Cyber norms
Cyber norms are voluntary guidelines and principles that promote responsible state behaviour in cyberspace. They are designed to enhance international security and stability by providing a framework for states and other stakeholders to follow in order to mitigate cyber threats and prevent cyber conflicts.
These norms include respecting international law, protecting critical infrastructure, refraining from malicious activities such as cyber espionage and electoral interference, and ensuring due diligence to prevent non-state actors from using a state’s territory or ICT infrastructure for wrongful acts.
While non-binding, these norms aim to foster cooperation, transparency, and trust among states and other actors in the digital space. Effective implementation requires regular dialogue, cooperation on technical measures, and efforts to hold violators accountable.
UN Cyber Norms
A. Interstate co-operation on security
Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security.
B. Consider all relevant information
In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences.
C. Prevent misuse of ICTs in your territory
States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs.
D. Co-operate to stop crime and terrorism
States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect.
E. Respect human rights privacy
States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression.
F. Do not damage critical infrastructure
A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public.
G. Protect critical infrastructure
States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions.
H. Respond to requests for assistance
States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty.
I. Ensure supply chain security
States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions.
States should encourage responsible reporting of ICT vulnerabilities and share associated information on
available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT- dependent infrastructure
K. Do no harm to response teams
States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cybersecurity incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity.