Security and privacy
After two years of negotiations, the UN Open-ended Working Group (OEWG) on developments in the field of information and telecommunications in the context of international security has adopted its final report. Here, APC presents its positions on the most salient points of the report.
The COVID-19 pandemic spurred on existing debates and developments on privacy, government surveillance and data monetisation. But what do all these mean for the Asia-Pacific, the region where most of the world’s population lives but whose voices are often overlooked in global tech discourse?
The Indian government has taken various measures that violate free expression and privacy rights in response to growing international criticism of its handling of the farmers protests, targeting critics of the authorities and supporters of the protests.
APC welcomes the opportunity to engage in this session. We appreciate Ambassador Lauber’s openness to civil society and the OEWG’s willingness to receive and consider comments by non-state actors.
In this response to the first substantive draft of the Open-ended Working Group on ICTs (OEWG) report, APC and other civil society organisations provide general feedback, focusing on the “introductory remarks” and the “conclusions and recommendations” sections, and provide recommendations.
This piece is the second in a series where Julia Keseru explores the connection between our online systems and bodily integrity, and the long-term effects of digital innovation on our collective well-being.
7amleh - The Arab Center for Social Media Advancement has announced the opening of registration for the fifth edition of the Palestine Digital Activism Forum, which will take place online this year, between 29 March and April 1.
APC welcomes this opportunity to address comments to the zero draft of the United Nations Open-ended Working Group on developments in the field of information and telecommunications in the context of international security (OEWG) report.
The African Digital Rights Network has published the first study to compare the digital rights landscapes of Zimbabwe, Zambia, Uganda, Sudan, South Africa, Nigeria, Kenya, Ethiopia, Egypt and Cameroon.
"Gender Approaches to Cybersecurity" explores how gender norms shape specific activities pertaining to cybersecurity design, defence and response. In each of these three pillars, the research identifies distinct dimensions of cyber-related activities that have gendered implications and, thus, need to be considered from a gender perspective.