Privacy and surveillance
|No||Name||Affil./Org.||SH-group||Topic and sub-issues||Description||Remarks|
|7||Matthias C. Kettemann||University Frankfurt, Germany||Academia||Privacy, data protection and surveillance
||Data is the new currency. Countries collect it, companies store it ... but how can we ensure that transboundary data flows are regulated in a human rights consistent way -- Panel on issues related to jurisdiction, privacy and data protection. We\'ll look at questions like: Which entities are responsible? Who has jurisdiction? Do we need a new concept of jurisdiction and responsibility?|
|15||Leonid Todorov||Coordination Center for TLDs for Russia||Technical community||Internet Governance - a Changing Landscape||Privacy: The Thick Red Line -- With recent disclosures and "revelations", the issue of privacy has been debated at all fora and on all levels. Can we hammer out a universal solution and make sure there is no Peeping Tom around? What kind of instrument could be crafted on the international level and how it could be made effective in preventing privacy breaches?|
|21||Matthias Flittner||KIT / research assistant||Academia||Secure Cloud Computing for critical infrastructure providers||Legal and liability aspects of cloud computing Requirements of critical infrastructure. Risks and threats of cloud computing for critical infrastructures. How to make the cloud transparent to the user.|
|29||Milton Mueller||Global Internet Governance Academic Network (GigaNet)||Academia||State Surveillance on the Internet -- Internet technical standards and end user security||Deep packet inspection (DPI) cooperation between ISPs and national security agencies.
Localization as a response to NSA surveillance.
Independent academic researchers and technical experts should explore how Internet governance processes have reacted to the Snowden revelations. The session should not debate whether the surveillance is good or bad, but describe the changes its explosure has provoked in several areas. Three areas of change need to be covered:
1. IETF moves to \"harden\" Internet technical standards.
2. DPI surveillance programs that involve cooperation between private Internet service providers and national security agencies
3. Proposed policies to localize or nationalize services, equipment or routing
GigaNet is able to provide experts in each of these areas.
|51||Tatiana Tropina||Max-Planck Institute for Foreign and International Criminal Law, Germany||Academia||The blurring borders between criminal law, security and intelligence - how to implement proper safeguards for human rights and data protection?
||As many discussions these days, this proposal is related to the recent revelations concerning mass surveillance and data gathering by intelligence services. Procedural measures implemented by criminal law (such as interception. collection of data) are related to crime are usually strictly regulated by safeguards, warrants, data protection rules. However, the issues of security in terms of prevention goes beyond criminal law and creates a "grey" area when security agencies can gather and monitor data without proper safeguards. This proposal suggests to discuss the issue of safeguards (human rights, data protection, etc) which have to be implemented in this "grey area" and the way of implementing them.|
|62||Annnette Mühlberg||ver.di and EURALO, support by ISOC chapter Belgrade, FIfF, Afilias, Open Rights Group||Civil society and MS||Surveillance: Democracy at stake!||Surveillance by States and by Business creates monopolies of power which endanger democracy. Those new monopolies of information collection and automated evaluation endanger and undermine human rights. In order to preserve human rights and enhance their enforcement in the digital society, we need to strengthen the informational self-determination of citizens in all spheres of society, particularly leisure and consumption, health, social security, work, media, politics. Which regulatory approaches and frames are needed to ensure such "informational self-determination" of citizens and Internet users and can prevent concentration of power and eroding of democracy and rule of law? How can respective provisions be effectively enforced?|
|81||Lee Hibbard||Council of Europe||Europ. Org.||Mass surveillance and the right to privacy : how can our human rights be enforced and reinforced?|
|85||Christian Horchert||CCC e.V., Germany||Technical community||Securing civil society -- How can we get rid of insecurities by design which leave us vulnerable to attacks of all types? And what does it actually mean, if we are not able to fix the technical problems in the future?||The base of our society depends on complex, networked technical systems - be it for communication in general, be it related to economy, politics or much of our everyday’s life. From the perspective of civil society we can\'t distinguish between attacks from organized crime, intelligence agencies, armies or scriptkiddies, so we need at least to agree on the fact that we have an issue here, especially if the continue to let backdoors and insecurities on purpose stay the way they do right now. There is hope, but only if we agree what is necessary to protect infrastructure, i.e. by having better liabilities for soft- and hardware as well as data and a massive intervention to actually fix many of the current problems. In order to get this done there must be a technical as well as a legal effort.|