digital governance system. Openness and cooperation are cited as critical principles for building a community with a shared future in cyberspace. This recommendation recognises the interconnected nature of the digital world and the need for collaboration between nations and organisations to address global challenges in digital governance. By fostering a cooperative and inclusive environment, the global digital governance system can be strengthened and more effectively address the diverse needs and interests of all stakeholders.

To summarise, the analysis highlights the growing importance of digital technology governors, data governors, and digital platform governors as crucial topics in the digital era. The need for enhancing mutual trust to mitigate digital security risks, building a sound digital governance ecosystem to promote innovation and development, and promoting cooperation on digital governance to improve the global system are key takeaways from the analysis. By addressing these issues and implementing the recommended actions, it is possible to unlock the immense potential of digital technologies and strive towards a more secure and inclusive digital future.

Qi

The development of the information technology revolution and the digital economy is significantly changing the way production and life function across the globe. This transformation has had a far-reaching impact on societies and economies, as it leverages the power and potential of the internet. With a positive sentiment, this argument highlights how the internet has transformed production and life.

China, in particular, has demonstrated its commitment to promoting internet development and governance. This dedication has led to notable progress in relevant undertakings within the country. Furthermore, hundreds of millions of people in China have experienced a greater sense of gain by sharing in the achievements of internet development. The sentiment here is positive, showcasing the positive outcomes resulting from China’s approach to cyberspace.

However, it is important to recognize that global challenges persist in the digital landscape. Unbalanced development, unsound regulation, and unreasonable order are some of the problems that persist globally. Although this stance assumes a neutral sentiment, it emphasizes the need for enhanced digital governance as a global concern.

Unity and cooperation are highlighted as the effective approach towards addressing the risks and challenges present in cyberspace. With positive sentiment, it is emphasized that all parties must work together to keep pace with the evolving trends of the times, seize historical opportunities presented by the information revolution, and tackle the potential risks and challenges in the digital realm. The conclusion drawn here is that unity and cooperation are key to ensuring robust digital governance.

In conclusion, the development of the information technology revolution and the digital economy holds immense transformative power over production and life. China’s commitment to internet development and governance has yielded positive outcomes for its people. However, global challenges such as unbalanced development and unsound regulation persist, making enhanced digital governance a pressing global concern. Through unity and cooperation, the risks and challenges present in cyberspace can be effectively addressed.

Wolfgang Kleinwächter

The analysis delves into the topic of internet governance, exploring various perspectives and arguments related to the issue. The first viewpoint asserts that the internet is not merely a technical problem but rather a political problem with a technical component. This perspective suggests that the political implications of the internet cannot be ignored and should be taken into consideration when formulating policies and regulations.

The second viewpoint emphasises the importance of adopting the Mighty Stakeholder Approach to internet governance. This approach argues that the internet cannot be effectively managed by a single group alone. Instead, it advocates for collaboration and input from various stakeholders, including governments, businesses, civil society, and users. The argument is based on the idea that a diverse range of perspectives and expertise is necessary to address the complex challenges of internet governance. A concrete example of this approach is seen in the World Summit, where arguments were based on how policymaking can be innovated, leading to the development of the Mighty Stakeholder Approach.

The analysis also highlights the existence of different layers within the internet and their potential for different forms of governance. These layers include an evolution layer and a use layer, each with its respective governance strategies. Additionally, the analysis points out that there are 193 different national jurisdictions, further underscoring the need for different layers of governance to cater to the diverse legal frameworks and regulatory systems across different countries. This observation suggests that a one-size-fits-all approach to internet governance may not be effective.

Another concern raised in the analysis is the risk of internet fragmentation. It notes that some governments might seek to bring the 193 jurisdictions to the ground layer of the internet, which could result in the fragmentation of the internet. This potential fragmentation is seen as a negative consequence, as it could impede cross-border communication and the free flow of information.

The analysis expresses support for the Global Digital Compact as a means to foster global consensus on internet governance. The Global Digital Compact is seen as an opportunity to bring diverse groups together and find common ground to address the challenges of internet governance effectively.

Lastly, the analysis highlights the importance of maintaining an open, secure, and inclusive internet. It asserts that the internet is as essential as air, highlighting that no state has its own separate air. Efforts should be made to keep the internet open and accessible to all, while also ensuring security and inclusivity. The analogy of clean air and pollution-free environment further reinforces the need to protect the internet from harmful practices that could compromise its integrity.

In conclusion, this analysis offers a multifaceted exploration of internet governance, presenting different viewpoints and arguments. It underscores the political and technical nature of the internet, emphasizes the need for collaboration among stakeholders, considers the various layers of the internet and the potential risks of fragmentation, supports the Global Digital Compact as a means of achieving consensus, and underscores the importance of an open, secure, and inclusive internet.

Audience

The audience member, who has already visited the place twice, expresses a strong positive stance towards a location with water settings and canals. They are greatly impressed with the overall water setting and specifically mention their enjoyment in walking around the canals. They are so enamored with the place that they express a strong desire to return at the end of the month, indicating their intention to revisit. This positive sentiment is evident throughout their argument, reflecting their enthusiasm for the place.

The supporting facts provided further demonstrate the audience member’s positive impression. They mention their desire to come back, indicating a high level of satisfaction with their previous visits. Additionally, they express enjoyment in walking around the canals, suggesting that the ambiance and beauty of these water features greatly enhance their experience.

Furthermore, it is noteworthy that the audience member’s positive impression aligns with the theme of good health and well-being, as indicated by the related Sustainable Development Goal (SDG) of “3. Good Health and Well-being”. This suggests that the water setting and canals contribute positively to the audience member’s personal well-being and overall satisfaction during their visits.

In conclusion, the audience member’s enthusiasm and positive stance towards a place with water settings and canals are clearly evident. Their desire to revisit, expressed satisfaction with previous visits, and enjoyment of walking around the canals all contribute to their positive sentiment. This finding is consistent with the related SDG of good health and well-being, highlighting the beneficial impact that such features can have on individuals.

Juni Murai

Juni Murai highlights the importance of a user-centric perspective in internet governance. While the internet initially originated from the supply side, it has now reached every corner of the world, impacting numerous industries and people’s lives. As a result, it is crucial to prioritize the needs and preferences of users when formulating internet governance policies. This approach ensures that regulations and services align with users’ requirements and expectations. Incorporating the input and feedback of users, governance leaders, and commercial entities is necessary to address emerging issues effectively.

The second key point raised by Juni Murai focuses on the complex advancements in internet technology architecture. From IP to web, cloud computing, social networking, the Internet of Things (IoT), and artificial intelligence (AI), the internet has rapidly evolved. This progression has increased complexity, making it challenging for policymakers and industry leaders to comprehend these intricate technologies. Thus, continuous education and awareness among stakeholders are crucial in keeping up with the evolving landscape. This understanding enables the development of effective policies that support innovation and foster a secure and inclusive digital environment.

Cybersecurity takes center stage as the third key point in Juni Murai’s argument. The emergence of new technologies brings the potential for misuse and various cyber threats. Collaborative efforts among different entities are essential to combat cyber abuses and promote responsible and ethical technology use. Investment in robust cybersecurity measures, such as encryption and threat detection systems, is crucial. By prioritizing cybersecurity, stakeholders can protect sensitive data, prevent unauthorized access, and maintain trust in the digital realm.

Juni Murai’s emphasis on collaboration expands beyond understanding new technologies to discussing their implications. Recognizing the need for a platform that brings together stakeholders from various sectors, opportunities for dialogue and knowledge-sharing are essential. Global discussions enable participants to better comprehend the technological landscapes across different regions. These conversations facilitate the exchange of insights, ideas, and best practices among policymakers, industry representatives, academics, and users. This leads to a comprehensive understanding and effective governance of new technologies.

In conclusion, Juni Murai underscores the importance of a user-centric approach in internet governance. The rapid advancements in internet technology architecture present challenges for policymakers in comprehending and regulating these complex systems. Furthermore, the potential misuse of new technologies highlights the criticality of robust cybersecurity measures. Collaborative efforts, partnerships, and global discussions are key drivers in promoting a better understanding of technological advancements and their implications. Working together, stakeholders can navigate the evolving digital landscape to ensure a secure, inclusive, and beneficial internet for all.

Luca Belli

The BRICS nations, Brazil, Russia, India, China, and South Africa, have been collaborating on shared challenges in digital policies and internal governance. Since 2014, they have established a working group on the security of Information and Communication Technologies (ICTs) to exchange best practices. The group aims to enhance the security of digital infrastructure and ensure responsible data usage. Joint commitments to global norms of cybersecurity and data protection have also been defined by the BRICS nations. These commitments reflect their dedication to secure digital development and adherence to global standards.

The BRICS nations have launched an initiative to improve cooperation in the supply chain, specifically in the digital era. By pooling their resources and expertise, they aim to create a more efficient and secure supply chain system that can better adapt to the challenges of the digital economy.

The enhanced cooperation process within the BRICS framework can potentially serve as a model for global digital governance. Their successful collaboration on cybersecurity regulations and the development of a framework for consumer protection in e-commerce demonstrate their shared commitment to addressing cyber threats and creating a safe digital marketplace.

Additionally, the BRICS nations prioritize maintaining digital sovereignty while securely transferring data. Each member country has their own system to define the extent to which data can be exported or transferred, emphasizing their commitment to protect national interests and assert control over their digital domains.

In conclusion, the BRICS nations have made significant progress in fostering joint understanding and addressing shared challenges in digital policies and internal governance. Through their working group, joint commitments, and enhanced cooperation in the supply chain, they demonstrate a commitment to promoting secure and responsible digital practices. This collaboration can serve as a model for global digital governance, while their focus on maintaining digital sovereignty highlights the importance of national control in data transfer.

Dai Lina

The development of AI governance rules is becoming increasingly fragmented, leading to a widening digital divide. This fragmentation is primarily driven by the competition among major countries, which has resulted in a deficit in national mutual trust. Unilateralism, statism, and protectionism are also impacting the formulation of AI rules.

One significant issue is the absence of many developing countries in AI governance discussions and decision-making. This exclusion exacerbates the digital divide among nations since these countries have no say in shaping AI’s rules and regulations. The lack of representation from developing countries raises concerns about the fairness and inclusivity of AI governance.

To address these challenges, it is important to promote international cooperation and adopt a human-centered approach to AI governance. This can be achieved by establishing a specialized agency under the US framework to govern AI. Such an agency could serve as a platform for fostering dialogue and cooperation among all countries, including both developed and developing nations.

Additionally, ensuring the safety, reliability, and controllability of AI is crucial. Amidst rapid advancements in AI technologies, it is paramount to build trust in these systems and have the ability to control their actions. This can help mitigate potential risks and ensure AI is used for the greater good of humanity. A human-centered approach should be advocated to align AI with ethical principles and respect human rights.

In conclusion, there is a need for more collaboration and inclusivity in the governance of AI. By promoting international cooperation and adopting a human-centered approach, the global community can work together to address the challenges posed by fragmented AI governance. This will ultimately lead to a more equitable and sustainable development of AI technologies for the benefit of all.

Shi Peixi

Different initiatives and efforts are being taken by states and enterprises to address the issue of global commons in the digital domain. However, the heavy intervention of leading states in the digital domain is resulting in tensions and divisions, leading to digital fragmentation. This fragmentation is evident in various aspects of the digital landscape, including telecommunications service providers, applications, application stores, undersea cable constructions, cloud services, mobile phone operating systems, 5G technology, the supply chain of chips, and the listing of tech companies on the market and capital flow related to new technologies.

In response to this critical situation, it is crucial to find measures that can prevent further fragmentation and division. New and innovative approaches to global digital governance need to be developed. These approaches should aim to regulate and manage the digital domain while fostering cooperation and collaboration among different stakeholders.

One notable discussion on this topic took place between the Secretary General of WIC, Mr. Ren, and other relevant stakeholders. During this discussion, Mr. Ren highlighted the importance of implementing new measures for global digital governance. It is essential to explore alternative methods and approaches that can effectively address the current challenges and ensure a more inclusive and cooperative digital environment.

The analysis suggests that the issue of digital fragmentation and division requires immediate attention, as it has significant implications for various sectors and stakeholders. By implementing new measures and adopting innovative approaches to global digital governance, it is possible to navigate these challenges effectively.

Overall, the summary highlights the existence of tensions and divisions in the digital domain due to the heavy intervention of leading states. It emphasizes the need for urgent measures to prevent further fragmentation and division. The discussion involving the Secretary General of WIC, Mr. Ren, reflects the growing recognition of the importance of finding new approaches for global digital governance. Moving forward, it is essential to foster cooperation and collaboration to address these challenges and ensure a more harmonized and inclusive digital landscape.

Vanny

The development of the internet was driven by a multi-stakeholder approach, which fostered collaboration and consensus-based decision making. This approach, characterised by the involvement and participation of various stakeholders, has proved to be effective in addressing the myriad challenges associated with internet governance. The Internet Governance Forum, established after the World Summit on the Information Society in 2005, plays a crucial role in facilitating dialogue and cooperation among these stakeholders.

The success of the internet is evident in the multitude of applications and services that have flourished over time. Unlike in Western countries, where individuals had the financial means to afford high-speed internet at high prices, users in some regions faced affordability issues. Consequently, alternative methods of providing internet services were developed to ensure accessibility for all. These efforts have resulted in the widespread availability of the internet and have contributed to its overall success.

It is important to distinguish between digital governance and internet governance as separate issues. Digital governance encompasses strategies to mitigate the use and risks associated with various technologies, applications, and services, including artificial intelligence. On the other hand, internet governance addresses how the internet is governed and managed. While these topics may intersect, they should not be used interchangeably, as they pertain to distinct areas of concern.

The multi-stakeholder approach to internet governance has proven effective in resolving various issues that have arisen. Despite sometimes requiring more time, this collaborative approach has consistently delivered solutions and ensured the involvement of diverse perspectives. The multi-stakeholder process allows for the inclusion of various stakeholders, such as governments, civil society, the private sector, and technical experts, fostering transparency and accountability.

It is essential for individuals to be well-informed about the internet and its functioning to make informed decisions based on facts. People often make decisions based on their opinions or assumptions about how the internet should function. Therefore, promoting education and awareness about the internet is crucial to facilitate better decision-making processes.

In conclusion, the development of the internet has been driven by a multi-stakeholder approach, which has been effective in addressing challenges related to internet governance. The success of the internet can be attributed to the multitude of applications and services that have emerged over time. Digital governance should not be confused with internet governance, as they pertain to different aspects. The multi-stakeholder approach to internet governance has proven to be effective, despite occasional delays. Finally, promoting internet literacy and awareness is vital for making informed decisions based on factual understanding.

Moderator

The Digital Governance Forum, hosted by the Cyberspace Administration of China and the Chinese Academy of Cyberspace Studies, aims to promote digital governance and cooperation in the digital era. The forum invites participants from around the world, including governments, international organizations, enterprises, industry organizations, and think tanks. It will discuss topics such as the impact of internet innovations on digital governance, digital governance capacity building, and the need for a sound digital governance ecosystem involving multiple parties.

China is committed to promoting internet development and governance. They advocate for a people-centered approach to digital governance, with a focus on inclusiveness and shared benefits. China plans to apply the internet to areas such as education, healthcare, and poverty alleviation, and proposes to improve digitally-enabled services and enhance digital literacy and skills. They also uphold principles of open and cooperative cybersecurity, being ready to cooperate in combating cyberterrorism and crimes while respecting the rights of all countries to choose their own network development and governance model.

The forum emphasizes the importance of exploring ways to strengthen digital governance and international cooperation. China recognizes the historical development opportunities brought by the trend of digitalization in the digital era and emphasizes the need to seize these opportunities to unleash the potential of digital productivity. However, the rapid development of new technologies and applications also brings new risks in terms of digital security.

The forum also highlights the importance of promoting openness, cooperation, and gender equality in digital governance. It emphasizes the need to ensure safe and affordable internet access for all by 2030, as there are still 3 billion people in the world who are unconnected. The role of ICANN in maintaining the technical underpinnings of the internet is also recognized as important.

The distinction between internet governance and digital governance is discussed in the forum. Digital governance refers to the use and risks of specific technologies, applications, and services, while internet governance is concerned with the maintenance of the internet’s technical infrastructure. The forum emphasizes the need to differentiate between these two terms and raise awareness at various platforms.

The forum showcases successful enhanced cooperation in digital governance among BRICS countries, highlighting the CyberBRICS project conducted by the Center for Technology and Society at FGV Law School. This project focuses on mapping digital policies in these countries and will shift its focus to AI supply chain and interoperability frameworks in the next phase.

In conclusion, the Digital Governance Forum hosted by China aims to promote digital governance and cooperation in the digital era. It emphasizes inclusive and people-centered digital governance, the importance of a sound digital governance ecosystem involving multiple parties, and the challenges and opportunities brought by internet innovations and digital security risks. The forum also highlights the distinction between internet governance and digital governance, the need for policy innovations, and global discussions to address the complexities of digital governance. It showcases successful enhanced cooperation in digital governance among BRICS countries and the importance of mapping digital policies. The forum provides a platform for dialogue and collaboration to strengthen digital governance and foster international cooperation.

Session transcript

Moderator:
. This is the first forum hosted by the bureau of international cooperation of cyberspace administration of China and Chinese academy of cyberspace studies. The theme of this forum is jointly share the responsibilities in the digital era and promote digital governance and cooperation. Taking this as a starting point, I would like to invite the government, international organization, enterprise, industry organization and think tank worldwide to hold dialogues on the two topics. First, the impact of Internet innovations on digital governance. Second, the approach of digital governance capacity building. In this forum, we will explore the ways to promote the global digital governance cooperation and comprehensively strengthen the digital governance capacity building. More important, we would like to continue to build a sound digital governance ecosystem. Now, let’s start the forum. First, let us welcome the director of the bureau of international cooperation of cyberspace administration of China, organizer of this forum to deliver an opening speech. Thank you, Miss Qi.

Qi:
Minister Ren, distinguished guests, dear friends, good afternoon. I’m very pleased to meet all of you in Kyoto. On behalf of the bureau of international cooperation administration of China, I would like to extend a warm welcome and heartfelt appreciation to all guests, both present and online. Today, the development of information technology revolution and the digital economy is transforming the way of production and life, exerting far-reaching influence over social and economic development of states, global governance system and human rights, and the development of emerging technologies by artificial intelligence also poses a new problem of governance to all countries. Problems with the Internet such as unbalanced development, unsound regulation, unreasonable order still exist across the globe. And enhancing digital governance has increasingly become a matter of interest to all countries, as well as an important topic for discussion. Against this backdrop, it is necessary and relevant for us to have an in-depth discussion on this important topic. Since China gained full-featured access to the Internet, it has always been committed to promoting Internet development and governance. Historical progress in relevant undertakings has been made in China. Hundreds of millions of Chinese people have a greater sense of gain from sharing the achievements of Internet development. Last year, China released the white paper entitled, Jointly Build a Community with a Shared Future in Cyberspace. This paper introduces China’s vision of Internet development and governance, shares its achievements in promoting the building of a community with a shared future in cyberspace, outlines the prospects for international cooperation, and expresses China’s sincere desire to strengthen Internet development and governance cooperation in cyberspace. We are ready to work with all parties to keep pace with the trends of the times, seize the historical opportunities of information revolution, and tackle the risks and challenges in cyberspace, making the Internet deliver more benefits to mankind. With this in mind, I wish to propose efforts in three areas. First, we need to follow a people-centered approach with a focus on inclusiveness and shared benefits. Focusing on people is the purpose of digital governance. We need to put people first, making positive efforts to apply Internet to education, healthcare, and poverty alleviation, improve digitally-enabled service, and enhance digital literacy and skills of different groups. We are willing to work with the international community to increase support and assistance to vulnerable groups, promote science and technology for good, bridge the digital divide, and facilitate the effective implementation of the United Nations 2030 Agenda for Sustainable Development. Second, we need to promote security and stability and maintain good order. Security and stability is the cornerstone for digital governance. We uphold the philosophy of open and cooperative cybersecurity, uphold respect for cyber sovereignty, and respect for the rights of all countries to choose their own path of network development and governance model, as well as to equally participate in international governance in cyberspace. We are ready to deepen exchange and cooperation with other countries in cyberspace, cooperating to combat cyber terrorism and crimes, and jointly safeguarding peace, security, and stability in cyberspace. Third, we need to stay united and work together for shared governance. Unity and cooperation is the effective way for digital governance. Practices have proved that anyone attempting to form exclusive blocs will only impede digital governance. To improve digital governance, we must uphold multilateral participation and multi-party participation so as to foster an enabling environment for digital economic development. We should liberate the role of the United Nations as the main channel in international cyberspace governance and give play to the role of governments, international organizations, internet companies, technical communities, social organizations, and individual citizens to jointly study and formulate norms for cyberspace governance that reflect the interests and concerns of all parties in a more balanced way, making the governance system more just and equitable. Ladies and gentlemen, IGF is the important platform under the United Nations. We are willing to join hands with all parties on the basis of mutual respect and trust to solve difficult issues, strengthen areas of weakness, and improve rules of governance concerning digital governance, constantly developing governance landscape featuring multilateral participation and multi-party participation, and jointly build a community with a shared future in cyberspace. Thank you for your attention, and I wish the forum a full success. Thank you.

Moderator:
Thank you very much, Ms. Qi, for the relevant and approach of China. Next, we have Mr. Xuanxin Zhang, Vice President of Chinese Academy of Cyberspace Studies to deliver the speech.

Xuanxin Zhang:
Distinguished guests, ladies and gentlemen, hello everyone. On behalf of Chinese Academy of Cyberspace Studies, I would like to extend warm congratulations on the holding of the Open Forum of Internet Governance Forum, and a sincere welcome to all the guests. At present, the innovation of the internet, big data, cloud computing, AI, and other digital technologies are accelerating. The intelligent industry and the digital economy are booming. All these have greatly changed the global allocation of the factors and resources. Industrial development models and people’s lifestyles. At the same time, the digital divide is becoming more and more pronounced. Cybersecurity and data security risks are increasingly penetrating. And the global digital government, governors, is still facing problems, such as unbalanced foundation, imperfect system, and fragmented roles. In this context, it is of great significance for us to explore ways to strengthen digital governance and international cooperation. It is a shared aspiration of all countries to build and maintain a peaceful, secure, open, cooperative, and orderly cyberspace. Building a community with a shared future in cyberspace has increasingly become the broader consensus of the international community. Now, from the perspective of Think Tank, I would like to share with you some observations and reflections on how to promote capacity building and international cooperation on digital governance. First of all, seize the opportunity. in the digital era to unleash the potential of digital productivity. Nowadays, the trend of digitalization has brought historical development opportunities, but it is also accompanied by risks and challenges. Digital technology governors, data governors, and digital platform governors have become important topics. I think TEC should actively carry out research to explore how to adapt to the development trend in the digital era, reserve space for technical innovation and development on the premise of ensuring security, optimize the digital development environment, so as to further tap the potential of digital technology in facilitating to achieve the sustainable development goals and enable people around the world to share the fruits of digital development. Second, enhance mutual trust through dialogues and exchanges to prevent digital security risks. At present, global security threats are becoming increasingly permanent, and the rapid development of new technologies and applications has brought new risks. The importance and urgency of building a solid bottom line and regulating development has become more permanent in the face of these new issues and challenges. I think TEC should play a bridging role in strengthening dialogues, exchange, research, and discussion, so as to enhance strategic mutual trust in cyberspace. I think TEC should innovate to build platforms for cross-disciplinary, cross-field cooperation. and the cross-national exchange and cooperation and actively offer advice and suggestion for preventing digital security risks and improving the system of digital governance rules. Third, guide multiple parties to actively participate in building a sound digital governance ecosystem. A sound digital governance ecosystem is the basic guarantee for promoting the digital innovation and development. Facing the rapid iteration of digital technologies and complex issues in digital governance, we need to adhere to mutual, natural and mutual party participation. The parties in digital governance include the government, international organizations, enterprises, social organizations, etc. All parties should play their respective roles, cooperate with each other and stress exchanges. Think tanks should be open-minded with a strong sense of responsibility and should, through dialogue, communication, general research and other means, build consensus, resolve misunderstandings and differences, and jointly contribute to the building of the global digital governance ecosystem. Last but not least, promote cooperation on digital governance to improve the global digital governance system. Promoting openness and cooperation is an important principle for building a community with a shared future in cyberspace. Think tanks should promote win-win cooperation and contribute wisdom to the development of the digital technology and the formulation of the governance role. We are much willing to cooperate with research institutions, universities, think tanks, enterprises, and international organizations from all countries in the field of the Internet, jointly study digital development and governance issues, and jointly contribute to the development of the Internet. Chinese President Xi Jinping called on the international community, faced with the opportunities and challenges brought by digitalization, to jointly build a cyberspace that is fairer and more equitable, more open and inclusive, safer and more stable, and more vibrant. Let us work together to find solutions to the challenges of digital governance, promote the building of a closer community with a shared future in cyberspace, and jointly create a better future for mankind. Finally, I wish this forum a complete success. Thank you.

Moderator:
Thank you, Mr. Chen, for your wonderful speech. Next, let’s have the second session of special guest speech. Mr. Ren Xianliang, the Secretary General of World Internet Conference and the President of China Federation of Internet Societies, to express his insights, please.

Ren Xianliang:
today. His undergoing major changes on scene in a century. The pace of digitization, networking and intelligence is accelerating. The way we produce live and go…. govern is also undergoing profound changes. Driven by digital technology, the digital transformation of traditional industries is accelerating. The cross-border data flows are growing exponentially, and the digital platforms are accelerating their global expansion. In the promotion of digital technology, the transformation of traditional industry digitalization is accelerating. The cross-border data flows are growing exponentially, and the digital platforms are accelerating their global expansion. The importance of digital governance is increasing. At the same time, unilateralism and protectivism continue to rise. The global digital governance pool is constantly increasing. The development of digital governance in various countries is uneven and increasing. The competition in the digital governance model is increasing. Digital governance has become an increasingly important global issue. At the same time, unilateralism and protectionism are on the rise. The global digital governance deficit is widening. The uneven development of digital governance capabilities among countries is becoming more evident. The World Internet Conference is committed to promoting the co-construction of the Internet space and common destiny. We are committed to the sharing of ideas, and actively explore the good digital governance ecology of government, enterprises, academia, and industry organizations. With the goal of jointly building a community with a shared future in cyberspace, the WIC will adhere to the concept of extensive consultation, joint contribution, and shared benefits, and actively explore ways to create a digital governance ecosystem with the participation of government departments, enterprises, academia, and industry organizations. In order to build a community of shared future, in order to build a community of shared responsibilities and common interests in the field of digital governance, and make digital technology deliver greater benefits to mankind, I would like to propose the following. Digital governance should be more precise and efficient. Digital technology provides new ideas, new methods, and new means to solve various governance problems. First, digital governance should be more precise and efficient. Digital technology provides new ideas, methods, and means to solve governance problems. Second, digital governance should be more precise and efficient. We should leverage the positive side of the digital technology while using technology to govern technology and constantly improve the ability of efficient governance based on digital For many years, the World Internet Conference has been organizing forums around cutting-edge technology, presenting leading technological achievements, demonstrating practical cases, holding forums, competitions, and other activities to provide a good platform for the transition of cutting-edge technology in the field of the Internet to national governance. Digital governance should be more inclusive and comprehensive. Second, digital governance should be more inclusive. There are still 3 billion people in the world who are unconnected, a large proportion of whom are women, elderly and rural population. Digital governance should avoid further widening the digital divide and prevent vulnerable groups from being further marginalized. The World Internet Assembly is willing to work together with the United Nations to ensure the safety of everyone by 2030. The WIC stands ready to make concerted efforts with all parties to achieve UN targets for the universal connectivity. Every person should have safe and affordable access to the Internet by 2030. Third, digital governance should adhere to women’s cooperation. Unity is strength, division is weakness. In the face of risks and challenges, we should stay in the same boat and share responsibilities in the digital age. We should engage in dialogues and exchanges to address issues such as cross-border data flows, platform governance, artificial intelligence, and cybersecurity. The WIC will do our best to build bridges to promote closer and pragmatic global cooperation on digital governance. Ladies and gentlemen, every year the WIC will host the WUZHEN Summit in Zhejiang, China. This year marks the 10th year of the WUZHEN Summit, which will take place from November 8th to 10th. I’d like to take this opportunity to invite you all to attend the WUZHEN Summit in the beautiful water town of WUZHEN to strengthen dialogues and exchanges. pragmatic cooperation and build a better digital future together. Thank you.

Moderator:
Thank you very much Mr. Ren for the important words. Now let’s start the third session of keynote speech. We have consulted different experts and scholars and various institutions in advance to determine these two topics. Please remind you that each speaker can have six minutes. Let’s move on to the first topic, the impacts of Internet innovation on digital governance. First of all, let me introduce the father of Internet in Japan, Professor Juni Murai of Keio University. Please. Okay, thank you very much for the introduction and

Juni Murai:
it’s an honor to be here to discuss with you about the subject and also I’d like to welcome to Kyoto, Japan on behalf of the Japanese side of the host and also you know I’d like to mention that I’m a frequent U-Chain Summit participant and I’ve been missing to visit there during the COVID-19 but unfortunately I have a conflict schedule so in that sense then it’s very nice to be here to talk with you. The subject of this one about the impact on the Internet innovation in the digital governance, then I’d like to mention the three points from my experience of the long-term participants of the development of the Internet. The first one is Ms. Chi was mentioned about the you know kind of user human being based governance type of thinking. Remember the when we started the developing the Internet then it’s always started from the supply side of the Internet services, right, so you know that’s been very successfully done. for the first two decades or something of the internet but now internet is outreaching to most of the people and the most of the region and the most of the industries therefore it’s always important to view from the user side and then they find out the issues and the sharing the issue with the governance leaders and then the users and the industries and the commercial entities so that’s a big change after the two or three decades of a development of the internet so the user point of view that’s the first point I’d like to mention the second point I’d like to mention is architectural advancement about the technology so the internet started of course with a you know kind of IP and the digital package switching network but then they know introducing the web and then in the cloud and the social network and the IOT with a sensory information to be exchanged over the internet and then AI with a lot of data generated from mainly from a social network but also from the sensors and digital image data and etc so there was advancement after that advancement actually of the technology is creating the very much a complex requirement to the government governance of the internet as well and the one of the issue I see these days is that the policy leaders to understand those technological architecture getting harder and harder so that’s a very natural thing right because the technology architecture getting very much a complex and advanced way so the what’s gonna be the solution then it’s a really the all the stakeholder working together and they’re listening to each other, and there should be the place to discuss about what is a new technology, what is the impact, and from the different standpoint to discuss. That’s probably one of the way to be described that the multi-stakeholder approach as well. And then the global discussion is gonna be also very important because of the technology is gonna be different in various part of the world. And so I see the photonic network type of a thing, quantum computations gonna be one, and also the non-terrestrial, the space infrastructure type of a discussion really happening in this year. And so those are the new area to discuss globally about the future of the internet governance as well. And so the third one, third point is about the cybersecurity thing. So the advancement of those leading technologies and the changing of technology, but the good technology can be used in a proper way or by use. But there’s always abusers of the new convenience technology, right? That’s very natural in a sense. And so the cybersecurity approach is jointly working toward the abuse of the new technology as well. So it’s also a very important point that the abuse, I mean, working together against the abusers, right? That’s the cybersecurity, very natural. But also the working together for the proper use and the ethical use of the technology together. It’s gonna be very important way about thinking about the governance for the innovation and the future together. So those are the three points I wanted to mention regarding this topics. Thank you very much.

Moderator:
Thank you very much, Professor Murai for your wonderful sharing. Now I give the floor to Vanny Valkovsky, Vice President for UN Engagement from ICANN, please.

Vanny:
Thank you, thank you very much. Thanks to the organizers for putting this session together. We are hearing a lot about what’s happening around the world in the field of internet innovations and digital governance. And of course, one of the fundamental principles of the internet since its inception was the way it was developed and the way the decisions have been taken to shape the internet trajectory have resulted from a multi-stakeholder approach of collaborative and bottom-up consensus-based decision making as opposed to other types of governance. We are at the Internet Governance Forum which was created after the World Summit on the Information Society in 2005. And those of us who have been there, I’m one of them. We remember that in the beginning of this whole process, people were thinking that the multi-stakeholder model or internet governance is only about ICANN. 20 years later, we see that almost no one is talking anymore about ICANN because there are so many different applications and services that are on the internet that people don’t even know that we exist. And I say that’s a good thing because that means we are doing a good job. Because if the internet is not working and it’s ICANN’s fault, everybody will know about us. But the reality is that all these innovations became possible because exactly of the open architecture, open standards, open way of developing the internet. We have seen, I can give an example, with one of the services that have been kind of developed in the testbed for the last 20 years, Enum, E-N-U-M. Nobody has heard about it, by the way, which is not a surprise because it’s been tested for the last 20 years and nothing happened. But everything else that relates to domain names, IP addresses, protocol parameters that actually is functioning and is being used widely has proven to be working. So this model that was built in the beginning has turned out to be actually a successful one even though people like Vint Cerf who is at the IGF and has been speaking and will continue to speak in the next couple of days never imagined that the internet will become what it is. And that’s why some of the architecture may not be necessarily reflecting the. the growth of the Internet. However, companies, innovators, people around the world have shown that there is always a way to create something that will use the infrastructure, that will use the TCP IP, and will make possible new services. I mean, I come originally from Bulgaria, so I can share the fact that it used to be a very poor country following the communism. And our Internet users didn’t have money to pay for high speed at high prices, unlike the people in the Western countries. So we created different ways of providing the Internet services, which were low price, high speed, and this was going against everything that you have read in the manuals of how to provide Internet services. But going back to the issue and the topic, you know, which is the impact of Internet innovation on digital governance, there is also another important point, which is there is a trend where digital governance is used interchangeably with Internet governance. And including at the UN, where I spent most of my time talking to diplomats and UN officials, there is a lack of understanding that these are two different issues. So Internet governance and digital governance are not the same, although sometimes you may see them confused by member states or people who are not familiar with that. And I think it’s important to know that there is a difference between those two, because that will reflect in the possible approaches of issues dealing with innovation. So digital governance is usually, this refers to approaches necessary to mitigate the use and risk of technologies, applications, services, things like artificial intelligence. And these are usually technologies that are distinct, typically distinct from the Internet. So because of the focus of, because of its focus on specific issues affecting everyday online users’ habits, for example, broader than the Internet or its technical layer alone, digital governance is comparable to public health challenges. So we are trying to make a difference between those and we are raising awareness at the UN level and other places where we speak because we believe that it’s important for the users and the policy makers and the technical community and also, you know, civil society, businesses, et cetera, all the stakeholders who are engaged in the IGF and in the development of the Internet to know that actually there is a big difference between Internet governance and digital governance and we shouldn’t confuse them. The Internet governance has shown that the multi-stakeholder approach is working. Whenever there is an issue that needs to be addressed, it has been addressed with, I mean, sometimes it takes more time than people would really want to, but there hasn’t been a problem that has been developed on the Internet that was not solved using the multi-stakeholder approach. And therefore, we are big proponents not only of the Internet governance forum, obviously ICANN is very supportive. We do participate wherever we are invited, which goes into our mission because we can’t really go and discuss issues that are not related to the technical underpinnings of the Internet. But when there are issues touching on those on ICANN’s mission, we are happy to participate and to provide technical neutral information about how the Internet functions and what we do. And we have found times and again through the last, I would say, 10 or so years after the WSIS plus 10 review, which was in 2015 at the United Nations, that the more we talk to every stakeholder, the better it becomes because there is more knowledge that we share and more facts. And then people take decisions based on those facts, not based on their opinions about how the Internet is functioning or should be functioning. So I would finish with that. I’m happy that we have also among us, and he will speak in a little bit, Wolfgang Kleinwachter, who is one of the pioneers of the Internet governance model. And if I’m not mistaken, you are also a member of the WGIC, Wolfgang? Yes, the working group on Internet governance, which actually defined what Internet governance is. So maybe at some point there will be a need for another working group to define what digital governance is, so that there is no confusion between those two. Thank you.

Moderator:
Thanks to Mr. Markowski for the interesting insights. Next, I would like to invite Mr. Shi Peixi, professor and director from Global Internet Studies Center in Communication University of China, to speak. Thank you.

Shi Peixi:
Thank you very much, and my topic is global digital governance, moving into the direction of global commons or to the direction of digital fragmentation. So there is a question mark here. So it is somehow beyond the internet governance, but it’s similar somehow to cyber security governance. So I treated cyber security governance and digital governance in a rather similar way. My idea is that after being blessed by the internet and the associated innovations for decades, two basic directions of global digital governance can be observed, identified. I treated it in a very similar way. So the first direction is rather, I treat it rather positively. It’s rather bright, and it can be called a direction or approach towards global commons. And the other direction is a rather negative one. It is a direction towards digital fragmentation or a kind of division of the global digital ecosystems. And this is rather a simplified way of making distinctions. And I introduced the first direction, the direction towards digital commons. So in spite of the fact, as I observed, that the international community, it’s very difficult for the international community. to replicate or repeat the successes in climate change and to repeat the success in nuclear weapons and the success in the governance also of the sea in spite of the failure, for example, to reach a Biden treaty in cyber governance and digital governance due to different reasons. That the digital issues can be so complicated, it can be so comprehensive, it can be so mighty dimensional and it can be so interwoven. In spite of the failures to have such a treaty or in Wolfgang’s words, to have a Q2 protocol perhaps in the cyber area if we consider where this conversation happens. So in spite of this, there have been many positive efforts, initiatives that are rather prominent. They are from states, they are from enterprises, they are also from the internet pioneers. For example, if we move beyond the ICANN model, ICANN model I think represented by the multi-stakeholder approach can be said to be something towards global commons, which is very successful and intriguing. In addition to that, in 2014 Brazil, where Luca is from, has this Net Mundial initiative and also 2017 Microsoft has this Digital Geneva Convention, though Microsoft now didn’t talk about this much after it was proposed in 2017, but it is a very brave attempt or effort. In 2018, I think the French President Macron proposed the Paris call for trust and security. In 2019, the Global Commission on Stability of Cyberspace put forward these eight norms. Same year, internet pioneer Tim Lee launched a contract for the web and in 2020 China put forward a global initiative on data security. And ongoing now at the United Nations, these discussions around the global digital compact. So these initiatives and efforts are designed both for the like-minded countries or stakeholders and the not like-minded stakeholders. So it is rather inclusive. It is meant for inclusion, not for exclusion. So it is intended for finding solutions. In this sense, I think these are the initiatives that are moving towards a direction of a global commons. However, there are some other negative trends that can be described as a direction towards digital fragmentation and division. And some leading states are intervening very heavily with the digital domain and creating tensions and divisions in terms of, for example, telecommunications service providers, in terms of applications, in terms of application stores, in terms of undersea cable constructions, and in terms of cloud services and mobile phone operation systems, and also in terms of 5G, supply chain of chips, and in terms of where tech companies can be listed on the market, and most recently, in terms of the capital flow about new technologies. So these are the rather negative trends, as I have observed. Therefore, I believe now is a very critical moment to find measures to avoid such digital fragmentation and to avoid the digital divisions by having new, innovative approaches of global digital governance. I think our Secretary General of WIC, Mr. Ren, talked about these new measures in this aspect. I’ll stop here. Thank you very much.

Moderator:
Thank you. Thank you, Professor Xu, for your relevant remarks. Let’s move on to the second topic, the approach of digital governance capacity building and the international. cooperation. First of all, let us welcome Professor Wolfgang Klamm-Wachter, professor from the University of Aarhus, for the speech.

Wolfgang Kleinwächter:
Thank you, thank you very much and indeed 25 years ago the internet was seen as a technical problem with some political implications, but today the internet is a political problem with a technical component. This is a big difference. 25 years ago when the World Summit started its deliberations, so I had the honor to work with Madame Hu, the president of the Internet Society of China, in the working group on internet governance, as many have said, and our task was to define what internet governance is, because a lot of people had different ideas what it is. And when we had the first meeting with Kofi Annan, who was the Secretary General of the United Nations in 2003, so he said, he argued that the internet is a technology innovation, a technical innovation, but what we need now are policy innovations. So that means you cannot handle, treat, govern the internet as any other thing. So that’s a technical innovation and we have to innovate policymaking. And all the debates in the working group on internet governance, which led to the Tunis agenda in 2005, were driven by how we can innovate policymaking. And the result is the mighty stakeholder approach, because the argument was the internet is too big, it cannot be managed by one group alone. That’s not a question of leadership, who leads it, but the internet needs collaboration from all sides. So, and I think this is really, was the starting point for what we see now, penetrates a lot of areas which are related. to the internet. So there is no definition exactly what the mighty stakeholder approach is. So different people have different ideas but the basic concept behind this is you have to involve the affected and concerned people in policy development. So the three elements of the definition was number one, mighty stakeholder. Number two, it has to be based on shared principles norms and decision-making procedures. What Madame Xi has said, you know, shared responsibility. So the concept of sharing was the second key element. And the third element is also important because we differentiated between the evolution of the internet and the use of the internet. So when many talked about the internet governance and digital governance, so I would disagree because this is really, you know, fighting with words or playing with words. So the understanding of the two terms, evolution and use of the internet, reflects that the internet is a layered system. And of different layers you can have different governments. More round layer, we have this one world, one internet concept. So we are using all the same protocols, you know, the DNS, the TCP, IP protocol, the IP address system, BGP, HTTPS, and this enables that everybody can communicate with everybody. So this is what Jan said, you know, the people-centered approach so that everybody can enjoy this right to communicate. So on the application layer, so that’s different. So this is the use of the internet. And here we have the reality that we have one world but 193 different national jurisdictions. So, and this, the two layers are interlinked. But, you know, the the visionaries of the internet in the 90s had probably the idea that the one world, one internet will go also to the application layer. So, but this is certainly unrealistic because we have 193 sovereign states. which they have their own national policy. The risk, what I see now, is that probably some governments say, we could bring the 193 jurisdictions also to the ground layer. And this would be the internet fragmentation. Because so far, the internet is not fragmented. The internet works, thanks to ICANN. And when Veni said, it’s good that nobody may have any more questions ICANN. So because they are doing the job, whether it was a pandemic or a war or other crisis, so people could send emails. They could go to websites. And this is like the air we need in our own environment. Internet is like air. There is no Chinese air. There is no American air. There is no Russian air or German air. So we have polluted air or clean air. And what we have to do in the community is to keep the internet air clean, to keep out, to avoid pollution. And so far, I think the Global Digital Compact, which is now, as Patrick has outlined, the most relevant political initiative on the table, would be a good opportunity to bring different groups together and to find a global consensus for the next 10 years. So there will never be a solution forever. So Bill Clinton, the former president of the United States, has once argued internet governance is like stumbling forward. We are moving from one step to the next step to the next step. But as long as it’s forward and as long everybody is included and it’s based on what you have said, your people-centered, human rights-centered, and based on a secure internet, and which is open for all, inclusive, then we are in the right direction. And so we have differences in the world. We live in a multipolar world. We know that others are different. But we have to learn to accept this. Thank you very much.

Moderator:
Thank you, Professor Kleinwachter for this wonderful sharing. Now, let’s welcome the speech of Mr. Luca Belli, director of CyberBRICS from Brazil. Please.

Luca Belli:
Thank you very much. And I first would like to start thanking the organizers for having put together this excellent session. Very interesting speeches so far. I would like to contribute a little bit with. some ideas that we have developed over the past years within the CyberBRICS project, which is a specific research project we have at the Center for Technology and Society at FGV Law School that I direct. And the ideas that we have been developed over the past five years of mapping are precisely trying to understand to what extent this grouping that in over the past weeks has gained, again, a lot of prominence due to the expansion. To what extent this grouping has been discussing, sharing good practices as information about digital policies and internal governance over the past years. So I’m bringing some of the elements here of the research that we have been conducting. First of all, for those who do not know, FGV is a very relevant academic institution in Brazil. It’s currently the third most relevant think tank in the world out of more than 11,000. The CyberBRICS project and all the information I’m going to share are all available in open access, including the recording of many interesting lectures and events on this website, cyberbrics.info. And this is the team. I think I’m particularly proud of this because it’s not only the only research project dedicated to mapping BRICS digital policies in the world. It’s also the only one that does it with people from the BRICS. So we have a very good project with 65% of the project members that are female. So it’s also quite a relevant gender balance dimension. It’s a very heterogeneous community. So although we are housing a law school, not everyone is a lawyer. We have also economists, data scientists, sociologists, et cetera. The three main pillars of the project are, first, analyzing the existing policies. Second, identifying good practices. And ideally, propose effective solutions so that this grouping could foster joint understanding of shared challenges. Some of the research products we elaborate look like this. This is a mapping of all data protection frameworks in the BRICS. We have this kind of tools. We also develop, of course, classic research outputs like this book, where we have mapped the cybersecurity regulations of the BRICS countries. An interesting part of this book, in the introduction of the book and also in other papers, we stress that, actually, when you start analyzing digital policies in the BRICS, you end up understanding that it’s a very telling example of enhanced cooperation. So Professor Wolfgang was mentioning that the IGF is a result of the WSIS. And another result of WSIS was the creation of this process of enhanced cooperation that, unfortunately, has never been put into practice by the UN for lack of consensus on what it is. But the BRICS offer a very good example of how this could look in practice. The fact that they have, since 2014, for instance, created a working group on the security of ICTs to share best practices and information on how they approach the cybersecurity. They even define joint commitments, for instance, to advocate for global norms on cybersecurity and data protection. There are other initiatives. These have an explicit commitment from the declaration of the ICT ministers, where they explicitly commit to enhance cooperation in digital governance. There are concrete initiatives, like the BRICS framework on consumer protection in e-commerce, the BRICS initiative on enhancing cooperation in the supply chain. So there are very good elements that we can assess as successful enhanced cooperation in the grouping. There’s also an interesting article we published last year that will also be the introduction of our upcoming book on data architectures in the BRICS, where we explicitly map the BRICS. the frameworks, the BRICS framework of data governance, and to what extent they are already quite compatible, actually. And so what we demonstrate is that there are already very, there is already a shared principle base of data protection principles in all the frameworks, very similar sets of rights and obligations, and also that each of the BRICS has created its own system to define to what extent data can be exported or transferred. They all want to transfer data, but they want to do it securely and to retain some sort of digital sovereignty on them. And that is also another work stream on which we have an upcoming book on digital sovereignty in the BRICS that demonstrate there are a lot of different nuances of this concept, and very different from what we could have in the Western countries usually in terms of thinking. To conclude, this is a preview of what will be the next phase of the project that will be dedicated to mapping AI supply chain and interoperability frameworks in the BRICS. This actually was published in the one, a very good book that was really prepared by the Chinese Academy of Cyberspace Studies and launched this year, well, published first last year and launched this year. I actually, my colleagues told me that I’ve just received the hard copies in my office in Rio this morning. And the last, the final thought that I want to share, that I think, I believe that if we want to work together for a community with a shared future in cyberspace, the first step is to understand which kind of regulatory frameworks, approaches, governance mechanism we already have. And so our small contribution to this effort is precisely to start to map and understand how these enhanced cooperation processes already work and to what extent they could be replicated and even scaled. Thank you very much for your attention.

Moderator:
Thank you, Mr. Bailey, for the relevant story of CyberBRICS. Now, let’s welcome Ms. Dai Lina, Deputy Director of the Journalism Institute of Shanghai Academy of Social Science. Please.

Dai Lina:
Good afternoon, distinguished guests. It’s a great honor for me to have the opportunity to give a short speech in this panel. Since yesterday, there has been a lot of discussion about artificial intelligence. Today, I would like to talk about AI. AI is a new technology that has been developed in the United States and around the world. AI is a new technology that has been developed in the United States and around the world. like to say a little more about international cooperation on AI governance. In recent years, both nation states, non-nation state actors, and the international organizations have all paid great attention to the issue of AI governance and have competed to take action. Unified system of governance rules and a global level governance mechanism have yet to be found. It is important to be aware of two concerning trends in international AI governance. One is that there is a growing trend of fragmentation in the development of AI governance rules. The competition among big countries have led to a further deficit in national mutual trust. And the ideas of unilateralism, statism, and protectionism have led a profound impact on the formulation of AI rules. The other one is that the digital governance divide is widening. There are lots of developing countries being notably absent and voiceless in AI governance. At the same time, some developing countries are coalescing to shape the development ecosystem of AI and exercising dominance in rule setting. Based on the above, there are two critical passes to an effective breakthrough in the current international process of AI governance. Firstly, we should especially promote the establishment of a specialized agency for the governance of AI under the framework of the United States. Last but not least, since AI poses different stress to countries with different levels of technology, it is important to strengthen dialogue and cooperation among all countries. We would better to advocate for human-centered and AI-for-good approach and ensure the safety, reliability, controllability of AI so that we can empower the global sustainable development and enhancing the well-being of all humankind. That’s all. Thank you for your attention.

Moderator:
Thank you, Mr. Dai. Thank you very much for your kind contribution. Due to the time limitation, we have to conclude this forum, but we hope to have more in-depth exchanges and discussions also in the future. You are welcome to share your views and stories with us when convenient. Once again, we thank all guests and friends for your wisdom and efforts to contribute to this open forum. We also would like to thank the secretary of IGF for providing us with an important dialogue platform. The open forum is concluded here. Thank you.

Audience:
I was there already twice, so that means I know the place, I’m so impressed by the water setting, and so I have a chance to walk around the canals, and so I would love to come back by the end of the month. Okay. Thank you very much.

Audience

Speech speed

203 words per minute

Speech length

54 words

Speech time

16 secs

Dai Lina

Speech speed

124 words per minute

Speech length

408 words

Speech time

197 secs

Juni Murai

Speech speed

129 words per minute

Speech length

782 words

Speech time

363 secs

Luca Belli

Speech speed

169 words per minute

Speech length

1098 words

Speech time

389 secs

Moderator

Speech speed

121 words per minute

Speech length

653 words

Speech time

323 secs

Qi

Speech speed

128 words per minute

Speech length

782 words

Speech time

365 secs

Ren Xianliang

Speech speed

102 words per minute

Speech length

776 words

Speech time

455 secs

Shi Peixi

Speech speed

135 words per minute

Speech length

777 words

Speech time

346 secs

Vanny

Speech speed

164 words per minute

Speech length

1202 words

Speech time

439 secs

Wolfgang Kleinwächter

Speech speed

148 words per minute

Speech length

975 words

Speech time

395 secs

Xuanxin Zhang

Speech speed

117 words per minute

Speech length

842 words

Speech time

431 secs

Internet3: An Internet based on 21st Century Principals | IGF 2023 Launch / Award Event #179

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Hideshi Takatani

Hideshi Takatani, a traditional Japanese artist, has embraced digital technology since 1977, making him a unique figure in his field. Coming from a traditional Japanese background, Takatani combines the analog and digital in his artwork, showcasing his ability to seamlessly blend the two worlds.

Takatani expresses concern over Japan’s ongoing economic struggles since the 1990s, referring to this period as a “blank 30 years.” This highlights the severity of the situation and sheds light on the challenges faced by the Japanese economy. Through his firsthand experience, Takatani’s worries hold both weight and authenticity.

However, despite his concerns, Takatani remains hopeful for the future. He believes in the transformative power of Internet3, an emerging concept and technology. Embracing Internet3, Takatani sees it as the last consciousness of human beings, hinting at its potential to revolutionize various aspects of life. Internet3 is perceived by Takatani as a catalyst for change, capable of ushering in a new era marked by innovation and progress.

In summary, Hideshi Takatani is a traditional Japanese artist who has successfully integrated digital technology into his artistic practice. While expressing concern over Japan’s economic struggles, he remains optimistic about the transformative potential of Internet3. Takatani’s unique ability to blend tradition and technology makes him a significant figure in the art world.

Mitsuhiro Hishita

During the discussion, the speakers emphasised the need for innovation in the field of Internet of Things (IoT) business to achieve free and secure access to the internet. They specifically highlighted Internet3 as a solution that enables zero trust and ensures a high level of security by providing secure IP addresses for each IoT device.

Internet3 was mentioned as a service that plays a crucial role in the IoT ecosystem, offering a secure and reliable internet connection for IoT devices. It enables zero trust, a security concept that assumes no device, user, or network should be inherently trusted, and verifies the identity and integrity of each connected device. This significantly reduces the risk of unauthorized access and enhances security in IoT environments.

A positive sentiment was expressed towards the potential benefits of adopting Internet3 in the context of achieving sustainable development goals related to industry, innovation, and infrastructure (SDG 9). The speakers specifically supported the deployment of Internet3 in the Hokuriku region.

The Hokuriku region’s companies and local enterprises were identified as potential early beneficiaries of Internet3. The speakers proposed that these entities should be the first to adopt this innovative technology. This suggests that the speakers recognize the significance of Internet3 in supporting the growth and development of the IoT industry in the region.

The overall sentiment towards Internet3 and its potential impact on IoT business and secure internet access was positive throughout the discussion. The speakers’ endorsement of Internet3 and its deployment in the Hokuriku region reflects their confidence in the technology’s capability to address the challenges of IoT security and facilitate innovation.

In conclusion, the speakers highlighted the importance of innovation in IoT business to achieve free and secure access to the internet. They focused on Internet3 as a service that ensures zero trust and provides secure IP addresses for IoT devices. Additionally, they advocated for the deployment of Internet3 in the Hokuriku region, particularly in local companies and enterprises. The discussion’s positive sentiment and support for Internet3 signify the potential benefits it holds for advancing sustainable development goals related to industry, innovation, and infrastructure.

Katsuhisa Sasaki

The analysis reveals that Katsuhisa Sasaki and Sabai City have expressed their support for different issues and initiatives. Katsuhisa Sasaki supports the implementation of Internet 3, emphasizing its benefits for the sustainability of Sabai City in the Hokuriku region. He believes that Internet 3 will play a crucial role in the development and progress of the city. This indicates that Sasaki recognizes the potential of Internet 3 to contribute to the overall growth and sustainability of Sabai City.

On the other hand, Sabai City emphasises the importance of gender equality as a major factor for a prosperous future. They believe that achieving gender equality is an essential element in creating a city where people can flourish and take on new challenges. This clearly highlights the commitment of Sabai City towards creating an inclusive and equal society where everyone has equal opportunities to succeed and thrive.

Both speakers express positive sentiments towards their respective arguments. This indicates that they firmly believe in the potentials and benefits associated with implementing Internet 3 and promoting gender equality, respectively.

The analysis also reveals that the topics discussed by the speakers are aligned with specific Sustainable Development Goals (SDGs). Katsuhisa Sasaki’s support for Internet 3 relates to Goal 9: Industry, Innovation, and Infrastructure, indicating the potential for technological advancements and infrastructure development in the region. On the other hand, Sabai City’s focus on gender equality aligns with Goal 5: Gender Equality, demonstrating their commitment to creating an inclusive society and promoting equal opportunities for all.

Overall, the analysis uncovers differing but equally important viewpoints on significant issues. The support for implementing Internet 3 and fostering gender equality highlights the commitment of Katsuhisa Sasaki and Sabai City towards sustainable development and societal progress. Their positive sentiments further validate the significance and potential benefits of their respective arguments.

Kristopher Tate

Internet 3, introduced by Kristopher Tate, is positioned as a revolutionary reimagining of the Internet, offering trust from the device layer. Unlike its traditional counterpart, Internet 3 operates as a good rather than just a service. Its software requests the Trusted Platform Module (TPM) to generate a public key corresponding to an IPv6 address, ensuring a high level of security and trust. All command and control as well as communication applications within Internet 3 are built on a foundation of trust.

One of Internet 3’s key features is its ability to provide 100% encryption and authentication. By establishing trust from the device layer, Internet 3 guarantees encrypted data transmission and proper authentication of communication entities. This heightened security makes Internet 3 suitable for both information technology and operational technology, offering protection against cyber-attacks and bolstering the security of critical infrastructure systems. Additionally, Internet 3’s useful applications for various markets have the potential to boost GDP and facilitate economic growth.

Internet 3 also promises integration with culture and society. Its support for remote work and promotion of work-life balance demonstrate its potential to enhance everyday work and family life. The collaboration between Internet3 and Mr. Hideshi Takenai from Shin-ten-no-ji temple signifies the connection between this technological innovation and cultural significance.

Moreover, Internet 3 embodies the concept of a universally accessible and owned Internet. By allowing users to have ownership over the Internet, Internet 3 aims to make it accessible to more places on Earth, bridging the digital divide and reducing inequalities. This aligns with the Sustainable Development Goals of Industry, Innovation, and Infrastructure, as well as Reduced Inequalities.

Despite technological advancements, there are still areas, including Japan, where the full potential of the Internet remains untapped. Kristopher Tate shares observations that people in Silicon Valley initially doubted Japan’s technology scene, and when he personally travelled to Japan at a young age, he noticed a lack of Internet usage. This serves as a reminder that although technology has evolved, global connectivity gaps still need to be addressed.

In conclusion, Internet 3, as presented by Kristopher Tate, offers a groundbreaking approach to the Internet, prioritising trust, security, and universal accessibility. It holds promise for integration with culture and society and has the potential to bridge the digital divide. Embracing cultural interpretations of freedom can further enhance global connectivity. Addressing disparities in Internet usage is essential to fully unlock the potential of technology worldwide.

Samantha Kawaguchi

The analysis explores two important topics: the potential of Internet 3 in bolstering sustainability in cities and the commendable initiative of Sabae City in promoting gender equality. Internet 3, a concept gaining prominence, is seen as a robust tool for achieving the Sustainable Development Goals (SDGs). It can facilitate this by providing increased avenues for developers to innovate and develop new solutions. By offering more opportunities for collaboration and engagement, Internet 3 can effectively contribute to addressing various SDGs such as quality education (SDG 4), gender equality (SDG 5), decent work and economic growth (SDG 8), industry innovation and infrastructure (SDG 9), reduced inequalities (SDG 10), sustainable cities and communities (SDG 11), peace, justice and strong institutions (SDG 16), and partnerships for the goals (SDG 17). The sentiment towards Internet 3 is positive, as it is seen as a significant enabler for sustainable development.

Additionally, Internet 3 is recognized as a crucial factor in ensuring digital peace and secure access to the internet for all individuals. With the implementation of Internet 3, the safety and privacy concerns associated with the internet can be effectively addressed, enabling widespread and secure connectivity. This is essential for fostering an inclusive and equitable digital environment.

Shifting focus to Sabae City, its historical emphasis on women empowerment and gender equality is noteworthy. The city has a long-standing tradition of women actively participating in the workforce and effectively managing both their careers and family responsibilities. Many women engage in family-run businesses, which form a significant portion of the local industries, including the production of glasses, lacquerware, and textiles. This cultural norm of women being involved in business and family life contributes to a thriving community where gender equality is valued.

The city’s specific commitment to gender equality under the SDGs is also highlighted as a notable point. Sabae City has made substantial efforts to emphasize gender equality through various initiatives, promoting equal opportunities, eliminating gender biases, and empowering women in all spheres of life. The sentiment towards Sabae City’s approach to gender equality is positive, acknowledging the importance of women’s contribution to the local economy and the promotion of a fair and inclusive society.

In conclusion, the analysis showcases Internet 3 as a potential catalyst for sustainability in cities, with its ability to drive innovation, enhance collaboration, and ensure secure internet access. Furthermore, the analysis highlights Sabae City’s commendable efforts in promoting gender equality, leveraging its history of women empowerment and initiating specific SDGs-based projects. These findings underscore the significance of technological advancements and progressive social policies in shaping sustainable and equitable communities.

Session transcript

Kristopher Tate:
What is it? This might be interesting. This might be interesting. This might be interesting. This might be interesting. How many minutes left? How many minutes left? It’s on time. It’s on time. Should I stand up? Should I stand up? Welcome. Thank you for joining us today. I think we’re on time at 4.30. I’m Christopher Tate from Connect Free Corporation. And today we’re here to talk about Internet 3 and Internet based on 21st century principles. Today, hopefully together, we are going to reinvent the Internet. That’s a big thing to talk about, reinventing the Internet. What does that mean? Well, first we need to think about how the economy works. I think that the first Internet really worked well because it fit with the economic trends at the time. Obviously, if something doesn’t work economically, then it’s really hard for a lot of integrators and people to connect to. But if we think about the economy and go back to basics, like Economy 101, we think about goods and services. And really, we have to think about what is a good, right? A good is something that usually some sort of specialized manufacturer or entity creates. And then it can be bought or sold. And obviously, usually you think about a good when you buy it, that you get to own it. You get to own the goods that are made for you, that you purchase. On the other hand, services are kind of another unique kind of thing. I traditionally think of services as something like maybe I want to eat a hamburger. Instead of going to the supermarket, and buying lettuce and tomatoes and the meat, if you’re a meat eater, and the bun, you might want to go to a company called McDonald’s, a shop called McDonald’s, and buy a hamburger. Or instead of managing your own wealth or managing your own cash, you want to maybe keep it safe in a bank, have them do it for you. Or even maybe you don’t have the time to clean your suit or clean your clothes, so you end up contracting the services of a dry cleaner. So these are usually things, when we think about services, we think of services as something that you can do yourself, but you choose not to, because you either have the luxury to do so, or it’s economically viable for you to do so. And so that really kind of brings the question about, what about internet services? Internet services, are they the same thing? Is internet service something you can do yourself? What about internet services? And so we really have to think about really kind of the core of internet services, the internet service provider. And so, historically speaking, the internet was not really for everyone. It was built mainly for the government and later research organizations, and it was not immediately understood that everyone would be able to connect. This is not something that really we think everyone would be connecting to. It was mainly, again, to reiterate for governments and research. And then, the advent of the personal computer kind of changed a lot of things. And obviously, the cheaper modems got, so you could use the existing telecom infrastructure. And we saw the rise of something called the Computer Bulletin Board. And really, these Computer Bulletin Boards, these BBSs required administration and a central phone to connect to. And then eventually, some entrepreneurs realized that they could further centralize this system nationwide. So instead of having a BBS that your friend or your friend or a friend connects to or creates for you, the idea would be that you would have companies that would provide the centralization to do this nationwide. And so, this was the birth of the online service provider, or instead of an ISP, what we say the OSP. And so, these OSPs sold monthly subscriptions to access their systems. Normally, you’d want to have access to a newspaper or access to a television subscription or a magazine. And so, this is kind of the thought process that there was a resource of information somewhere not in front of you, something you need to dial into, a monthly subscription. And so, as we are well known today, some of these in the US were CompuServe and later AOL. But then, as we still think about it, traditionally, these are still a service. Theoretically, they’re still a service. If you really wanted to, you could still set up your own BBS independently. Who wants to do that? So, it would be great to say, OK, CompuServe, OK, AOL, why don’t you do that for us? Why don’t you create the connective service for us? It still made sense that there were these companies that would do something, like creating these BBSs for you instead of you doing it yourself or having someone in your community do it for you. But then, in 1991, specifically, with the backing of the White House, the Internet, which was then known as the NFS Network, which is the National Science Foundation, finally opened up access to commercial entities. This is great. This meant that not only the government and research entities would use the Internet, but also commercial entities as well. And so, obviously, what took place afterward was a rush, a land rush, to obtain as many IP addresses as one could get. Apple, to this day, not to hone an apple, I mean, they did something great. They decided they wanted to get space, so they got a whole block, of IP space. And even today, Amazon Web Services owns 1.7% of the IPv4 address space, which is around 73 million addresses. Quite a lot of addresses. Now, really, what comes next is that there’s a lot of industrious entrepreneurs, like the entrepreneurs that created the BBSs, the OSPs, that realized that they could sell a monthly subscription to access the Internet itself. And so, I pulled this from the Wikipedia on the Internet. And you can see here that something kind of weird is that the Internet’s all the way up there. And you’ve got Tier 3 networks, and all these networks, but the Internet is way above, and where are the customers? The customers are not in the Internet. They’re down at the bottom. They’re kind of tethered onto the Internet. They’re not in the Internet. They’re just kind of accessing the Internet. I think this is a fundamental problem. This is kind of interesting. Pulling up the Wikipedia was such an interesting image for me because, really, you are not an Internet user. You’re an Internet subscriber. There’s a distinction. And so, ISPs should be called Internet subscription providers. So, as long as IP address is centralized, we think, I think, that so, too, is the Internet. And that’s unfortunate. And so, getting to the Internet we want, which is kind of the theme here that we have today at the IGF. And, really, the Internet that we want is unfortunately not the Internet that we currently have. We find that we want more from the Internet than what the Internet can currently provide to us. And, believe it or not, if you were to place the word Internet with electric grid 100 years ago, you’d probably have the same thing happening what we have today, the electric grid that we want, per se. And so, this is interesting because, just like the Internet, the electric grid is very dangerous. It’s a dangerous thing. If you connect, touch directly to the electric grid, you might get shocked. Before the invention of the socket, the only option to repair light bulbs was to call an electric company who would send an electrician. This might be very hard to believe, but, again, 100 years ago, different time, different technologies, there were people that were connecting electric grid directly to the light bulbs in these houses. And so, here in Japan, a gentleman by the name of Konosuke Matsushita, he was one of those electricians. And he realized that an invention, a socket, would allow anyone to change their light bulbs independently of electricians. And so, as the story goes, and it is a story, obviously, you go to the museum inside of Panasonic’s headquarters, they’ve got a whole section, a whole corner of it, but, basically, his superiors balked at the idea that common folk, common people, would work with dangerous light bulbs. Who would want to do that? Who would want to work on that? That’s dangerous. And they even hypothesized that they might even lose their jobs to commoditization, that if anybody could change a light bulb, what would happen to me? What would happen to my job? And so, he thought of both sides. He thought of his colleagues. I don’t want people to lose their jobs. But then again, he thought about the rural side of Japan. There’s so many places in Japan that can benefit from electricity, can benefit from these innovations, but unless they can create a world that doesn’t need direct electricians to change a light bulb, then his hopes would not happen. So he founded Panasonic. And today, they make very many useful products that everyone can use at their leisure at any time. And so, the Internet, like the electric grid, still requires professionals to work to its full extent. And unfortunately, if configured incorrectly, the Internet can be hacked, filtered, and redirected. These are all things that we work with. I think a lot of the people here at this IGF were in our different work groups, and we’re talking about these different things. And so, although the current Internet has enabled economic opportunities for billions of people, it also fundamentally hinders the future of our modern economy. And so what do I mean by that? Well, I’ve got four different things here. The first is, without encryption and authentication at its core, cyberspace is less of a trustworthy society and more or less the Wild West of our modern economy. Number two, the Internet architecture places too much power in the hands of network administrators who could be coerced by bad actors or repressive governments to shut down networks or filter information. We’ve seen this a lot around the world. There’s a lot of news about it. Something happens, a war breaks out, and then all of a sudden, the Internet goes down. Can’t connect anymore. This is a really hard thing to work through. And so, obviously, because the way that the current architecture works, it’s really easy to, even if there’s good intending people at these ISPs and these institutions, you put a gun to someone’s head, and it changes. Third, the governments and corporations that currently utilize this stuff, they’re forced into this kind of idea of private networks, which in turn limits our innovation and economic freedoms by creating closed networks in the name of security. Here in Japan especially, there’s a lot of carriers who are well-meaning. No one’s bad. No one’s doing bad things, but at the same time, they are marketing these closed networks to their clients, that you can have a closed network, a closed 4G, 5G network that connects directly to the cloud. And the problem with this is that, again, further limits the access to the Internet. You want to have so much connectivity to all these different devices and different services, but we end up seeing a lot of carriers in the name of security closing down the networks when we should be keeping them open. And fourth, politically repressive governments have been hijacking Western technology and are rapidly extending it to create digital authoritarian ecosystems. This is a lot of keywords here, but basically, people are using the Internet that we invented in America, the land of the free and the home of the brave, and using it to do things that are not, let’s say, in the name of freedom. And so instead of relying on a few network engineers that we have, the question really becomes, why not make an Internet that anyone can securely operate anywhere? This should be a no-brainer. I’m going to say it again. Instead of relying on the few network engineers that we have, why not make an Internet that anyone can securely operate anywhere? And so that’s Internet 3. Internet 3 is an Internet that works… You wanted to clap there? That’s great. I haven’t presented you here. It’s an Internet that works like a good instead of a service. Instead of buying access to the Internet, you are the Internet, and so am I. Instead of relying on network engineers, the software that the Internet 3 is based on autonomously maintains connectivity at all times through all interfaces. So normally, what this means is that when you get an IP address, it’s usually on one interface. You’re connecting to Wi-Fi in a cafe shop. Well, you’ve got the Wi-Fi’s cafe shop’s IP address. And you might have the IP address of maybe your phone that you’re tethered to, right? So a computer today, unfortunately, has so many different IP addresses, different connectors, but instead we want to autonomously do that. So then instead of fearing connection, Internet 3 allows you to welcome it, right? We get this a lot in the corporate world. If you go to maybe your partner’s office, a different corporate partner’s office, and they’ve got the Ethernet cable out on the table, and you’re tempted to use it, and then, you know, he says, no, please don’t use our Internet because our network administration says you shouldn’t do that. And so we want to create, you know, an Internet where everyone is connected at all times. Just like the electric, you know, we’ve got these electric cables here on our desk right here, right? We just, you know, plug into it, have fun with the electricity. Well, we should have the same thing with the Internet. And so really the fundamental change is how you get your IP address, right? You know, the corporate network, you want to maintain that, you know, only your corporate people are having IP address. So we see this as a really big problem. Who owns the IP address? And so the Internet was born in a world where computational power was limited and quite expensive. I mean, we’re talking about mainframes, right? And then we had, you know, generally started getting in the direction of the personal computer, but it really wasn’t until, you know, Apple came along and others came along that allowed us to think about, you know, computers in terms of personalized power. But again, computers were good at moving data and not calculating math. And so we really see a fundamental change in the 1990s, but unfortunately the export laws limited how math and cryptographic primitives could cross borders. So, you know, we have the technology to do a lot of security, but unfortunately we were worried about how this technology would be placed in others’ hands. And so by the end of the 20th century, the Internet had a second protocol implementation, as we know it today by IPv6, but it continued to remain tied to an address registry. Yes. And so this changes today with Internet 3. Inside of most smartphones, probably most everyone’s smartphones here today, there is something called a Trusted Platform Module, or TPM. Apple likes to say that it’s called the Secure Enclave. And when you watch a Hollywood movie or download an app from an app store on your phone, the content you receive is cryptographically signed so that only your phone can use it. You know, we call this DRM, which is, normally when you think about it, kind of, it’s not a really happy technology, it’s kind of a clothing technology, but the flip side is that Internet 3 can utilize this TPM in a completely new, revolutionary way that changes the game. So instead of asking the network for your IP address, who am I, Internet 3 software asks the TPM to generate a public key that maps to an IPv6 address. And so, specifically, because, you know, this is a broad claim to make, you know, what are you doing? Specifically, we generate a curve 25519 public key and cryptographically hash it into an IPv6 address. So, what does this mean? It means that when you’re connecting to another node and you talk to the node, normally what would happen inside the browser happens at the protocol layer, and because every node on Internet 3 has this public key, you exchange public keys and are able to ascertain not only who the other party is, but the other party can ascertain who you are. Not in terms of a privacy data standpoint, but actually as more of a, more as a kind of a specific physical property of the network, right? So, obviously, here we have DNA and we have our faces and our fingerprints. You don’t know who someone is, but you do know what they look like. And so, the same way, every device on Internet 3 knows what they look like. So, this is kind of a rough illustration here. So, you have the trust module inside the computer, and then that has a secure public key, and from that secure public key, into an authenticated IP address that you can use and share. And because it’s backwards compatible with IPv6, all of the applications on top of Internet 3 work just like they did before. So, we’re completely backwards compatible with all of the IETF protocols above layer 3. So, that means TCP, that means all of the other application suites, that means email. All of the applications that you like and love today, they become automatically encrypted and authenticated. And we think that this is a great trend to create. So, this means that without any public key infrastructure at all, we can create an Internet that is not only 100% encrypted, but also 100% authenticated. And I think that this is kind of the crux of what we really need. And so, there’s so much to get into. I’ve spent 12 years of my life, and our company has been around for 12 years to really kind of work this through. It works over existing layer 2, so any kind of physical layer that you’ve got, you can still use today. It’s always authenticated IP addressing, so instead of having, if you go to a website and put a username and password, the website knows who you are, and you know that you’re connected to the website. It works, again, to reiterate with existing software, so anything that speaks IPv6, you can put it on top of Internet 3. And then again, it’s software-defined networking, which means that you don’t have to… to go get another switch or router or some sort of hardware or thingamajig to plug into your computer. It’s software, you download it, it works. And again, to reiterate, it’s a patent solution. We’ve been working on this for over 10 years, so we’ve been lucky to get some very core patents. So you can see that where a lot of security is up at layer seven and it’s hit and miss, internet three integrates internet security and encryption and authentication at layer three. And so in that way, anything above there is completely secure. And so seeing is believing. So I wanted to show you guys kind of a demonstration of it running. I’ll walk around here to the computer. I was expecting a stage, right? Because you’re gonna have a launch event, you think you’d have a stage, but I like this format too. It allows us to be more together. So I’m gonna switch over here and I apologize if in order to accommodate some of the pictures here. So this is one of the applications. So again, this is Safari by Apple. And you’ll notice that it’s not, we haven’t changed Safari in any way. It’s Safari version 17. And you’ll see that at the top here, I’ve got an IP address. Now this IP address is a little bit special. It starts with FC. And that is a special range inside of the IPv6 mandate where it’s called a site local address, which means that the site local administrator can do whatever they want with that address space. And so we, again, hash our public key into this IP space. And so we can create IP addresses that don’t conflict with the current internet. So again, this is internet three. We can use, I can go to Google here. I’m not going through VPN. I’m not using any kind of things. It’s completely backwards compatible things, but it doesn’t mess up your current internet connectivity. So it’s an additive solution. It’s not that you have to use internet three or not. You can use internet three and you can use the existing internet simultaneously. And so this demonstration I’ve got, it’s kind of a cute little website here that I’ve got here. And this was actually made by a couple of high school students at the Fikui Technical High School. And what is this thing here? Well, it’s a little web application here that’s running on a Raspberry Pi inside of our offices in Fikui prefecture. And right now, it’s kind of hard to see me. I’ll zoom up here. We are opening the door, the main security gate to our offices in Fikui over internet three. And so what’s kind of special here, I’m gonna stop it here because I don’t want to go too far. Maybe I’ll let the cats and dogs in here. What’s really special about this is that we have a special arrangement with NTT that allows us to use their fiber optic network without having ISP built into it. So right now, here in Fikui, this property doesn’t have an ISP registered. We don’t have any kind of ISP services there. It’s just a fiber optic line from the NTT network. And then somewhere in the border of NTT’s network and this internet network, we have another internet three node, which is relaying this traffic with the NTT network. And this is again, all done kind of in a P2P fashion. And so what’s great about this is that again, if I’m gonna switch to the administration page here, you’ll see that these, it’s a simple application made by high school students. There’s a security tab here and you can see that there’s these different IP addresses. So this is my IP address right here. So if I comment this out, if I comment this out here and then hit deploy, you’ll notice that if I refresh the page, it says permission denied. And so this is really important because it means that I can control who accesses what, what resources simply by what IP address I own. So if you wanna do this with public keys and TLS and all this stuff, it requires real knowledge of security primitives. But with internet three, it’s just a simple string that you have to match. So as long as I match, I’m gonna, I wanna close the door. So I’m gonna redeploy here. And so we reconnect here and then I’m gonna press the down button here and then I’m gonna close the door. And so what this means is that without using the cloud at all, we can just connect to all of these devices on these high speed networks. Most of the phones in everyone’s pockets here, they’re on the 5G network, right? And they’re running 24 hours a day and you plug them in charge night and they have multiple gigabytes of storage and they have all the photos and the data that you wanna share with your friends. Why not have an IP address on your phone that you can connect to? Why can’t your phone be a server? These are the kind of questions that we ask ourselves every day at Connect Free. And I just wanna show you for the technical people here. So if I do a netstat, which is kind of shows the local network table of this machine, you’ll notice that how we implement it is that there is a rule in the network table that says anything that starts with FC, send it to this virtual network adapter. And if I pull up the virtual network adapter, you can see that this IP address that’s generated from the public key is there. And so some other things that you can do with this. Obviously, there’s a lot of software that runs on IPv6. So for instance, if you look at, for instance, maybe before we connect here, let me open up the settings. So this is the IP address, the Internet3 IP address of this Windows server that we’ve got. And of course, Internet3 runs on Windows as well. And so if we connect here, you’ll notice that I’m on a Mac here, but I’m connecting to a Windows machine. And then if I set up, if I, let me see here. If I open up the network control panel here for network adapters, you can see, and if my antivirus loads here, okay, let me pull it over to the side here. Yeah, so if we pull up, you can see that again, the Internet3 IP address has been assigned to this adapter. This is a virtual network adapter. So to the operating system and to the applications, nothing is new. You’ve got an IP address that you can use, and we can tell your friends, hey, this is my IP address. And you can control it with a normal firewall as well. So again, going back, I’m gonna go back into my, so again, this is working. So it’s not, so kind of the cool thing about this is that it’s working the way it should be, but all of this has been encrypted and authenticated, which is great. It’s not like it’s, it’s such an additive technology, but there’s no cost to do any of this, right? You just install it and it works, which is the way it should be. So I’m gonna go back to my presentation here and kind of get more into talking about, and I apologize, there’s a lot of words on this slide. I apologize. So basically, you’re gonna hear a lot here today at IGF about something called DFFT, data-free flow with trust. What is that? What does that mean? And the late Prime Minister Abe presented at Davos in 2019 to the G20 group that really, the internet needs to be, in one way, more accepting to data flow, but in another way, having more to do with trust. And so, again, I apologize, there’s a lot on the slide there but really, the question we also kind of ask ourselves, why do we still trust the telephone system, right? Well, because all of the applications on your phone, like SMS and voice, and even here in Japan, we still use fax machines a lot, this is all authenticated by the network layer. The telephone company asserts that the telephone number is gonna be trustworthy. But unfortunately, the internet itself, there’s a lot of people like Blockchain and Web3 and these other well-to-do people that are trying to do something on top of the internet, but really, the problem is that by trying to reinvent trust on top of the internet, you’re still having to deal with the cost of the internet itself. What that means is that even though, yeah, even though you’re trying to do something better for the internet, right, and try to help people, you’re still having to work with the tremendous cost of the internet itself. So, Internet3 gets around that by providing trust from the device layer. So, because each Internet3 device is a router, is routing secure data for other devices, you’re able to get all command and control and communication applications in a way of trust, right, that everything can have trust. It’s not just one application. It’s not just one computer. It’s all computers and all applications. And so, I’m kind of moving into the weeds here a little bit. You’re also gonna hear, hopefully, more about something called Zero Trust. And Zero Trust is a specification defined by the United States National Institute of Standards and Technology. And this is very important because of what it means is instead of having these local networks, we redefine the way network security is by saying that we shouldn’t trust anyone to begin with and only trust the connections that we are able to trust. And so, why Internet3 plays a huge, important role into how Zero Trust will go forward and how communication will go forward is because every computer is authenticated by the public key that is inside of the computer. When a packet comes into the other application, right, so if you’re connecting to another application, immediately, that application knows that this IP address is definitely coming from whatever computer it’s coming from. Now, they don’t know what name the computer is or the user is. They don’t have any of this privacy information. Just like I’m looking around the room and there are some new faces and there are some old faces, right? I don’t know everyone’s name here, but I can look in everyone’s direction and I can see who you are. You have the right to exist in reality from your DNA, right? If you walk into a bank, the bank can say hello to you. They might not know your name. If they do know their name, they can greet you. But we hope that we can do the same thing here on the Internet. And so, really, we wanna convey that we think that Internet3 is the best way to implement Zero Trust. Now, is it hard to use? What do you do? Well, it’s really simple. You download software, you double-click it, it activates, and you’re online. That’s the way it should be. So, very simple to use. Again, for embedded devices, we have a developer program that allows you to work with us to integrate Internet3 into your device. And so, in kind of one slide, you can see here that we have, really, for a plethora of different markets, a solution to helping everyone connect. And so, the real critical question now that we come to this juncture in our time together in this one-hour slot is really, well, this is great and all, but how do you guys make money? You said it’s a good. How much does it cost? What is your business? And so, we really think about, kind of, instead of, again, to reiterate, instead of having the Internet become a service, we think it should be a good. So, we sell the IP address for a one-time cost, right? And, you know, although we don’t have any kind of slides to it today, generally, our idea is that it’ll be free for people, and we wanna make money on the devices. If you look in the ceiling, there’s a lot of lights, there’s a lot of infrastructure that is around us, and helps us get through the world. I think the term in the United States is operational technology. So, a lot of people think of the Internet as being a solution for IT, for information technology, but we think that the Internet should go more towards the idea of operational technology. There’s a lot of infrastructure that apparently is gonna be hacked, or hackable, right? We wanna help to see that we’re not hacked, that we’re all secure, and all secure, and ready to utilize the infrastructure in ways that increases GDP. And so, by selling the IP address for a one-time fee, it really helps us do two things. One is, it helps the manufacturers take responsibility for the product. What does that mean? Anyone who has ever bought an IP camera knows that when you buy the IP camera, you end up spending a lot of time setting up the IP addresses, and doing all these different things. Whereas, in the future, when the IP camera comes from the factory, it already has an IP address because it was generated at the factory. You can write it on a label. You can put it on a QR code. There’s no need to do any kind of setup because for the lifetime of the device, it’s always the same IP address, which means it’s trustworthy. And so, again, because the public key and the associated private key is generated inside the device, we don’t have any control over that. We can’t revoke that IP address, but what we can do is we can activate and bless the device. And what that means is that we associatively sign the key so that other nodes in the network knows that it is actually bought and paid for. And so, I like to use the term bless instead of activate because you can do the reverse of activation. You can deactivate something. It’s really hard to un-bless something once it’s blessed. We like to use the term bless, but the idea is that, again, to sell these IP addresses. That’s our core market. We think there’s about a trillion devices in the world that might be available for Internet3. So that is, if you sell it for $1 per device, it’s a trillion dollars. We think it’s a huge market. And so, to help us really grow Internet3, there’s a number of core partners that we’ve been working with. We’ve been very shy about who we work with at this current juncture because we haven’t been really public in our activities. And so, at IGF here, we’re going to come forward. But now we have these collaboration partners, Omnimo, KOMGates, and Mitsubishi and Company, who have been fundamental in helping us navigate really what is gonna be, hopefully, a huge juncture in how we communicate. And so, I’d like to change gears now and hopefully kind of reiterate what we’re doing. I mean, there’s a lot of different things that I can talk about, but it’s best to have really kind of these experts talking. So, if I may, can I ask Mr. Hirohishita to give some comments about the, oh, you got your mic?

Mitsuhiro Hishita:
Okay, great, about Internet3. Thank you. Thank you very much, Chris. My name is Mitsuhiro Hishita. I am the Director General of the MIC Japan Hokuriku Regional Office based in Kanazawa. Actually, I am posted this position since this July. Until then, I was working for the Global Strategy Bureau of the MIC, and I was working for the global negotiation, like the G7. The last G7 was, by the way, held in Takasaki in this April. Well, at that G7 also, we talked about the internet governance. We noticed that there is some government control over internet. Sometimes, there’s a government shutdown. There is sometimes government internet fragmentation. So, the theme of this IGF is, as you know, the internet we want. So, what is the internet we want? As Chris mentioned, there is, if you want to do the IoT business, you need to get free access to internet, and you need to have a secure ICT infrastructure. So, according to what I heard from this Chris presentation, and understand that this Internet3 is an innovative new service that will enable the zero trust, and also it will provide a secure IP address for each IoT devices. So, I hope that from the viewpoint of the Hokuriku Regional Office Director General, such a new innovative service should be first introduced in the Hokuriku region’s companies, and also local enterprises, so that they can show that this new technology really is feasible, and also can provide safe access to internet. This is my comment.

Katsuhisa Sasaki:
Thank you very much. It’s okay to clap. Yeah, it’s okay. Yeah. So, again, we’ve had a lot of support from the Hokuriku region. A lot of people don’t know where Hokuriku is. It’s kind of north of here, and a little west of Nagoya and Tokyo. But we like to think of it as Cyber Valley, as the upcoming place where a lot of this innovation will take forward. So, thank you for your comments, Mr. Hishida. So, next, I want to kind of switch gears to Mr. Katsuhisa Sasaki, Mayor of Sabai City. And thank you, Mayor, for coming so far out to Kyoto. And so, again, Sabai is a really core city in the Hokuriku region. And so, I’d like to hear some comments from Mayor Sasaki. Thank you. Hello, everyone. I am Katsuhisa Sasaki, the Mayor of Fukui Prefecture, Sabai City. Sabai is a city no one wears NBT eyewear, which make up over 19% of nationally produced glasses frame. Our city is also known throughout Japan for its SDGs by gender equality, sustainable development, any city. We believe that gender equality is a key to a prosperous future and strongly to be a sustainable city in which people can together flourish and take on new challenges. I am here to support Internet 3, which will contribute to Sabai’s sustainability. Now, Samantha, from our resource center for implementation of SDGs, we address our thoughts on sustainability and Internet 3. Samantha, go ahead. Thank you.

Samantha Kawaguchi:
Thank you, Mayor Sazaki. Before I start, I would just like to make one correction. The, Um, the, uh, English coming out at the top of the screen said 19% of glasses for Sabae, the number is over 90. Just wanted to make that distinction, sorry. Um, hello, my name is Samantha Kawaguchi. I am a Canadian based in Sabae City. Much of my work focuses on the Sustainable Development Goals. Um, within that, mostly, um, goal number five, gender equality, and other areas such as diversity and intersectionality. And today, I have come here with the Mayor to speak a little bit about how Internet 3 correlates with Sabae’s initiative for the Sustainable Development Goals, and how that, um, implementing Internet 3 is a great way to further sustainability, and not just our city, but in other local cities, very similar to our own. And before I’d like, um, before I start, I would like to mention that Sabae is, um, a small city of about 70,000 people, but it has greatly been considered one of the forefronts of the local SDGs initiatives. It’s a role model city in, especially, regards to goal number five, gender equality, and this is for many reasons, but one of the big ones stems from Sabae’s history with women’s empowerment. Unlike some of the other regions in Japan, Sabae, historically, has seen many women involved in the workplace, as well as in their family life, balancing career and child raising, which is something very specific to Sabae and the Fukui region. And currently, women are still in the workplace, active as ever. Much of the women are involved in family-run businesses, which still, to this day, make up a great number of our local industries, such as glasses, lacquerware, and textiles. And it is for this reason that, um, Sabae event, uh, started being very particular in its SDGs, especially gender equality initiative. And today, with the current environment of Sabae being pretty different than other regions in Japan, where we have the, uh, highest percent of the, uh, women, women, excuse me, employed and women, um, working as well as men working. So dual income households. So with this, um, background, we spent a lot of time and strived to, um, further, not only gender equality, but all of the sustainable development goals. And some of the ways that we have done this is, um, through, uh, various initiatives that both the city and our local companies and industries engage in, such as, um, we have a network that, um, really promotes gender equality by bringing together leaders of our local businesses that have implemented, um, policies within their workplaces to encourage gender equality. We encourage, uh, per- uh, excuse me, parental, uh, paternity. We support paternity leave in both our public and private sectors. And we also celebrate many global milestones, such as International Women’s Day, to spread more awareness of how gender equality is something very necessary to a sustainable society, society. And we feel that, in Sabae, Internet3 is a very, very important tool to not only, um, doing more things towards gender equality, Goal 5 from the SDGs, but also all of the other SDGs as well, as well. So this would, um, work with all of the three pillars of, um, sustainable development, such as the economic sector, the environmental sector, and the societal s- s- excuse me, sector. So, for example, with Internet3, this, or Internet3, excuse me, um, there would be no fees, which would make Internet way more accessible to a larger amount of people. So, for example, there would be more e- means to go online and access educational tools, and for people to be online without having to pay monthly costs would mean less barriers. So this would directly relate to SDG 4, 5, and 10. And that is on an individual level. On a consumer level, Internet3 would relate to the SDGs by providing more ways for developers to get involved in actually developing and innovating towards new solutions rather than trying to rehash old things and trying to work more on security. So this would mean more inventions. And this could, um, really reframe the way that, um, all of our companies and industries work, how our inter- our inner structure functions. This would, uh, correlate to SDG 8, 9, and 11. And this is directly… Indirectly, it has the potential to correlate with many other SDGs, such as poverty, healthcare, as well as areas, uh, pertaining to environmental issues. And it is for this reason that, um, we think that Internet3 would also be a very, very key factor to, um, digital peace online. Because with Internet3, everybody will have safe access to the Internet, and this will allow for a digital democracy in which we can all focus on our human rights and our, um, safety in order to use the Internet in a way that was different than what we have, um, used up until now. And it will be better for us on a, um, as humanity on a whole in order to access the Internet. And this will pertain to SDG 16 for peace. And another huge factor in Internet3 is SDG 17. Because through global partnerships, and local partnerships as well, everybody can come together to use this new type of Internet to have more access to a free virtual world. And this will be a great opportunity for everybody to come together and tackle much of the societal issues that we all face together as humanity. So Internet, as we all know, as everybody here knows especially, uh, Internet is such a vital part of our lives. It really is an indispensable lifeline. And in regards to diversity and human rights, the Internet is one of our rights. And we should be able to access it in a way that is free, and is safe, and is accessible to everybody. So it is for this variety of reasons that Internet3 can be a great tool that can help survive sustainability. But not just our city. It can help many cities, much like our own, that are trying their best to deal with local issues and do their best towards global issues as well. So, um, we hope here from Sabaya, a little city of 70,000, that our showcase of what we are doing and how Internet3 can really speed up our sustainability process and help our town grow even more, we hope that this could have been a little hint for everybody listening, and that you too can find something that Internet3 can help you with. Thank you for listening.

Kristopher Tate:
Thank you, Samantha. I, I think that, you know, obviously, um, Sabae is really important, uh, for a number of reasons. Um, one, you know, it, it only has 70,000 people, but it’s really what I think the model Japanese town. If Sabae, uh, if it can work in Sabae, it can work anywhere. And I really want to touch again on, um, what Samantha was talking about with, uh, equality and women’s, uh, uh, women’s equality in, in the sense that, um, through Internet3, um, there’s been, um, different projects inside of the, uh, city to help remotely connect to, um, the Sabae city network. So what does that mean? It means that, you know, if you, um, need to be at home, especially, uh, dur- during COVID-14, uh, 19, it was very hard for, um, people to connect into these networks, these governmental networks. And so we, uh, were able to talk to the Ministry of, um, uh, Internal Affairs and Communications to get the right checklist, the right guideline checklist to be able to use Internet3 inside of a governmental setting. And that really changed it so that people could take their, um, they could use their laptops from home and connect into the la- to the- their desktops and do the work from their home, um, when they weren’t able to before. So again, that really helps for, um, child, uh, uh, bearing and helping with, with the home, uh, issues. And, and so, uh, again, to reiterate, um, it’s really great to hear from Sabae city, uh, today. So I’m gonna change gears a little bit. Um, I want to introduce, um, Mr. Hideshi Takenai, who’s, uh, next to me. He’s kind of a unique person. Um, he’s from the Shinten-no-ji Temple in Osaka. And, um, he is, um, kind of a very artistic person. And so I think that a lot of people think about, um, I think a lot of people think about the Internet and digital as being this kind of high-tech thing. And I really hope that Internet3 can show that it integrates well with, um, culture. And what that means is that a lot of people are still thinking kind of, uh, what we say in Japan as kind of an analogue method. And, um, through, uh, our relationship, um, he has kind of, uh, helped, uh, helped me find that, that, you know, digital can also really be, um, connected to culture and connected back to, um, really, um, society in a very profound way. And so I’d like to, to ask, uh, ask him for, for a little comment here.

Hideshi Takatani:
Yes. Um, I am real, I know people, yeah. And, uh, thank you so much. Uh, let me introduce myself. It’s, uh, I was born in a traditional Japanese family. I was bo- uh, I play in the traditional Japanese entertainment. Uh, I played at the traditional, uh, Japanese instruments. Uh, Japanese set is, uh, so, you know, it’s a koto, yeah. So it’s a koto, uh, I play. Uh, this is, uh, the simbrick is, uh, uh, uh, uh, uh, yeah. Uh, yeah, no, yeah, just, no, no, yeah, it’s okay. Uh, it’s something like that. Um, it’s so, uh, but, uh, I am, I am a new, uh, a new wave, I want a new wave, yeah. I had, uh, the, so I had a board, a computer in 1977. Yeah, uh, 1977, yeah. Oh, the display in this, uh, keyboard, display, the Sony is a keyboard, the Yamaha, and, uh, you saw, uh, oh, oh, tape recorder, yes. Oh, oh, oh, yeah, yeah, what, what, what, what to use, what to use, yeah. Yeah, and maybe, uh, the one hundred yen, you know, hyaku man yen, yeah. Uh, and so, and to be con- yeah, so Japanese, and to be continue to, uh, step by step, step by step, as so, and, uh, analog, and so digital, it a combination. Yeah, to be continue, yeah. And, uh, by the way, it’s a Japanese, uh, uh, situation, yeah. Now Japanese situation, economic, uh, situation is so bad. What, yeah, yeah, as, uh, Tate, thank you so much, it’s a what, and to Japanese situation, economic situation is a bad. Why, what, uh, yes, it’s so, uh, in, uh, 1970, 1980, yeah, no, no, 1960, 1970, 1980, yeah, is so go, go, go, go, go, yeah, yeah, go, go, go, go, go. But the 1990, yeah, and so, 90 from 99, 99, yeah, to now, yeah, from 1999 from, to now, is so, uh, this is, uh, what is, what to say, is, uh, uh, 13 blanks, 30 blanks, 30, why this, yeah, yeah, yeah, it’s okay, 30 blanks, 30 blanks, uh, so, 空白の30年, yeah, yeah, uh, yeah, yeah. Um, uh, so, uh, I, uh, can fit in, uh, digital, yeah, to be continued from 1977. But, uh, in Japan, uh, almost Japanese people, and Japan cannot, uh, settle into Internet, and, uh, cannot set into, uh, uh, digital, yeah. And, uh, because it’s so economic, it’s, uh, all most, it’s things, is, uh, wow, wow, yeah. And, uh, I think it’s, I catch, um, I catch Internet 3. Thank you so much. I got Internet 3. Yeah? You think so? And, uh, I think, uh, the Internet 3 is meaning is, uh, last, uh, last, uh, consciousness of human beings. Uh, consciousness is a human beings. Uh, uh, so I take, please say is, uh, Internet 3, uh, is meaning is the last consciousness a human being. Uh, we hope, uh, Internet 3 create, uh, Japan, and, uh, Japan, and, uh, so create, uh, the world. Create is, uh, new world. Uh, it is, uh, possible for us, uh, to create new world. Uh, so take, Chris, uh, thank you so much.

Kristopher Tate:
Thank you. You know, I think that everyone, you know, uh, we’re trying, right? And I think that a lot of people, they’re so, uh, excited about this new idea of an Internet that we can own together. Um, it connects, the Internet connects us today a lot of places, but it also connects us, it doesn’t connect us. There’s a lot of places on the Earth that are not connected, um, where it’s important to, um, bridge the gap and bridge connectivity, um, not only just in a technical means, but also, um, in, you know, sometimes a spiritual mean, uh, even. And so, um, you know, there’s, it’s, a lot of, a lot of people, anybody can, uh, can join Internet 3, and that’s what makes it, um, very special. So, um, I wanna, uh, let’s see here, let me switch. So we’ve got a TV spot. Maybe we can, uh, kind of, uh, slow things down here. I think, you know, just to kind of introduce the TV spot, um, we’re really thinking about, you know, the, the name Connect Free, our company’s name is Connect Free. And, um, just to give you kind of a perspective, I, uh, grew up, uh, in Seattle, Washington, uh, connected, uh, to the Macintosh for the first time at three years old, got on the Internet, uh, at four, started writing, uh, C, uh, language at five with this, uh, ThinkC interpreter. Um, graduated early from high school at 15, went to Silicon Valley, got invested in by Ron Conway, uh, got into the scene there, so I went from Seattle to Silicon Valley, which was a big move to me. But, um, I realized something, and that was at 19, and that was that a lot of the world didn’t understand Japan and still doesn’t understand Japan. And growing up, um, in Seattle, there was a lot of Japanese people around me, and I really wanted to understand why they weren’t getting it. Why didn’t people get Japan? And so, um, I’m, I, uh, I traveled to Japan at 19 because there was a lot of people in Silicon Valley that just didn’t believe in Japan at the time, unfortunately. And so when I came to, um, Japan, I asked them, point blank, why, why don’t you use the Internet more? Why don’t you use technology more? And just like, um, we just heard, um, you know, the 1970s, 1980s, people were really interested in technology, but when it came to the 1990s, they were really hard-pressed to get in there. And so it was really about, um, freedom and responsibility. For Japanese people after the war, um, the word freedom shows up in the Japanese constitution, uh, 11 times in Japanese. And so it really forced the Japanese people to really think about what is freedom? What does it mean to be free? And their interpretation was to be 100% responsible. Um, and so, um, we really think that, that kind of changed me a lot as an American, um, to really think about there’s, there’s a lot of ways you could think about freedom. And so, um, I realized that, you know, we could connect better. We could connect more freely. So that’s where the name Connect Free, uh, comes from. And so I want to put the, the TV spot on here to show a little bit how we, um, we think about freedom. Can we get more of the speakers? So with that, I’d like to, uh, end today’s, uh, uh, at least this, this portion of, of the talk. Um, and, um, Internet 3, um, you can, you can access it at internet3.net. And, um, you know, I, I think that we’re starting something together today. You know, I, uh, I think that we still have maybe a few minutes of time here. We’ve got four minutes left here. So, um, I want to open it up and see if anybody wants to, you know, uh, kind of come forward. And talk if that’s what, uh, that’s, uh, feasible. If not, um, we can see you back at our booth at number 39. And, uh, I hope everyone has a great IGF. Thank you. Great. Yeah.

Hideshi Takatani

Speech speed

121 words per minute

Speech length

595 words

Speech time

295 secs

Katsuhisa Sasaki

Speech speed

140 words per minute

Speech length

291 words

Speech time

125 secs

Kristopher Tate

Speech speed

203 words per minute

Speech length

7933 words

Speech time

2350 secs

Mitsuhiro Hishita

Speech speed

163 words per minute

Speech length

297 words

Speech time

110 secs

Samantha Kawaguchi

Speech speed

168 words per minute

Speech length

1250 words

Speech time

446 secs

ISIF Asia 2023 Awards | IGF 2023 Launch / Award Event #8

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

ISIF Asia

ISIF Asia and APNIC Foundation are two organizations that play a crucial role in promoting internet development and innovation in the Asia-Pacific region. ISIF Asia specifically focuses on providing grants and awards to projects that contribute to internet development, with a particular emphasis on infrastructure, inclusion, and knowledge. Their ultimate goal is to achieve meaningful and equitable internet access for all individuals. On the other hand, the APNIC Foundation is committed to supporting and recognizing entrepreneurs and innovators in the internet field, with the aim of fostering the expansion and improvement of internet access and usage.

Both ISIF Asia and the APNIC Foundation align their efforts with the Sustainable Development Goals, particularly SDG 9: Industry, Innovation and Infrastructure, and SDG 17: Partnerships for the Goals. These goals serve as a framework for their work in making significant contributions towards the development and enhancement of internet-related initiatives in the region.

While ISIF Asia has dedicated substantial resources to supporting projects and initiatives in the Asia-Pacific region, they acknowledge that the current funding falls short of the needs of researchers and practitioners. In response, they actively seek contributions and support from like-minded organizations, partners, and donors who are willing to collaborate and participate in their work.

Both ISIF Asia and the APNIC Foundation recognize the importance of monitoring and evaluating the impact of their interventions. ISIF Asia is in the process of developing a monitoring and evaluation framework to better understand their impact and calculate their contributions within a broader ecosystem, rather than claiming full attribution for project outcomes. This approach reflects their commitment to a multi-stakeholder, community-based approach to internet development, wherein they actively build networks and collaborate with various regional and national organizations to maximize their impact.

Overall, the contributions of ISIF Asia and the APNIC Foundation are valuable in driving internet development and innovation in the Asia-Pacific region. Their commitment to the Sustainable Development Goals, collaborative approach, and efforts towards monitoring and evaluation demonstrate their dedication to creating meaningful and equitable internet access for all individuals.

University of Malaya

The University of Malaya in Malaysia has been recognized for their work on an SDN-based internet exchange playground, receiving the prestigious ISF-Asia 2023 award. This project aims to enhance the training of technical operators and bolster the routing security of internet exchange points (IXPs). One important aspect of their work is the team’s focus on engaging women in this field, with the aim of promoting gender diversity. Additionally, the project introduces the use of RPKI (Resource Public Key Infrastructure) in the BGP (Border Gateway Protocol) to enhance security.

The ISF-Asia 2023 award comes with a £5,000 grant for research costs and a travel grant to the Internet Governance Forum in Kyoto, Japan. This recognition highlights the significance of the University of Malaya’s work and their contribution to the advancement of the internet industry.

The University of Malaya is optimistic about the possibilities of further international collaboration on their SDN-based internet exchange playground project. Dr. Ling Tak Chow, a representative from the university, expressed the hope that more countries and collaborators would join their efforts. The project has been designed in a way that allows for connection to more nodes, thereby enabling the training of a larger number of networkers. Furthermore, the project aims to create a more distributed environment for IXPs, facilitating network operations on a wider scale.

Providing easy access to a learning environment for young networkers is another key aspect emphasized in this summary. Access to such an environment may be particularly challenging in developing or least developed countries. The goal, therefore, is to create a learning environment that closely resembles real-world scenarios. This enables young networkers to gain practical experience and skills necessary for their professional development.

The summary also highlights future areas of development in internet network operations, including the exploration of AI-assisted IXP environments and the continuous improvement of internet exchange security. These advancements are expected to enhance the efficiency and reliability of internet networks, contributing to the further development of the industry.

In terms of technological advancements, the summary points out the University of Malaya’s use of advanced technologies like SDN (Software-Defined Networking) and BGP routers. They have secured funding to deploy these machines in various countries, allowing users to set up their own path between routers. This technological approach creates a more flexible and customizable network infrastructure, encouraging innovative solutions and greater user autonomy.

The University of Malaya has also received grants and appreciates the support and collaboration they have received. They express gratitude towards their institution and collaborators, particularly mentioning Dr. Chua Pangwei, Dr. Aris Redianto, and project admin Satish Kumar for their valuable contributions.

Overall, the University of Malaya’s work on the SDN-based internet exchange playground project is lauded for its significant impact on the industry. While the number of publications may be an important measure of success, Dr. Ling emphasizes the importance of the project’s practical implications and the training it offers.

The expanded summary highlights the University of Malaya’s achievements, aspirations for further collaboration, focus on gender diversity, commitment to practical learning environments, and exploration of advanced technologies. Their dedication to advancing the field of internet network operations is commendable, and their work has the potential to shape the future of the industry.

Keywords: University of Malaya, Malaysia, ISF-Asia 2023 awards, SDN-based internet exchange playground, networkers, routing security, IXPs, gender diversity, RPKI, BGP, Internet Governance Forum, practical learning environment, international collaboration, developing countries, least developed countries, AI-assisted IXP environments, internet exchange security, Software-Defined Networking, BGP routers, flexible network infrastructure, grants, appreciation, industry impact.

Audience

Technical projects aimed at improving Internet efficiency and reducing latency have a dual impact, both on a technical level and on the economic front. In particular, projects such as Internet Exchange Points (IXPs) play a crucial role in driving not only technical advancements but also economic progression. These initiatives require funds to be implemented, and although the investment may seem significant, the practical and economic benefits they bring tend to far exceed the initial funding. One specific example of this is a project that used $9.4 million, where the speaker believes the impact on the economy was far greater than the amount invested.

The economic impact of such projects is as vital to consider as the technical advancements they bring. It is crucial for stakeholders, especially governments, to be convinced about the benefits and impacts of these technical projects. One suggestion for achieving this is to present quantifiable data and statistics that demonstrate the economic impact. By providing tangible evidence, such as measurable results in terms of economic benefits, stakeholders can better understand the value and potential of these projects. In particular, the speaker, Dr. Zartash, has highlighted the challenge of convincing government and other key stakeholders about the significance of these initiatives. The use of quantifiable data and statistics could prove to be a more effective method of persuasion, appealing to stakeholders’ preference for concrete numbers.

Looking towards the future, it is essential to develop plans that can further demonstrate the economic impact of technical projects like IXPs. This is key to gaining continued support and persuasion from relevant stakeholders. In particular, quantifiable results can serve as a persuasive tool to build a case for more projects like IXPs in regions such as Pakistan. By providing evidence of the positive economic impact and potential future benefits, stakeholders can be encouraged to support and invest in such initiatives.

In conclusion, technical projects aimed at improving Internet efficiency and reducing latency not only have a technical impact but also a significant economic impact. The practical and economic benefits of these projects generally surpass the initial funding, making them valuable investment areas. However, convincing the government and other stakeholders about the importance and value of these projects can be a challenge. Utilising quantifiable data and statistics to demonstrate the economic impact can play a crucial role in persuading stakeholders. Future plans should be devised to provide further evidence of the economic impact and to gain continued support and persuasion from stakeholders.

Ellisha Heppner

Ellisha Heppner holds the position of Grants Management Lead for the APNIC Foundation, where she oversees the distribution and management of grants. Her role highlights her commitment to effectively managing grants within the organization. She actively supports the advancement of the Internet for development, recognizing its potential to drive innovation and infrastructure growth.

One notable example of Heppner’s support is her encouragement of the LUMS team’s efforts. The team received the ISF-Asia awards in 2023 for their outstanding work in the development and implementation of software-defined networking (SDN) applications for internet exchange points (IXPs). Their innovative approach enabled the successful deployment of IXPs in Karachi and Lahore, leading to reduced operating costs through automation. Heppner played a crucial role in presenting the award to Sartaj Avzal-Uzmi, the leader of the LUMS team, expressing her hope that the recognition would further assist their future innovative initiatives.

Furthermore, the APNIC Foundation celebrates the remarkable contributions of three grantees from the Information Society Innovation Fund (ISIF) Asia. These grantees have made exceptional strides in the development of internet exchange points, which play a vital role in industry, innovation, and infrastructure growth. The recognition they receive highlights the importance of promoting internet exchange points and their impact on advancing connectivity and collaboration.

However, challenges remain in convincing service providers to fully utilize the newly established internet exchange points. Although physical connectivity has been established, there is room for improvement in optimizing their usage. While there are potential cost benefits for service providers in utilizing these exchanges, increased persuasion is needed to ensure their widespread adoption.

The accomplishments of the ISF-Asia 2023 awards extend beyond LUMS. MNIX, the organization behind Myanmar’s first internet exchange point, is recognized for their exceptional work in this field. MNIX operates as a non-profit, community-led exchange that provides IP peering facilities. With two IXPs and three points of presence (POPs), their plans to extend their network reach to a data center further contribute to the development of internet infrastructure in Myanmar. Heppner commends the notable work done by Thien Nguyen Kim and the team at MNIX.

Additionally, the University of Malaya, Malaysia, is acknowledged for their work on designing, developing, and operating an SDN-based internet exchange. Led by Dr. Ling Tak Chow, this project holds significant implications for the advancement of industry, innovation, and infrastructure. The University’s efforts to foster gender equality in the field through online training, tutorials, and seminars specifically targeting women are also recognized.

Overall, Heppner expresses gratitude towards the meeting attendees and appreciates the support provided by the Asia Pacific Internet Development Trust and APNIC. She recognizes their essential role in enabling the work of awardees and their commitment to furthering the development of the internet. Through her support and encouragement, Heppner demonstrates her dedication to advancing internet connectivity and collaboration in pursuit of sustainable development goals.

University of Management Sciences or LUMS

Lahore University of Management Sciences (LUMS) is actively working on the development of software-defined Internet Exchange Points (IXPs) in Pakistan. The LUMS team has successfully deployed IXPs in both Karachi and Lahore. This achievement is the result of collaboration with government organizations such as the Higher Education Commission and Pakistan Telecommunication Authority. These collaborations were essential for identifying suitable locations and hosting the IXPs.

Despite the successful deployment, the utilization of the IXPs remains a challenge. Efforts are being made to incentivize service providers to exchange their traffic through the IXPs by encouraging the presence of large content providers in Pakistan. By doing so, it is hoped that the overall utilization of the Internet Exchange Points will increase.

One of the significant hurdles in this project was the absence of IXPs in Pakistan. The LUMS team had to secure funding and develop a research team to address this issue. The first challenge was to identify the problem and seek funding to solve it. However, despite these initial obstacles, LUMS was able to overcome them and successfully deploy the IXPs in Karachi and Lahore.

In terms of challenges faced by Pakistan’s internet infrastructure, the limited connectivity and expensive access are noteworthy. Pakistan’s connectivity is only through the southern part of the country, which brings about inefficiencies and renders access to the internet quite expensive for ordinary users. This highlights the importance of improving internet affordability and making it accessible for the masses.

Another noteworthy observation is the need for the neutralization of geopolitical scenarios for efficient international connectivity. Currently, Pakistan is not connected to any neighboring countries for internet exchange, resulting in inefficiencies. It is crucial to have better international connectivity to enhance internet exchange practices.

Overall, the successful deployment of the IXPs by LUMS is a significant step towards improving Pakistan’s internet infrastructure. Collaboration with government organizations, efforts to incentivize service providers, and addressing issues of limited connectivity and expensive access are all crucial aspects of this project. By focusing on these areas, it is hoped that Pakistan’s internet exchange system will be more efficient, cost-effective, and accessible to a wider population.

Myanmar Internet Exchange

The Myanmar Internet Exchange (MNIX) has been recognised for its achievement in developing Myanmar’s first internet exchange point (IXP), winning the ISF-Asia Awards 2023. MNIX has successfully expanded its operations to include two IXPs and three points of presence (POPs), with 26 peer ASNs. This not-for-profit, community-led exchange provides IP peering facilities for its members, promoting collaboration and connectivity within the country.

However, MNIX faces challenges in several areas. Cooperation between local internet service providers (ISPs) and contemporary providers proves to be a hurdle. The emigration of engineers further compounds this issue, exacerbating the shortage of local staff and hindering the growth and development of the exchange.

Nonetheless, MNIX has notable achievements to its credit. It established the Resource Public Key Infrastructure (RPKI) system earlier than other regions, ensuring security and authenticity in the exchange of internet routing information. Additionally, MNIX places significant emphasis on the training of IXP members, fostering knowledge sharing and collective experiences.

Looking to the future, MNIX has plans for expansion. This includes extending its network reach to a data centre, setting up another IXP in a different city, and establishing small POPs in other cities. These steps towards expansion aim to strengthen internet infrastructure and enhance connectivity across the country.

One of the main challenges faced by MNIX and other internet exchange points in Myanmar is securing the engagement of large network operators. Negotiations with these entities often prove difficult, as they show little interest in participating in IXPs. However, an increase in the content connected to the IXP may generate interest from these larger network operators, leading to increased collaboration and connectivity.

The community, particularly content providers, play a crucial role in supporting the establishment and operation of IXPs. By joining the IXP, content providers contribute to reduced latency and increased connectivity, benefiting all stakeholders involved. This highlights the importance of partnerships and community involvement in driving the success of internet exchange points in Myanmar.

In a separate development, the Myanmar Internet Exchange (MMIX) has expanded its network beyond Yangon by establishing another IXP in Mandalay. MMIX aims to focus on small and medium ISPs and plans to set up more locations in remote areas of Myanmar if there is demand.

However, challenges exist, particularly with the government network in Naypyidaw. Currently, it is not yet connected to MMIX, despite most of the networks in the city being government-operated. Connectivity between MMIX and the government network in Naypyidaw could enhance collaboration and extend the benefits of the internet exchange point.

MMIX recognises that establishing content for the network is crucial for attracting ISPs. To this end, they have been approaching content delivery network (CDN) providers to acquire content. Without a diverse range of content, ISPs are unlikely to connect to their network, underscoring the significance of content provision in driving the success of internet exchange points.

In conclusion, the recognition of MNIX for developing Myanmar’s first IXP highlights its significant contribution to the country’s internet infrastructure. Despite challenges in cooperation, staff shortage, and engaging large network operators, MNIX has achieved notable successes with the RPKI system and IXP member training. Plans for expansion and the vital role of the community and content providers emphasise the importance of collaboration and involvement in advancing internet exchange points in Myanmar. Additionally, MMIX’s expansion beyond Yangon and focus on content provision demonstrate a commitment to improving connectivity and access to remote areas.

(Note: I have retained the same level of detail as the original text, while correcting grammatical errors, sentence formation issues, typos, and using UK spelling and grammar where required.)

Session transcript

Ellisha Heppner:
My name is Alicia Hepner, and I am the Grants Management Lead for the APNIC Foundation, and I’ll be your emcee. I just want to thank you all for your support here today and the commitment to advance the Internet for development. We are here to celebrate the work of three fantastic grantees of the Information Society Innovation Fund, ISIF, Asia, for their outstanding contributions towards the development of Internet exchange points. We have a short video to introduce the ISIF Asia for those who may not be familiar with it. Could we please play the video?

ISIF Asia:
In 2016, the United Nations declared Internet access a human right. But today, more than a quarter of the Asia-Pacific is still disconnected, leaving many of the most vulnerable people without access to this essential resource. The Information Society Innovation Fund, ISIF Asia, supports communities in the Asia-Pacific region to research, design, and implement Internet-based solutions to achieve the Sustainable Development Goals. ISIF Asia achieves its goals through grants and awards to projects that contribute to Internet development from a technical and operational perspective in three key areas – infrastructure, inclusion, knowledge. The infrastructure program aims to increase Internet speed, reduce maintenance and operational costs, improve reliability and or security. ISIF Asia infrastructure projects have ranged from innovative satellite connection research through to smart villages and the establishment of networks to serve remote communities. The inclusion program pursues the goal of meaningful and equitable access to the Internet for all. It focuses on availability, bringing the Internet to places with limited or no access. Affordability, helping bring down the costs of Internet access for disadvantaged areas. Accessibility, boosting the adoption of standards and technologies to help people with disabilities online. Diversity, increasing representation in the Internet industry among women, LGBTQI plus people and other underrepresented groups. The knowledge program supports training and research projects that develop technical capacity and or research around Internet network operations. ISIF Asia knowledge projects have ranged from cyber security research through to training in technical best practice. ISIF Asia is run by APNIC Foundation thanks to generous support from the Asia-Pacific Network Information Center and the Asia-Pacific Internet Development Trust, as well as other generous donors. To get in touch, contact the foundation at info at isif.asia. And now I’d like to introduce the foundation’s acting CEO, Sylvia Cadena, to speak. Thank you, Alicia. Thank you. If I can have my slides. Thank you. My apologies for my croaky voice. I am trying to be quick in this presentation, but it’s my great honor to introduce to you the work of the foundation in this edition of the ISIF Asia Awards. The foundation was established as the fundraising arm of APNIC. For those of you that are not aware of what APNIC is, APNIC is the Asia-Pacific Network Information Center, and we allocate the IP addresses and ASN numbers that all network operators require to connect their customers to the Internet, and we cover all the Asia-Pacific region with a big focus on developing capacity, both human and infrastructure, and produce insightful research and actively participate in multi-stakeholder model of Internet cooperation and governance, which gathered us here today at the Internet Governance Forum in Kyoto. The APNIC Foundation, the map that you can see in front of you, are showing only the projects and initiatives that were supported just last year. The map for the years of operation of the foundation was established in 2016. It’s a little bit bigger to fit in one screen, so you can scan the QR code to have a look at our last year annual report. The mission of the foundation is to increase investment in this area and to support dialogue and collaboration that leads to the development of these projects, like the ones that you are going to learn about today. As mentioned in the video, the foundation has three programs, infrastructure, inclusion, and knowledge, and all our funding is allocated around those three, which includes grants and awards from ECF Asia and other funding mechanisms that the foundation has, with a big focus on building capacity, both human and operational, for a global, open, affordable, accessible, stable, and secure Internet. We target most of our funding and our support to network engineers, cybersecurity professionals, and Internet governance specialists, as we understand that the needs of the people that build the Internet are not very well addressed. A lot of the funding that exists goes into projects that are more focused on end users, so the role of the foundation is to support those that build the Internet and maintain it and make it what it is today. I’m not going to repeat what we saw in the video about what the infrastructure, inclusion, and knowledge programs cover, but the photos that you saw on the screen and some of the information in the video are all about projects that we have supported in our years of operation, and we encourage you to take advantage of the reports that we normally publish on our website to see what resources are available. In terms of other areas of investment from the foundation, you can see on the screen the projects that the foundation is currently investing on. They are all ranging from technical training and capacity building in different modalities, some with a stronger emphasis on, for example, gender and diversity, others with a stronger emphasis on new or students that are just graduating from engineering that are looking at how can we engage them in the future development of the Internet, like the School on Internet Asia in their API project, and you also can see a couple of our research projects that are research on Internet measurement and also on cybersecurity. Those projects are all the same as with the three programs that I mentioned before. They are all aligned with the programs of the foundation and all looking at the support for the network engineers, cybersecurity professionals, and Internet governance specialists that make the Internet work. The foundation has three main public or community funding tools or mechanisms to provide support. ECF Asia is the one that gathers us here today, but we also have the foundation community assistance and the trust discretionary funding that allows organizations that are working in Asia-Pacific or globally to be able to receive much-needed support for really core operations that they are doing. So in the photo, for example, on the right hand of my screen on the trust discretionary fund square is Shadow Server that allows information that are produced by people that are using different cybersecurity mechanisms like honey pots and honey nets to share threat analysis at a global level, and that dashboard allows for organizations to learn about those cybersecurity threats. The photo in the middle is about training provided that has allowed organizations in the Pacific to continue the support for computer emergency response teams. And the last photo on ECF Asia is from one of the deployments in the Solomon Islands. So ECF Asia was established in 2008. So far we have allocated $9.4 million to 145 projects and 33 awards, covering 32 of the economies that APNIC service region. The technical reports from all of these organizations are published on a creative commons license that allows, we only publish the final report, but that allows organizations that are looking into replicating some of the issues that they are targeting to be able to find some of the information and the lessons learned that these organizations have discovered in the process. These reports are very raw, are very, is the lessons learned, is their first goal of what they learn and what they share is not academic papers, they are not trying to impress anyone, it’s just about sharing really what happened and encourage dialogue and participation. And we really encourage you to have a look at those reports because I think that’s one of the main differences between ECF and any other grants program in the region or globally. The majority of grants programs will never disclose the reports that guarantees provide to them and that is a valuable source of information for the community. ECF was awarded as an ECF champion back in 2018 and 2019 and so far we have received thousands of proposals. So we, although you know those numbers might be big in terms of you know almost 10 million dollars over 15 years, the needs of researchers and practitioners in the region are way bigger than that. So we are always looking for contributions and support from well-minded organizations, partners and donors that are willing to participate in our work. We are aligned with mostly SDG 9 and SDG 17, SDG 9 on innovation and internet infrastructure development and SDG 17 as we are partners for the goals. But a lot of the individual projects are aligned with different SDGs and in our maps, in our website, you will be able to identify which SDGs our projects or the projects that we have supported are aligned with. At the moment for this year we had 23 selection committee members that were actively serving in five selection committees. They were all well-recognized experts in the region. We received 135 applications this year, a 12% increase from last year across the different categories as you can see on the read on the screen. And at the moment we are tracking 68 active projects between the last three years of operation as we have projects that expand over 18 months implementation periods. So there is some that the final projects reports are not yet published but they will be at some point in the future and we encourage you to find them in our new website that was very recently launched. These are all our social media handlers and we really hope that you can follow us, especially the one for LinkedIn and YouTube as we are hoping to get our vanity links. So if we get more people to subscribe we get closer to that number. So please if you have a chance to have a look at more of our work we really welcome your input and your support to the work that the foundation does and of course to the growth of the funding mechanisms that we have available. We are just an email away and I will get back to Alicia so that we can continue with the most important part which is acknowledging the outstanding contributions of these remarkable people we have here today. Thank you Alicia.

Ellisha Heppner:
Thank you Sylvia. So now what we’re going to do is look to celebrate the success and award our nominees. We will look to play a short video and then I’ll ask to come up and present award face the front to our beautiful online audience and just get a quick snapshot before sitting down and I’ll introduce the next. So first awardee is the Lahore University of Management and Sciences or LUMS and the project was led by Zatash Uzmai. They are receiving the award for their work on software defined internet exchange points and we have a short video to show on the project. Could we play the project?

University of Management Sciences or LUMS:
The ISF-Asia 2023 awards include five thousand dollars for research costs and a travel grant to the internet governance forum in Kyoto, Japan. A winner of the ISF-Asia awards 2023 is the Lahore University of Management Sciences LUMS for their work on software defined internet exchange points IXPs. Wanting to make software defined networking SDN more accessible for smaller IXPs in emerging economies, the LUMS team developed a method to conveniently retrofit IXPs with open source SDN applications. Led by Zatash Abzal-Uzmi, the team was able to retrofit an IXP in a lab setting intended for deployment at a local IXP in the capital city of Islamabad, using their own prototype software package which can help bring down operating costs via automation. What has happened since the start of the project is that we have been able to successfully deploy internet exchange points in Karachi as well as in Lahore. So now there are three internet exchange points in Pakistan. Many service providers in each of these three cities are bringing in their optical fiber cables to the internet exchange points in the respective city and they are exchanging traffic with each other. There is still a big challenge, so the physical connectivity is there. The big challenge which still remains is convincing these service providers to actually exchange their traffic through this internet exchange point. We try to convince them, you know, this will save a lot of money for you which you can use to offer additional services and bring the state of the internet in the country to a higher level. So that’s That’s something that we are hoping to do in the coming months. We congratulate Sartaj Avzal-Uzmi and the team at GLAMRS, and we trust that this award will help them on their journey towards supporting their community through innovative uses of internet-based technologies.

Ellisha Heppner:
Thank you. Sartaj, I was wondering if you could stand up, and I will have the APNIC Director-General, Paul Wilson, here today, and we’d like to invite him out the front to present the award to Sartaj. Paul, could you just make your way to the front, we’d like it, keep going through. We have our online community that would love to see your beautiful faces and present the award to Sartaj. Thank you so much. Thank you so much. Thank you both. Thank you. The awkwardness of this. It is that moment. Our second awardee is from Myanmar International Exchange, and the project lead is Dae Min Kain. They are receiving the award for their work established in Myanmar’s first IXPs. We have another short video to introduce the project.

Myanmar Internet Exchange:
The ISF-Asia 2023 awards include $5,000 for research costs and a travel grant to the Internet Governance Forum in Kyoto, Japan. A winner of the ISF-Asia Awards 2023 is MNIX, Myanmar Internet Exchange, for their work developing and operating Myanmar’s first internet exchange point, IXP. As a non-for-profit, community-led exchange, it is carrier and data neutral, providing IP peering facilities for its members. Since the start of operations in 2017, MNIX has grown to two IXPs and three points of presence, POPs, with 26 peer ASNs, and plans to extend their network reach to a data center. There is no rules and regulations when we set up this IXP. We set up this IXP by ourselves, and we reported to the ministry regularly. Later, ministry allowed us to operate officially. The biggest challenge is the co-operation between local ISPs and contemporary providers. Many engineers are leaving country for their future career, so we have to create local stuff by ourselves. We could set up RPKI system very early in this region. We regularly train the IXP members. We share our knowledge and experience. We will set up another IXP in another city, and we will also set up small POPs in other cities as well. We congratulate Thien Nguyen Kim and the team at MNIX, and we trust that this award will help them on their journey towards supporting their community through innovative uses of internet-based technologies.

Ellisha Heppner:
Wonderful, thank you. To present the award, I’d like to welcome Sylvia back to the front of the stage so to speak, and Ms Kyne here to present the award. Thank you. APPLAUSE Hopefully everyone got time for photos, otherwise we can do that afterwards. And the final awardee is the University of Malaya, Malaysia, and the project led by Dr Teck Chaw Ling for their work on the design, development and operation of an SDN-based internet exchange playground for networkers. We have the last video to show you about the project.

University of Malaya:
The ISF-Asia 2023 awards include $5,000 for research costs and a travel grant to the Internet Governance Forum in Kyoto, Japan. A winner of the ISF-Asia Awards 2023 is University of Malaya, Malaysia, for their work on the design, development and operation of an SDN-based internet exchange playground for networkers. A valuable simulator that can help train technical operators and strengthen routing security of IXPs. To foster participation, there was online training, tutorials and seminars, particularly focused on engaging women in the field. We want this playground to simulate and to work like an internet exchange point. Under this internet exchange point, we actually also introduce the RPKI in the BGP into these environments. So the student actually can learn so-called the security of RPKI and the BGP. This will actually help to reduce a lot of fakes or routes inside our environments. We are hoping to see that in the future, we can actually get more collaborators to join in and become a node that is connecting to us. And because our environments are more towards a distributed environment, so we are hoping to see that more countries or more collaborators can join us. And from there, they can also utilise it and then to train more networkers in the future. We congratulate Dr. Ling Tak Chow and the team at University of Malaya, and we trust that this award will help them on their journey towards supporting their community through innovative uses of internet-based technologies.

Ellisha Heppner:
Thank you. Dr. Ling up the front. And to present the award, I’d like to welcome Jun Murai, who in addition to being the board of the foundation, is very well known here and even being called the father of the internet in Japan. So he’s the president of the Wide Research Institute and the dean of the Graduate School of Media and Governance at Keio University. Thank you for those photo opportunities and well received for the beautiful work that you guys have been doing. Before we go into a couple of question times for our awardees, I’d like to just hand it over to Silvia.

ISIF Asia:
We normally have a very distinguished guest that likes to join us today. He’s been served and he apologized earlier this morning that he was not able to join and he sent me some remarks to read on his behalf. So dear Silvia, the APNIC Foundation has been a key promoter of internet innovation in Asia Pacific and beyond for many years. It has been my privilege to participate in this work from time to time and to acknowledge how important it is that newcomers to the internet, entrepreneurs and innovators are recognized for their efforts. I regret that another event required my attention during this session, but it does not dampen my enthusiasm for the APNIC Foundation’s continued efforts to expand and improve internet access and use. Those who are sponsored by and honored by APNIC are benefiting people everywhere. Please keep up with this good work, being served chair of the IGF Leadership Panel.

Ellisha Heppner:
Thank you very much. Thank you, Silvia. So I’d just like to take the next about 20 minutes, 15, 20 minutes, just to ask our awardees some questions about the work that they’re doing in their economies. So my first question for Ms. Kine, as a practitioner and an implementer developing IXPs in Myanmar, what will be the main challenges for engaging network operators in the country at the IXP from a multi-stakeholder approach? What can the region and international community do to support your work?

Myanmar Internet Exchange:
Yes, for set up IXP negotiations are the most difficult parts. So especially negotiation with the network operators, big network operators, mobile operators, because they are big and they do not have so much interest in IXP. So for the community, we need to find out what kind of interest they may have connecting to the IXP. So we need more content connecting to the IXP. So also, they should have awareness, mutual connection, each other will be better, staying alone themselves and going outside traffic or do the overseas so we can reduce more latency. So more and more content arrived to the IXP, they were also interested to connect to us. So community should support, especially content providers. Thank you.

Ellisha Heppner:
Thank you. This question is for Dr. Ling. In your view, what will be required to continue to build capacity and confidence within your young engineers interested in internet network operations and management? And what are the future areas related to knowledge development?

University of Malaya:
Thanks for the questions. Whenever we do any teaching and so on, I like to emphasize on the word easy access. But in reality, easy access is not easy. For most of us, you don’t feel that, but actually if you go to least developed country or still developing country, you will start to feel this thing. So what we are trying to do is to have an environment for easy access so that the young networker can actually got the opportunity to actually use the environment. That’s number one. Number two is we want the environment to be as similar as possible to the real environments. So even during one of our training, when we start to pump in the internet routes into our environments, everybody’s machine hang. So in our normal learning environments, you can’t encounter these kind of things. When you learn, they will ask you, set up to BGP, exchange. Thank you very much. You get my route. I get your route. Thank you very much. Correct? Correct. And in reality also, you are configuring your own environment ASN and the other guy is configuring the other side. And you must make sure that they are actually talking to each other. And unwanted route should not be coming in. So these are all the things that we slowly want to develop into the environment so that it will actually work as close to the real environment as possible. So of course, as I mentioned just now in the video, we have POP in many countries. This is because in our last project, another project sponsored by Asia Connect, we managed to get funding so that we can put our machines over there. And we use the RAN, Research and Education Network, to actually run through the SDN and also allow BGP routers to be actually hosted. And the user can eventually set up their own path in between all the routers. So these are the things that we are hoping that in the near future, there are other country can join us and then we have more POP and more people can actually benefit there. So what are the things that we want to look into it? We are hoping that we can look into AI-assisted IXP environments and also more security onto the internet exchange. So that’s what we are looking forward to. Thank you very much.

Ellisha Heppner:
Thank you. My last question is for Mr. Zatash. What are the challenges that you face as a researcher to bring your proposed solution and research outcomes to practice in Pakistan? Are any of those challenges common to other parts of the APAC region?

University of Management Sciences or LUMS:
Thank you, Alicia, for the question. I would like to list some of the challenges starting from identification of the problem. As a researcher, I was looking at the state of the internet in Pakistan and the apparent gap of the absence of internet exchange points in Pakistan led to the identification of this gap and identification of this research problem. The next challenge was to put together a team to solve this problem and secure funding for solving this problem, and I would like to thank ICF Asia and APNIC for providing the funding for this project. I work at a university, so I had easy access to the talent, and I’m thankful to the colleagues and the students who have worked on this project. The next challenge was going out of research and actually deploying the system in practice. For that, as a university professor, I would not have been able to do it on myself if it were not for several government organizations who have provided support. So one of the big challenges was to identify the locations where we could host the internet exchange points and the Higher Education Commission of Pakistan, which is a government body, Pakistan Telecommunication Authority has been throughout with us for identification of the locations, and then a Punjab Information Technology Board, which is also a government body, they allowed us to host the internet exchange point at their location, and these locations serve as the neutral locations, which is an essential part of deployment of the internet exchange points. The next step was to ask the service providers to bring in their optical fibers to the internet exchange points, and in that also the telecom regulator. Pakistan Telecom Authority played a key role in convincing the service providers, small and large service providers, to bring in their optical fibers to the Internet exchange points in all the three cities. So that challenge was also solved. The next challenge, which is yet to be solved, is to make sure that the Internet exchange points are fully utilized. We still do not see a lot of traffic through these Internet exchange points, and it will require, you know, more effort convincing the Internet service providers to actually exchange the traffic. And one of the reasons that we have identified is the lack of CDNs and content hosting in Pakistan. We are making an effort, Pakistan Telecom Authority is at the forefront of this effort, and we are hoping that some of these large content providers, CDNs, would be able to deploy their presence in Pakistan at the Internet exchange points, which will incentivize these smaller service providers to actually make use of the IXPs that we have deployed. So these are some of the challenges that we have faced, some solved, and some are yet to be solved. Thank you.

Ellisha Heppner:
Thank you very much, Zartash. We’ve got a couple of minutes before I ask the three awardees for closing remarks. Is there any questions from the audience? Yes, please.

Audience:
Okay, thank you. My name is Vakas. I work for PTA, and thank you, Dr. Zartash, for mentioning PTA being one of the partners in the IXP. My question is actually to the APNIC Foundation. So, you see, these are technical projects for you to improve the Internet efficiency and performance and to reduce the latency and all. In terms of technical impact, these projects are huge, but at the same time, I also believe that the economic impact of these projects is also very valuable data to have. And why I mention this is because you mentioned $9.4 million or something, right? But in terms of impact, this number would be much higher with these projects and all. Probably we also need these numbers to address one of the challenges that Dr. Zartash has mentioned, which is about convincing the governments or to the CDNs and all to come and be deployed in Pakistan. And with my experience, I’ve seen that government understands numbers way more than just the objectives of the project or anything. So is there any future plans, or is there any data or any research that can prove the economic impact of these projects, which we can then use to sort of build a case for more IXPs or for more similar projects like this in Pakistan? Thank you.

ISIF Asia:
Thank you, Wakas, for the question. Well, I have to say that from the foundation side, we’ve been working on monitoring evaluation framework to try to understand the impact of the work of the foundation in a better way. And then in that field, there is something called attribution and another element called contribution. So even though $9.4 million sounds like a lot of money over 15 years, small projects like the ones that we have funded in the past, it takes three to five, sometimes longer, to actually reap the fruits of their labor. I think Professor Zartash can share the horror stories of the beginning when he was trying to just open the dialogue for that to happen in Pakistan, and all the 145 grant recipients can also share many of those stories. The part that I would like to highlight is that the funding that this program facilitates and the funding that the foundation facilitates builds community. So in the end, we are also investing in people, and we are also investing in their minds, in these wonderful minds that are here. The number of dollar signs that are behind the work of Dr. Zartash that we were able to provide are very small compared to the support that he gets from the university, the support that he gets from you and the VTA and other people in Pakistan. But the part that would be really interesting to see, as you very rightly say so, is how the foundation and other donors in this space, how can we aggregate our contributions into something that shows how we are really working for the Internet we want, for the Internet we need, for the Internet we want to preserve. But again, it’s around attribution and contribution, to wrap up what I was saying. It’s very difficult for an organization like us to say that we have done this or say that this is our impact. That is a very personal view. We have contributed to it, but it cannot be attributed only to us. And it’s very important that we highlight that this is a healthy ecosystem of organizations that are committed to work in this space, and that in the next few days we have a call for a meet and greet for donors in the Internet development space, exactly because there are a bunch of organizations that are working at a national, regional and global level contributing to this and trying to figure out how we express our impact collectively is something that we are all grappling with. There is only a couple of results frameworks that are associated with Internet adoption. One is the UNESCO indicators for Internet universality, the ROM-X, which are like a hundred and something indicators that are really hard to be able to monitor. But the more organizations and the more projects, even at a smaller scale, start measuring against indicators like that, then the easier it is for all of us to look at not only what we have achieved, but what’s next, what’s missing, what are the gaps, and how can that small funding that we have available can be of use for that particular community. There are projects or initiatives like the Partners to Connect at ITU that are simplifying a lot of those indicators. The same in a similar fashion to try to get people that are investing in this space to talk to each other and to see, okay, what are your priorities and how that is progressing. Very difficult to do when there are conflicting funding agendas also. So giving space for practitioners in the field like Kain in Myanmar and for researchers and educators like Tartaj and Professor Link is super important because they are just, it is all come together. It’s a multi-stakeholder approach to advance IXPs in the region, and I hope these examples are illustrative and support IXP development also, knowing that we have representatives here from Latin America and from Africa in the meeting, not in this room, just seeing how these lessons learned and how this information can more accurately share on the building of IXPs in the region. But thank you very much for your question. I hope it’s a long answer, but it is a complicated process. The Internet is very new to be able to have that all mapped out, but we are working on it. Thanks.

Ellisha Heppner:
Thank you, Silvia. Is there any last questions before I hand it over for closing remarks? So I’m just going to ask then in the last couple of minutes that we’ve got for just our awardees perhaps to just reflect and just give two minutes on what’s next. You’re at the IGF, there’s a platform for you. What does IXPs mean for you and what’s next for your economy? Dr. Sathesh, would you like to start?

University of Management Sciences or LUMS:
I think we are talking about the affordability and pervasiveness of the Internet for masses. So we solve some of the technical problems, but there are other sort of issues that also require some attention. One of the things that I would like to mention, which is related to Internet affordability and broader access, is international connectivity. I will specifically take the example of Pakistan, which is like a big country, the fifth largest country in the world. The connectivity of the country to the international routes is only through the southern part of the country, which is under sea cables, not connected to any of the neighboring countries, so not exchanging traffic there, which brings in a lot of inefficiencies and the access becomes a lot expensive for the ordinary users. And this is where the geopolitical scenarios come in the way, and I think there has to be some effort, probably other people who specialize in that area, to make sure that geopolitical situations are neutralized in order to bring what was probably envisioned as the broader Internet, everyone is connected to everyone without any geopolitical situation. We can reach there one day. Thank you.

Ellisha Heppner:
We’ll hand that over now to Ms. Cullen.

Myanmar Internet Exchange:
For MMIX, we set up the first IXP in Yangon, and recently we set up another IXP in Mandalay. Relating to the content, without content, no ISP would like to connect to our exchange. Also, content provider is also the same. Without network operators, they don’t like to connect, like a chicken and egg. So we are approaching to the CDM provider, and we can provide some traffic to the ISP, so we are running this first IXP. For the second IXP, at first, when we set up, there is no content. We have to adjust this problem using the technical. We are carrying traffic from Yangon to Mandalay, so we are providing some traffic, all the traffic from Yangon to Mandalay, and later we requested CDN, so when arrive the new CDN, we can provide traffic locally. So Myanmar has three biggest cities, Yangon, Mandalay, and Naypyidaw. Naypyidaw, we already reached our service, but now Naypyidaw, most of the network are government network, and government network is still not connecting to MMIX. Now all the connection are private setters also. We are also targeting another city. We are targeting many ISP, especially for the small and medium. Big ISP, they are not interested to connect IXP. So they have their own transmission, their own international link, so without forcing or without the interest to connect MMIX, especially for the content, they will not connect to us. So we are targeting for the small and medium ISP, we will set up another for that location if there is a demand. We also consider not only the same city, but also some parts of the Myanmar areas, even they have only one and two ISP, we are negotiating with the transmission provider, we will carry remote traffic and connect to the Yangon and Mandalay IXP. So we are planning like that. Thank you.

Ellisha Heppner:
Thank you, that sounds really promising. And Dr. Ling, just last closing remarks from you and your reflections.

University of Malaya:
I always believe in how impactful a project will be than how many people actually you publish. So for us, we got a grant from Asia Connect, we set up all the infrastructures, and we use this grant to do all the training, and we are hoping that we can actually enhance the playground, put in more features, and later on we will do more trainings for the young networkers and so on. So I would also like to take this opportunity to thank ISIF for giving us the grant, and also my university for providing us the environment, and also my collaborator, Dr. Chua Pangwei, Dr. Aris Redianto, and also my project admin, Satish Kumar, for their help in actually putting up the whole things. So thank you very much.

Ellisha Heppner:
Thank you. Well thank you everyone for joining us online and in the room, and I’d really like to especially thank the Asia Pacific Internet Development Trust and APNIC for your support. And for your support, we have cookies, I hope everyone has also collected their cookies as enticement, but I also want to recognize and thank our awardees who have traveled quite far to be here and showcase the work that they’re doing in their economies. So I appreciate your time today, thank you. Thank you. That concludes the proceedings, and for the awardees we might have a few photos with the extra minutes we’ve got. Thank you.

Audience

Speech speed

168 words per minute

Speech length

244 words

Speech time

87 secs

Ellisha Heppner

Speech speed

140 words per minute

Speech length

1044 words

Speech time

446 secs

ISIF Asia

Speech speed

149 words per minute

Speech length

2751 words

Speech time

1111 secs

Myanmar Internet Exchange

Speech speed

138 words per minute

Speech length

732 words

Speech time

319 secs

University of Malaya

Speech speed

143 words per minute

Speech length

848 words

Speech time

356 secs

University of Management Sciences or LUMS

Speech speed

146 words per minute

Speech length

1064 words

Speech time

438 secs

Newcomers Session | IGF 2023

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Anja Gengo

The Internet Governance Forum (IGF) is not just an annual meeting but a continuous process that promotes a multistakeholder model and facilitates discussions on various internet governance issues. It serves as a platform for different stakeholders, including governments, civil society, the private sector, and the technical community, to engage in dialogue and exchange ideas.

The IGF has been organised by various member states, including the current host, Japan. Its main objective is to provide an open, inclusive, and transparent space for all stakeholders to address the challenges and opportunities presented by the internet. By adopting a multistakeholder approach, the IGF ensures that decisions about internet governance are not solely left to governments but involve all relevant actors.

The IGF Secretariat, based in Geneva, Switzerland, plays a crucial role in supporting the IGF process. It operates in a neutral manner to facilitate discussions and help coordinate the activities of the forum. The Secretariat is keen on receiving feedback from participants to continuously improve the process and address any concerns or suggestions they may have.

The IGF Leadership Panel was appointed following the Secretary General’s High-Level Panel on Digital Cooperation. They recognise that digital technologies are rapidly developing, and mechanisms for governing those technologies should keep pace. The Panel emphasises the need for the IGF to advance its modalities and ensure that it remains relevant in the ever-changing digital landscape.

In addition to its role in facilitating discussions, the IGF contributes to capacity development and sustainability through various initiatives. One such initiative is the Youth track, which works with young people from different regions for capacity building in the area of internet governance. Another initiative is the Parliamentary track, which engages legislators in discussions on internet governance and helps them develop policies that align with the goals of the 2030 Agenda for Sustainable Development.

In conclusion, the Internet Governance Forum is a dynamic and inclusive process that goes beyond its annual meeting. It promotes a multistakeholder approach to internet governance, with the aim of addressing the challenges and opportunities brought about by digital technologies. Through the support of the IGF Secretariat, the collaboration of stakeholders, and the implementation of capacity-building initiatives, the IGF contributes to the development of sustainable and inclusive governance frameworks for the internet.

Session transcript

Anja Gengo:
Ladies and gentlemen, good morning. I hope you can hear me well. So, to everyone who has joined us online from the different parts of the world, for the majority of the world, it is very late or very early, so we thank you for the great effort you are making. Good. Those of you who are here are the ones who are participating for the first time in person. I hope we can have a nice and friendly conversation about what the IGF is, what it means, how to participate. And well, we have four days ahead of us, and well, we can participate and collaborate in these four days, but we are also going to talk about how to continue collaborating between the sessions. I am Anja Gengo, I work at the IGF Secretariat. The Secretariat is an office based in the United Nations in Geneva, Switzerland. Its main task is to support the process in a neutral way. The Secretariat has been in operation since the beginning of the IGF. The person in charge of our office, unfortunately, has not been able to be here with us due to some changes at the last minute, but surely you already know him, all of you who have been here yesterday, and you will see him later, especially at the opening ceremony. Do not hesitate to contact me or others. How was all this started, and as I said, what are the ways for long-term engagement? I will guide you through this history of almost two decades long through a couple of slides, but I hope that most of the time of this morning’s session can be reserved for a dialogue with you. The Secretariat is very interested to learn about your feedback on the current process, the way, for example, you’ve heard about the IGF, reasons to be here, and of course your expectations from the forum. This is always very valuable for us to improve the process for the time to come. Now, to go to a little bit of a history of the IGF, as you can imagine, the concept of the United Nations traditionally is multilateral, so it’s first of all member-state-centered and people-centered process. In early 2000s, the concept of multi-stakeholder model was, I think we have some interference probably from Zoom, so I’ll ask our technicians to mute the online participants. We’ll certainly have, as I said, time to give floor also to online participants, and I hope that you can give me a couple of minutes to just introduce the topic, and then we’ll give you the floor. Thank you. As I said, in a traditionally multilateral intergovernmental process, introducing the concept of multi-stakeholder model was something that I’m sure you can imagine was exotic at the time, and as the Internet was on the rise in early 2000s, sort of the late 90s, and was becoming more and more part of people’s daily life, the community, not just the member states, but the community, different stakeholder groups, called for a process to govern the Internet while at the same time keeping it accessible, affordable, safe, secure, of course human rights-centered, and the Internet is one, which is very important, so to avoid any fragmentation. So in early 2000s, because of these calls, the Working Group on Internet Governance was formed, and the Working Group was formed of different stakeholders coming from different backgrounds. Some of them you can actually meet here at the IGF. I think they are really valuable resources of information, and if you go to WGIC website or just to Wikipedia, you can check the names of those members and maybe approach them during this meeting to just get to know each other. But very long story short, the WGIC did come up with a working definition of Internet governance, and I hope you can see it on this slide, saying that Internet governance is the development and application by governments, the private sector, and civil society in their respective rules of shared principles, norms, rules, decision-making procedures, and programs to shape the evolution and use of the Internet. This definition that is older than the IGF itself is the definition that is still in use today, and I’m sure from your experience as well, just as mere end users, first of all, you can also tell that it’s very much relevant to today’s digital public policy processes. Going further, within the World Summit on the Information Society of the United Nations, there were calls by different stakeholders, of course, including the member states, to establish a forum that will be inclusive, that will be multi-stakeholder, and that will enable everyone to get together and discuss issues that pertain to Internet governance. Through two phases, which are most important, happening in 2003 and 2005 in Tunisia and in Switzerland, in Geneva, finally the IGF was convened. The Tunis Agenda for the Information Society, specifically its paragraph 72, is what gave life to the IGF. It set its mandate. The convening of the IGF, formally speaking, happened in early 2006 by, at that time, serving Secretary General of the United Nations, Mr. Kofi Annan, and the very first annual meeting took place in late October, early November of 2006, in Athens, hosted by the government of Greece. Now, the rest is, of course, history. Today, we are sitting at the venue that is hosting the 18th annual IGF meeting and its edition. These five days of the annual meetings are far from being just organized by an event organizer. It’s a part of a process, and it’s organized by its host country, the government of Japan for this year, and also by various modalities within the structure of the IGF. The heart of those modalities is shown on this slide. I hope you can see it. First and foremost, the IGF Multistakeholder Advisory Group, or the MAG. The MAG is a multistakeholder body composed of 40 members coming from different stakeholder groups, different regional groups, with gender parity across the membership. It is chaired by a chair that’s elected through the membership and endorsed as such. The group is appointed annually by the Secretary General of the United Nations, and its core mandate, by terms of reference, is that it serves to advise the Secretary General on the program, on the agenda of the annual IGF meeting. Currently, the MAG is chaired by Mr. Paul Mitchell. That is the first chair coming from the private sector. This year’s meeting is particularly important with respect to the Multistakeholder Advisory Group composition, just because probably during this week, if not even today, the community will be informed about the renewed membership of the Multistakeholder Advisory Group, and not just that, also by its new chair. So we will have a rotation of the chair as well. So please stay tuned. The information will be at the IGF website, and I’m sure it will be announced also during the IGF meeting at appropriate places and sessions. The MAG is renewed, as I said, by approximately one-third of its total membership every year. So today, or in this week, we will learn who are the new 11 incoming MAG members, from which countries they’re coming, what are their backgrounds. So it will be very interesting to see how the composition will be refreshed in that sense. If you are interested to be part of the MAG, or to contribute, then the call for nominations usually opens during the first half of the year, for a couple of weeks. And any stakeholder, individual or organization, is most welcome to nominate eligible nominees that are then considered for possible appointment to the membership group for one term, subject to extension for up to three terms. As of last year, the structure of the IGF has been advanced and reformed to an extent. So today we speak also about the IGF Leadership Panel. The Leadership Panel was appointed last year by the Secretary General, following a process that came out of the Secretary General’s High-Level Panel on Digital Cooperation and Roadmap for Digital Cooperation, calling for the IGF to advance its modalities, given the fact that, as you can all witness, of rapid development of digital technologies, and it is on us to ensure that the mechanisms for governing those technologies are keeping pace with that development. So the Leadership Panel is a high-level multi-stakeholder body, composed of in total 15 members. Among the 15 members, as an ex officio members, are, for example, the MAG Chair, the Secretary General’s Envoy on Technology, but also the host countries. So, for example, the current host country holds a seat, as well as the future host country and the past host country. So we have that three-partite arrangement through the Leadership Panel, which allows us to bridge the process from last year to current year and then to future year. And with that, keep the continuity of the discussions and the process. Just yesterday, I think it was the last session hosted in this room, so if you were here, you had a pleasure to meet most of the members of the Leadership Panel and to hear from them. There will be other opportunities during this week, plenary open sessions, and that’s a good opportunity to listen to what the Leadership Panel has in plan for advancing the IGF, its modalities, for making it more impactful, more visible globally speaking, and for helping us to engage those that are not currently engaged and ensure that we are leaving no one behind. The profiles of the Leadership Panel members are visible, hopefully, to you on this slide. You can see that it’s very diversified. The chair of the Leadership Panel is Mr. Vint Cerf, well-known father of the Internet to all of us, and his vice chair is Ms. Maria Ressa, the Nobel Prize winner, and I’m sure also a person that’s well-known to all of you. And then finally, you can see that part of the working mechanisms of the IGF, as I said at the beginning, is the office where I work. For example, the IGF Secretariat, this is the entrance at the Palais des Nations in Geneva, where we are based, and the role of the, as I said, the Secretariat is to ensure that all these mechanisms do work within the framework of the IGF principles and procedures. Now, what are the IGF principles? The IGF is an open, inclusive, bottom-up, transparent, non-commercial, multistakeholder process that runs throughout the year. Its funding is extra budgetary, so in other words, it doesn’t have regular financing channels, but it depends on support from various donors, whether it’s financial or in-kind. The IGF is very transparent when it comes about also its financing, the way it functions, so if you visit the IGF website, you will see who are the donors to the IGF’s trust fund, who are also the in-kind donors and supporters. Just in case, if you would have questions later, I can tell you that among the biggest donors, of course, are certain governments and also the technical community, then the private sector, but there are also those that come from a completely non-commercial domain that can be nested under the civil society. So it’s a very interesting composition of the supporters of the IGF, and we are very grateful to all those friends who are making sure that the IGF functions for almost the past two decades. I mentioned to you at the beginning that the IGF is a process, so not just the annual meeting, and that process, of course, includes a couple of components, but two are major, which I think would be valuable for you to memorize. One is called the intersessional work. Everything that’s happening between the two annual meetings is called the intersessional work. It’s a community-centered, community-driven work, and I will be speaking about its concrete form in just a couple of minutes. And then another integral part, very important, of that process is, of course, what’s happening today and what’s going to happen this week here in Kyoto at this venue, the IGF annual meeting. Different member states have, different governments have hosted the IGF so far, and the 18th annual IGF meeting, as you can see, is hosted by the government of Japan. For the next year, we will formally announce the host very soon, so please do stay tuned. In this room, we will learn where the IGF will be going next year in 2024. But on this slide, you can see where we were in the past 17 years so far. It’s great to be back in the Asia and Pacific region, as you can see, after a long period since we met, I think, in Bali, that was the closest to this region. This is just to illustrate quickly the dynamic atmosphere at every IGF, but I’m sure that especially those of you who attended the wonderful gala night just last night already felt that dynamics and just the energy that is produced by so many people gathering at one place who really care about the Internet and who are strong and passionate believers that the Internet, its associated tools and services, can really transform this world and bring better life to all people. This annual meeting, of course, is not just about discussions. Of course, the IGF is not a decision-making forum, but that doesn’t mean that it doesn’t produce concrete outcomes and outputs. I’m sure from your experience you would agree one of probably the greatest value and benefit individually and also for organizations participating at the IGF in person here at the annual meeting is the fact that you can network and exchange good practices, maybe not so good practices, but learn from those practices and ensure that going back to your respective communities you can make a change and make an improvement. There are also tangible outputs, so toward the end of this meeting you will be able to consult at the IGF website what we call the IGF messages. Those are the messages, action-oriented, and the tangible outputs that emerge from the reports of the session organizers. In other words, more than 300 sessions that feature this year’s program of the 18th annual IGF meeting will result in concrete messages that are developed around the main sub-teams of the IGF. The main sub-teams, I’m sure that by now you all know them by heart. The Internet we want empowering all people is the overarching theme of this year’s IGF. Under the overarching theme we have eight sub-teams, which you can see are very diverse. We’re discussing matters related to connectivity and access to human rights online, artificial intelligence, other emerging technologies, but also matters related to, for example, digital governance, to sustainability and environment, safety and security, data governance, and so on. So there’s plenty to choose from. I know it can be also overwhelming when you look at this very robust and rich agenda, but it is only reflective of the world that we are living in now, and that is that with respect to online environment, different communities have different issues, and a global forum needs to be inclusive of all those. And I hope that your inputs coming from your respective communities will help us to understand better those local specificities and ensure that this global community then is informed and can act upon that information. Yes, this year’s forum for now marked record number of registered participants. We are now close to having 9,000 participants who have registered to participate in the IGF. Of course, the largest number of them over, I think, 75% is in-person participation, and the rest is online participation. In terms of the participation and the backgrounds of the registered participants, it is really diversified, and we have stakeholders coming from all stakeholder groups, different disciplines, so representatives coming from the government, international and intergovernmental organizations, civil society, including the academia, private sector, technical community, and other related industries and disciplines. Now to move to this first component that I mentioned of the IGF process, which is called the IGF intersessional work. So I want to just concretely say what does that mean, and especially what are the ways of engagement, what’s the value of being engaged in that type of a work, and what you need to do if you’re interested in any of these topics. So the intersessional work, the work that’s happening in between the two annual meetings of the IGF, whose results are then discussed at the annual meeting, takes different forms. We have, for example, the best practice forums and the policy networks. Both are multi-stakeholder-driven community networks focused on particular issues, through which stakeholders work together to unpack mapped issues and to look at good practices, maybe not so good practices, and while not issuing concrete recommendations, we are very much focused on the intersessional work on good actions that can be taken to bring progress on recognized issues. So for example, for this year, the best practice forum on cyber security looks at cyber security related agreements and norms at national and international levels, trying to identify where are the gaps, and I think in this week the BPF on cyber security has a dedicated session, so you can certainly visit that session to understand what has that work resulted so far in. But the way the best practice forum, for example, functions throughout the year is that its modus operandi is its public mailing list. Everyone is most welcome to join the public mailing list. From the MAG, from the Multi-Stakeholder Advisory Group, usually a couple of MAG members act as co-facilitators. The IGF Secretariat holds a PAN as a neutral editor, and all together we work with community stakeholders from around the world to discuss the issues. We usually meet at least once monthly, and of course we meet at the on-site meeting once annually speaking. Just like best practice forums, the policy networks are very similar in terms of the working modalities. The only difference is the scope. While the best practice forums look good practices, best practices, the policy networks have a much broader scope. They look at what are the issues, what’s the status quo, what could be done to change it, how could that be done, who could do good actions to resolve certain issues. And for this year, the MAG decided that we have three policy networks that are focused on meaningful access, on Internet fragmentation, and on artificial intelligence. You are most welcome to subscribe to the mailing lists and to join these networks at any point in time. The PNs, the policy networks, they also have dedicated multi-stakeholder working group of experts, so they are very much of help to drive the work toward the right direction and to engage other stakeholders from the world in order to ensure that we have an inclusive process reflective of all issues globally that exist. Now I mentioned to you that the BPFs and PNs are dependent every year on the MAG, but also on your input, because through the public call for inputs every year, the MAG basically advises on the final agenda of the annual IGF meeting on the sub-teams, for example, looking at where is the pulse of the community, what’s relevant for the community, and they also decide on what are the topics that it seems the community finds most relevant and marks as a priority, and then they orient the intersessional work of the BPFs and PNs toward those topics. But unlike these two forms, the dynamic coalitions is something that’s more consistent, more independent in terms of the MAG and the IGF working mechanisms. They are run by experts coming from different disciplines, different stakeholder groups, different regions, and some of the dynamic coalitions, which are issue-oriented, exist for years. Some of them exist close to the duration of the IGF so far. As I said, they’re issue-oriented. They are very concrete. For example, you have now, it says 24, but by the time we reach the 18th annual IGF meeting here in Kyoto, we have three more, so it’s 27 in total. And they are different. There are dynamic coalitions, for example, on blockchain, on public access in libraries, on environment, on domain name system, and so on. So you are most welcome to visit the IGF website, look at what the dynamic coalitions are doing, subscribe to their mailing list, or simply reach out to the IGF secretariat, and we will put you in touch with the coordinator of this work. And then part of the IGF process also relates to capacity development. By the mandate of the IGF and the Tunis agenda that I mentioned to you at the beginning, at the heart of the IGF is to build capacity in all countries, developed and developing countries. And the capacity development strategy is every year tailored to fit the needs of the global community, but I would like, just for the purpose of this meeting, to focus on two very important components that are also presented here at the IGF in Kyoto. They are the parliamentary track and also the youth track, where I’m very much focused on developing capacity and working with legislators, members of parliaments coming from different parliaments from around the world, through our parliamentary track. The parliamentary track that’s coordinated by my colleague Celine sitting in this room is coordinated and developed in cooperation also with the regional IGFs. That helps us a lot to reach the local communities much better, much more efficiently. For example, this year we had a series of capacity development workshops hosted at the Asia-Pacific regional IGF in Brisbane in Australia, but also at the African IGF in Abuja in Nigeria. And here at the IGF yesterday, a series of capacity development workshops and dialogues between members of parliaments and with members of parliaments took place. Today it continues as well, so I do advise you to please visit the IGF website, IGF 2023 menu parliamentary track, and just see which session takes place where today. They’re very interesting and it’s a good also experience so you can engage better maybe with members of your parliament in your countries. Part of the capacity development for us relates to sustainability of these processes and the sustainability of the processes of course relates to investing and working with young people. Through the youth track, the IGF Secretariat works throughout the year with many youth IGF coordinators and many youth-related networks and communities on Internet governance to design and then implement the youth track. So this year, young people advised us that their priority is to look into safe digital future and so we are unpacking basically that concept through a couple of capacity development workshops. Some of them, just like the parliamentary track, have been hosted at the regional IGFs or at the Asia-Pacific IGF. Well, we firstly actually toured the globe through regional IGFs starting at Eurodig, that is the European IGF in Finland, then we moved to the Asia-Pacific IGF which was hosted in Australia, then to Latin America region through the Youth LAC IGF hosted in Colombia and then we concluded with the African IGF that was hosted in Nigeria in September. The conclusion of the youth track took place just yesterday. We had a wonderful IGF 2023 Global Youth Summit where we tried to establish a framework for a meaningful dialogue between the current generation of experts and leaders and the next generation of experts and leaders. And that’s very important for us. It has been a message that’s been sent by youth throughout the years of the IGFs feedback process that young people are very much interested to be active players in this field but that they do not want to be isolated and that is important that we have a meaningful dialogue with them between the decision makers and the decision makers holding those positions here right now. Now, I mentioned to you already a couple of IGFs, not just one, and that all relates to the concept of the IGF initiatives, national, regional, sub-regional and youth IGF initiatives or we should call them shortly the NRIs. The NRIs emerge organically. If you look at the Tunis agenda, it doesn’t call for establishing a national IGF in a particular country or a regional IGF but it does very much calls for development of a multistakeholder model at local levels and building on that, learning from the IGF as a model, many multistakeholder communities or many countries and regions started organizing their own IGF processes, applying the same set of principles, frameworks, procedures in their local communities. That history of close to 18 years now resulted in having today more than 160 officially recognized NRIs by the IGF Secretariat. The IGF Secretariat is entrusted by the NRIs to run the recognition process, ensuring that the processes do adhere to the IGF principles and also to support the network so we work throughout the year on a couple of objectives including to be presented here through a couple of sessions at the annual IGF meeting but also on other types of objectives you can see on the IGF website which we always set at the beginning of the year in a bottom-up consultations with all the NRIs. Many of the NRIs are present at this year’s IGF meeting here in Kyoto and they will have their main session, a couple of collaborative sessions so I do invite you to consult the IGF website and join us on those sessions and meet colleagues doing these really great things also in their respective countries. And I want to recognize of course our host, Japan has an excellent national IGF that has its own evolution and just I think in early September they hosted their annual meeting which was excellent and I think set a very good preconditions for engagement of Japanese community in this year’s 18th annual IGF meeting. So I mentioned the leadership panel, I won’t keep your time now on that, you will have opportunity to learn from the leadership panel directly. I hope that you have visited the IGF village which is just near the registration area at this venue. The IGF village you have seen probably is composed of a couple of exhibition booths and it serves for the community to better connect with institutions, organizations that are doing excellent work on Internet governance and it’s a very good opportunity and a quick one to connect with work of these organizations and see how certain maybe partnerships and cooperation could be developed long-term speaking. There’s a system of bilateral rooms, I hope that you have seen that at the IGF website. If someone participating in person at this year’s meeting is of your interest to meet with in a bilateral setup, so in a private setup, you can reserve a room through the IGF website, the secretariat will facilitate the approval and you can meet with those stakeholders. And of course if you need any support to connect with anyone, please email us at igf.un.org, we’ll be happy to support you. Now I won’t go that much into the processes which are with the United Nations are very much related or have an impact on the IGF, but I will mention briefly of course the 2030 Agenda for Sustainable Development and I’m sure you’ve seen the 17 SDGs really cross-cutting the agenda of the IGF. This community is very much outspoken about the SDGs being a great accelerator of sustainable development and all of us as session organizers, as session participants are doing what we can to ensure that the reflections on how the SDGs can be supported by certain digital public policy related processes are reflected in discussions at this meeting. I mentioned at the beginning the digital cooperation concept, I’m sure that many of you also heard about it, especially the Global Digital Compact, the Our Common Agenda. So those are all the processes that are very recent, they came out of the Secretary General’s office and the whole goal is to look at our digital future, long-term speaking, to ensure that we can all benefit from it. It impacted the IGF already and probably it will long-term speaking, for example the leadership panel is the outcome of the Roadmap for Digital Cooperation and you can see hopefully on this slide more about this whole concept about the roadmap and its pillars. The Our Common Agenda and Global Digital Compact, there will be discussion a lot with respect to these topics at this year’s IGF. Many sessions are indeed directly or indirectly focused on this. The GDC is gaining momentum certainly, the Member States will soon enter the negotiation process to understand what the GDC will be about and of course the IGF as the forum within the United Nations where all stakeholders as equals discuss matters related to Internet governance, public digital policy is directly engaged in these processes and reflected by the discussions happening within. Now I’m going to invite for your comments and questions, it doesn’t have to be a question but I would like to also hear from you how do you find this year’s IGF, is it overwhelming for you? If you have any questions for the Secretariat I’d be happy to respond, we have I think a couple of more minutes left. And I also invite you to connect with us, so to subscribe to our mailing lists, to connect with us through our email, igf.un.org is the email address of the IGF Secretariat and we would be happy to hear from you. You can also visit our social wall, connect with us on social media, we’re present on Facebook, Twitter and Instagram. There is also the IGF mobile app, it’s very convenient and quick way to follow the schedule for example for this year’s IGF rather than going through a browser, so I hope that you’ve experienced it, if not then I do invite you to download the app and use it and tell us your user experience so we can do better for next year. So with that let me stop here and pause here and just to see if you have any questions or comments on what you’ve heard so far. I would assume that if yes, if there are comments we would use these microphones that are up front, correct? Yes. Good, I don’t see any comments, any requests for questions, I don’t know if we have anyone online that would like to ask anything before we wrap up here. Thank you. So we don’t have any requests from online participants, good. This is a compliment, that means that it was clear so far. First of all I want to sincerely thank you for being here and for being at the IGF, learning about it. It’s been a great pleasure to speak with you and to you this morning. As you know we will start preparing for the big moment of this year’s IGF which is to formally open this year’s meeting and I think everyone will benefit, especially the organisers and the technical logistical team, of a couple of more extra minutes to set the stage, prepare the room, so I will wrap up then earlier. Thank you very much. Please let us meet also outside, be free to approach or visit our office, 104, that’s the number of our office, we would be very happy and grateful to connect with all of you. Thank you very much for your attention.

Anja Gengo

Speech speed

153 words per minute

Speech length

5743 words

Speech time

2252 secs

Intelligent Society Governance Based on Experimentalism | IGF 2023 Open Forum #30

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Title: An In-Depth Analysis of the Main Arguments and Evidence Presented in the Text

Summary:

The following extended summary provides a comprehensive overview of the main points, arguments, evidence, and conclusion presented in the original text. Additionally, notable observations and insights gained from the analysis are also included. The summary is written using UK spelling and grammar.

The text under analysis argues that advancements in technology have had a profound impact on the modern world. The author asserts that these advancements have not only shaped our society but have also brought about significant changes in various sectors such as healthcare, education, and communication.

One of the main points highlighted in the text is the positive impact of technology on healthcare. The author argues that technological advancements have improved the accuracy and efficiency of medical diagnoses and treatments. They provide evidence by citing examples of cutting-edge medical devices that aid in diagnoses and advanced surgical procedures that have significantly improved patient outcomes. Moreover, the author discusses how telemedicine has revolutionized healthcare by making healthcare services more accessible to remote areas and underserved communities.

Another key argument put forward in the text is the transformative effect of technology on education. The author contends that technological tools and online learning platforms have enhanced the learning experience for students. They supply evidence by referencing studies that demonstrate improved academic performance and engagement among students who utilize technology in their studies. The author also highlights the potential of virtual reality and augmented reality in creating immersive educational experiences.

Additionally, the text addresses the impact of technology on communication. The author argues that advancements in communication technology have broken down physical barriers and enabled instant communication across the globe. They present evidence in the form of statistics on the rise of social media platforms and the increasing ease of global collaboration. However, the author also acknowledges the drawbacks of technology, such as the potential for privacy breaches and the negative effects of excessive screen time on individuals’ well-being.

In conclusion, the text asserts that technology has revolutionized multiple aspects of our lives, including healthcare, education, and communication. While presenting compelling evidence to support this claim, the author acknowledges the potential downsides of technology. Overall, the analysis provides a well-rounded view of the impact of technology, acknowledging both the benefits and challenges it brings to our society.

Note: The expanded summary aims to accurately reflect the main analysis text and include relevant long-tail keywords without compromising the summary’s quality or readability.

Frank Kirchner

The development of AI and robotics is seen as increasingly necessary due to demographic changes and the complexity of certain tasks. Robots are already being used in production facilities and private households, and there will be a greater need for automation in the future. However, the predominantly controlled nature of AI and robotics development, with a small number of private companies, limits access and understanding. This concentration of control raises concerns about the diffusion and democratization of these technologies. Advocates argue for the establishment of standards and regulated frameworks to democratize the design, understanding, and programming of AI systems. This would make them accessible to a wider range of individuals and organizations and foster a more inclusive AI landscape. A standardized design and programming framework would enable cradle-to-grave tracking of robotic components, ensuring accountability and sustainability in production. Transparency is also highlighted, with the validation of source, carbon footprint, and material composition of AI components. The International Development Agency (IDA) could play a role in monitoring AI and robotics development worldwide to promote inclusivity, transparency, and sustainability. Another concern is the concentration of control in a few big companies, and efforts should be made to prevent monopolies and ensure access for a wider range of stakeholders. The risks associated with AI and robotics, including hackers and misuse, cannot be entirely prevented but can be minimized and regulated. Open access and contribution to knowledge safeguard data and technology by minimizing misuse and promoting responsible use. In conclusion, the development of AI and robotics requires addressing issues of access, control, transparency, and accountability. Standards, regulated frameworks, and monitoring by organizations like the IDA can democratize AI, foster innovation, and ensure a more inclusive and sustainable future.

Audience

Suji, a PhD student from Seoul, Korea, is inquiring about the model of governance that AIDA is considering for AI. She is specifically interested in whether AIDA is looking towards models such as the International Atomic Energy Agency (IAEA) or the Food and Drug Administration (FDA). Suji is raising the question of whether AI, like nuclear energy, requires stringent governance due to its potential risks. She also wants to understand the authority and power that such a governance body should possess, as well as its specific roles and responsibilities.

Furthermore, the advancement of technologies like AI, AOT, IoT, and blockchain is resulting in a significant increase in data generation. This has led to the creation of an international database. The proliferation of these technologies has heightened the need for international regulations and rules to govern data transactions that occur across borders. One example is the existence of the SWIFT code, which is a system for international data transactions regulated by 835 different banks from various nations. Establishing international standards and guidelines for data transactions is crucial to ensure the efficient and secure exchange of data globally.

In addition to governance and data transactions, there is also consideration of ethics in regards to cybersecurity, with a particular focus on the issue of hacking. The ethical implications of cybersecurity breaches are a cause for concern. Safeguarding against hacking incidents is crucial for maintaining the security and integrity of data systems. This highlights the importance of incorporating ethical considerations into cybersecurity practices.

Overall, Suji’s inquiries shed light on the growing need for robust and comprehensive governance frameworks to regulate AI, as well as the importance of establishing international standards for data transactions. Furthermore, her observations underscore the significance of ethics in the realm of cybersecurity. Addressing these concerns is vital to ensure the responsible and secure development and deployment of AI technologies.

Evelyn Tornitz

In this session on promoting human rights through an International Data Agency (IDA), the speakers explored the role of IDA in strengthening human rights and ensuring responsible innovation. The session was moderated by Evelyn Tornitz, a Senior Researcher at the Institute of Social Ethics, University of Lucerne, Switzerland, and a MAG member at the UNIGF.

Peter Kirchschlediger, Director of the Institute of Social Ethics at the University of Lucerne, provided an overview of IDA and its purpose. He emphasised that IDA aims to create standards and monitor compliance with these standards in the design and development of robots and artificial intelligence (AI) systems. The goal is to promote responsible practices and prevent any misuse or negative consequences of AI technology.

Kutoma Wakanuma, a Professor at Montford University in Zambia and the UK, discussed the importance of responsiveness, inclusivity, and proactiveness in responsible innovation. She highlighted the need for AI systems to be inclusive of diverse voices and ensure that they respond to the needs and concerns of different communities. Additionally, she emphasised that responsible innovation should be proactive in addressing potential risks and negative impacts.

Frank Kirchner, a Professor at the German Research Institute for Artificial Intelligence, joined the session online and added a new aspect to the discussion. He highlighted the need for a tracking system that can monitor the use of robots and AI, as well as ensure compliance with established standards. By creating a system for monitoring and evaluating AI technologies, potential risks and negative consequences can be identified and addressed more effectively.

Yong Jo Kim, a Professor at Chuang University in Korea, focused on the role of education and knowledge in promoting human rights. He emphasised the importance of transparency, fairness, and embedding human rights in their specific contexts. By integrating human rights principles into education and promoting transparency in AI systems, the potential for violations can be minimised.

Migle Laokite, a Professor at Pompeo Fabra University in Barcelona, Spain, highlighted the challenges associated with handling the negative consequences and risks of AI. She stressed the need for robust mechanisms to address and mitigate these risks, particularly when it comes to high-risk AI technologies. She also mentioned the importance of impact assessments and using the information generated from these assessments to predict and prevent future risks.

Yuri Lima, from the Federal University in Rio de Janeiro, Brazil, focused on the inclusion of the Global South in discussions on labour rights and inclusive living. He emphasised the need to involve diverse perspectives and ensure that any discussions about human rights and technology include the voices and perspectives of those in the Global South.

During the Q&A session, participants raised questions about the concrete functions and powers of IDA, as well as the regulation of data. The panelists addressed these questions, highlighting the importance of regulation and proactive prevention of misuse and risks associated with AI. They emphasised the need for the inclusion of the Global South in discussions and decision-making processes related to AI and human rights.

In conclusion, this session emphasised the importance of responsible innovation and the role of IDA in promoting human rights. The speakers highlighted the need for inclusivity, proactiveness, and transparency in the development and use of AI systems. They also stressed the significance of education, knowledge, and regulation in addressing the risks and negative consequences associated with AI technology.

Kutuma Wakanuma

The analysis of the speakers’ viewpoints on AI technology and its social and ethical concerns reveals several key points. Firstly, there is a strong call for a proactive approach to addressing these concerns. The speakers advocate for responsiveness and the need to actively consider the potential threats and consequences associated with AI technologies. They argue that current AI technologies often focus on the positive aspects and neglect to address these important issues. This proactive stance is seen as crucial to avoid potential negative impacts and ensure the responsible development and use of AI technologies.

Inclusivity and understanding of the impact of technologies on different subjects is another key theme that emerges from the analysis. The speakers assert that technologies can have diverse impacts depending on the cultural and geographical context of their usage. They emphasize the need for diverse representation in decision-making processes and the development of AI technologies. This inclusivity is seen as essential to ensure that the technologies are designed and used ethically and consider the needs and perspectives of different groups.

The establishment of an agency like IDA (AIDA) to oversee ethical concerns in AI technologies is also supported by some of the speakers. They argue that such an agency could oversee, supervise, and monitor the ethical and social concerns associated with AI technologies. Inclusive decision-making can be facilitated through the existence of an entity like the IDA, ensuring that the perspectives of various stakeholders are taken into account. This would help set global standards and ensure the responsible and ethical development and use of AI technologies.

In addition to these points, one of the speakers suggests an overall employment-free status at borders, allowing individuals to earn globally. This viewpoint highlights the need to adapt to the changing nature of work in the digital age and to consider the global impacts of AI technologies on employment opportunities.

Furthermore, health and education are identified as key focus areas in AI policy. These sectors are seen as crucial for social development and well-being, and AI technologies can play a significant role in improving access and quality of healthcare and education. The speakers argue for greater emphasis on these areas in AI policy discussions and decision-making processes.

The analysis also brings to light the idea that different continents and countries may require different AI regulatory policies or acts. This recognition emphasizes the importance of considering the diverse contexts and needs of different regions when formulating AI policies and regulations.

The establishment of a global AI act that can protect everyone is a point of consensus among the speakers. They argue that this would ensure a universal standard for the responsible development and use of AI technologies, safeguarding individuals from potential harmful consequences.

Proactive measures and policies are seen as necessary to regulate AI technologies like CHAT-GPT, which is highlighted as an example of a technology with widespread effects but inadequate policies in place. The speakers emphasize the urgency of taking proactive steps to regulate such AI technologies, particularly in sectors like education, where the responsible use of AI is crucial.

Another noteworthy observation from the analysis is the emphasis on global inclusivity in discussions and decision-making processes related to AI regulation. Currently, more developed nations dominate these discussions, which can lead to a lack of representation and consideration of the perspectives of the Global South. The speakers stress the importance of including voices from both the Global South and North to ensure a comprehensive and inclusive approach to AI regulation.

In conclusion, the analysis highlights the need for a proactive approach to address the social and ethical concerns associated with AI technologies. Inclusivity, the establishment of an oversight agency like IDA, and the development of global policies and standards are seen as essential steps towards ensuring the responsible and ethical use of AI technologies. Additionally, the analysis emphasizes the importance of considering the diverse needs and contexts of different regions and the need for proactive measures and policies to regulate AI technologies. Overall, the speakers advocate for a comprehensive and inclusive approach that takes into account the potential impacts and concerns associated with AI technologies.

Yuri Lima

The rapid advance of new technologies has brought about significant challenges in our ability to comprehend and effectively integrate them into our economic systems. This has resulted in an uneven distribution of the advantages these technologies provide. The digital economy, as it currently stands, showcases a stark contrast between the international flow of profits and the conditions of labour.

Many individuals across the globe find themselves working under poor circumstances, with meagre pay and minimal labour rights or protections. This divergence from the ideals outlined in Article 23 of the Universal Declaration of Human Rights, which emphasises fair and favourable working conditions, poses a significant concern in the modern digital economy. The insufficiencies in addressing these issues further highlight the need for more comprehensive and inclusive approaches.

It is paramount to acknowledge the vital role that underdeveloped countries play in the global exchange of technology and wealth. Disregarding their importance hinders progress and sustains an unequal global value chain. For a fair and just digital economy, it is crucial that the global South, where much of this exploitative digital sweatshop labour occurs, has a say in shaping the global rules that govern the digital economy.

To address these challenges and foster collaboration, an International Database Assistance Agency (IDA) could be established at the United Nations level. This agency would shed light on hidden inequities, identify best practices, and propose actionable solutions. By providing transparency and serving as a platform for engagement between governments, workers, businesses, and civil society, an IDA could contribute to the achievement of a fairer digital economy. The goal would be to create a system that benefits all, promoting technical cooperation and ultimately shaping a just and equitable digital future for everyone.

In conclusion, the fast-paced introduction of new technologies has created a disparity between our comprehension and integration of these technologies into our economies. The current digital economy falls short of embodying principles such as fair working conditions and equal distribution of benefits. To rectify this, it is essential to consider the role of underdeveloped countries and ensure their inclusion in shaping global rules for the digital economy. Establishing an International Database Assistance Agency at the UN level can facilitate transparency, facilitate cooperation, and pave the way towards a more equitable digital future.

Hyung Jo Kim

The discussions centre around the incorporation of Artificial Intelligence (AI) within education, the necessity of an agency to regulate the use of AI, the importance of handling data with transparency and fairness, and the consideration of cultural contexts in discussions pertaining to human rights.

In the sphere of education, the Korea Ministry of Education has made the decision to introduce AI education to all children and high school students by 2025. This will involve utilising AI tools to teach fundamental subjects such as mathematics and English. The argument made is that including AI in education is essential for enhancing learning and equipping students with the skills required for the future. This move is viewed positively as it will enhance educational quality and prepare students for a progressively digitalized world.

Transitioning to the regulation of AI, it is asserted that establishing an agency or control tower to oversee its usage is imperative. It is acknowledged that AI technology has both positive and negative aspects. While it has the potential to revolutionise various industries and foster innovation, concerns regarding its ethical implications and potential risks have arisen. The proposed agency would assume responsibility for regulating the use of AI, ensuring it is implemented responsibly and ethically. It is noted that such an agency would inevitably amass substantial amounts of data, highlighting the necessity for cautious consideration and transparent handling of this information.

The significance of data transparency and fairness is additionally underscored in the context of AI regulation. In the age of AI, the issue of data ownership has become progressively intricate, emphasising the need for transparent and just treatment of data. The trustworthiness of the agency responsible for regulating data is emphasised, as it plays a critical role in upholding public trust and confidence in the use of AI. This is regarded as crucial for accomplishing SDG 16: Peace, Justice, and Strong Institutions.

Lastly, the consideration of cultural contexts is regarded as imperative in discussions encompassing human rights. Specifically, within regions such as Africa and Asia, it is necessary to concretise the concept of human rights by taking into account cultural diversity. It is asserted that research should strive to strike a balance between universal and diverse values, i.e., universality and diversity, in order to establish a comprehensive understanding of human rights that respects diverse cultural perspectives. This is deemed important for the achievement of SDG 10: Reduced Inequalities.

In conclusion, the discussions and arguments presented revolve around the integration of AI in education, the need for an agency to regulate its usage, the significance of data transparency and fairness, and the consideration of cultural contexts in discussions concerning human rights. The inclusion of AI in education is seen as a positive move towards improving educational quality and equipping students for the future. The regulation of AI is deemed necessary to address potential risks and ensure responsible implementation. Data transparency and fairness are emphasised as significant aspects in the age of AI, while cultural contexts are underscored for attaining a comprehensive understanding of human rights.

Melina

During the discussion session, Ayalev Shebeji raised a valid concern regarding the protection of international database information. The question focused on whether advanced technology or other methods could effectively safeguard sensitive data from hackers and potential security breaches.

The complex issue of protecting international database information from unauthorized access is brought into question when considering the effectiveness of sophisticated technological advancements. While advanced technology can enhance data security, it is not foolproof. Hackers continually develop innovative strategies to bypass technological barriers, rendering them less reliable for complete protection.

In addition to advanced technology, other measures can be employed to safeguard international database information from hackers. Implementing strict security protocols and utilizing encryption techniques can make it more difficult for hackers to gain access to sensitive data. Regular security updates and patches should also be applied promptly to address potential vulnerabilities. Furthermore, educating and training individuals who interact with the database on best practices for data protection can significantly reduce the risk of security breaches.

It is important to be aware that no security measure can provide absolute protection against hacking. Cybersecurity is an ongoing battle, as hackers continuously adapt and evolve their techniques. Thus, a multi-layered approach is necessary, combining advanced technology, robust security protocols, encryption techniques, regular updates, and ongoing training and education.

In conclusion, protecting international database information from hackers requires a comprehensive strategy that incorporates advanced technology and complementary security measures. While advanced technology plays a crucial role, it should be accompanied by robust security protocols, encryption techniques, regular updates, and continuous education and training. By adopting this multi-layered approach, organizations can reduce the risk of security breaches and protect sensitive data to the best of their ability.

Peter Kirchschlediger

The International Database Systems Agency (IDA) is a research project that originated at Yale University and was finalized at the University of Lucerne. Its primary objective is to identify the ethical opportunities and risks associated with Artificial Intelligence (AI) in order to promote the well-being of humanity and the planet. The IDA’s vision extends beyond AI regulation to encompass the entire value chain of AI, from resource extraction to the production and use of AI technologies.

The IDA aims to foster peace, sustainability, and human rights while promoting the responsible development and deployment of AI. Drawing inspiration from the International Atomic Energy Agency, the IDA is seen as a necessary step towards addressing the ethical concerns of AI, with the goal of preventing AI-based products that violate human rights from reaching the market.

Peter Kirchschlediger, a supporter of the IDA, argues for the need for stronger enforcement mechanisms in the field of AI. He notes that despite the existence of numerous guidelines and recommendations, businesses continue to operate as usual, highlighting the necessity for a structure similar to the International Atomic Energy Agency. This would provide orientation and ensure that AI is developed and deployed in an ethical and human rights-respecting manner.

In addition, it is suggested that the IDA should not only enforce regulations but also have the power to sanction both states and non-state actors that fail to fulfill their obligations. This would further strengthen the IDA’s effectiveness in promoting responsible AI practices and holding those who undermine ethical principles accountable.

The IDA also has the potential to address cyber security concerns by promoting technological cooperation and enforcing legally binding actions. It is believed that the IDA’s enforcement capabilities and global reach could contribute to the development of a global consensus on cyber security issues, given the significant risks cyber attacks pose to societies worldwide.

Overall, the IDA’s research project seeks to identify the ethical opportunities and risks associated with AI, with the aim of promoting the well-being of humanity and the planet. By fostering peace, sustainability, and human rights throughout the AI value chain, the IDA strives to ensure that AI is developed and deployed in an ethical and responsible manner. Drawing inspiration from the International Atomic Energy Agency, the IDA advocates for stronger enforcement mechanisms, including the power to sanction actors that violate ethical principles. Furthermore, the IDA could play a pivotal role in addressing cyber security concerns through technological cooperation and the enforcement of legally binding actions. The IDA’s mission is to shape a future where AI benefits society while respecting ethical standards and human rights.

Migle laokite

The European Parliament has recently proposed conducting an assessment to evaluate the impact of high-risk artificial intelligence (AI) systems on fundamental human rights. This assessment would take into account various factors, such as the purpose of the AI system, its geographical and temporal scope of use, and the specific individuals and groups likely to be affected. The aim of this assessment is to ensure that AI technologies are developed and deployed in a manner that respects and safeguards fundamental human rights.

There is a growing consensus that the Artificial Intelligence and Data Agency (AIDA) should play a central role in addressing the potential threats and risks associated with AI. Supporters argue that AIDA should gather and share knowledge on AI risks and harms with international organizations to prevent harm on a global scale. Making this information readily available and accessible can help protect against AI-related harm worldwide.

Furthermore, proponents advocate for AIDA to become the focal point for addressing AI risks and harms to protect individuals and prevent misuse of AI beyond Europe’s borders. They argue that by leveraging AIDA’s capabilities, the rest of the world can also benefit from the prevention of negative effects and potential abuses related to AI. This perspective aligns with the goal of reducing global inequalities, as AI can have far-reaching implications for societies and individuals in different regions.

In summary, the European Parliament’s proposal to assess the impact of high-risk AI systems on fundamental human rights acknowledges the importance of ethical and responsible development and deployment of AI technologies. The support for AIDA to play a central role in this endeavour aims to share knowledge and collaborate to mitigate potential threats and risks associated with AI within and outside of Europe. The ultimate goal is to protect people globally and foster a more equitable and inclusive AI landscape.

Session transcript

Evelyn Tornitz:
Good afternoon to this session, Promoting Human Rights through an International Data Agency. Welcome both to our participants and speakers here on site and also to our online audience. I am Evelyn Tornitz. I’m going to be moderating the session today. I’m a Senior Researcher at the Institute of Social Ethics, University of Lucerne, Switzerland, and also a MAG member here of the UNIGF. Here today with me are Peter Kirchschlediger, Director of the Institute of Social Ethics, also University of Lucerne, Switzerland, and Kutoma Wakanuma, Professor at the Montford University in Zambia and UK. Then we have Frank Kirchner, Professor at the German Research Institute for Artificial Intelligence in Germany. He’s online. He’ll be joining us online. We have here with us on site also Hyung Jo Kim, Professor at Chuang University in Korea. And then we have Migle Laokite, Professor at Pompeo Fabra University in Barcelona, Spain. He will be joining us online. And then we also have Yuri Lima from the Federal University in Rio de Janeiro, Brazil. He will also be joining online. Some words to the flow of the session. We will start with short input presentations, just really short to give you a bit of a overview what the session is going to be about. Afterwards, there’s going to be a question and answer from both online and on-site participants. And then we would really like to also have, like, open the floor in the sense of having a lively discussion with… with all of you, also hear your inputs, your comments and your contributions which you would like to share with us. So, let’s start with Peter, who is here with us today. So, if you could maybe explain in the beginning what this International Data Agency, what it is about and how it will contribute to strengthen human rights.

Peter Kirchschlediger:
Well, thank you so much, Evelyn, and thank you to you, all of you, being here. A warm welcome to this session. So, the idea of the International Database Systems Agency, IDA, is a result of a multi-year project started at Yale University in the US and then finalized at the University of Lucerne. Basically addressing the question, how we can make sure that we identify early enough the ethical opportunities and the ethical risks of so-called AI in order to make sure that all humans can benefit from the ethical opportunities and that we are able to master the risks in a way that humanity and the planet can flourish. And based on that research, I made two concrete proposals. One is to deal with AI in a human rights-based way. So, talking about human rights-based AI. This means, though, looking at the entire value chain of so-called AI. So, looking to how we extract the resources that this is happening in a human rights-respectful way, how we produce technology products, also dare that we do that in a human rights-respecting way. And also then the use, and also maybe human rights-based, the non-use of certain technologies. and get to recognize that certain technologies we shouldn’t use because they may be human rights violating. And that was the first concrete proposal. And the second proposal is to think so-called AI with a dual nature. So having ethical upsides and ethical downsides and comparing that to nuclear technologies because also there we have ethical positive potential but also ethical negative potential. And thinking in the model of the International Atomic Energy Agency, simplifying it in the field of nuclear technologies we were doing research, we built the atomic bomb, we used the bomb several times and then we realized as humanity that we need to do something about it in order to avoid the worse. I’m fully aware that the International Atomic Energy Agency is not a perfect solution. It has its geopolitical implications but still I think it needs to be admitted that it was able to avoid the worse. So I think in analogy in the model of the International Atomic Energy Agency we should also establish at the UN an International Database Systems Agency, IDA. IDA aiming for fostering peace, promoting sustainability and promoting human rights but also making sure that no AI based product which is human rights violating is ending up on the market. And I’m very much looking forward to our discussion and the session about this idea of IDA. Thank you so much.

Evelyn Tornitz:
Thank you very much Peter for providing us with this overview and what you’re envisaging for IDA. We go on now to Kutuma who will also Give us a short input on AIDA and what possible role you would see.

Kutuma Wakanuma:
Hello. Is it on? Okay. So, good afternoon, everyone. Thank you very much for joining us on this session, which I’m hoping will have a very good discussion between us and yourselves. I think it is very important that we do think about establishing an agency such as AIDA. And I think one of the things that we ought to be doing as we try to advocate or as we advocate for the establishment of AIDA is to look at how we can be responsive when it comes to the identification or the identified social and ethical concerns around emerging technologies like artificial intelligence. Oftentimes, when these technologies are being innovated, they’re being developed or perhaps designed and then implemented, one of the things that is… Excuse me. One of the things that is always looked at is the positive aspect of these particular technologies. Very little, I think, in the process of these designs up to the implementation stage, do we or do the developers think about the consequences or the threats that these technologies present? And this then brings us to concerns around privacy and data protection, for example, and also other ethical concerns such as ownership and control, because we know that as the technologies are being developed, the concentration of ownership and control is in the hands of a few, especially as they trickle down to, say, for example, the Global South. We have issues around transparency and accuracy of the technologies. We have concerns around autonomy. We have concerns around power, which then speaks to aspects related to monopoly, to dependency, and to a certain extent, to digital colonialism, as the technologies become mainstream. So rather than becoming reactive when the concerns start, the unintended consequences start showing up, we need to be a bit more proactive, and I think this is where AIDA might actually come in. So some of the questions that we need to ask is how do we become responsive to responsible innovation? For me, I think one of the things that we ought to be looking at is being inclusive, particularly when we are looking at how these technologies permeate globally. Yes, of course, they perhaps start from more developed countries, and then trickle down to less developed countries, but the issues perhaps may be similar to a certain extent, because obviously, privacy and data protection concerns, I think, could be universal to a certain extent, although, of course, the way these concerns may be looked at or experienced could be slightly different. We also need to be cognizant of the fact that we need to understand how these technologies can have an impact on the different subjects that start using these particular technologies. So how do we go about ensuring that we co-create, for example, or co-produce these particular technologies? Because for the most part, we have these technologies as global technologies. And when we’re talking about global technologies, sometimes we should be concerned about who are the voices that are representing these particular technologies in a global manner. Do we have everybody at the table when we’re talking about ethical concerns that impact people? And for the most part, I think there is a gap in terms of who is at the table, whose voices are being represented, whose social and ethical concerns we’re going to be talking about. And if we’re going to have an agency like IDA, that may actually help in terms of overlooking or supervising or indeed monitoring these particular concerns so that we can actually use these innovations, we can actually use these emerging technologies in a more responsible and not irresponsible manner. So this is what I have to contribute for now. And then hopefully I’m looking forward to an exchange with everyone else here. Thank you.

Evelyn Tornitz:
Thank you, Kutuma, for adding this aspect of responsiveness, which is, I think, really a key word that is not often mentioned, but I think, yes, you’re right. I mean, if we want responsible innovation, it should be responsive, inclusive, and proactive, as you mentioned. Thank you very much for adding this point. We will go on now with Frank Kirchner, who is joining us online. Frank, are you there?

Frank Kirchner:
Yes, I’m there. Can you hear and see me?

Evelyn Tornitz:
Yes, we do.

Frank Kirchner:
Okay, cool. Yeah, thank you for the opportunity. My name is Frank Kirchner. I’m the director of the German Research Center for Artificial Intelligence, actually. And at the same time, I’m the professor for robotics at the University of Bremen. What I would like to take a point of view, of course, from creating these robots, creating these systems that we actually call AI-based robots, because they’re… have to act and are already acting in real world environments in direct cooperation, for example, with people in production facilities, but also already in private households. And I think what we’re seeing now is just the beginning of it, because in many countries, because of the demographic factor, we will have a very, very high need for more and more of this kind of automation. At the same time, these systems will be required to do even more complicated tasks that usually have been done or are still done today by human beings. So what that means is that we have to create systems, robotic systems, acting in a real world environment, maybe in direct contact with human beings, that will have to be able to perform really complicated, maybe for human beings, trivial tasks, like packing something or cleaning your house and stuff. But for a robot, for a technical system, it’s still very complicated. And this can only be achieved with massive intervention by artificial intelligence tools. So having said that, as Peter said, there’s one thing that is actually one way and one alley that we have to go down that is really very useful and can be of high value for humankind. But on the other hand, because we have to use these highly sophisticated AI models, there’s only always the risk of danger in whatever way to misuse these systems as well. So how do we deal with this? The problem is that we cannot say we avoid it. You know, we cannot say that we don’t touch it, we don’t do it, because it will be done. It’s already moving forward. And one thing that has already been mentioned by the previous speaker is that if we look at who’s able to actually do these kind of things today, you know, who can build these robots, who can build the systems that can drive the robots, the AI technology inside? It’s only very few. And it’s not even states, it’s not even countries. It’s actually private companies. So if you want to create the foundational models that you need in order to… enable a robot to do these kind of tasks that I was describing, you have to put a lot of money into creating the model, the foundational model. And if you look at who is doing this today, it’s the big five. And not even countries, not even the high developed and rich countries in Europe or North America are putting the kind of resources to the table. So this kind of in this idea of having the IDA, I think I do support a lot because it gives the opportunity to create ways to design these systems that gives the power to more and more people. So instead of just having a few experts that can design these kind of systems, we have the possibility by creating standards in the way we design and program these systems from the very low level mechanical and electronic level of performance all the way up to the high level behavior and decision making in these devices. So these standards have to be created and somebody has to monitor them. And that’s something that can be done by as we have seen it in software development tools in general. If you go back to the 70s, for example, there were a few people on the planet that could program your IBM computer. And these guys were flown back and forth between all parts of the world in order to do this kind of programming. In the meantime, we have been able to develop frameworks and model based development tools that allows basically everybody to program his own computer. And the same thing, I think we have to think about for robotics and for artificial intelligence based system. The effect of this will be that we have more and more people that are able to not just create these systems, but also to understand they’re working and to understand their inner functionality. And that usually is a way, effective way to block and to put a wall to misuse of these kind of systems. The other thing that these model-based frameworks for design and programming allows us to do is we can also use meta-knowledge, meta-knowledge for all the parts that go into these robots. We can have a cradle-to-grave tracking of all the components that go into these robots. Where has this motor been produced? Who has produced it? What material was used for it? What was the carbon footprint for exactly this material that went into your robot? We can track it, but all by having a more standardized way to design, to build, and finally to program and use the kind of systems that by no means, by no question, we need in the future to serve so many challenges that humankind is facing now and moreover in the future. That would be my comment and my hope for something that an institution or an idea like the IDA could support and maybe even be an institution like Peter said, to monitor this kind of development worldwide. Thank you.

Evelyn Tornitz:
Thank you, Frank, for adding this new aspect of creating standard and also monitoring the compliance with this standard and also this tracking system that you mentioned for the design development use of robots and AI. We’re going to go on now with our on-site participant, Yonggeom, on my left side. Okay.

Hyung Jo Kim:
Thank you very much. The pronunciation for European is very difficult. I’m sorry for that. Okay. Thank you very much for having me and this good opportunity to this meaningful meetings, especially for Professor Petter. I have many things learned from this conference yesterday and today, also from the presenter. How should we live and prepare for our digitalized society in order to preserve or even more promote our human rights with digital technology? Let me start with a brief quote of a technical philosopher, Heidegger. A quote began, regardless of whether we enthusiastically embrace technology or deny technology, we are bound to it helplessly. The question concerning technology, so, and yes, the using of AI is unstoppable current. For example, I should show our situation in Korea to express. Before three months, the Korea Ministry of Education decided to offer AI education to all our children and high school students, starting in 2025. In addition, primary subjects such as math, English, will be taught with AI tools. It means two ways, coding and some related to AI technology, we should all, we should all run in our education knowledge, we should do, and also in other subject, mathematics and English, English, with this subject, also with AI tools to all, to be offered to all our children. So in this context, I would like to say that it is very self-evidently that we should have an agent such as control tower item. Because as we are well known, AI technology has not only positive but also as mentioned a negative side. So that we need a control tower in order to minimize the negative side. It is self-evidently. Therefore, more, I think more significant is not merely asking whether it is possible but asking a question in regarding how it should be, should, will be. More concrete, how we should and will build the institute. Because such a question finally constitutes an object or target of our question. And the thought underlying the question constitutes the character of that object. Meaning to say, question make entity. So with following two questions, I would like to suggest a discussion in regarding of directional building of item. First is about the problem of infinity regress. In the age of artificial intelligence, data are becoming ownerless. Even though yesterday many presenters in the main session have stressed the data authority. But this fact can be considered as a contra-factual evidence for the fact that the ownerhood of data is becoming weak. The agency that regulates the use of data will eventually collect more data than any other agency should be controlled or regulated. This could lead to call for the agency to be. are subject to be also controlled as well, yeah? Therefore, it is important to well demonstrate the agency’s trustworthiness. At this moment, we should come back to the value of transparency and fairness. The second, the problem is of definitional research on human rights. Okay, if we discuss the concept of human rights in the abstract and theoretical dimension such as level of political declaration, maybe, today so many speaker, yesterday in the main session said, it may be related to the just philosophical concept such as very broad concept human rights or human dignities, but however, if we consider the cultural context in Africa or Asia and so many other group, the concept of human rights will be made concrete and realized in accordance with the situation. This should be a research group to establish a good circle or the victoria circle structure between general and particular value, namely, universality and diversity. I think this should ultimately be implemented through collaborated research between various research group, something a low researcher and ethics and philosophical research group. Okay, my point worked too. Thank you very much.

Evelyn Tornitz:
Thank you very much also to you, Yongo, also for pointing out the role of, Yes, thank you very much, Yongo, also for pointing out first the role of education and knowledge which we have. haven’t talked about yet, and also for highlighting the need of transparency, fairness and embedding human rights in their contexts. So we will go on now with our online speaker Migle. Migle, are you there? Yes, I am. Can you hear me? Yes, we hear you perfectly. And we see you

Migle laokite:
okay. Good. So first of all, it’s great to see you again, although it’s online, but it’s great to see Evelyn, Peter, Kutuma and Hyongho. It’s great to see you again. My point, thanks of course for this opportunity to explain why do I think that AIDA is relevant and necessary in this in this in this context of especially artificial intelligence advancements. So basically, my point was more, you know, I start from the European perspective. So as to argue that, well, we need we do not have and therefore we need a sort of international agency to address the threats that the artificial intelligence and the related systems might give rise to, so much so that European Parliament has recently published its suggestions on how to expand how to improve the proposal for the Artificial Intelligence Act that the European Commission is promoting, right, that the first artificial intelligence legislative document that we are right now negotiating at the European level. And one of the things that the European Parliament has seen as very relevant and very, very important was the idea that we need to address the not only classify artificial intelligence on the basis of the risk, but also bear in mind that the high risk artificial intelligence systems might and surely will have a huge impact on the human rights. And therefore, European Parliament has proposed to propose that the high-risk artificial intelligence systems should undergo the fundamental rights impact assessment, which was not foreseen in the original version of this legislative proposal. So the assessment of this impact would basically include such elements as the purpose of the system, intended geographic and temporal scope of the use of the system, categories of natural persons and groups, not only persons as such, but also groups likely to be affected by the use of the system. How we are going to verify that the particular artificial intelligence system is compliant with the legislation related to the fundamental rights, but of course it applies to the human rights more widely. And what kind of reasonably foreseeable impact we can envisage through this impact assessment and what specific risks, what harms can we think of and what adverse impact there might be. And should this assessment lead to the certain huge and negative outcomes so that the foreseeable misuses or harms are kind of especially relevant, the developer needs to inform both the national and national authorities and also the stakeholders and in particular, the national supervisory authority that might start the investigation. So having said this, of course we say, okay, that’s a great initiative and well, we very much hope. that all these assessments might be brought into being. What I do, where I do see the role of AIDA is that is making, is basically being the focal point where all these assessments might flow. So as to basically make the good use of all this enormous amount of information related to artificial intelligence risks and harms to people and groups of individuals or ethnical groups or any other groups of human beings because this information is fundamental to prevent these risks and negative impacts, right? So making this knowledge also available and accessible for international organizations would help us also not only to prevent these harms from taking place in Europe but also would expand this protection worldwide because United Nations and in particular this the International Database Systems Agency, so AIDA could be the institution that could be in charge of this task because otherwise, we discover things in Europe but then we would say, okay, so that many companies might say, okay, we cannot do this in Europe but there is the rest of the world, right? Where you can do anything you want. And the way to prevent this from taking place is to build AIDA and make it the focal point for this sort of information to be distributed, accumulated and put to the use that would prevent any abuse, harm or other negative effects on the people from other continents where actually I think Thuma rightly pointed out that there is a tendency, there was a historical tendency, you know, to. to colonialize and abuse other continents. So I think this is the way to prevent also the repetition of historical errors we’re still kind of not comfortable with. Thank you very much.

Evelyn Tornitz:
Thank you very much, Miglia, for your input. And also highlighting again, I think all the speakers have agreed that technology has lots of advantages, but we also need to handle the negative consequences and the risks, especially when it comes to these high risks AI that you mentioned, which at least at the European level then has this impact assessments and what to do with this assessments or with this information that these assessments generate, like ideally to predict future risks. So there also we have like a new contribution that we have not discussed so far yet for AIDA. We will go on now to our last speaker who is online from Brazil. I’m not going to ask you what time zone that is and what hour of the day, but Yuri, if you are there, can you hear us?

Yuri Lima:
Sure. Thank you, Evelyn. It’s 4 a.m. in Rio. So good afternoon to the participants of this important session on the International Database Systems Agency. It is a pleasure to be here today. I would like to briefly speak about the challenges of building a fair international division of labor in the digital economy. In the past decade, we have witnessed the rapid and unprecedented evolution of AI and digital platforms that ushered in a new digital hyper-globalized economy. These powerful changes have transformed the essence of work globally and will continue to do so. While the potential of recent technological advances to drive growth and innovation is staggering, there is a significant disconnect between the pace of this evolution and society’s capacity to adapt. The speed at which new technologies emerge far surpasses our collective ability to understand, regulate, and fairly integrate them into our economic fabric. The result is an unequal distribution of the benefits of this technological progress. The digital economy, as it stands, presents a stark disparity between the international flow of profits and labor. While a handful of multinational tech giants amass incredible wealth, sometimes larger than countries’ GDPs, most of the digital labor force finds itself in a challenging position. This dichotomy results in an international division of labor that is often invisible, underpaid, and inhumane. A modern dynamic that echoes centuries-old practices when resources from many were channeled to benefit a privileged minority. The technologies might have changed, but the underlying logic in their development, operation, and even disposal still relies on exploring cheap labor from the global south. From Kenyan content moderators who flag harmful content to train chat TTP, and gig workers in Brazil who drive for Uber while producing data that helps to develop autonomous cars that will eventually replace them, to the Congo miners who extract the materials to produce the next iPhone that will later be dumped in electronic waste landfills in Thailand. Many people around the world face poor working conditions with low pay and little to no labor rights or protections. to sustain a digital economy that seems very clean and slicky in the developed economy’s Silicon Valley. Meanwhile, Article 23 of the Universal Declaration of Human Rights articulates everyone’s rights to just and favorable conditions of work and to just and favorable remuneration, ensuring an existence worthy of human dignity. Moreover, the Sustainable Development Goal No. 8 calls for decent work for all, fostering economic growth while upholding workers’ dignity, safety, and rights. Sadly, the current digital economy diverges from these noble ideals. In consequence, the time has come for urgent action to promote a more ethical international division of labor in the digital economy. We need greater transparency around the supply chains in labor practices that sustain big tech. We must recognize that the role of underdeveloped countries in the global flow of technology and wealth cannot be diminished in importance, as it is imbricated with the more valued parts of this global value chain, both sustaining and allowing it to exist in the first place. The global South, where much of this digital sweatshop labor takes place, must have a seat at the table in determining global rules for the digital economy. Enter the potential role of an international data-based systems agency, IDA, an agency that can serve as a sentinel, monitoring and ensuring that the principles of fairness, justice, and equality are upheld in the digital sphere. Observing the current state, but also anticipating future challenges, IDA can shine a light on areas. that have remained in the shadows, revealing inequities, identifying best practices, and recommending actionable solutions. An IDA at the UN level can bring transparency and provide a platform for governments, workers, businesses, and civil society to engage, collaborate, and commit to a fairer digital economy. By promoting the rights to a fair International Division of Labour, IDA would ensure that a larger portion of the society, not just the privileged few, enjoy the fruits of the digital revolution. In conclusion, while technology drives progress, it is our collective responsibility to ensure that this progress does not come at the cost of human rights and sustainability. As we build a more technologically advanced society, we cannot leave human rights and dignity behind. The future we want is one of inclusive prosperity and equity. Getting there will require both steps to reform the International Division of Labour in the digital economy as it stands. An International Database Assistance Agency at the UN can be a platform for technical cooperation in the field of digital transformation, promoting a just and equitable digital future for all. Thank you.

Evelyn Tornitz:
Thank you very much, Joeri, for also pointing out here what Koutouma already mentioned as well, like who is sitting at the table and that absolutely the Global South also needs to be included as well if we talk about labour rights, but of course, and inclusive living. Thank you for that. We have now heard the inputs of all our speakers, so I would like to give the word to the audience, both on-site and online, first for a round of questions and answers to our panellists. Maybe we can start first with the participants here on-site, if you have any open questions.

Audience:
Yes. Hi. Oh, can you hear me? Okay. Hi, my name is Suji, and I’m from Seoul, Korea. And I’m studying public administration in the Seoul National University, and now I’m a PhD student. So I really, really wanted to ask, is there any model as a governance? I mean, is AIDA looking for an IAEA model or FDA model kind of things? So if you are thinking that AI could be a hazard as a nuclear energy, then are you thinking about IAEA model? And then do you think it is fit for the context of AI, and what should be the authority and power for the governance exactly? And so I was curious about what the governance body of IAEA would actually do concretely, and what the authority or power should it have? Thank you.

Evelyn Tornitz:
Thank you so much for posing this very important question, like about the concrete function and powers also. Who would like to answer that question from the panelists, maybe? Peter?

Peter Kirchschlediger:
Well, thank you so much for the question. So you’re absolutely right that there need to be adoptions made to, let’s say, the model of the International Atomic Energy Agency adopting it to the field of AI. I think you’re absolutely right on that. I still think that the model of the International Atomic Energy Agency can serve to give us orientation how many functions, rights, entitlements such an agency should have in order to really make a difference then on the ground. Because I think what’s important now is that I think we have gone through a period of beautiful declarations and guidelines and recommendations. but we haven’t seen yet so much impact of that. You know, businesses run as usual. We’re still facing the same risks. You know, we are not that good in identifying the ethical opportunities together. Not everyone is benefiting from AI, and so we need something really which is teethful, so has an impact. And I think there, we need to adopt the International Atomic Energy Agency model in order to make it fit for AI, but I think it’s possible looking at, for example, concrete functions IDA should have. For example, what is absolutely usual and not even questioned in the field of the pharmaceutical industry is a certain kind of approval of access-to-market process. And something similar would be needed to be done in the field of AI, so IDA would have the rights to run such approval process. Secondly, it would need to have, I mean, the proposal would be that it has also possibility to sanction not only state but also non-state actors not fulfilling their duties, not fulfilling their obligations. So in order really to make, to see a difference, you know, of the impact of artificial intelligence on the ground. Basically, you know, the underlying motive is to protecting the weak from the powerful. So, and of course, who the powerful is, as we have heard from Frank Kirchner from Germany, is that, you know, the powerful, it has kind of shifted, you know, the powerful in the field of AI are the multinational tech giants and not so much the states anymore. So of course, that needs to take into consideration as well. Thank you.

Evelyn Tornitz:
Would you also like to add something?

Kutuma Wakanuma:
Yeah, just quickly. And I think, for me, this also relates to Mikla’s contribution when she talked about the… on their own rights, on their own interests, that says that the borders must have an overall employment-free status. And then people who want to live, they can just attach their palm to the whole across the world to get the stuff that they need. That’s the kind of idea, but I think the third one out of seven just focuses on the health as well as the education. Perhaps also Africa might be looking at a different kind of act or regulations. And within these particular countries or continents, there will be also countries looking at different regulatory policies or acts if you like, whatever it is that they are looking at in terms of AI policy. And so for me, I think that IDA would be, one of the things that IDA could do is to then sieve through all these different regulatory policies to help come up with, I know it’s going to be quite difficult, but at least come up with something akin to one global standard of artificial intelligence because as Peter rightly said, one of the things that IDA would do is to, potentially do, is to protect the weak from the strong. So if we have an organization or an agency like IDA, I think it might help to then come up with some standard or some AI act that can be cohesive and cover a global ground so that everyone is protected in that respect.

Evelyn Tornitz:
Thank you very much for these, hello, no. Yes, okay, thank you for sharing your insights on that and are there any more questions here from the onsite participants? If not, we would go on to see if there are online questions, but please, if you have any. If you have any more questions, feel free to pose them. If not, Melina, she’s our online moderator, may I ask, are there any questions in the online chat?

Melina:
Good afternoon. Yes, actually, there’s one question by Ayalev Shebeji. So I would like to invite you to ask your question. And now he didn’t raise the hand, but he already posed the question in the chat. I will read it. And is it possible to protect or prevent international database information by building sophisticated technology advancement? Or is there any other means to protect or prevent from the hackers?

Evelyn Tornitz:
Who would like to answer that?

Audience:
Okay. Sorry. Thank you very much for giving me this opportunity. I can elaborate my question, it looks like a little bit cluttering words.

:
Sorry, maybe if you could put on your camera, is that possible?

Evelyn Tornitz:
So we can also see you?

Audience:
Yeah, okay. No worries.

Evelyn Tornitz:
Thank you so much.

Audience:
I joined IGF in Addis Ababa last year. And I’m researching in digital fiat currency or CDBC in Australia. I just finished my master in information and communication technology. My understanding is last year, there is a positive and negative impact of AI. And also, we haven’t mentioned here is a lot of technologies behind it. We have AOT and IOT and also… blockchain technologies, all these technologies is generating huge amount of data. We are trying to create, as I can see now, international database. So are we really creating international database and protecting this database with a sophisticated technology or is there any other mechanism we can regulate internationally with global south, including global south at the current database, for example, SWIFT code or SWIFT is internationally a data transaction with a cross border and that’s 835 different banks of different nations is signed and regulated. We need to find that kind of international rules and regulation. Also, we need to think how we teach the hackers. If we hack another country, what happens if another person or another hacker is hacking our own country? We need to have ethics. So what are actually these international IGF forum, try to find out and set up all inclusive countries, international law, which is governing both internet and internet related technologies and what are the what are the perspectives? This is my question. So thank you very much. If it’s not clear, I can elaborate more.

Evelyn Tornitz:
Thank you very much for your question. If I understood correctly, your question has to do with the regulation of this huge amount of data. and how the Global South can be included specifically. Please correct me if something is missing. Okay, so who wants to address this question from the panelists, both on-site or online? Kutuma, please go ahead, yes.

Kutuma Wakanuma:
Well, I don’t know if I’m going to address it adequately, but yeah, I’ll address it in a manner that I kind of perhaps understood it. I think your question for me took me to reflect on discussions that we’re having around CHAT-GPT. I mean, it hasn’t been very long. I mean, a couple of years, if you like, we didn’t really have a concern around CHAT-GPT. So now, you know, we’re starting to look at it and think about all these concerns in education and, you know, in different kinds of sectors. And CHAT-GPT is a classic example of how these unintended consequences can actually affect different, I suppose, organizations or corners of the world differently. And it’s one technology that is permeating everywhere. And people are struggling to understand how or what policies, you know, we can start looking at. I mean, coming from being an academic and, you know, being very much involved in student activities and student modules and things like that, we are now thinking about, oh, okay, this is a technology that has bolted. So there is no way of, you know, bringing it back. So how do we help students or how do we encourage students to use it responsibly? And I think this is something that everyone is kind of thinking about across the globe. And there is no… there is no right way of looking at it and this is why we probably need agents like AIDA to proactively look at these particular global events or situations and how we can then have global mitigating aspects related to this. So and one of the things that we ought to be doing also is to be inclusive and I think you did allude to the fact that in the global south, it could be an impact and things like that but for the most part, only a few, I suppose, especially from developed, more developed countries really are sitting at the table discussing these particular elements and we need an agency like AIDA to ensure that everyone, including people from the global south, from the global north, are sitting at the table trying to find solutions to concerns that are currently emerging or to have a foresight in terms of what could potentially come as a result of these particular technologies coming in. We shouldn’t just sit around and wait until something has happened in order for us to then start scrambling to find solutions and this is one example of what CHRGPT has done and I’m sure a lot of other upcoming technologies are doing. So I hope I’ve answered your question, perhaps even in a little way, thank you.

Evelyn Tornitz:
Yes, of course, Peter, please.

Peter Kirchschlediger:
May I just, well, thank you so much for your question. I just wanna add three minor points. I think the first thing is really that AIDA should promote technological cooperation and I think that’s very important for for tackling, you know, cyber security. And secondly, it shows also that IDA needs to have some kind of force also being legally binding because a problem like cyber security, we cannot tackle with recommendations and guidelines. And thirdly, I think it creates a certain kind of optimism that this will be possible to find, you know, global consensus on IDA because of the huge and enormous damage, economic damage. Cyber security is basically, you know, threatening all of us, be it, you know, state actors, be it non-state actors. And to join forces in that regard, you know, could help us to tackle that huge issue. And I would suggest that, you know, IDA could play a substantial role in that. Thank you.

Evelyn Tornitz:
Thank you very much, Peter. Are there any further questions from the audience online? Melina, is there anybody there who want to ask another question?

Melina:
No, I don’t see any more questions. Does anyone want to add something?

Frank Kirchner:
Well, if there’s no other questions, I would like to add to what Peter just said to the question of Yadel. I think Peter already said, we cannot prevent hackers from doing what they want to do. You know, it’s criminal. So we will always have criminals in the world. And if they have enough criminal energy, they will do it. So this is not the way we can make this data safe. But there is, of course, other ways to do it. And that’s what my comment was about the standardization and the opening of this knowledge to a broader audience, to a broader audience. To a broader audience, to a broader public, you know? And this is exactly where the agency could play a vital role. Because if you think about Wikipedia. You know, if you think something like this is an open database, you know, a database of knowledge and everybody can read it and everybody can add to it. And this is how I think you would be able to minimize the possibilities of misuse or hacking or whatever, by the largest extent, because if everybody sees and has the benefit from having this database, everybody will also make sure that this database is not corrupted. So still means that there’s possibilities for people that want to misuse it, they will misuse it. And then we have, like has already been said, ways actually of regulatory or laws, you know, that can then intervene and say, okay, you misuse this data, you will be, you know, punished by law, you know, because you committed a crime or whatever, because you misused the data that we’ve provided to the general public all over the planet. But to my mind, the biggest or the best possibility to make sure that we can use this great technology, which is it, which it is, right, it is a great and very, very powerful technology. We have to use it, but we have to use it to our best for benefit. And we have to live with the fact that there will always be people that try, at least, to misuse it. And this is where governance and where governments can come in and set in, you know, regulations like the EU says, you will not be punished for creating artificial intelligence, you will be punished for misusing it, you know, if you come up with an application that is misusing artificial intelligence. So that’s my perspective. And I think it’s correct what you said, you know, by looking at the further demands on automation that I have referred to, all these machines, all these robots, all these machines, you mentioned the Internet of Things, they will all create data. And it is. an enormous challenge and task for humankind actually, how to manage and how to create and how to safeguard this data. But it cannot be just in the hand of a few big companies. We should not forget that, Peter also mentioned it. It’s not the States, it’s not United States, it’s not Germany, it’s not the European Union that is creating these techniques. It’s companies, it’s companies that have enough money to pay the energy bill of a state like New York to create a foundational model, billions of dollars. Nobody can put these billions of dollars out. And the most stupid thing is that they are all doing it again and again and again. So if Microsoft comes up with creating-

Evelyn Tornitz:
I’m sorry to interrupt you, Frank, but I got the sign here from the technical staff that we have to come to a close of this session. But I would like again to take the opportunity to thank all participants, all speakers, both on and offline. I think there was a broad consensus that we need to, if possible, proactively prevent the misuse and risks of so-called artificial intelligence database systems. And standard setting, of course, as also Frank has put it out now at the end, is a way to do it, is also a way to do it for IDA. And yes, thank you very much again for being here. And I’m sure that discussion is gonna continue. Who knows, maybe at next year’s IGF, let’s see. So thank you again for being here. Thank you.

Audience:
Thank you. Thank you.

Speech speed

144 words per minute

Speech length

13 words

Speech time

5 secs

Audience

Speech speed

117 words per minute

Speech length

459 words

Speech time

235 secs

Evelyn Tornitz

Speech speed

157 words per minute

Speech length

1298 words

Speech time

497 secs

Frank Kirchner

Speech speed

175 words per minute

Speech length

1678 words

Speech time

576 secs

Hyung Jo Kim

Speech speed

115 words per minute

Speech length

710 words

Speech time

370 secs

Kutuma Wakanuma

Speech speed

154 words per minute

Speech length

1519 words

Speech time

591 secs

Melina

Speech speed

114 words per minute

Speech length

93 words

Speech time

49 secs

Migle laokite

Speech speed

150 words per minute

Speech length

820 words

Speech time

328 secs

Peter Kirchschlediger

Speech speed

163 words per minute

Speech length

1097 words

Speech time

403 secs

Yuri Lima

Speech speed

137 words per minute

Speech length

855 words

Speech time

375 secs