|

All Comments

Comments on the Pages

  • Asia Pacific Regional Internet Governance Forum 2017 Bangkok Synthesis Document – Draft 0 (140 comments)

    • Comment by Hong Xue on July 27, 2017

      We may wish to clarify the meaning and definitions of couple of legal terms mentioned here. Data localization is not equal to prohibition of cross-border data flow. Protectionism is too broad and negative to be used here.

      Comment by Mili on July 27, 2017

      While the document is a great way to summarise the content at the conference, my concern is around the use and dissemination of the document and the learning thereby after the event.

      Comment by APrIGF Secretariat on July 27, 2017

      New proposed section: Capacity Building (Joyce Chen, ICANN, Townhall 1)

      Comment by Nigel Hickson on July 27, 2017

      Think an additional paragraph referencing the desirability of governments working with all stakeholders in promulgation of such policies and legislation should be added; this was consensus of the Session this morning (run by Joyce Chen).

      Comment by Mili on July 27, 2017

      Adding to the earlier comment it not just important to increase accessibility in the technological format sense, I also feel it is important to simplify the content in such a way that it is understood easily by all the end users of Internet broadly and can also serve as a user friendly document for referencing, learning for the new comers in the fraternity.

      Comment by wanawit ahkuputra on July 27, 2017

      [31]multi stake holder approach for government in developing the policy relate to the electronic authentication and electronic signature. Technology limitation and user experience.

      Comment by Joyce Chen on July 27, 2017

      To include another section dedicated to activities around capacity building on Internet Governance such as newcomers capacity building day, and encouraging APAC participation in IG issues.

      Comment by Adeel Sadiq on July 27, 2017

      If we mention Reliable with I. Access, we do not need section 19. Reliable Access means the Internet blocks is already covered in that.

      Comment by Jinel on July 27, 2017

      Kindly include entry re PWD and accessibilities.

      Comment by Adeel Sadiq on July 27, 2017

      It should be Reliable Access, not just Access.

      Comment by Jonathan Brewer on July 27, 2017

      We say “strategies must be developed” but in fact the ITU & World Bank InfoDev already have excellent strategies published in their ICT Regulation Toolkit. Should we instead seek to update or promote their work?

      Comment by wanawit ahkuputra on July 27, 2017

      Digital economy and trade[commerce]

      Comment by Jinel on July 27, 2017

      This I think should be lifted from here. It actually covers all the sections, from access, security, digital economy, to human rights.

      Comment by Jianne Soriano on July 27, 2017

      Youth-driven initiatives have been mentioned in this paragraph. Adding a section on the discussion outcomes of the YIGF role-play session from each of the three committees that have been formed after the final round-table discussion on the final day.

      Comment by Karma Tshering on July 28, 2017

      When it comes to improving access to Internet, one of the biggest hurdles is digital divide. Even if the Internet is taken to their door step, digital illiterate (or even uneducated ones) gets left out from the inclusion. So the strategies must be also focused on helping/supporting those people who are first time ICT users. For example, community centers with Internet facilities can be setup within the community and the operators can support those people.

      Comment by wanawit ahkuputra on July 28, 2017

      from TPP Definition :
      Data Localization -> Location of Computing Facility (article 14.13)
      Cross-border data flow -> Cross-Border Transfer of Information by Electronic Means (article 14.11)

      +1 on the aspect of clarify the meaning and actually in the TPP text there were no definition of the term in the article text

      Protectionism were the term widely use in the “Trade” . As the text contain in the chapter were under the ecommerce chapter of trade agreement. “Protectionism” were well understood on the method/measure use by each party. But in the technology aspect of this tech might lead to different understanding. We could try to get some suggestion on what should be the appropriate term to use.

      Ref: https://ustr.gov/sites/default/files/TPP-Final-Text-Electronic-Commerce.pdf

      Comment by Maureen Hilyard on July 28, 2017

      Thank you Jonathan. The text was a filler taken from the workshop 12 description, but thank you for reminding us of the toolkit and how it would be useful to refer to it with respect to strategies already in place.

      Comment by Maureen Hilyard on July 28, 2017

      Comments made in Town Hall session 1
      * Kuo Wei – long workshops and ‘next billion’ focus
      * Visharaad – inclusion of disability and accessibility guidelines
      * Nigel – include data related to workshops and attendance, etc
      * Ali – elearning – to raise greater awareness – different approaches for different target audiences
      * Joyce – add capacity building as a separate ection
      * Edmon – Privacy (transferred to S11)
      * Jemil – include PWDs and acessibility
      *Adeel – access issues..
      * Edmon – supported capacity building – separate section explaining what we want to say about CB
      * Vashkar – the SD must be accessible to all users – and language needs to be user friendly
      * Winston – report consists of complicated language – format is great but formal concepts are expressed by technical experts – their credentials?
      * Hong – general structure – some sections closely related – current headings may need to be renamed
      * Mili – supported CB section – for newcomers – perhaps set up an information portal to assist with CB
      *Wanawit – government – trade vs commerce

      Volunteers
      * Access – Michael Pepen, Benjz, Waqas, Hongwu Dai, Wanawit, Anna Thomas, Gangesh Varma
      *Human Rights – Valencia
      * Capacity Building – Mili

      Comment by wanawit ahkuputra on July 28, 2017

      Online personal information protection and cross border flow of information is one of the major topic under the III. Digital Economy and Enabling Innovations . Whether we need to have more text reference to the aspect of e-commerce under this para 15.
      Or we address the privacy and data protection aspect under the para III. Digital Economy and Enabling Innovations.

      Comment by wanawit ahkuputra on July 28, 2017

      +1 to Adeel
      The reference WS.25 (Supporting National Computer Emergency Response Teams for Improving Cyber Security) were not relate to the title of the para 20.

      Comment by Arthit Suriyawongkul on July 28, 2017

      Data about requests should be…
      –>
      Data about requests, such as user data request and shutdown request, should be…

      (give examples, for readability)

      Comment by Praveen on July 28, 2017

      Internet is not something which is created by single entity, it’s a wish, work and infrastructural development of every stakeholder, but unfortunately most of the Internet infrastructure is owned by private corporations rather than the civil society. Majority of Internet infrastructure is copyrighted. So it’s the responsibility of governing bodies to make the basic infrastructure which builds the Internet under the Open access and accessible to the public.

      Comment by Arthit Suriyawongkul on July 28, 2017

      protection from … [illegal] and harmful online contents

      –>

      mind the word “illegal”, as the legality and legitimacy are two different things.

      Encrypted (“secure and private”) communication is illegal in some countries, for example.

      Comment by Ang Peng Hwa on July 28, 2017

      As the opening plenary was on the Gender Divide, perhaps this item should be moved higher if not close to the very top.

      Comment by nd on July 28, 2017

      suggestion: “common issues of interest”

      Comment by Arthit Suriyawongkul on July 28, 2017

      Suggest to add a point on consideration for “expiration date” of protection measure and mechanism.

      Some data encryption or data masking used today to protection data may works today but not necessary works 10 years from now. But the owner of the personal data still alive, without the protection.

      More comments will be collected from workshop “WS83 Upgrade Required: Obfuscation and cryptographic standards for data protection law in the age of linked and big data” tomorrow – http://apps.2017.rigf.asia/submission/proposaldetail?id=113

      Comment by Can Udomcharoenchaikit on July 28, 2017

      There should be more discussion on Free and open-source software (FOSS). Since, it is one of the fundamental components for an internet that is open and accessible to all, an internet that repects our privacy. FOSS ensures that we have control over the technology we use in our daily life. FOSS ensures that the technology we use is transparent, and does not do anything malicious behind our back.

      Comment by Lin Tsz Ching, Cadence on July 28, 2017

      The recent trend is that censorship does not merely come in closing down of network or interrupted access to the Internet, but sometimes authoritative governments deliberately create traffic jam for websites that voices unfavourable opinions or opinions from the minority so that the website becomes unaccessible. Maybe this could also be acknowledged in the synthesis document and assistance and protection for those websites could be considered.

      Also, in my opinion any disruptions to the access to mobile and Internet services should be avoided at all cost, no matter whether standards have been established in national legislation or what because access to internet is a basic human right which should not be violated. Laws that are against this human right are not justified, and provides an excuses for authoritative regimes in censorship.

      Comment by Raman Jit Singh Chima on July 28, 2017

      The statement section here should note the importance of protecting the right of users to secure communications and the role that encryption plays in that and ensuring digital security as a whole.

      Comment by Arthit Suriyawongkul on July 28, 2017

      [ protection of children[27] and youth]

      Not only children and youth are vulnerable. Senior citizens are too, if they have lesser experience about the internet.

      Child protection in itself is an idea from offline world that taken for granted that senior citizens are more experienced. This is not true for online, may be true in the future but not now.

      Comment by Raman Jit Singh Chima on July 28, 2017

      I don’t think there is unanimous consensus that the COE Convention on Cybercrime should always from the basis for national legal frameworks on this.

      We should also explicitly note that legal frameworks in this area should build on the increasing international human rights law norms in this area, particularly those from the UN Special Rapporteurs on Free Speech, Privacy, and others, along with documents from the Human Rights Council such as General Comment 34 (on free expression under the ICCPR).

      Comment by Arthit Suriyawongkul on July 28, 2017

      Because computer getting faster, more data available, reidentification techniques are smarter. — Data encryption, data masking, data obfuscation techniques for data protection that work 10 years ago may not work today. Those work today may not work 10 years from now.

      This means the owner of the personal data who still alive 10 years from now will no longer have technical protection.

      The regulation should address this and make the regulation future-proof, at least to the life span of a human.

      Comment by Can Udomcharoenchaikit on July 28, 2017

      Sorry, this comment supposes to be for the whole document not just for this paragraph.

      Comment by Benjz Gerard Sevilla on July 29, 2017

      Suggested addition: The challenge then is for us to streamline investments towards an integrated digital economy. The same is accorded to how data is prized as a government asset and a catalyst for private sector investments.

      Comment by Benjz Gerard Sevilla on July 29, 2017

      Suggested Addition: The bottomline objective is to build on the experience of the multi-stakeholder process involving government, businesses, civil society and other sectors of the digital community, and to harness their energies into bringing the benefits of the digital economy to all citizens.

      Comment by Benjz Gerard Sevilla on July 29, 2017

      Suggested addition: As a basic right, qualified access to information is a democratizing platform and with this sense of confidence, the APrIGF lays the necessary groundwork for the development of the broadband ecosystem for the use of internet in participatory democracy.

      Comment by Amrita Choudhury on July 29, 2017

      Public access not only helps to improve digital literacy and provide access to marginalized and under served communities, it also helps to provide “assisted access” to people who are not internet savvy.

      Comment by Amrita Choudhury on July 29, 2017

      For ensuring Cyber security, Privacy and Safer Internet, it is imperative that there is collaboration and more emphasis on capacity building among decision makers on the implications of their decisions,

      Comment by Peerarust Siriamphan on July 29, 2017

      Even though it’s a very good idea to help the people with lack of English skill to be able to access to internet easily but from my experience now people with lack of English skill still have the ability to access to the internet. For example if they want to search for the information there is a google app on the mobile phone. Both iOS and Android system have local language instruction. They don’t really remember what URL the website have all there care about is the tittle and short description on Google.
      For the EAI, for Thailand. I have ask some of my friend and all of them never know about IDN and EAI and they are all don’t interested in having local language email or domain. If I have any chance to interview people from more rural area I will updated here.

      Comment by Arthit Suriyawongkul on July 30, 2017

      [resilience to disasters]

      While ‘resilience to disasters’ and, in general, ‘availability’ (which is part of information security) is important, I don’t think it should come as the first thing under ‘Access’.

      Comment by Arthit Suriyawongkul on July 30, 2017

      Hmm.. or should the substances from the discussion be mentioned in the relevant sections, instead of having a separated section on youth? I’m thinking more of the integration of all demographic groups.

      Say, if there’s a concern or observation on cybersecurity from the YIGF role-play, should that comment be put in cybersecurity section? Likewise, if there’s a comment from YIGF on access, put it in access section.

      Comment by Arthit Suriyawongkul on July 30, 2017

      Data protection section should mention about the data-driven discrimination.

      Right to explanation (of algorithmic decision-making) is proposed in WS80.

      Comment by Arthit Suriyawongkul on July 30, 2017

      The International Principles on the Application of Human Rights to Communications Surveillance (the “Necessary and Proportionate Principles” or “13 Principles”) should be mentioned here, as it is one of the principle related to the most fundamental part of the internet and it is in itself the principle that developed in multi-stakeholders fashion.

      Comment by Arthit Suriyawongkul on July 30, 2017

      Conclusion section is needed.

      Comment by Arthit Suriyawongkul on July 30, 2017

      [Internationalized Domain Names (IDNs)[18] and Email Address Internationalization (EAI)]

      In order to support this, as well as other native language interface and input/output, the infrastructure like Unicode encoding and supporting fonts for languages are also needed.

      There are also cases that the Unicode for a language is supported on desktop operating systems, but not on mobile operating systems. This rendered the access
      to names and contents in that language impossible or confusing.

      Take the example of non-Unicode ‘Zawgyi’ font of Burmese language, which is popular in mobile phones but make it difficult to access to Burmese Wikipedia. (for more details, see ‘Burmese Wikipedia’ in English Wikipedia)

      Comment by Arthit Suriyawongkul on July 31, 2017

      The problem now is that many mobile phone vendors prefer to install non-Unicode font (‘Zawgyi’ in Burmese) as default font of their devices.

      While installing Unicode font is possible by the user, it takes further effort and technical skill which not necessarily has in every users.

      Mobile phone manufacturers should work together with internet governance community and language community [esp ethnic/minority language communities] to guarantee access to languages in a standard way on the internet.

      This comment (on character encoding, font, and access) has been addressed in side-event Internet Universality Indicators by UNESCO and APC during APrIGF 2017 (29 July 2017).

      Comment by Arthit Suriyawongkul on July 31, 2017

      Mobile phone and IoT manufacturers and software developers should responsible on providing security patch in a timely manner for a guaranteed period of time after the time of purchase.

      ‘Capacity building’ is pretty much addressed and highlighted in different venues of internet governance, but cybersecurity & privacy on the internet platform is the area where capacity building alone doesn’t work — as people are heavily rely on the device and network that they use – and they don’t have a [technological/administrative/legal] permission to upgrade/update/patch these devices by themselves even they do have ‘capacity’.

      Safe behavior on vulnerable device is not safe.

      There should be a form of regulation to make sure that internet-connected manufacturers will take responsible in making their devices secure for a reasonable time period.

      For example, if the average mobile phone changing cycle of consumers is 3 years, the reasonable time period for manufacturers to keep releasing security patch of their mobile phone can be 3 years or more.

      Comment by Arthit Suriyawongkul on July 31, 2017

      Support this comment on FOSS, which can also related to the transparency of algorithmic decision-making as well – as discussed in WS80.

      Comment by Arthit Suriyawongkul on July 31, 2017

      Agree. At least it is the fact that Convention on Cybercrime is signed in 2001 or 16 years ago.

      Internet has changed a lot since then. Facebook founded on 2004, YouTube 2005. iPhone released in 2007, Android in 2008. It’s quite a different internet.

      Comment by Arthit Suriyawongkul on July 31, 2017

      How about having a “Human-readable version”, like what Creative Commons License has? :D

      Comment by Arthit Suriyawongkul on July 31, 2017

      +1

      Comment by Nusrat Mehajabin on July 31, 2017

      Data should have classification. For example personal data, financial data, historical records, fake news etc. And each class should have its own models and methods for being forgotten. Emphasis on financial data and if forgetting financial data is wise or not is also a topic worth exploring.

      Comment by Nusrat Mehajabin on July 31, 2017

      case studies of cyber crime and model/traditional penalties (of course with anonymizing the victims) could be made available to the cyber crime eradication training programs

      Comment by Nusrat Mehajabin on July 31, 2017

      We often talk about how to reach the users to raise awareness. We could consider the power of advertisements on websites as advertisements contributes heavily to the digital economy. different advertisements can promote holistic internet governance and the multi-stakeholder approach and make them aware that they have a say and they can make their voices count.

      Comment by Nusrat Mehajabin on July 31, 2017

      Each APrIGF could reflect on its predecessor. That is we could set out some goals each year and next year evaluate what have we done to achieve those goals.

      Comment by Nusrat Mehajabin on July 31, 2017

      ICT infrastructure prerequisites other facilities such as uninterrupted electricity supply. However internet connection is useless if we don’t have the power to fuel it. so we need to speed up other development processes to match digital progress

      Comment by Juggapong on August 1, 2017

      why is it conflict to each other?

      Comment by Juggapong on August 1, 2017

      Can we say ‘appropriate level of protection which meets international standard should be’…..

      Also, we may add what should be done e.g. incorporating social norm + laws + tech is needed to address the problem?

      Comment by Lokesh on August 1, 2017

      I agree with you. I think it’s for us who are part of the IG to take it up and simplify further. But I do feel that these documents should not just remain as technical publications and shelved. Can a group of volunteers like us take it up and reach these issues to the actual end users of the internet? I am ready to volunteer.

      Comment by Lokesh on August 1, 2017

      Agree Amrita, and going forward I feel there is a strong need of a group that exclusively works or provides guidance on how such a public access could be provided, what infrastructure is needed, cost effectiveness, local ownership of such an infrastructure are some of the issues that need urgent attention especially in the context of hard to reach communities.

      Comment by Hong Xue on August 1, 2017

      I really don’t seem any reason for isolating the so-called the right to be forgotten from privacy and data protection. Is there any strong and compelling reason for so doing?

      Comment by Mili on August 1, 2017

      Lets do it! You can reach me at [email protected] and I will brief you on the plan. (Got one in my head)

      Comment by Mili on August 1, 2017

      A compiled list of actionable items/ or key takeaways…that summarises the discussion in the document for a quick scan. Point form. precise and objective.

      Comment by Mili on August 1, 2017

      Youth initiatives like yIGF, Netmission programs, various capacity building platforms to engage and encourage more and more youth to contribute to IG discussions. But necessary to highlight issues they face like the major problem is sustainability, funding, gender diversity especially in ASEAN.

      Comment by Mili on August 1, 2017

      Access issues in Asia are majorly driven by infrastructure and lack of basic facilities like electricity. Need to strengthen them first specially in remote terrains – Indonesia, Phillippines, India, etc in order to promote use of Internet.

      People do not however, want to compromise freedom and speech for better access. Monopolisation of Internet by ISP’s or large telecom operators are detrimental to the pricing thus making internet access more affordable.

      Comment by Zakir on August 1, 2017

      May be, we should rephrase this para slightly. e.g
      “The Asia Pacific Regional Internet Governance Forum (APrIGF) serves as a multi-stakeholders driven platform for discussion, knowledge sharing, and collaboration at a regional level, and also where possible to aggregate national and local IGF discussions, to ultimately advance the Internet governance debate and initiatives in the Asia Pacific region.

      Comment by Zakir on August 1, 2017

      The terms “Access” here is referring to “connectivity”. I think we should have something related to “accessibility” as well.

      Comment by Don Hollander on August 2, 2017

      Expanding digital literacy and access will also have a (generally) positive economic impact. I’ve seen reports that a 10% increase in access results in a 1% increase in GDP. It is important, I think, to make sure that Digital Literacy goes hand-in-hand with Access because this will ensure users will be able to discern good from naughty.

      (PS: Your system rejected my IDN email address)

      Comment by Don Hollander on August 2, 2017

      There is a LOT of meat in this one paragraph and could well do with breaking it up.

      Technologies

      Policies

      Processes

      Comment by Don Hollander on August 2, 2017

      Should there also be encouragement for consistency across jurisdiction so that bad guys can’t hide somewhere where there’s inconsistent rules from where they act.

      Comment by Don Hollander on August 2, 2017

      [serious economic consequences]

      …serious economic, social and cultural consequences…

      Comment by Arthit Suriyawongkul on August 2, 2017

      May take a ‘drop-down bullet’ approach adopt by Manila Principles on Intermediary Liability (google that).

      Show simplified headings, click on a heading for more explanation bullets. And a click on ‘Read More’ for background papers full of references.

      Comment by Arthit Suriyawongkul on August 2, 2017

      Please link to https version when available.

      Comment by Arthit Suriyawongkul on August 2, 2017

      Please link to https version.

      Comment by Arthit Suriyawongkul on August 2, 2017

      Wonder if this short url (igf asia / WS_1) will be a permanent link?

      If it’s not and the destination may change in the future, we shouldn’t use it for reference. (should use the full url instead)

      Comment by Arthit Suriyawongkul on August 2, 2017

      [Community networks and public access to ICT]

      We have at least three big things here, at least according to the heading “Access, Empowerment, and Diversity” – and may need to break this down to subsections for readability.

      # Access

      This is more about infrastructure, and as other comments already pointed out, can be many things in this package.

      To take something similar from other public policy circle, can think of 3As of Availability, Accessibility, and Affordability, widely adopted in public heath, or 5As, with additional of Adequacy and Appropriateness, from patient perspectives.

      Resilience is also here [WS 38].

      “Digital Economy” workshop like [WS 57] is obviously connected to this subsection.

      # Empowerment

      This may be more about the ability of a person or a social group to use the available infrastructure.

      Digital natives (youth) [WS 41], digital migrants (older people who new to digital environment), and marginalized communities whose their offline social status may also undermined their online social status, should be all under the consideration of this Empowerment section.

      (The ‘Internet Universality Indicators’ by UNESCO seems to discussed a lot on this.)

      # Diversity

      IDN, EAI, Unicode, fonts, local contents are here – and may need collaboration with wider circles and this is something that have to rely on standards that larger that internet alone.

      I understand that the librarian people who attend IGF take this very serious. May able to take more comments from [WS 74].

      —-

      Take one example: Mother who have to raise their kids at home all day can’t afford to go to telecenter. This is Access + Empowerment issues combined and an example of building network or access points alone does not necessary addressed the access problem.

      So in this sense [WS 93] can also be discussed here (there are a lot of overlapping, i know).

      Comment by Rajat on August 3, 2017

      I agree with Art’s point here as well as his comment on the priority given to “ICT resilience to disasters”.

      I’d also like to highlight a key differentiator between Access and the Ability to use. Maybe we can add a little line on digital literacy.

      Comment by Karma Tshering on August 3, 2017

      [ IPv6]

      When more and more focus is geared towards IPv6 adoption, it is also equally important to make such adoption affordable. Else those users who can not make the transition from IPv4 to IPv6 will be impacted, and consequently, for giving access to the next billion users, the old users will be sidelined.

      Comment by Karma Tshering on August 3, 2017

      [Community networks and public access to ICT]

      In the workshop session – public access of ICT, there was greater emphasis to develop more local contents to diversify the Internet resources, which will enable easy access to non-English speaking users.

      Comment by Karma Tshering on August 3, 2017

      [Privacy and data protection]

      When it comes to security, privacy and data protection, the policy makers are confronted with the balancing act of CIA framework, which emphasize on “Confidentiality”, “Integrity” and Availability. It is always challenge to sufficiently protect the data, but also making easily available to intended users. So it again drives down to policy decision of providing appropriate balance between “restricting access” and “granting access”.

      Comment by Rom Kant Pandey on August 3, 2017

      Gender based violence not only women and child also affected socially marginalized groups.

      Comment by vashkar bhattacharjee on August 3, 2017

      Please include an word inclusive

      Comment by vashkar bhattacharjee on August 3, 2017

      Please include inclusive Internet Governance in the last line.

      Comment by Harish CHowdhary on August 3, 2017

      eUniversal Acceptance issue including E-mail Address Internationalization and IDNs is very Important for AP region as Next 500 million Internet users are from AP region itself.
      Ascii based Internet is barrier to those who are not familiar with ASCII based languages,in getting online.A multilingual internet is useful for all so that every one can have the benefits of this marvelous technology.
      We should also come together to solve issues related in to Universal Acceptance i.e. Speech to text search in local languages

      Comment by Suphannee Grace Burnell on August 3, 2017

      1.”Access” is one component of New Media Competence or Digital literacy. All groups need ability to access as same as they need knowledge to “analyze” messages and “Create” their own message at the same time.
      2. As we know the population of senior citizens all over the world are grew up and Digital literacy and digital access have become increasingly important for all cohorts. That’s the reason why we can not ensure that senior citizens may be regarded as a homogenous group, We can not think this group does not want or is not able to make use of ICT but we need to understand their limitation and support them.

      Comment by Adli Wahid on August 3, 2017

      Cybersecurity contain many sub-themes (i.e. system/infrastructure resilience, safety, privacy, cyber crime, etc) and many actors. It is important to encourage the technical community in those domains to engage with other stakeholders so there is clear understanding of the problems and discussion on possible solutions.

      Comment by Salanieta Tamanikaiwaimaro on August 3, 2017

      In addition in 2018, the High Level Political Forum at the UN HQ in New York will be an opportunity for the National Regional IGF Initiatives (NRIs) to showcase how this is achieved on a practical level around the world.

      Comment by Salanieta Tamanikaiwaimaro on August 3, 2017

      On the issue of Access. there are a host of organizations who are involved across the multistakeholder environment who deal with “Access”. At the WSIS 2017, Chinese Multinational Corporations such as Huawei presented on how they intend to connect the next billion. You have IGOs that have diverse strategies on bridging the digital divide but what we want to do is (in IGF fashion) allow for the opportunity to synergize efforts to bring development whether at policy level, infrastructure level, technical standards, innovation at the edge etc. Asia Pacific is on the cutting edge of development with crypto banks in Malaysia, and Indonesia happens to be chair of the UN 2nd Committee which looks after the Addis Ababa Agenda which was passed by the UNGA. However with Accessibility there are issues of inclusion and threats that come with growing Access which require mitigation.

      Comment by Salanieta Tamanikaiwaimaro on August 3, 2017

      China has recently introduced law banning VPNs which pose as a threat to freedom of expression or freedom from surveillance by the State. Other countries have for years attempted to stifle accessibility by internet shutdowns and we have seen this in the deliberate throttling of the internet in Iran, internet shutdowns in countries like Pakistan, attempted banning of You Tube and Facebook etc in other countries.

      Comment by Salanieta Tamanikaiwaimaro on August 3, 2017

      Countries are not obliged to respect international law only those which they have ratified. We cannot impose they respect the conventions. But what needs to happen is that the NRIs are afforded a unique opportunity to dialogue within their communities and advocate for an open and free internet. However, something that has been missing are international minimum standards that the global community can agree to abide by in diverse areas including but not limited to privacy, data protection, surveillance, inclusivity etc.

      Comment by Salanieta Tamanikaiwaimaro on August 3, 2017

      The jump from para 12 to para 13 is disjointed. Para 13 is clearly referring to cyber crime. There should be mention on the need for Digital or Electronic Evidence rules, issues of admissibility, uniform timestamping protocols, judicial training etc.

      Comment by Salanieta Tamanikaiwaimaro on August 3, 2017

      I mentioned something on Privacy in a previous comment in relation to the banning of VPNs in China…etc. There was also discussion in the remote chat during the APrIGF about the need to regulate agreements and create international minimum standards. For instance telcos and providers at the edge or OTT onsell customer information etc. So it’s not just government doing surveillance but private sector as well. The NRIs are well positioned to foster and engage in dialogue in the macro APrIGF level as well as in their respective jurisdictions to engage in elaborate discussion.

      Comment by xxx on August 3, 2017

      You madе some go᧐d points there. I checked on the
      web for more information about the іsѕue and found most peoρle wіll go along with your views on this website.

      Comment by Hailey YANG on August 3, 2017

      Agree. We should put emphasis on the effort in bridging and narrow the digital divide with the aim to enhance the Internet environment with higher access, empowerment and diversity, like the fundamental infrastructure and adequate and sustainable capacity building.

      Comment by Hailey YANG on August 3, 2017

      I totally agree with Arthit that “resilience to disaster” should not come first under the section access, but an item after basic access for the general public is achieved. Thus, it will be better and make more sense if we put it at later part.

      Comment by Hailey YANG on August 3, 2017

      About IDNs, in the awareness level, every party should study and explore the linguistic factors of domain names contributing to the global digital divide, how Internet domain names are managed, citing the IDN development cases in Thailand and Russia.

      People in many countries still do not recognize the cert, both cyber attacks, people should know.

      Should be done public guide. To let the public know what the cert is responsible for, why should you know?

      Make a public guide about Cybersecurity For the common people.

      The Cybersecurity public guide and Cert public guide are must not use a lot of manual text, use the infographic to explain.

      Comment by ALI HUSSAIN on August 4, 2017

      The capitalist economy of world is going into the hands of few rich people and the divide of rich and poor is increasing. In order to meet the sustainable development Goals the policy should reduce the gap between rich and poor citizens.

      Comment by Vishaarad on August 4, 2017

      I support what Lokesh has purposed thus I would like to volunteer also

      Comment by ALI HUSSAIN on August 4, 2017

      There should be updated cyber crime legislation in every country but the legislation must be adopted after the consensus from multi-stakeholders independent of law enforcement.

      Comment by Vishaarad Sharan on August 4, 2017

      MANILA PRINCIPLES ON INTERMEDIARY LIABILITY https://www.manilaprinciples.org/

      Comment by Khulan Batbayar on August 4, 2017

      We should discuss to give sense of ownership to the communities. Support them to create their own Internet or local network infrastructure and let them help within themselves. Communities helping to the communities. People tend to be protective and caring towards their own properties.

      Comment by Khulan Batbayar on August 4, 2017

      There are number of ways to provide a low cost access to the rural areas where major ISPs consider it not profitable. And they also offer net neutrality through that network infrastructure (e.g. community network). We should raise awareness to the government and locals. It is time to try bottom-up approach rather than top-down approach

      Comment by Khulan Batbayar on August 4, 2017

      We should not only depend on the government to do the things for us. It takes time. I think people help themselves to create their own infrastructure.

      Comment by Khulan Batbayar on August 4, 2017

      Agree with you. There is no use of creating an infrastructure if there are noone to use it.

      Comment by Khulan Batbayar on August 4, 2017

      [Access and empowerment]

      While providing an access to the rural areas, empowering local people to benefit from the Internet is one of the most important thing. Creating a business opportunities through Internet, periodical education programs, practical workshops are must!

      Also, age gap of Internet users should be considered more. Because some areas younger people are more interested of using the Internet, but what about middle aged and older people? How are they going to benefit?

      Comment by Vishaarad Sharan on August 4, 2017

      Similarly; those who are disable and those suffering mental or cognitive impairments; disorders and dysfunctions since this group of users are vulnerable on the internet and need protection.

      Need to publicize why large organizations should have their own cert.

      Comment by Vishaarad on August 4, 2017

      Mesh networks should be also be included when dealing with infrastructure, digital literacy and empowerment’ and accessibility

      Comment by Vishaarad on August 4, 2017

      Freedom of expression in the public sphere, such as public Tweets; remain public as opposed to protected Tweets; these has not correlation with breach of privacy.

      Comment by Vishaarad on August 4, 2017

      +1

      Comment by Vishaarad on August 4, 2017

      +1 A similar approach is being take by the current Fiji Government but is limited to schools in rural areas

      Comment by Vishaarad on August 4, 2017

      Freedom of expression and privacy needs greater clarification since in the real world public sphere, such as public Tweets; remain public as opposed to protected Tweets; thus has no correlation with breach of privacy.

      Comment by Vishaarad on August 4, 2017

      There is a need to protect the IG multi-stakeholder model from political and corporate lobbying

      Comment by Vishaarad on August 4, 2017

      An example from Fiji, Software Foundation; a non-profit organisation had instituted an eLearning project at a rural school this was achieved by creating the needed digital infrastructure.

      Comment by Vishaarad on August 4, 2017

      +1

      Comment by Vishaarad on August 4, 2017

      +1

      Comment by Vishaarad on August 4, 2017

      The might be a need for a sub-heading for blocking of anti-government websites in the region. But, to this; Fiji has provided an interesting example, when in 2006; there was a coup and subsequently a military lead government; there was no blocking of anti-government websites by the regime.

      Comment by Vishaarad on August 4, 2017

      A sub-heading on ‘Hate Speech’ and ‘Freedom of Expression’ is needed? Including a paragraph on how to distinguish them is need? In the Pacific region, Fiji has issues relating to Racial and Religious Hate Speech over the internet and particularly in social-media.

      Comment by Vishaarad on August 4, 2017

      Is there a need for a sub-heading/paragraph on pornography, profane, indecent, nudity and sexual content? For social-media, same guidelines for women should apply to women (unless the content is anthropological in nature). Men should not be allowed to post photographs which show exposed chest similar to women.

      Comment by Winston Roberts on August 4, 2017

      I suggest giving the full title of the WS.

      Comment by Winston Roberts on August 4, 2017

      In the last line I suggest you delete ‘from’ and give the exact dates in December.

      Comment by Prasanth Sugathan on August 4, 2017

      Online Harassment

      Efforts are required involving all stakeholders to make the Internet a safe space for all, including the voices of the minorities. Solutions to online harassment can take many forms, such as victims speaking out about their abuse, better community standards by social media companies, digital security precautions, self-help strategies, stricter laws, and better efforts by law enforcement agencies.

      Comment by Prasanth Sugathan on August 4, 2017

      Algorithmic Transparency

      Algorithms form a basic part of data analysis and artificial intelligence. They are made by various entities in order to analyse data and make use of data for purposes such as profiling, showing targeted advertisements, showing relevant search results, as well as performing automated tasks such as those performed by self-driving cars.
      Disclosure of algorithms can facilitate governments, researchers and the general public in understanding what kinds of data is used and how that data is used, leading to an increase in privacy awareness through openness and transparency.

      Comment by Winston Roberts on August 4, 2017

      Hi, as the convenor of WS74, I’m glad to see lots of people ‘got’ what our panel of speakers were saying. It is also correct that the library sector experts (civil society) who I represented at APrIGF regularly attend the global IGF and advocate for “access to information”. I refer you back to the WSIS Geneva ‘Principles’ (2003) which have very clear wording on the need to plan for appropriate technology + skills training + buildings (telecentres, libraries, dual-purpose schools/community information kiosks, whatever you want to call them…) to help grassroots communities cross the digital divide. ‘Access to information’ is not a nice ideal, it is a basic necessity to help people get education, to improve their life chances. It has an economic impact. That is why the WSIS Geneva action lines included e-health, e-education, e-agriculture, etc…

      I agree with the person who said this section probably needs to be split up a little more, to give a little more space to expand the ideas. But it doesn’t need too much rewriting, just enough to refer to the authoritative documents which already exist, briefly quoting a few key concepts from them.

      Comment by Amrita Choudhury on August 4, 2017

      A multi stakeholder approach to resolve the issue of universal acceptance is of prime importance. Industry, government, technolologist, academia, civil society, need to come together, discuss and work to resole the issue. It is also very important to take the views of internet users and non users about what they want, since they would be the ones who would use internet in local language in the future.

      Comment by Amrita Choudhury on August 4, 2017

      Shut downs leads to social instability, human insecurity and loss of peoples trust in situations often marked with social and political unrest. It is important to measure the impact of internet shut down and also to analyse what situations trigger internet shutdowns and who is given the iscretionary power to do so. Further what are the extreme situtaions when internet can be shut down and what is the process that will be followed needs to be discussed.
      Infact rather than trying to shut the internet Dialogue, transparency and openness to try and find alternate solutions to this difficult issue could be the approach.

      Comment by Amrita Choudhury on August 4, 2017

      The gender digital divide should also highlight in access and the strategies which need to be adopted by nations to connect the women, the marginalised and disable.

      Consult the public before issuing Internet control or censorship rules. Because some cases do too unnecessarily. Violations of privacy and privacy

      In Thailand I very concerned about this concept. “The Council for the Advancement of the Reform of the Nation,” with the intention of “fully regulating Social Media,” with excessive censorship or blockade, violating privacy rights, being able to sneak information at any time, blocking its services. nation By claiming that the protection of the internet and games addict.

      (News link (in thai) https://www.beartai.com/news/179268 )

      Comment by hvale vale on August 4, 2017

      The opening and many of the panel showed as gender is crosscutting and cannot be considered or highlighted just under the human rights section. Access to infrastructure, information, knowledge shown how the excluded are women and individuals discriminated by being gender non conforming. I would suggest a preamble acknowledge gender as a key divide and engage with substiantial strategy to practice inclusion. Innovation with no gender thinking/designing will never be really inclusive. Furthermore gender violence has to be considered non onlyy an effect of sexism, discrimination and so on but as one of the key factor that prevent women to fully access the information society.

      Comment by hvale vale on August 4, 2017

      Rtbf cannot be considered without data protection framework.

      Comment by hvale vale on August 4, 2017

      Privacy should be linked with consent and agency. Both factors have being constantly stressed during the session focusing on gender, sexual rights and freedom of expression and should be mentioned here too.

      I want thailand Should be like this

      I do not agree to have access to services blocked. But it should guide the public to know how to prevent the danger of content on the Internet for your children, however, should be better. Because the current system to support parents are already good. But parents lack knowledge.

      I think : I do not agree to have access to services blocked. But it should guide the public to know how to prevent the danger of content on the Internet for your children, however, should be better. Because the current system to support parents are already good. But parents lack knowledge.

      Before the law governing the use of online media, content censorship. Should ask people first. Because there are times when the government has a broader law or violated the privacy rights too.

      I think : Before the law governing the use of online media, content censorship. Should ask people first. Because there are times when the government has a broader law or violated the privacy rights too.

      Comment by KS Park on August 4, 2017

      I think the problem with RTBF is that it does not make such distinction, i.e., for any personal data whether consisting of public content or private content, people accessing that data or search engine helping such people are imposed a burden to prove “public interest’ or drop from search. For instance, a stock broker puts out his financial information online to demonstrate his investment skills. Can he later suppress that information from search results “for being personal data” (maybe to avoid criticisms when his clients complain about bad performance of his portfolios)? If you say “no”, who is there to show public interest in keeping that data when the broker files a suppression request.

      Comment by KS Park on August 4, 2017

      I think that RTBF has proximity to Internet shutdowns in para 19 because it disables critical functions of internet governance for reasons not related to access to illegal information. RTBF rule applies to information that is perfectly legitimate by itself and requires that information to be hidden from search. Internet shutdown does similar things to internet traffic.

  • Asia Pacific Regional Internet Governance Forum 2018 Port Vila Synthesis Document – Draft 1 (118 comments)

    • Comment by Babu Ram Aryal on September 4, 2018

      I’ve a comment on the last paragraph where we are using cybersecurity and cyber crime as synonyms. Need a new paraphrase.

      Comment by Babu Ram Aryal on September 4, 2018

      I think, cyber policy makers are key stakeholders who make cyber policy including laws.

      Comment by Babu Ram Aryal on September 4, 2018

      I think, the first sentence os a bit wrong, dependency on IPv^, DNSSEC and routigh Security only ?? Well, I’m not convinced. Need rework on the para. We can say, these are some of major issues to be addressed !

      Comment by Babu Ram Aryal on September 4, 2018

      Who should take these education or awareness ?

      Comment by Babu Ram Aryal on September 4, 2018

      Privecy and Data Protection are always critical issues, not only now.

      Comment by Babu Ram Aryal on September 4, 2018

      Can we have APAC regional level Disaster preparedness network ? Any discussion in that line ?

      Comment by Babu Ram Aryal on September 4, 2018

      There are many economies in APAC who criminalizes blockchains and similar new technologies, were there any discussion on addressing the issue? Does this recommends or urges to address the issue?

      Comment by Babu Ram Aryal on September 4, 2018

      I found some Asia and Pacific participants perspective. Are we dis integrating Asia Pacific into Asia and Pacific ?

      Comment by Dr.N.Sudha Bhuvaneswari on September 4, 2018

      This can be rephrased as “Building a secured Internet ultimately means improving on the cybersecurity standards and the ability to trace malicious activities”

      Comment by Doreen Leona on September 4, 2018

      add guidelines on the first line……therefore should read, after implementation of policies, guidelines and best practices…..

      Comment by Dr.N.Sudha Bhuvaneswari on September 4, 2018

      Thanks for the comments Mr.Babu. This sentence can be rephrased as “The future stability and security of the Internet highly depends on the successful implementation of policies and best practices, and by addressing the increased implementation of few major issues like IPv6, DNS Security Extensions(DNSSEC) and routing security”

      Comment by Doreen Leona on September 4, 2018

      Emphasis to implement and conduct awareness and education to multi-stakeholders on existing national laws that have provisions of collecting and possessing data privacy

      Comment by Dr.N.Sudha Bhuvaneswari on September 4, 2018

      No special educators for this awareness, we need to bring about evidence based training that needs to be exchanges among the peers and shared with the community

      Comment by Doreen Leona on September 4, 2018

      also the key to inclusive and diversity is to promote innovative development

      Comment by Doreen Leona on September 4, 2018

      also the key to inclusive and diversity is to promote innovative development. (this sentence should read here and not above)

      Comment by Doreen Leona on September 4, 2018

      In addition to Government providing policy environment for access it should include for services as well and further financial support to drive local content and demand driven solutions

      Comment by Doreen Leona on September 4, 2018

      just started in the Pacific

      Comment by Arzak Khan on September 4, 2018

      We should also include the work espionage.

      Comment by Arzak Khan on September 4, 2018

      *word

      Comment by Ang Peng Hwa on September 4, 2018

      I think “legality of” in the first line should be replaced with “issues of”. The reason is that it seems to be an issue of legality but if so, any illegality can be easily “cured” be passage of a law.

      Comment by Ang Peng Hwa on September 4, 2018

      Suggest amending the last sentence by adding to it the words in quotation marks:
      At the same time, Internet shutdowns and restrictions are detrimental to the freedom of expression and right of universal access to Internet “and so should be kept to the minimum in duration and in compliance with due process.”

      Comment by Etuate Cocker on September 4, 2018

      Capacity building starts at the grass root and a good example of the Vanuatu IGF that were established during APRIGF. It would be good to revisit the impact of such intiative in training locals on how to safely navigate the Internet. This initiative can be driven by local government initiative such the CERT Vanuatu.

      Comment by Etuate Cocker on September 4, 2018

      This section does not address how we can strengthen existing stakeholders such as CERTs. It does mention these initiatives but there is a need to determine how CERTs and any other domain interact with organisation such as ICANN, APNIC, and other train providers to strengthen their skills in term of responding to threats.

      Comment by tripti (Sflc.in) on September 5, 2018

      Enabling meaningful access to the Internet not only involves building infrastructure or connectivity, but it also means, to enable access to an Internet which is free, open, affordable, accessible, neutral, inclusive, diverse and uninterrupted among others. ( So that, we cover all aspects of Internet Access)

      Comment by tripti (Sflc.in) on September 5, 2018

      The document currently points out we need a disaster management plan. Why do we need was pointed out by Vint Cerf, he mentioned how concerns with respect to cable landings are increasing with increase in global warming and in order to mitigate the same we need comprehensive disaster management plan. (we can consider including the ‘why’ part to make document comprehensive)

      Comment by tripti (Sflc.in) on September 5, 2018

      Instead of using ‘can result in data driven discrimination’, I was wondering if we could use ‘may result in data driven discrimination’. Just sounds more grammatically sound.

      Comment by tripti (Sflc.in) on September 5, 2018

      Also, we can add something on the lines of what happens offline manifests online and how women are being affected by online abuse.

      Comment by Ms Nasuven Enares c/- Pauline Molissa USP Port Vila Vanuatu on September 6, 2018

      Change my address to C/- Poste Restante, Vanuatu Post Limited, Port Vila Republic of Vanuatu.

      This has to be done at the grass roots level or community Services Organisations level for Vanuatu.

      Comment by Ms Nasuven Enares c/- Pauline Molissa USP Port Vila Vanuatu on September 6, 2018

      to affordable internet in the pacific region

      Comment by Yeseul on September 6, 2018

      Good points. This can be discussed in the next APrIGF or APSIG, and we will compile your opinion for the next draft.

      Comment by Yeseul on September 6, 2018

      Thanks Ang for your input. Will update accordingly.

      Comment by Yeseul on September 6, 2018

      Thanks, Dorren for your input. I would like to hear more aoug Digital Economy and other emerging technologies from the Pacific. Would you be able to make some more comments on the issues specific to the Pacific countries?

      Thanks!

      Comment by Yeseul on September 6, 2018

      Cross-Border Data Flows Enable the Digital Economy | Public Policy

      Comment by Yeseul on September 6, 2018

      According to McKinsey research, international data flows have increased global GDP by 10.1 per cent over the past decade. Both ASEAN and APEC have officially recognised in their privacy frameworks the vital contribution that cross-border data flows make to trade and economic growth in their region. Although the Asia Pacific region has made good progress in developing and implementing data privacy frameworks that both protect citizens and allow data to flow across borders, the report highlights that variances in data privacy laws across countries are holding back trade and innovation.

      source: https://www.gsma.com/publicpolicy/regional-privacy-frameworks-and-cross-border-data-flows?utm_content=76645995&utm_medium=social&utm_source=linkedin

      Comment by Yeseul Kim on September 6, 2018

      We have witnessed a spiking number of successful female CEOs who have built their businesses mostly online and then could extend these to offline. The benefits of these online businesses initiated by female CEOs are more than the economic empowerment, as those businesses are mostly for the women thus can satisfy the needs of women which might have been shunned or disrespected by those which have focused on the needs of the male customers. This is not only about the female communities but also for other marginalized communities as well. By running business online which focuses on their own needs, these traditionally marginalized groups can be empowered comparatively easily.

      I sometimes feel uncomfortable with the discussions which try to treat women as a special group which needs special supports. Although this can be still true to many of the regions on the earth, I would also like to emphasize that quite a large number of female CEOs could successfully build their businesses online, and we are also seeing the even bigger number of female CEOs using SNS to leverage their businesses in Asian regions.

      Comment by Yeseul Kim on September 6, 2018

      Here, educating the youth and the marginalized communities is essential to increase their access to the Internet. Governments can actively implement the public policies and public education systems which ensure educating these communities so that they can be equitably benefitted from the Internet and other technological developments.

      Comment by ananda niraula on September 7, 2018

      “Law enforcement, network operators and IT professionals “. I think we should add civil societies…
      “Law enforcement, Service providers,, IT professionals, civil societies and bankers”

      Comment by Kuan-Ju Chou on September 9, 2018

      The relationship between privacy and freedom of expression can be ariticated more. Because I am wondering why privacy may conflict to freedom of speech. Without the guarantee of using internet, users may tend to self-censoring their expression. That is the lack of privacy harms freedom of expression.

      Comment by Kuan-Ju Chou on September 9, 2018

      (In my last comment, I mean “articulated” more.)

      The concept jumps from privacy to freedom of speech then lands on “hate speech” might be hard to understand. The core idea is that in order to make the internet open to everyone, to let users feel free to express their personalities as a human, we need the privacy and take serious to online abuse issues.

      Comment by Yeseul Kim on September 10, 2018

      During the meetings for the synthesis document, it has been proposed to particularly incorporate the Pacific perspectives as APrIGF was held in Vanuatu and there was Pacific IGF going on along with APrIGF this year.

      Hope this helps!

      Comment by Hirotaka Nakajima on September 13, 2018

      CERT should be replaced with CSIRT since CERT is registered trademark of Carnegie Mellon University.
      UN IGF also uses CSIRT (http://www.ucl.ac.uk/steapp/dpl-news-publications/un-internet-governance-forum-workshop-on-csirts-and-cyber-diplomacy)

      Comment by Don Rodney Junio on September 13, 2018

      Not all new technologies would contribute positively to the economy.
      We need to acknowledge that technology is not inherently good and it also has some adverse effect on society.
      What does “markets” refer to in the first paragraph?

      Comment by Doreen Leona on September 13, 2018

      In the Pacific especially Vanuatu digital economy is in its early stages especially with e-commerce it is only popular among tourism industry due to payment systems not fully integrated into the local commercial Banks.

      Digital trade and ecommerce will also promote traditional and cultural practices to produce more of local products example local handicraft when global market drives demand.

      Comment by Georges TAUANEARU on September 13, 2018

      I think trace malicious activities is not enough. Can we go further more after tracing.

      Comment by Georges TAUANEARU on September 13, 2018

      ?

      Comment by Georges TAUANEARU on September 13, 2018

      I would add practical, reasonable and fair solutions

      Comment by Georges TAUANEARU on September 13, 2018

      A transparent multi-stakeholder approach to identify and address key risks is a positive way forward to addressing cybersecurity issues which within the Asia Pacific region.

      Comment by Georges TAUANEARU on September 13, 2018

      This sentence is manufactured oriented Machine-User. What about User-other user side line perspective?

      Comment by Georges TAUANEARU on September 13, 2018

      [It is important to protect and respect the rights of users while ensuring digital security as a whole.]

      My comment above!

      Comment by Georges TAUANEARU on September 13, 2018

      [The key to socio-economic progress in the developing societies is quality education]

      and training

      Comment by Georges TAUANEARU on September 13, 2018

      A paragraph that states clearly that APRIGF understand the need for pacific islanders equip with devices that are disaster responsive.

      Comment by Maureen H on September 13, 2018

      Great points Yeseul

      Comment by Adnan on September 14, 2018

      Cyber security is the main biggest issue now a days

      Comment by Gunela Astbrink on September 18, 2018

      [Online accessibility and the availability of services online particularly for people with disabilities remain a priority. Development of content on the Internet should include accessibility as part of the agenda as such accessibility features can add to the user experience. This could be achieved with various technological developments such as voice assistants and character recognition software. More can be done to involve people actively in developing inclusive technologies and online content.]

      Suggest to shorten and change above wording to:
      ‘Online accessibility for people with disabilities remains a priority. Inclusive design means the development of hardware and software that enhances the user experience generally and enables online content that is also accessible for people with disability. More can be done to involve people actively in developing inclusive technologies and accessible online content.’

      Comment by Satish Babu on September 18, 2018

      In the phrase “be available in all languages…”, can we include scripts as well? (“be available in all languages and scripts…”)

      Comment by Satish Babu on September 18, 2018

      [which]

      Remove.

      Comment by Satish Babu on September 18, 2018

      [Privacy by design needs to be emphasized along with informed consent]

      The sentence needs to end here.

      Comment by Satish Babu on September 18, 2018

      [safeguard collection and use of personal data]

      “…safeguard the collection and use of personal data” ?

      Comment by Satish Babu on September 18, 2018

      [beckons for reliable,]

      Non-standard usage? “Calls for” may be more appropriate.

      Comment by Satish Babu on September 18, 2018

      [Internet shutdowns and restrictions are detrimental to the freedom of expression and right of universal access to Internet.]

      Internet shutdowns also have a significant detrimental impact on the economic/commercial use of the Internet. I wonder if this aspect should also find a place.

      Comment by Satish Babu on September 18, 2018

      [have the potential to redesign our interactions ]

      “redesign” is too mild for what these technologies can do…”transform” may be more appropriate.

      Comment by ZHAOHAN Li on September 18, 2018

      The last sentence is not that comprehensive. When we think about securing the Internet, it usually means ensuring network security and stable operation, maintaining the integrity、confidentiality and availability of network data, effectively responding to network security incidents, and then preventing cybercrime and the ability to trace criminal activities.

      Comment by Dawen Obed on September 18, 2018

      Very interesting to learn new concept regarding the topic on Cyber security

      Comment by Dawen Obed on September 18, 2018

      I was graduate with a bachelor in Computing Systems in Auckland and interest also in Cyber security which I also have some related subjects in term of malware Analysis,System Security Botnet,Fishing etc…..I would like more if the stake holder could provide more pratical worshop on this topic of Cyber security.

      Comment by Dawen Obed on September 18, 2018

      For my little state Island I wish if my community need to understand more about online Privacy and data Protection to help young people to their respective environment to have what this topic is all about.

      Comment by Dawen Obed on September 18, 2018

      For my Island State I wish if APRIGF can deal with our local Government IT center to run awareness more on access and Empowerment of using Digital device through internet.

      Comment by Dawen Obed on September 18, 2018

      I wish if our Government IT center to create a digital e-commerce shopping online to satisfy every citizen living in my country(vanuatu).

      Comment by Dawen Obed on September 18, 2018

      i really want to see a diversity of people with different norms and values to participate and engage in Digital world.

      Comment by ZHAOHAN Li on September 18, 2018

      The second sentence:
      Digital trade and e-commerce have already become the key enablers of the global economic growth and has been changing the ecosystem of the traditional trade.

      It is not a point that needs to be predicted, but is already happening. Right?

      Comment by Ali Hussain on September 18, 2018

      Many cost effective IoTs device comes with weak set of protocol which rises Security concerns so there is need to regulate the IoT manufactures and policy should be made to implement the compliance standards. only certified and compliance IoT devices should be allowed to allowed to market.

      Comment by Ali Hussain on September 18, 2018

      Te cross-boarder security is a challenge due to the fact that a lot of security architecture based on central trusted party to make sure the data integrity and security. The universal technological solution for protecting data integrity independent of trusted central party should also be explored to ensure the goal of cross-boarder data security for better data regulation and security.

      Comment by Ali Hussain on September 18, 2018

      The specific capacity building model for smooth learning of old age people should be encouraged. This will help in bridging gap between the understanding of young generation vs the mid or old age people who have less tendency to adopt and learn new technologies.

      Comment by ZHAOHAN Li on September 18, 2018

      The last sentence is inaccurate and logically confused.

      Good national governance and legislation do contribute to the successful economic development but they are not the prerequisites definitely. For many countries, national governance and legislation often fall behind economic development. It could only say that, good national governance policies and timely legislation will create a better environment for economy development.

      Additionally,national governance,policy making and legislation are all at the national level. Supranational cooperation is at the international level. Two aspects need to be considered together.

      Comment by Leotrina Macomber on September 18, 2018

      I suggest we keep it general and just say “relevant agencies and the technical community” This is so that the judiciary (prosecutors and judges) and policy makers are also included here as well.

      Comment by Leotrina Macomber on September 18, 2018

      [ technical capabilities]

      I would suggest that this be changed to read “technical and forensic capabilities”in the region. This is to capture that some of these CERT’s are intended to be the only technical forensic capability in their countries as in the case for Tonga until maybe the number of reported cases increase in the future.

      Comment by Hriday Ch. Sarma on September 18, 2018

      A problem concerning cybersecurity is that there is no uniform set of laws for all countries, or countries within any region, which would put up a broad framework within which all digital activities need to be performed. I think we should include the legal topics in our agenda for the year 2018-2019.

      Comment by Hriday Ch. Sarma on September 18, 2018

      I think not just the technical community, but also the private sector companies need to be duly included in the multi-stakeholder approach. This would then entrust responsibilities and rights to the conduct of the latter.

      I see, the next point says end-users also be trained on security technique methodologies. This could be best achieved if the private sector is asked to train their customers/ audience base, but on an objective note.

      Comment by Hriday Ch. Sarma on September 18, 2018

      Here we need to keep the emerging market trends in mind. Say for instance, South Asia would be increasingly getting connected with Southeast Asia with the actualization of the India-Myanmar-Thailand Trilateral Corridor, which is now officially decided to be connected with Vietnam through Cambodia.

      There could be other regions within Asia that will be connected to their respective adjacent regions in near-future.

      Comment by Hriday Ch. Sarma on September 18, 2018

      How do you actually connect marginalized communities at a cross-border level. This needs to be very well planned, and not for the heck of saying.

      Comment by Hriday Ch. Sarma on September 18, 2018

      Educating women, especially young girl children, on matters relating to advanced digital technologies and digital securities in crucial for empowering the whole society. There needs to be special focus in this regard, and am sure this would not be gender-discrimination but gender-empowerment.

      Comment by Hriday Ch. Sarma on September 18, 2018

      I think we, i.e. APRIGF, its MSG group members and the organizations they are affiliated with/ head, should come up with a consensual final document of this and send it across to all national and state/ provincial governments. Also, we make a follow-up inquiring how government agencies have acted upon the shared suggestions mentioned in the doc.

      Comment by Chen-Yi Tu on September 18, 2018

      [Privacy and data protection are critical issues now, especially as they may come into conflict with freedom of expression]

      Is this trying to say “right of privacy” as “universal human right”? If yes, then the correct reference should be Article 13 of 1948 Universal Declaration of Human Rights. The freedom of speech is in Article 19. Conflict between privacy and freedom of expression usually discuss in a context of press freedom. I would suggest to frame privacy as enabler of freedom of expression, as in Article 17-19 of International Covenant on Civil and Political Rights.

      Comment by Burcu Kilic on September 18, 2018

      The ‘free flow of data’ narrative should not be considered the default norm. Our data is not a trade commodity and it should not be treated as such. Privacy is a fundamental human right; thus it should flow alongside our data throughout the data life cycle. There should be check and balances to the free flow of data.

      Comment by Burcu Kilic on September 18, 2018

      Our rights should flow alongside our data throughout the data life cycle.

      Comment by Burcu Kilic on September 18, 2018

      People should be in control over their data, no matter where they are and no matter who holds it. Data ownership implies that people can sell away their fundamental rights, including privacy. Thus, we need comprehensive data protection laws and other regulatory mechanisms that are designed to safeguard people, not international businesses nor state control over their citizens. But we also need regulations that encourage healthy competition, not data monopolies.

      Comment by Sanya Reid Smith on September 18, 2018

      Governments need to balance many considerations (not just free flow of data for innovation) including the need to require data to be stored locally for a number of reasons including: to investigate tax evasion (eg New Zealand), for privacy (eg Australia), to be able to do timely and effective financial regulation the way the USA couldn’t during the 2008 financial crisis because some Lehman Brothers data was stored in Hong Kong etc.

      Comment by Cherie Lagakali on September 18, 2018

      [A multi-stakeholder approach to identify and address key risks is a positive way forward to addressing cybersecurity issues which within the Asia Pacific region]

      I think there may be a word missing between which and within

      Comment by Gaya on September 18, 2018

      Suggest:
      Privacy and data protection are critical issues now, especially in the digital age where forms of violations are fast evolving. as they may come into conflict with freedom of expression, and can result in data-driven discrimination.

      Reason: rights don’t come in conflict with each other. They have to be seen as an exercise of harmonisation. SR on FoE has many times talked about balancing rights and not confronting

      Comment by Gaya on September 18, 2018

      After youth and women – please include while addressing privacy.

      Comment by Gaya on September 18, 2018

      Instead of internet community – use Societies should

      Suggest rephrasing the next paragrapgs as :
      Societies should take a proactive approach (contributing to the efforts of regulators and legislators to strengthen online privacy and data protection), and also collaborate with agencies and organisations which are trying to combat ‘hate speech’ directed at different sections of society, especially women and minorities.

      Comment by Gaya on September 18, 2018

      Across the Asia Pacific region, legislation has been developed to govern various aspects of the Internet. Legislation that traditionally govern offline spaces is also used in tandem with these specialised legislation to address violations. This is applicable to privacy and data protection as well. It is pertinent to emphasise the need for these laws and regulations to meet domestic constitutional as well as international human rights standards. ICT laws and privacy related regulations by state and non-state entities must place users and individuals as their priority, be rooted in, and adapt a human rights based approach. States and private entities, especially social media platforms must carry out human rights impact assessments for their existing policies and regulations on privacy and ensure that any changes or introduction of new policies undergo such assessments. States should also collaborate and adapt good practices from each other towards ensuring human rights online and privacy protection through adapting comparable legislation in the region.

      Comment by Gaya on September 18, 2018

      I do not agree that this is a new concept – this existed in earlier forms – but i guess the point is dealing with the challenges of the new forms of data protection challenges –

      Some points missing from earlier inpiut – can be captured as
      Good practices and standards evolving in other jurisdictions, especially GDPR must be analysed and adapted as feasible for the region. Privacy considerations strengthened in light of GDPR may have extraterritorial enforceability. ICANN contracted parties must particularly comply with the GDPR and contractual obligations, trumping community-led policy development processes at ICANN.

      Digital rights management could be explored as a significant manner in which online privacy can be protected, to this end capacity building programmes and measures must be extended through multi-stakeholder participation to empower users. Private entities, especially social media platforms play a significant role in ensuring privacy online and refraining from compromising privacy rights of users. Platforms must adapt privacy protections by design and strive for informed consent over formal gestures. As the demand for data localisation grows, these private entities must act in accordance wtih international human rights standards and states must refrain from compromising rights of individuals.

      Comment by Cherie Lagakali on September 18, 2018

      PACIGF Notes on Cybersecurity:
      The Fiji Government has recently introduced an Online Safety Bill that will see irresponsible social media users paying up to $20k in fine and face imprisonment of up to five years if investigated by the Online Safety Commission and found guilty.
      This bill will impact on hateful and harmful electronic communications and the posting of intimate visual recordings that would impact women and children as victims.

      Comment by Gaya on September 18, 2018

      I am not sure if arguing that highest level of protection is the best way – we should ask for privacy by default and the enforcement of common minimum standards – which can then be enhanced in other jurisdictions

      Comment by Gaya on September 18, 2018

      Suggest this to replace existing paragraph

      Comment by Gaya on September 18, 2018

      We should talk about being aware and understanding how different groups and discriminated against and have difficulty using the internet – or accessing it – example – indigenous groups and women – LGBT groups.

      Comment by Gaya on September 18, 2018

      Perhaps we can express that the new and emerging tech should be rights respecting – also can say we hope open source alternatives for existing and new tech keep evolving ensuring that users have autonomy and choice

      Comment by Gaya on September 18, 2018

      Should we put dispruptive in “”

      Comment by Gaya on September 18, 2018

      More than social systems it is a question of rights – social systems is a dicey term

      Comment by Gaya on September 18, 2018

      Please reconsider how the last line is phrased… Even if tools benefit society, or a notion of it – it comes from a place of power- who is to decide it beefits society enough to overrule personal or individual rights

      Comment by Gaya on September 18, 2018

      Not just civil rights – it is economic cultural and social rights that are mostly impacted – overall I suggest using human rights or mention both classes through the document.

      Comment by Cherie Lagakali on September 18, 2018

      PACIGF Notes:
      52% of the countries have adopted DNSSEC in the Pacific

      Comment by Gaya on September 18, 2018

      These changes are possible only in social media platforms and internet companies, especially those that have become a part of our every day life act in a more responsible manner. Business entities must take rule of law and ensuring rights are protected in the their policies and implementation is the basis on which less intrusive regulations can be demanded from states

      Comment by Cherie Lagakali on September 18, 2018

      Sorry maybe the above comment should go under Online Privacy and Protection

      Comment by Gaya on September 18, 2018

      Would be good to include persons of all sexual orientation – this is key

      Comment by Gaya on September 18, 2018

      Would it be possible to suggest a rights based approach to cyber security?

      Comment by Gaya on September 18, 2018

      Also would be great if we addressed diversity in infractructure ownership which will impact who gets access

      Comment by Gaya on September 18, 2018

      Can we change civil rights to human rights?

      Comment by Gaya on September 18, 2018

      Suggest putting in a line that aspires for a plural internet that allows or aids individuals to develop in a manner that they deem fit for themselves

      Comment by Cherie Lagakali on September 18, 2018

      PacIGF Notes:
      It is costly for companies to implement and also maintain infrastructure because the islands in the Pacific are too spread out, also there are natural disasters occurring every year

      Comment by Cherie Lagakali on September 18, 2018

      PacIGF Notes:

      Pacific Internet exchange point: Vanuatu, PNG and now Fiji

      Comment by Cherie Lagakali on September 18, 2018

      PacIGF notes:
      In the Pacific there is an Australian Government program called Pacific Connect with a focus on Fiji, Samoa, PNG, Solomon Islands, Vanuatu and Tonga to engage digital and ICT initiatives in the areas of government digital/innovation, cyber engagement, leadership, women, and research. The program is said to be about putting the ‘right’ people in the room to connect and work on mutually beneficial issues. The two year pilot program’s theme is: Building Australia-Pacific Connections for the Digital Future

      Comment by Cherie Lagakali on September 18, 2018

      PacIGF Notes:
      Digital Technology is still fairly new with a technical Startup called TraSeable Solutions implementing Seafood Provenance and OxFam (humanitarian relief cash transfers) with other projects like Fiji’s land registry on blockchain, PNG- palm oil supply chain and national identity and supply chain projects

      Comment by Kasek Galgal on September 18, 2018

      Ensuring that the Internet does not replicate existing inequalities is something mentioned in the community networks session. For example in an area with good connectivity, men still have more access than women or the wealthy more so than the poor.

      Comment by Cherie Lagakali on September 18, 2018

      PacIGF Notes:
      There is still a need for alot to be done.
      Also need for a bridge between IGF communities and spaces. The need to bring multi stakeholder models to the Pacific Nations

      Comment by Cherie Lagakali on September 18, 2018

      PacIGF Notes:
      A need for all to come together with your own skills for your own areas. To collaborate and work together to achieve national requirements

      Comment by Cherie Lagakali on September 18, 2018

      PacIGF concluded with the need to learn from each other and help each other also a more inclusive approach where for example the legal people highlighted that they are always the last to know and only if there is a problem but they would like to be more informed and in the loop from the beginning

  • Asia Pacific Regional Internet Governance Forum 2017 Bangkok Synthesis Document – Draft 1 (107 comments)

    • Comment by Ang Peng Hwa on August 25, 2017

      [Therefore strategies must infrastructure-based]
      A word or phrase is missing.

      Comment by Ang Peng Hwa on August 25, 2017

      This sentence is clunky. It’s too wordy and this gets in the way of being comprehensible. The suggested edit follows.

      As improved technologies facilitate access for the next billion Internet users, it is important that the individual and collective uniqueness, and the linguistic, geographic and cultural diversity that these new users bring to the Internet be supported, conserved and enhanced through inclusive policy measures such as the universal acceptance of internationalised domain names.

      Comment by Ang Peng Hwa on August 25, 2017

      [Whether it is security, stability and resilience of the Internet infrastructure or security of network and information systems, , to issues on safety, privacy and data protection, collaboration and capacity building[22] are needed to mitigate[23] and prevent cyber security incidents[24] within and beyond the Asia Pacific region, and the setting of global encryption standards is encouraged[25].]

      Suggested edit.

      Collaboration and capacity building[22] are needed to mitigate[23] and prevent cyber security incidents[24] within and beyond the Asia Pacific region, and the setting of global encryption standards is encouraged[25].]

      Comment by Ang Peng Hwa on August 25, 2017

      [agreed international conventions and declarations]

      Delete “agreed” on redundancy.

      Comment by Ang Peng Hwa on August 25, 2017

      [Respect for human rights is fundamental to the achievement of the Sustainable Development Goals (SDGs)[45].]

      Recommend moving this up to the start of the paragraph.

      Comment by Ang Peng Hwa on August 25, 2017

      [Human rights agreements should apply to the Internet environment in the areas of access and development, freedom of expression[39], right to assembly and privacy as well as on the right to information, education, health, culture, and to a broad range of other rights[40] as set out in the WSIS Geneva Declaration of Principles[41], Tunis Agenda for the Information Society[42], and other agreed international conventions and declarations[43].  The impact of existing and emerging laws, policies, and practices on the security of network and information systems, data protection, surveillance, anonymity, intermediary liability and cyber-crime must protect human rights and meet international standards for guarantees.  These issues have been the subject of intense scrutiny and debate by all stakeholders at the APrIGF meeting.  The application of human rights should also consider issues of gender, disability, age and sexuality[44].  Respect for human rights is fundamental to the achievement of the Sustainable Development Goals (SDGs)[45].]

      Suggested edit.
      Respect for human rights is fundamental to the achievement of the Sustainable Development Goals (SDGs)[45]. Therefore, human rights agreements should apply to the Internet environment in such as set out in the WSIS Geneva Declaration of Principles[41], Tunis Agenda for the Information Society[42], and other international conventions and declarations[43]. These areas include access and development, freedom of expression[39], right to assembly and privacy as well as on the right to information, education, health, culture.  Laws, policies, and practices on the security of network and information systems, data protection, surveillance, anonymity, intermediary liability and cyber-crime must protect human rights and meet international standards for guarantees. The application of human rights should also consider issues of gender, disability, age and sexuality[44]. These issues hwere the subject of intense scrutiny and debate by stakeholders at the APrIGF meeting.  

      Comment by Ang Peng Hwa on August 25, 2017

      [Right]

      Missing article: The

      Comment by Gayatri on September 4, 2017

      Suggest this be changed to 4 part – including necessity

      Comment by Gayatri on September 4, 2017

      How do you define a reasonable period of time? If that is the case, the user must also be aware that this information is safe only until a certain period.

      Comment by Gayatri on September 4, 2017

      Not sure what data-driven discrimination is discussed here… perhaps we can simplify it by saying freedom of expression, privacy and data protection need to be balanced rather than saying they come in conflict

      Comment by ananda niraula on September 4, 2017

      We should also add violence against women and children. The discrimination or affect by internet to the individual internet users have to included.
      The word are too hard to understand. simple word to be used if possible.
      Country like Nepal, there is no MLAT or letter of rotatory provision in our country incase of trans-border crime.
      Please also include this.

      Comment by Maureen Hilyard on September 4, 2017

      Sentence starting: “Building on… APrIGFs 2015 Macao and 2016 Taipei,….” OR “APrIGF 2015 Macao and APrIGF 2016 Taipei,”

      Also “two webinars each followed by public comment periods, ”

      Could there be an addition? “… collaborative open document detailing the significant deliberations which took place during the APrIGF 2017 Bangkok.” (ending the introductory para with an introduction to the most recent APrIGF)

      Comment by Maureen Hilyard on September 4, 2017

      (as well as “of those within” the broader APriGF…

      Nevertheless it is anticipated by “the” APrIGF…

      …thoughts in the Asia Pacific region as “a” contribution…

      Comment by Maureen Hilyard on September 4, 2017

      I would delete “the” before Best Practice Forums..

      Replace “to be held from” December 2017 (with) “to be held on 18-21” December 2017

      Comment by Maureen Hilyard on September 4, 2017

      I would finish the sentence at “collaboration at a regional level.”

      (continue with…)

      It also aims to aggregate national and local IGF discussions, and ultimately, to advance the … etc

      Comment by Maureen Hilyard on September 4, 2017

      I would suggest that we insert something in the sentence that begins “Community networks and public access to ICT [17]” and continue with…
      “not only have the potential to improve digital literacy but also facilitate safe, effective, non-discriminatory access by all users, including women and children and those within marginalised and underserved communities.”

      Comment by Maureen Hilyard on September 4, 2017

      Last sentence is OK without the “And” at the beginning of the sentence. I know we all do it but its not grammatically correct :(

      I like this paragraph

      Comment by Maureen Hilyard on September 4, 2017

      Exactly!

      Comment by Maureen Hilyard on September 4, 2017

      In the last sentence of this paragraph…
      change”is funding as well as ensuring that… etc”

      to

      “is funding, however, it is also important to ensure that …etc”

      Comment by Maureen Hilyard on September 4, 2017

      Agree with Peng Hwa’s edits.. with amendment of the typo :)

      I agree with the section beginning with statement about human rights being fundamental to the achievement of SDGs and also impressing on readers that human rights was a major area of “scrutiny and debate” at the APrIGF.

      Comment by Maureen Hilyard on September 4, 2017

      Great paragraph. I also think it addresses some of Ananda’s concerns from para#11.

      Comment by Amrita Choudhury on September 4, 2017

      This could perhaps be added after the last sentence , The greatest challenge ………………..skills of participants.

      Another challenge is in scaling up and sustaining these initiatives.

      Comment by Sylvia Cadena on September 5, 2017

      It seems a verb is missing from “Therefore strategies must infrastructure-based that are aimed at shaping technologies”?

      The concept is not clear and it does not flow with the rest of the sentence.

      Comment by Sylvia Cadena on September 5, 2017

      Change for “preserve”.

      Comment by Sylvia Cadena on September 5, 2017

      Use either internet or Internet, but use it consistently.

      Comment by Sylvia Cadena on September 5, 2017

      Paragraph is a a bit clunky… Suggested edits:

      Capacity building is critical to bridge the digital divide across Asia Pacific, especially in marginalised and developing countries. By empowering diverse communities to develop, deploy and use ICTs more effectively, they stay informed, understand their digital rights and responsibilities and can therefore participate, enhancing the Internet ecosystem. Capacity building strategies al local, regional and global level that address the needs of neglected communities from underserved areas are key towards digital inclusion, and should incorporate security and privacy.

      Comment by Sylvia Cadena on September 5, 2017

      This is already happening. It should not be written in future tense, as if nothing has been done.

      Comment by Sachini Perera on September 5, 2017

      to ultimately advance the IG development in the AP region “and promote a progressive discourse on IG in the region”

      Comment by Sachini Perera on September 5, 2017

      effective and “meaningful”

      Comment by Sylvia Cadena on September 5, 2017

      Edits suggested:

      The greatest challenge that exists for any capacity building initiative is funding allocated to strengthen participation, ensuring diversity of language and culture, as well as the background knowledge and skills of participants.

      Comment by Sachini Perera on September 5, 2017

      And updating gender blind policies

      Comment by Sylvia Cadena on September 5, 2017

      Use either cybersecurity or cyber security consistently across the document.

      Comment by Sachini Perera on September 5, 2017

      [neglected communities]

      neglected and marginalized communities

      Comment by Sachini Perera on September 5, 2017

      I think it’d be good to emphasize that CP not just helps create awareness but also gives agency to the users

      Comment by Sachini Perera on September 6, 2017

      Agree

      Comment by Sachini Perera on September 6, 2017

      [rights activists]

      human rights activists

      Comment by Sachini Perera on September 6, 2017

      Can we also include people with disabilities as well as other groups of people who have specific challenges and needs that need to be incorporated into IG?

      Comment by Sylvia Cadena on September 6, 2017

      Clunky paragraph… edit suggested:

      Cybersecurity, understood as the protection of online systems from damage and disruption, is critical not just to the stability of cyberspace, but also increasingly important to the physical world such as safety, privacy and data protection with concrete technical recommendations for consideration such as setting global encryption standards [25]. Collaboration and capacity building[22] are needed to mitigate[23] and prevent cybersecurity incidents[24] within and beyond the Asia Pacific region.

      Comment by Sachini Perera on September 6, 2017

      [to address violations]

      and in some instances to restrict freedom of expression and suppress dissent.

      Comment by Sachini Perera on September 6, 2017

      Agree

      Comment by Sylvia Cadena on September 6, 2017

      Sorry, missed a sentence:

      Cybersecurity, understood as the protection of online systems from damage and disruption, is critical not just to the stability of cyberspace, but also increasingly important to the physical world on issues such as safety, privacy and data protection where concrete technical recommendations for consideration were discussed, such as setting global encryption standards [25]. Collaboration and capacity building[22] are needed to mitigate[23] and prevent cybersecurity incidents[24] within and beyond the Asia Pacific region.

      Comment by Sachini Perera on September 6, 2017

      [the protection of children and youth online]

      And also indicate that capacities of children and young people should be strengthened so that the approach is not entirely protectionist and gives agency to the users as well.

      Comment by Sachini Perera on September 6, 2017

      Especially through the use of blanket provisions such as “in the interest of National Security”.

      Comment by Sachini Perera on September 6, 2017

      I think it’s fine for it to be at the bottom. The SDGs are weak in accountability mechanisms and are not centered in human rights language so it’s fine to mention it later in the para.

      Comment by Sachini Perera on September 6, 2017

      Can we explicitly mention ICESCR, ICCPR and CEDAW?

      Comment by Sachini Perera on September 6, 2017

      [The application of human rights should also consider issues of gender, disability, age and sexuality]

      “crosscutting” issues

      Comment by Sachini Perera on September 6, 2017

      Are there concrete suggestions for this?

      Comment by Sachini Perera on September 6, 2017

      [important]

      critical

      Comment by Sachini Perera on September 6, 2017

      [women]

      women and girls

      Comment by Sachini Perera on September 6, 2017

      Women are not a homogenous group and their access to technology is affected by a number of other factors such as age, class, caste, race, ethnicity, income, culture, religion, sexual orientation, gender identity, abilities, urban or rural locality, etc. Therefore, women have to overcome multiple discriminations in order to gain access. These include, but are not limited to, the high cost of devices, the high cost of connectivity, lack of infrastructure, social, cultural and religious norms and restrictions, geographical location, language barriers, etc. Even when they overcome some of those barriers, often women and girls’ increased access to the Internet is directly proportional the increase of violence against women online (http://www.genderit.org/sites/default/upload/issue_womenrights_digital.pdf)

      Comment by Sachini Perera on September 6, 2017

      [through a range of strategies]

      Including addressing the structural causes of violence

      Comment by Satish Babu on September 6, 2017

      Can we mention Universal Acceptance together with IDNs and EAI? In fact, if we are mentioning IDNs, then IDNs and Universal Acceptance may be sufficient.

      Comment by Satish Babu on September 6, 2017

      Towards the end of the paragraph, I’d suggest the following sentence:

      In the case of SIGs, Asia-Pacific has made major strides through multiple regional, subregional and national initiatives including APSIG, MEAC-SIG, inSIG, pkSIG and APIGA. Nevertheless, there is still more effort required in underserved areas of Asia-Pacific.

      Comment by Satish Babu on September 6, 2017

      Recommend “…Disruptive innovations such as the Blockchain…”

      Also, in the fourth line from the bottom, the reference to “prohibition…as well as source code disclosure” is unclear. As stated, this is anti-open source, which may be an issue with several parts of the community. Not sure if this was expressly stated in any session…if not, it’s best it’s redacted.

      Finally, the sentiment against data localization (somewhat understandable in terms of possible inhibition of free flow of data) is also problematic, as local communities may prefer data in local languages and formats.

      Comment by Hong Xue on September 6, 2017

      The title is too ambiguous and should be replaced with “Emerging Issues on HR on the Internet”. This section is not a overall and comprehensive narrative on HR, instead it merely addresses a few selected issues. It’s better not to use the exclusive title as present but make it more open-ended.

      Comment by Hong Xue on September 6, 2017

      “Prohibition of data localization” is indeed a poor wording and should be modified. It’s a complicated legal issue and cannot be prohibited completely. There should always be contain exemptions or exceptions that enable local storage requirements.

      Comment by Maureen Hilyard on September 6, 2017

      agree

      Comment by Kasek Galgal on September 6, 2017

      Not sure about using content in a plural form (contents) here.

      Comment by Kasek Galgal on September 6, 2017

      Indeed, digital literacy is critical. Particularly in regions that are newly connected.

      Comment by Kasek Galgal on September 6, 2017

      Use of words “multi stakeholder” here. Can be consistent with rest of document which spell it as “multistakeholder”.

      Comment by Sylvia Cadena on September 8, 2017

      First published in 2015, the Asia Pacific Regional Internet Governance Forum (APrIGF) Synthesis Document aims to identify common interests and relevance around Internet governance within the Asia Pacific region. The document also reflects about the discussions which take place at the APrIGF conference[1] each year. Building on the APrIGF Synthesis Document from APrIGF 2015 Macao[2], and 2016 Taipei[3], the process for the 2017 Synthesis document now includes two webinars[4] with two public comment periods[5] to collect wider input from the Asia Pacific Internet community across all stakeholder groups to build a more comprehensive , inclusive and collaborative open document.

      Comment by Sylvia Cadena on September 8, 2017

      The Synthesis Document aims to collect the contributions and outputs of participants at the APrIGF meeting (as well as the broader APrIGF community through remote participation and dissemination on the mailing list and online platform). The document is not intended to be representative of the whole Asia Pacific region. Nevertheless, it is anticipated by APrIGF Multistakeholder Steering Group (MSG)[6] and the Drafting Committee[7] that the development of this Synthesis Document will help drive active participation from Asia Pacific organizations at the Internet Governance Forum (IGF) process and to raise attention about the issues identified. The MSG and the Drafting Committee also trust the process and the document it self will demonstrate the value of the annual APrIGF meeting as a platform for voices, views and thoughts in the Asia Pacific region as contribution to relevant global, national, local and international forums on Internet governance.

      Comment by Sylvia Cadena on September 8, 2017

      The Asia Pacific Regional Internet Governance Forum (APrIGF) serves as a platform for discussion, exchange and collaboration at a regional level. It also serves, where possible, to aggregate national and local IGF discussions, to ultimately advance the Internet governance understanding across the Asia Pacific region.

      Comment by Sylvia Cadena on September 8, 2017

      Please use Internet or internet consistently through out the document

      Comment by Sylvia Cadena on September 8, 2017

      More than half of the global internet users live in the Asia Pacific region, but the true benefits of bridging the access gap can only be realized if it leads to socio-economic empowerment of the multifaceted human capital in the region[13]. Therefore strategies must be in place for the infrastructure to be able to respond to the increasing demand; to support the research and deployment of technologies and solutions; to adopt policies to bridge the digital divide; to improve network resilience to be better prepared for disasters[14]; to create a holistic approach towards eGovernance[15] and to push back against Internet shutdowns[16].

      Concrete examples presented at the event include benefits such as: 1) Community networks and public access to ICT[17] improve digital literacy and facilitate effective utilization of access by marginalized and underserved communities; 2) Youth-driven initiatives[18] leverage information technology to drive social changes and empower the emerging generation of the region; 3) Technological solutions such as IPv6[19], Internationalized Domain Names (IDNs)[20] and Email Address Internationalization (EAI)[21], facilitate access for the next billion Internet users while 4) inclusive policy measures, such as Universal Acceptance of Internationalised Domain Names, pave the way to support, conserve and enhance their individual and collective uniqueness, the language, geographic and cultural diversity that these new users will bring to the Internet.

      Comment by Sylvia Cadena on September 8, 2017

      Across the Asia Pacific region, legislation[26] has been developed to cover various aspects of the Internet. Legislation that traditionally governed offline spaces is now also used in tandem with these specialised legislation for virtual spaces and online behaviours. These provisions must respect internationally recognised conventions for human rights and standards (for example, and not limited to, the Council of Europe’s Convention on Cybercrime[27]). Particularly, governments should be urged to reconsider the manner in which Mutual Legal Assistance Treaties (MLATs)[28] are currently implemented. The right to privacy, access to justice and rule of law must be upheld when data of individuals are shared by states.

      Comment by Sylvia Cadena on September 8, 2017

      stakeholders (not countries)

      Comment by Sylvia Cadena on September 8, 2017

      Advances in data encryption required due consideration for an expiration date of protection measures and mechanisms, so contemplated regulations stand the test of time[30]. Similarly, the mobile and IoT industries also face challenges of time and expiration[31]. Regulatory measures should balance consumer protection with the responsibility that hardware manufacturers and software developers will take in making their devices secure for a reasonable time period.

      Comment by Sylvia Cadena on September 8, 2017

      Privacy and data protection are current issues of concern, specially as they may come into conflict with freedom of expression, and can result in data-driven discrimination[32].

      Comment by Sylvia Cadena on September 8, 2017

      Move after the next paragraph. It makes more sense for flow of the document

      Comment by Sylvia Cadena on September 8, 2017

      Move after paragraph 21 to improve document flow.

      While expectation of privacy may vary between cultures, comprehensive protection mechanisms must meet internationally recognised right to privacy and be linked to the concepts of consent and agency. International minimum standards should be created, guaranteeing the highest level of protection as a default safeguard, considering the nature of cross-border data transfer for online services, differing levels of protection in relevant jurisdictions and general lack of user awareness. These protections should also take into account the rapid development of technology that may make current data encryption, data-masking and obfuscation techniques obsolete in the future.

      Comment by Sylvia Cadena on September 8, 2017

      Digital trade and e-commerce are key enablers for the development of a global digital economy[35], yet they inevitably challenge physical national borders. Disruptive innovations such as blockchain[36] have the potential to change behaviours, practices and interactions in business, political and social environments. The digital economy cannot be successful without trust[37], free flow of information and appropriate business rules for different jurisdictions.

      To realise the potential growth of the digital economy, free trade agreements[38] should be reviewed in light of the growing trend of limiting free flow of information and/or requiring data localization, as well as source code disclosure unless there is a legitimate public policy reason.

      Coordinated multistakeholder collaboration and thorough discussion among all other stakeholders with active government participation is indispensable to realizing the benefits of the digital economy to all.

      Comment by Sylvia Cadena on September 8, 2017

      Agree with rewording proposed by Peng Wha above.

      Comment by Sylvia Cadena on September 8, 2017

      Keep title spelling Human Rights in full.

      Comment by Sylvia Cadena on September 8, 2017

      Maybe better to move this paragraph above as part of the previous one (after the mentions to WSIS and Tunis).

      Comment by Sylvia Cadena on September 8, 2017

      Change title to “Internet shutdowns and blocking”

      Comment by Sylvia Cadena on September 8, 2017

      Above there was a comment about add necessity. If that word is added above it should be consistent on this paragraph

      Comment by Sylvia Cadena on September 8, 2017

      Excellent!

      Comment by Sylvia Cadena on September 8, 2017

      Move paragraphs 29 and 30 right after paragraph 26. Do not leave gender to be the last issue on the document

      Comment by Sylvia Cadena on September 8, 2017

      I will add here “as well as the persistent disparities in literacy and income, barriers in the form of social and cultural norms that negatively affect women’s employability, as well as online gender-based violence.”

      Comment by Sylvia Cadena on September 8, 2017

      Some repetition between paragraph 29 and 30, worth reviewing.

      Comment by Adrian Wan on September 9, 2017

      must be infrastructure-based

      Comment by Winston Roberts on September 10, 2017

      I think the question is not whether or not the document is INTENDED to be representative – I would prefer to say ‘fully representative’- but rather whether it really can be, for practical reasons, such as the difficulties in being sure we have managed to reach out to all and get back responses from all relevant people in such a diverse and wide-spread region. If you agree with that, could I suggest re-wording the paragraph as: “…..online platform). The APrIGF Multistakeholder Steering Group (MSG) [6] and the Drafting Committee [7] accept that the Synthesis Document cannot be fully representative of the very diverse Asia Pacific region. Nevertheless, they anticipate that the development of this Synthesis Document can help drive active participation ……(etc..)”

      Comment by Winston Roberts on September 10, 2017

      I agree with Maureen’s rewording of the IGF dates.

      Comment by Winston Roberts on September 10, 2017

      I agree; and I believe we should continue to capitalise it.

      Comment by Vishaarad on September 10, 2017

      Would there be a need to include Mesh networks?

      Comment by Winston Roberts on September 10, 2017

      I agree with the addition of words about cultural diversity proposed in previous comments, I will leave it to Jen to do some complex editing there :-)
      Part of the problem with this para is that it combines aims, mechanisms and outcomes in very compressed language. Trying to keep it brief also makes it a bit obscure in places. However I think we should resist the temptation to add in too much more text, because we have the references to key source documents (which include the WSIS and SDG material).
      But having said that, I would propose one key addition, as follows:
      After “improve digital literacy”, I suggest adding “and access to information resources which support education and life-long learning. Community networks facilitate effective access by marginalised and underserved communities.”

      Comment by Vishaarad on September 10, 2017

      There is a need to establish a SIG(s) in Fiji & or in the Pacific prior to the next APrIGF, such a SIG programme should cater for none IG/ICT professionals.

      Comment by Vishaarad on September 10, 2017

      This is needed in to prevent the risk of IG and IG education becoming sacerdotal.

      Comment by Winston Roberts on September 10, 2017

      After “underserved regions”, could we add “(including the small island developing states)”.
      It is implied, but it would be good to make it explicit.

      Comment by Vishaarad on September 10, 2017

      Community and Mesh Networking:
      * Establishing of Mesh networks can promote greater digital literacy and can be used for communication during disasters
      * Governments should tax/duty/tariff exempt equipment needed to establish mesh networks and community networks.
      * Governments need a policy of encouraging ISPs to not penalise the sharing of internet subscriptions/connections for the purpose of establishing community networks.

      Comment by Vishaarad on September 10, 2017

      Hi, Can I get some feedback for my following comment-

      User Privacy and Terms of use:
      * Privacy policy, terms and conditions with services such as within operating systems, Internet/net-centric software and Internet-related services and products need to be streamlined, (for examples; this should not be spread over various web pages and windows/screens).
      * This would make it easier decision making by users.
      * There is also a need to make such documents accessible to users regardless of the literacy or education level.
      * There is need to highlight the use of telemetry.

      Comment by Vishaarad on September 10, 2017

      * Racial and religious hate speech over the Internet and Social-media, this maybe less evident in other South Pacific compared to Fiji

      Comment by Vishaarad on September 10, 2017

      Does the following apply to your respect country?
      – In Fiji’s context, the use of third party software, internet/-centric application and tool/services (including cloud storage) by Government/National bodies and agencies, for example; the storing and processing of details of citizens.

      Comment by Vishaarad on September 10, 2017

      I agree. Internet, and Accessibility and Disability
      * Assistive Technologies; need to be promoted in the Pacific to promote great accessibility to Internet.
      * There is also a need for more home-grown Internet-centric and other Assistive technologies in the Asia Pacific to cater for the linguistics diversity of the region
      * Apart from with those with visual impairments, there is a need for Assistve Technologies in the Pacific for those who lack the use of limbs.
      * Social-media/Internet Social Networking Companies and Technology companies and corporations (including email services) need to take measures not to exploit those who are vulnerable such as women, children and those with disabilities. Those with mental health disorders; and cognitive impairments and disorders are also vulnerable on the Internet. It is important to note that; anyone can become disable in any point in-time in her or he’s life, this can also be temporary such as a number mental disorders that affect cognitive function and judgement.

      Comment by Vishaarad on September 10, 2017

      +1

      Comment by Vishaarad on September 10, 2017

      * There is a need to look into Social-media for emergency management, such as capturing, tagging and verification of information of disaster affected communities & areas for better coordinating of relief activities on the ground

      Comment by Vishaarad on September 10, 2017

      I feel there is a need to have a heading for Open data, Open access etc

      Comment by Vishaarad on September 10, 2017

      With the recent floods on the South Asian mainland; would the following be relevant ? – With a high prevalence of floods in Fiji; there is a need for Open access to data of rainfalls and consequent flooding and the means to capture and verify information from social-media users and that could result in the subsequent crowd-sourced mapping of flood affected areas for disaster risk mitigation for future floods.

      Comment by Vishaarad on September 10, 2017

      * Better education is needed for the public, media and officials to access alerts from the Pacific Tsunami Warning Centre via email and via there official social-media profiles, and how to interpret the information issued by them.

      Comment by Vishaarad on September 10, 2017

      * Fiji and the Pacific need to invest in establishing cloud and net-centric computing infrastructure to protect the data and privacy of there citizens.

      Comment by Winston Roberts on September 10, 2017

      I agree with Ang Peng Hwa and others that we should emphasise the importance of agreed international instruments at the beginning of the paragaph. As one of the drafters of the WSIS Geneva “Principles”, I clearly recall the debates at the WSIS about this matter: there were attempts to water down references to the UDHR, in fact some took the view there was no need to bother mentioning Human Rights at all, and that we just needed to focus on technical ‘information’ matters… You have to wonder why… Fortunately reason prevailed, and the Geneva ‘Principles’ do make sufficient reference to the UDHR. Internet Governance, like all other policy areas, has to be developed within the framework of such agreed international instruments. We need to take an inclusive approach that allows for new and emerging issues.

      Comment by Winston Roberts on September 10, 2017

      Yes, good text. There are honestly-held contrary viewpoints in this area, and we will just have to wait until the international community has come closer to a common position.

      Comment by Vishaarad on September 10, 2017

      How is ‘access’ measured or how do we measure ‘access’ ?

      Access to Pornography on the internet, it seems, is also a measure of the access of internet in Nadi and Suva in FijiZ; on the main-island of Viti Levu in Fiji. In 2015; Google Trends released a list for the search of the word “Porn” and “Pornography” compared to a country’s total searches in which Eight of the top 10 nations listed were developing countries in Africa, with Fiji and PNG from the Pacific

      Comment by Vishaarad on September 10, 2017

      Is there a need to define a criteria of how “access” and; or ” accessibility” is measure. What do you think?

      Comment by Winston Roberts on September 10, 2017

      Maybe you mean insert between para 25 and 26?

      Comment by Vishaarad on September 10, 2017

      Would there be a need to have a heading “Disaster and the Internet”? My input – * There is a need to look into Social-media for emergency management, such as capturing, tagging and verification of information of disaster affected communities & areas for better coordinating of relief activities on the ground.

      *With a high prevalence of floods in Fiji; there is a need for Open access to data of rainfalls and consequent flooding and the means to capture and verify information from social-media users and that could result in the subsequent crowd-sourced mapping of flood affected areas for disaster risk mitigation for future floods.
      * Better education is needed for the public, media and officials to access alerts from the Pacific Tsunami Warning Centre via email and via there official social-media profiles, and how to interpret the information issued by them.

  • Asia Pacific Regional Internet Governance Forum 2016 Taipei Synthesis Document – Draft v1 (105 comments)

    • Comment by Mohit Saraswat on July 27, 2016

      In my opinion, a lot of machines would constitute to a bigger portion of the next billion that would be joining the internet. Machine to Machine communication would be an integral part of internet expansion. Its important that security by design is considered in M2M communication.

      Comment by Paul Wilson on July 27, 2016

      Rural connectivity is very imporant; however I do not believe that it requires “global changes to the Internet”. I suggest to relocate this goal to Para 28 (“Continuing efforts in bringing the next billion online”).

      Comment by Paul Wilson on July 27, 2016

      Rural connectivity is very imporant; however I do not believe that it requires “global changes to the Internet”. I suggest to relocate this goal to Para 28 (“Continuing efforts in bringing the next billion online”).

      Comment by Paul Wilson on July 27, 2016

      sorry, this comment can be deleted (wrong paragraph).

      Comment by Mohit Saraswat on July 27, 2016

      While these treaties and agreement would be certainly helpful in ensuring the cross border data flow, which was one of the building block of the internet, it would be beneficial to have it done providing a level playing field to all the parties involved. Mechanism should be inbuilt in these treaties ensuring that the further development of digital economy for the developing countries are not compromised in any ways. This also include offsetting measures that data localization brings to the parties advantage.

      Comment by KANUMURI S RAJU on July 27, 2016

      combined efforts from multi community sake holders or internet users or internet consumers safe guarders is needed. rather than private public etc

      effort necessary to support skill development , local languages local Ideas thoughts

      Comment by ANG PENG HWA on July 27, 2016

      I’m inclined to agree with KS Park that the Right to be Forgotten should not be mentioned at this time. The reason is that it is a right that comes “after” the right of privacy. Without the right of privacy, the RTBF will not be a meaningful right.

      Comment by KANUMURI S RAJU on July 27, 2016

      collaboration on cyber security education and preventing cyber attacks from nations which will effect people countries innocents etc.

      Comment by KANUMURI S RAJU on July 27, 2016

      Rural users villages un educated users.

      Comment by KANUMURI S RAJU on July 27, 2016

      ecological social survival economical

      Comment by KANUMURI S RAJU on July 27, 2016

      under global united open nations / open data flow liberty of cross border of open knowledge’s must be safe guarded with open agreement and policy/

      Comment by KANUMURI S RAJU on July 27, 2016

      social ,economical, native people societies , under privileged societies , middle class societies un educated job less youth etc

      Note globally middle class is getting sandwiched the next billion are also form these communities or youth of world is also can be added.

      Comment by Hong Xue on July 27, 2016

      Suggest to have an overall review of the structure of the document and identify the key issues and/or topics to be covered. Apart from the current list, there are “others” (such as Manila Principles on Intermediaries, Network Neutrality and Capacity Building) that are yet to be included.

      After Day 1, the fruitful discussions had been made and should be reflected in the documents.

      Comment by KANUMURI S RAJU on July 27, 2016

      investigation prosecution open collaboration

      tracing cyber crooks with out double minds / standards.

      Comment by nd on July 27, 2016

      This section should be framed from a human rights perspective. This is actually a dangerous section as some repressive Asia Pacific countries use these words “cultural differences” or “cultural specificities” as excuse to not respect human rights and even violate human rights.

      Comment by nd on July 27, 2016

      so I’m suggesting to delete this

      Comment by KANUMURI S RAJU on July 27, 2016

      Education and open privacy to cultures under universal open standards rules and regulations can over come culture where in good privacy is needed in known , others privacy is becoming others business mud throwing for survival etc,.

      If culture is aspect no body in world must not watch movies tv shoes etc

      Comment by KANUMURI S RAJU on July 27, 2016

      Governments service providers internet companies must respect consumer rights and also quality if living liberty of internet is important.

      Comment by Kelly Kim on July 27, 2016

      Notice:
      RTBF Meeting on Day 2 (July 28) from 9:00am in Room 405

      Comment by KANUMURI S RAJU on July 27, 2016

      right to destroy of digital personal data secured knowledge of people is important. good people data is not worried by criminals data must not be forgotten.

      Comment by Hiro Hotta on July 28, 2016

      Whether/How Internet is defined as “Critical National Infrastructure” is different from country to country. In addition, the Internet is a cross-border infrastructure that is critical at least in a sense. So, I think it’s better to chage “Critical National Infrastructure” into “infrastructure based on the Internet”?

      Comment by KS Park on July 28, 2016

      “The so-called concept of Right to be Forgotten (RTBF) is gaining greater support in many countries. Should RTBF have extra-territorial application? Does it also apply to digitised newspaper archives? Where do the boundaries lie with freedom of the press, and the integrity of the historical record? RTBF is a legal device supposed to protect privacy but it delists according to others concepts like public interest, and it is dangerous because it imposes a burden of proving public interest on people searching for public truthful statements or intermediaries (such as libraries, educational institutions, archives, search engines).”

      Comment by KS Park on July 28, 2016

      “The so-called concept of Right to be Forgotten (RTBF) is gaining support in some jurisdictions. Should RTBF have extra-territorial application? Does it also apply to digitised newspaper archives? Where do the boundaries lie with freedom of the press, and the integrity of the historical record? More fundamentally, the mostly judge-made law delists according to concepts like public interest but it conflicts with public interest because it imposes a burden of proving public interest on people searching for public truthful statements or intermediaries (such as libraries, educational institutions, archives, search engines).”

      Comment by KS Park on July 28, 2016

      “The so-called concept of Right to be Forgotten (RTBF) is gaining support in some jurisdictions. Should RTBF have extra-territorial application? Does it also apply to digitised newspaper archives? Where do the boundaries lie with freedom of the press, and the integrity of the historical record? However, more fundamentally, the mostly judge-made law orders delisting according to concepts like public interest but it conflicts with free access to information and therefore public interest because it imposes a burden of proving public interest on people searching for public truthful statements or intermediaries (such as libraries, educational institutions, archives, search engines).”

      Comment by KS Park on July 28, 2016

      “The so-called concept of Right to be Forgotten (RTBF) is gaining support in some jurisdictions. Should RTBF have extra-territorial application? Does it also apply to digitised newspaper archives? Where do the boundaries lie with freedom of the press, and the integrity of the historical record? More fundamentally, the judicial decisions under that concept conflict with public interest because it imposes a burden of proving public interest on people searching for public truthful statements or intermediaries facilitating that search such as libraries, educational institutions, archives, search engines.” – Winston, Yasuo (of IFLA); K.S., Kelly (Open Net Korea)

      Comment by Arthit Suriyawongkul on July 28, 2016

      providing some statistics, like numbers of days open (start date, end date), numbers of comments, etc. would be very interesting and will give the reader the idea of the participation in our process :)

      Comment by Arthit Suriyawongkul on July 28, 2016

      should also mention the arbitration mechanism that would allow foreign companies to challenge domestic regulations before international arbitration panels.

      Comment by Arthit Suriyawongkul on July 28, 2016

      if section is to be included, it should made clear that the “right to be forgotten” (in quote) is another concept related to right to privacy, but not the same.

      The information that RTBF deals with is a data that is (or should be) already the in public, and to be decided whether to keep it further public or not.

      The information that the right to privacy deals with is data that shouldn’t be in the public in the first place.

      Comment by Shita Laksmi on July 28, 2016

      In Asia Pacific, majority of the connection is via mobile phone. There is a different quality of accessing meaningfully the Internet via laptop or PC versus via mobile phone. The early adopter countries –which have access to Internet way before others– started their connection via cable and PC. The quality of accessing Internet via mobile phone, certainly has more limited quality.

      It would be good to have specific intervention on how to make mobile access Internet better engaged with people.

      Technology is not working in vacuum, the same with Internet. It depends on many factors and how you connect is also important.

      Comment by Arthit Suriyawongkul on July 28, 2016

      Computer code will be more effective in practical that legal code in this Machine to Machine.

      How to do the governance? As it’s not obvious to average people.

      Comment by Arthit Suriyawongkul on July 28, 2016

      What about scope it down to only “critical information infrastructure” ?

      Comment by Arthit Suriyawongkul on July 28, 2016

      [cyber-security]

      I suggested “cyber-security” to be replaced by “security of network and information systems” which is more self-explanatory.

      Comment by Arthit Suriyawongkul on July 28, 2016

      [new laws and policies]

      to be replaced with

      “existing and emerging laws, policies, and practices”

      Comment by APrIGF Secretariat on July 28, 2016

      Contribution from audience at Day 1 town hall session: Place holder topics

      – Intermediary Liability, Manila Principles

      – Capacity Building, bringing people in to have a better access to training and education and training and participation.

      Comment by APrIGF Secretariat on July 28, 2016

      Contribution from audience at Day 1 town hall session: Local language, Internationalized Domain Names (IDN) and Email Address Internationalization (EAI).

      Comment by byoungil oh on July 28, 2016

      I also support the suggestion to delete this sentence. despite of cultural differnce, privacy should be regarded as universal human rights.

      Comment by APrIGF Secretariat on July 28, 2016

      Contribution from audience at Day 1 town hall session:

      – Participation by women

      – Rights to accessibility

      Comment by byoungil oh on July 28, 2016

      this is thecomment on para 37

      Comment by Arthit Suriyawongkul on July 28, 2016

      In the context of cross-border data transfer and local people using online services provided from servers in foreign jurisdictions, this is problematic.

      I proposed this title and text:

      “Protection without borders

      Expectation of privacy may vary by cultures, thus different protections in different jurisdictions. Considering the nature of cross-border data transfer for online services and users’ difficulties to aware of that complication, if there is a difference in the level of protection in relevant jurisdictions, the highest level of protection should be guaranteed as a default safeguard. Minimum adequate level of privacy protection should also be sought after as an international agreement and adopted by every concerned jurisdictions.”

      Comment by APrIGF Secretariat on July 28, 2016

      Contribution from audience at Day 1 town hall session:

      – Right to Information, proactive disclosure, internet platform for obtaining information from state agencies.

      Comment by APrIGF Secretariat on July 28, 2016

      Question from audience at Day 1 town hall session: The Budapest convention is a global cybercrime convention, the Internet is truly global, would a regional convention be very useful?

      Comment by Gayatri Khandhadai on July 28, 2016

      Instead suggest:

      Legislation and policies governing ICTs:
      Across Asia several legislation have been developed to govern various aspects of the internet. Legislation that traditionally govern offline spaces are also used in tandem with these specialised legislation to address violations. These provisions must respect internationally recognised human rights and standards for restrictions. They must also draw from other regional documents on ICTs including the Budapest Convention Cyber crime.

      Comment by Gayatri Khandhadai on July 28, 2016

      Or

      Legislation and policies governing ICTs:
      Across Asia several legislation have been developed to govern various aspects of the internet. Legislation that traditionally govern offline spaces are also used in tandem with these specialised legislation to address violations. These provisions must respect internationally recognised human rights and standards for restrictions. They must also draw from other regional documents on ICTs including the Budapest Convention Cyber crime. Particularly, states should be urged to reconsider the manner in which mutual legal assistance agreements (MLATs) are currently implemented. The right to privacy, access to justice and rule of law must be upheld when data of individuals are shared by states.

      Comment by Arthit Suriyawongkul on July 28, 2016

      To protection person in question, if there is difference in the protection of suspect/defendant in relevant jurisdictions, the MLAT should honour the highest level of protection.

      Comment by Shubha on July 28, 2016

      This paragraph needs to be removed, or if it is to be rephrased, should be done without having ‘culture’ as the basis to mould laws and its implementation.

      Comment by Arthit Suriyawongkul on July 28, 2016

      To protection person in question, if there is difference in the protection of suspect/defendant in relevant jurisdictions, the MLAT should honour the highest level of protection.

      Regarding to this, please also refer to para 37 (“respect to cultural differences” – privacy protection in different jurisdiction).

      Comment by APrIGF Secretariat on July 28, 2016

      Contribution from audience at Day 1 town hall session:

      – Issues related to spectrum for connectivity

      Comment by Arthit Suriyawongkul on July 28, 2016

      Need title.

      Propose: “Protection of critical information infrastructure”

      Comment by Arthit Suriyawongkul on July 28, 2016

      may be merged with para 30?

      Comment by APrIGF Secretariat on July 28, 2016

      Contribution from audience at Day 1 town hall session:

      – Net Neutrality

      Comment by Arthit Suriyawongkul on July 28, 2016

      Or put emphasised on the new challenges that IoT will bring, like difficulties to patch large among of outdated devices, privacy violations from Big Data and linked data (made possible by large-scale data collection and smarter algorithms).

      Comment by Gayatri Khandhadai on July 28, 2016

      Alternatively

      Universal protection of rights:
      While expectations of privacy may vary across cultures, protection mechanisms must meet internationally guaranteed right to privacy.

      Comment by Arthit Suriyawongkul on July 28, 2016

      If we can frame it for a better protection of privacy, there’s no need to remove.

      Surprisingly, currently we don’t have a specific section dedicated to Privacy or Data Protection.

      Comment by Gayatri Khandhadai on July 28, 2016

      Suggest this:

      Uninterrupted access to the internet is essential for the free exercise of rights online. Network shutdowns and blocking have serious economic consequences and impede the right to information, expression, assembly and association among other rights. Any disruptions to the access to mobile and internet services must comply with strict standards established in national legislation and must meet the threshold of legality, necessity and proportionality laid down in the International Covenant on Civil and Political Rights.

      Comment by Arthit Suriyawongkul on July 28, 2016

      Three-part test of legality, legitimacy and proportionality must be ensured to be passed for all relevant jurisdiction in the investigation or prosecution. An oversight of the process must bee required from all participating countries. Data about requests should be made available to the public, for the interest of transparency and accountability.

      Comment by Arthit Suriyawongkul on July 28, 2016

      Agree. If we can start with Convention on Cybercrime. And try to improve the Convention if feels inadequate.

      Comment by Aris Ignacio on July 28, 2016

      Can this part be merged with Paragraph 28? I think both have a primary purpose of putting people online.

      Comment by Gayatri Khandhadai on July 28, 2016

      The use of ICTs in Chennai, India in 2015/2016 during the floods for rescue efforts and for relief work

      Comment by ANG PENG HWA on July 28, 2016

      Addressing Intermediary Liability appropriately is a critical step in enhancing the use of the Internet. To that end, the Manila Principles have been drafted after extensive consultation at the RightsCon 2015. More work needs to be done to put the Manila Principles into practice.

      Comment by Aris Ignacio on July 28, 2016

      An addition to capacity building, maybe we can also add YIGF as one of the programs that provides an avenue for the said area.

      Comment by Hong Xue on July 28, 2016

      Trade agreements address many things other than intellectual property rights. This para needs to be completely rewritten to reflect the discussion here.

      Comment by Hubert Chen on July 28, 2016

      I believe that maintaining cultural diversity online is an important issue, but what I want to ask is that is there any active action we can take online to keep cultures from disappearing. The internet itself is a kind of powerful and new culture, which is actually putting minor culture on the edge of extiction. So I think there should be something we can do actively.

      Comment by Aris Ignacio on July 28, 2016

      As an addition, maybe the document can be in multiple languages for the benefit of people who are not natives of the English language. :-)

      Comment by Kenta Mochizuki on July 28, 2016

      We held a workshop on the protection of youth online. I know there were several workshops regarding the similar theme. Therefore, we believe that we should include several sentences on the protection of youth online specifically. In this regard, I would like to propose the following sentences.

      “While the freedom of expression based on the free flow of information shall be respected, protecting children from illegal and harmful online contents is one of the most important issues. Accordingly, it is vital for all multistakeholders including governments, private sectors, schools, and child welfare institutions to cooperate and collaborate each other in order to strike a balance between the freedom of expression and the protection of youth online. In addition, comprehensive approaches based on national and international laws as well as self-regulations are indispensable, taking into account cultural, historical, and social differences of countries and regions.”

      Comment by NetMission Ambassadors on July 28, 2016

      We do support the idea of having “Capacity Building” add to the document, while we have worked on toolkit about youth engagement program e.g. the yigf and hkyigf initiative we have organized, that we can put our input a bit.

      Training Materials

      As well as there is workshop on Day 3 to discuss how to move forward for the AP region next generation engagement initiative. Happy to recap our discussion outcome and add to the mentioned session.

      Comment by Ben on July 28, 2016

      As for the IPv6 deployment ,ICANN may encourage Governments of each country to come up with some stimulation plans such as “If you transfer to IPv6 ,tax deductibility is available! ” to urge companies to transfer from IPv4 to IPv6.

      Comment by Maureen Hilyard on July 28, 2016

      The Nepal Wireless Connectivity Project (WS#90)

      Comment by Maureen Hilyard on July 28, 2016

      Last mile issues for developing countries. For example, although Pacific Islands governments realise the value of many newly established cable connections, many have not fully factored in the ongoing costs of ensuring that infrastructure and future maintenance, governance structures and human and other capacities match the potential of the connectivity.

      Comment by Maureen Hilyard on July 28, 2016

      Internet adoption is increasing slowly in the Pacific mainly due to its lack of affordability. There are still island countries where monopoly Telecoms (and even some where there are multiple providers, e.g. Papua New Guinea) put the internet out of reach of those who need the access, but it is too expensive. Many Pacific users only have access to the internet at work, Private connections are unaffordable on their low local wages. The cost for businesses as well as for learning, information and other valuable uses is quite prohibitive.

      Comment by Maureen Hilyard on July 28, 2016

      The SDGs provide significant focus areas for development in regions such as the Pacific and ICTs and internet connectivity could be a major contributor to this development. Unfortunately there is not enough research being done to identify how appropriate technologies and internet connectivity can effectively contribute to the future-proofing of mitigation measures being introduced by local donor-funded projects.

      Comment by nd on July 29, 2016

      +1

      Comment by Satish Babu on July 29, 2016

      While the subthemes are well developed, there appeared to be a bit of disconnect in relating the sub-themes to the main theme of “Merging Physical Space with Cyberspace”.

      Comment by Satish Babu on July 29, 2016

      Should we make “…measures to support and conserve existing diversity…” to “…measures to support, conserve and enhance existing diversity…” ?

      Comment by Kenta Mochizuki, Esq., LL.M. on July 29, 2016

      We would appreciate if you could add the following sentences in para.30, Security:

      “While recalling the freedom of expression online based on the free flow of information not only domestically but also internationally, the protection of youth from illegal and harmful online contents is one of the most important issues in the Internet governance. Hence, it is vital for all multistakeholders including, but not limited to governments, private sectors, schools, and child welfare institutions to cooperate and collaborate each other in order to strike a balance between the freedom of expression and the protection of youth online. In this regard, comprehensive approaches based on national and international laws as well as self-regulations by private sectors are indispensable, taking into account cultural, historical, and social differences of countries and regions.”

      Comment by Kenta Mochizuki, Esq., LL.M. on July 29, 2016

      While I would like to echo what Ms. Hong Xue said, provisions on digital economy and trade are absolutely needed. In addition, there are many kinds of international agreements and policies, so we had better change the title otherwise this paragraph is bit vague and it is unclear what this paragraph wants to say.

      Therefore, I propose the following sentences:

      —–
      ¶32 (or appropriate para. number) Digital Economy and Trade

      Digital economy and trade are key enablers for the development of the world economy. Now that the digital economy becomes the economy as such, and does not have any borders. The digital economy and trade cannot be successful without the free flow of information and appropriate domestic and global rules. On the other hand, there is a growing trend that some governments take protectionist approaches on trade by limiting the free flow of information and/or requiring data localization, and the trend hinders the further growth of the world economy. Therefore, constructing the further network of free trade agreements which requires member states to maintain the free flow of information and to ensure the prohibition of data localization as well as source code disclosure unless there is a legitimate public policy reason is highly recommended. In this regard, thorough discussion among not only governments, but also other multistakeholders is encouraged by referring to Trans-Pacific Partnership Agreement as one of the examples.

      Comment by Ks park on July 29, 2016

      Sorry for multiple comments above, which kinda reflect collective stream of consciousness of the working group. Please use the last one signed with the names of all of us (clocked at 7:07am). Also, I think Arthit’s comment is consistent with and incorporatable into our proposed text.

      Comment by ANG PENG HWA on July 29, 2016

      I think that specific reference to TPP needs to be removed. Athough the TPP is the first trade agreement for the digital age, the TPP process has, regrettably, been less than exemplary from a multistakeholder perspective.

      Comment by APrIGF Secretariat on July 29, 2016

      Contribution from workshop participant: placeholder topic and text:

      – Multi-stakeholder model

      The use of the multistakeholder model in Internet governance receives broad support internationally. Multistakeholder model encourages coordination and planning through a consensus-making process and recognizes the need to incorporate regional and local Internet governance context and strategies. Its implementation and efficiency thus undergo continuous testing and refinement. There are ongoing efforts to explore means for greater participation in multistakeholder processes and to work towards an inclusive multistakeholder method.

      Comment by Maureen Hilyard on July 31, 2016

      Arthit has mentioned below that some statistics related to the development of the APrIGF Synthesis Document could be included into this document, perhaps as an appendix (?)
      This would add to its authenticity when we present it elsewhere. The appendix could briefly explain the process, the schedule, and the names of eventual contributors and/or where they come from within the region to demonstrate the spread of contributing voices.

      Because paras 3 & 4 are about process and not content, they could be deleted (and the appendix section developed).

      Comment by Maria Umar on August 1, 2016

      Internet Access has hugely changed my personal life and helped me change that of other women around me. The Women’s Digital League was formed when I was fired from my teaching job because the private school I was working at would not give me maternity leave. Sitting at home with a simple dial up connection I found remote work. Earning my first $2.5 writing an article for someone in the US gave me much-needed confidence in my abilities. It was a stepping stone to becoming financially empowered and independent; being recognized as the top most impactful entrepreneur in Pakistan; and in showing women they didn’t have to accept status quo. With greater financial empowerment I ahve seen young women not settle for the first proposal that came for them as they were no longer a burden on their household; send siblings to school/college; have greater say in decisions at home; be more respected and therefore have a higher self-esteem.

      Comment by Smita on August 2, 2016

      +1

      Comment by Smita on August 2, 2016

      +1

      I don’t think it should be removed since differences in cultural norms need to be acknowledged. But I agree with Gayatri’s framing, that regardless of these norms, the right to privacy must meet international standards.

      Comment by Smita on August 2, 2016

      I like the fact that you have explained the reason for maintaining international standards in right to privacy. Perhaps we can include a line from here on cross-border data transfer with what Gayatri has suggested?

      Comment by Smita on August 2, 2016

      +1

      Comment by Smita on August 2, 2016

      +1

      Comment by Zakir Syed on August 4, 2016

      Net Neutrality should be added to the heading thereby covering both the scenarios i.e complete shut down or blocking certain services. There have been cases of different services/applications being blocked in a number of countries across the APAC region. Internet service providers and telecos needs to consider the fact that net-neutrality is an emerging areas of concern and that it is the end users rights to enjoy open Internet connectivity. Governments, regulatory authorities, industry associations, the academia, and most importantly the civil society needs to highlight this issue which is considered to be a serious threat to the future of open Internet in the region.

      Comment by Zakir Syed on August 4, 2016

      +1. I agree with Paul on this. I think the key drivers for universality of the Internet are IPv6, Internationalized Domain Names (IDNs) and as a result of IDN’s Internationalized/multilingual email addresses, and to some extent Over The Top (OTT) applications that are resulting in convergence.

      Comment by Zakir Syed on August 4, 2016

      Some of the fundamental issues pertaining to overcoming the digital divide include but are not limited to the Universal Services Obligations/Fund (USO/USF), Digital Dividend which is the below 1GHz spectrum that is being free as a result of the Digital Switch-over (of analogue TV), Infrastructure Sharing among service providers, and ICT education and capacity building, among others. These issues needs to be highlighted and discussed so as to aid into the efforts in over coming the digital divide.

      Comment by Zakir Syed on August 4, 2016

      This, I think is a multifaceted issues and can be explored in from different angles, such as the Impact of Transition on the overall Internet Governance (IG) landscape and debate on a global scale, similarly its impact on the IG landscape in certain specific countries and regions. Additionally, how is the transaction going to impact the business sector (mainly the Internet businesses). Questions like these and others in light of the future impact of IANA Transition can really lead to an interesting debate.

      Comment by Zakir Syed on August 4, 2016

      Security actually can be “Security of the Internet” or “Security on the Internet”. If its the former, lets change the heading to “Online Security” but if we mean the later, then “Security, Stability & Resiliency” can be a good heading, for it directly refers to the core of Internet, and is also one of the principle which the US Govt for the IANA Transition proposal to adhere to.

      Comment by Zakir Syed on August 4, 2016

      I think the truly global nature of Internet can not be used as an excuse to enact national and/or regional laws that will help make the Internet a safer place. Think of this, Internet is a truly global but we don’t have one Global IGF, instead several regional, national IGFs. Similarly, Internet is global yet we have 5 NICs, APNIC, RIPE NCC, AfriNIC, …….. The regional/national cyber law could be useful if in harmony with global conventions.

      Comment by Zakir Syed on August 4, 2016

      The deletion/removal of this paragraph, i believe will be contradictory to the Para 35 where it explicitly talk to preserving “culture” in terms of sustaining diversity. Just a thought.

      Comment by Zakir Syed on August 4, 2016

      It is due to this very nature, “New Security Considerations” are decisive.

      Comment by Zakir Syed on August 4, 2016

      With due respect I disagree. I think the term “Critical National Infrastructure” could be a good fit here. For example Smart Grid which is a good example of CNI can be connected to the Internet and hence prone to security challenge. It may not be something completely “based on Internet”. Similarly, other large scale telemetry/smart metering systems could be examples of CNI connected to internet instead of completely based on it.

      Comment by Zakir Syed on August 4, 2016

      While they could possibly be merged but I would suggest not to merge these. Para 30 relates to generic/traditional security aspects which this one is looking into the emerging security threats linked to disruptive technologies such as IoT which fairly has a specific and more challenging dimension to it.

      Also we have to consider the security issues which may arise due to Internet of Things. The suggestion of the meeting was security issues should be addressed from the phase of designing the devices.

      Collaboration to mitigate and prevent cyber security incidents within the region of AP and in a global level is a must.

      Comment by Gunela Astbrink on August 5, 2016

      Correct typo of ‘intercessional’ to ‘intersessional’

      Comment by Gunela Astbrink on August 5, 2016

      If as you suggest this section should be framed from a human rights perspective, it may be better to delete this section as privacy is already mentioned under the Human Rights section. In this way, cultural differences become less contentious in terms of privacy.

      Comment by Gunela Astbrink on August 5, 2016

      The topics below may be merged or changed but I suggest that topics be clustered together to reflect various main themes. The following suggested order does not indicate that some topics are less important than others. I have started from 28 and attempted an order from there:
      28, 31, 35, 33, 34, 30, 38, 36, 39, 40, 29, 32. I have omitted 37 as it’s suggested that this be merged with 31.

      This section should NOT be removed. The Internet content for AP region is mostly from US and EU. But when there is a matter about privacy they refer their privacy policies developed on their culture. Sometimes a privacy violation according to our culture, does not align with their policy and hence they do not consider and take action.

      Comment by Jim Prendergast on August 5, 2016

      I think this paragraph is simply restating the sub themes of the conference. The other topics listed may have been discussed but they shouldnot be considered sub themes.

      Comment by Edmon Chung on August 5, 2016

      in WS59 a theme emerged around the importance of understanding the dynamics of diversity, in that it changes over time on different issues and as such discussion evolves through stages. That diversity is not an absolute or finite value, and that cultural diversity is highly relevant for the AP region in the global IG context, especially in the development of rough consensus (i.e. to avoid dominant cultural bias causing undue influence over results of discussions given cultures in AP’s tendency towards deference to authorities)

      Comment by Edmon Chung on August 5, 2016

      WS57 discussed the growing importance of investigating illegal wildlife trade online, and the effectiveness of cross jurisdictional processes are becoming increasingly critical. At the same time though, privacy and other user rights must not be compromised. Industry code of practices are important beyond legislation.

      Comment by Edmon Chung on August 5, 2016

      WS57 highlighted the merging physical space with cyberspace in the sense that the internet and ecommerce is having a direct impact on wildlife and the environment, (poaching supported by demand from convenience of ecommerce). At the same time ecommerce and elearning can support rural economies to discourage poaching. the SDGs and their interrelation with the Internet and Internet Governance is exemplified by supportive policies and technologies deployed for wildlife conservation (especially as it intersects with rural populations and least developed areas in the proximity of endangered species)

  • Asia Pacific Regional Internet Governance Forum 2018 Port Vila Synthesis Document – Draft 0 (93 comments)

    • Comment by Gaya on August 14, 2018

      Data protection practices must comply with international principles like the OECD 1980 one
      Region should look at what GDPR mean for us and how the good principles can be adapted int he region

      Tension between internet governance law and extra territorial laws

      Comment by Gaya on August 14, 2018

      Synthesis – Town Hall 1
      Content moderation – to be rooted in human rights – David Kaye report – Human rights impact assessment – social media for content moderation

      Comment by Gaya on August 14, 2018

      Enforcement of laws – cyber crimes to get better addressing

      Comment by Gaya on August 14, 2018

      Need for greater participation and voice of youth to be heard

      Comment by Joyce Chen on August 14, 2018

      Need to push for enforcement of law both on and offline, particularly at national level;

      To mitigate security concerns and cybercrime, there is an urgency to develop robust cybersecurity policies at organisational and national levels.

      Comment by Gaya on August 14, 2018

      Taking a human rights based approach to technology and to root ICT laws in human rights principles and values

      Comment by Pablo Hinojosa on August 14, 2018

      At the workshop today, WS89 “Whois” collected, disclosed and protected: How we care about protecting data privacy?”, there are elements about Whois that had to do with cybersecurity, specially the use of Whois for traceability and attribution. However, not only Law Enforcement Agencies use the Whois for this purpose. There are other entities, such as CERTs, that use Whois to monitor behavior regularly but, importantly, for incident response purposes. It is important that CERTs have access to Whois, as public accessibility might be restricted due to privacy considerations.

      Comment by Ali Hussain on August 14, 2018

      Where Internet has enabled the access to information and on-line social networking the need of Digital Rights Management has emerged as need of community for protecting the social-cultural need and to protect users online privacy and safe data use. And capacity building programs are in high demands.

      Comment by Ali Hussain on August 14, 2018

      There is need do the capacity building of elders and parents so as to bridge the gap of Internet access between children and parents.

      Comment by Ali Hussain on August 14, 2018

      Emerging technologies must utilize the benefits of community networks for connecting the last miles network for access to affordable Internet.

      Comment by Joyce Chen on August 14, 2018

      Need further elaboration on role of law enforcement and more guidance for them on balancing individual privacy rights while ensuring public safety.

      Comment by Joyce Chen on August 14, 2018

      Need language on the need for more capacity development activities to increase knowledge and capabilities of technical operators.

      Comment by Pablo Hinojosa on August 14, 2018

      During workshop WS89 “Whois” collected, disclosed and protected: How we care about protecting data privacy?” we discussed how privacy considerations have been strengthened in light of the General Data Protection Regulations (GDPR), an European set of privacy rules that have impacted the way Whois publishes personal information of Domain Name holders. These rules are not limited to Europe but have extraterritorial enforceability, adding new considerations to ICANN contracted parties, such as Registries and Registrars, that need to comply with both, the GDPR and their contractual agreements with ICANN. This has trumped community-led policy development processes at ICANN, requiring an expedite process for Registrar and Registrars to agree on new policies for their Whois services to comply with GDPR. It is important to improve monitoring capability of future legislation that may have impact on services such as Whois; but also prevent that multistakeholder processes be overturned by regulatory processes.

      Comment by Gaya on August 14, 2018

      Similarity in legislation – states should cooperate to have comparable legislation and tweak it ot local context

      Comment by Andrew Joe Tungon on August 14, 2018

      I would like to see more emphasis on developing of ICT in education sector especially tempted areas in Asia Pacific cause this would probably promote and encourage a universal access policies of individuals users in ICT

      Comment by Andirauga Paru Nongkas (Andi) on August 14, 2018

      national e-commerce frameworks need to enable economies to leverage the use ict’s to drive social and economical development

      Comment by Andirauga Paru Nongkas (Andi) on August 14, 2018

      the benefits of such initiatives should be effectively advocated and communicated to local communities in order to leverage or realise the full benefit of the multi stakeholder engagement

      Comment by Mariko Kobayashi on August 14, 2018

      I understand the balance between generalizing and uniqueness, and I suggest that adding one sentence to summarize APAC’s specific issue in each sub-theme. Or how about keeping the current sections, and adding several paragraphs to describe more detail/ particular topics for our region?

      Comment by Yohani S Ranasinghe on August 14, 2018

      Capacity building should be done and different approaches need to be identified to spread the awareness about the Internet Governance within the community because first, we need to attract more people to the discussion then only we can empower our multi-stakeholder model.

      To attract more stakeholders, the benefits of these type of discussions or forums must be conveyed to them and it will be helpful for people to improve interest. Clear idea about the final outcome of the multi-stakeholder discussion needs to be conveyed.

      When more people are engaging it is obvious to face more challenges when coming to a conclusion but approaches need to be identified and the experience can be shared among national IGF in this regards and how they overcome these challenges.

      Time is one of the greatest challenges different groups face when they need to gather and discuss, we need to identify different communication platforms especially online platforms that can be used effectively for these kinds of conversations. If face to face meetings are difficult at least it is worth meeting online rather than doing nothing.

      Comment by Burcu Kilic on August 15, 2018

      In WS105 panel on digital trade and development, concerns were expressed about the implications of the trade rules which have been agreed in recent free trade agreements and proposed at the World Trade Organization such as: cross-border data flows, e-signatures, restrictions on access to source code and algorithms, for: privacy, artificial intelligence, cybersecurity, algorithmic bias/discrimination, financial regulation, tax collection, health, environment, competition law etc. It was explained that data should not be treated as a commodity and our rights should flow with the data. There was consensus among the panelists that the trade rules are already out of date compared to the fast-moving technology and would not solve the access, connectivity and affordability challenges in the region.

      Comment by Sanya Reid Smith on August 15, 2018

      Therefore we think it is important to build bridges with the trade negotiators and increase their understanding of the technology and the far-reaching implications of these rules. Users and the technical community have not been sufficiently involved in this trade rule-making process on these issues, their voice should be heard (for example via effective stakeholder consultations) and their concerns taken into account. Better engagement of these underrepresented communities is needed in these processes.

      Comment by Kenn Yee on August 15, 2018

      Just a suggestion, this comment might be better captured under Access and Empowerment section

      Comment by Pablo Hinojosa on August 15, 2018

      Perhaps could be good, in an introductory paragraph, a mention to the presentation by Vint and Chengetai about the recent launch, by the UN Secretary General, of the High Level Panel on Digital Cooperation. The APrIGF community may acknowledge the Panel and appreciate the efforts by Chengetai and Vint to reach out to this community and the mapping of different issues. Perhaps we can also set some expectations about the level of openness, inclusiveness and transparency in which the panel will be working; and also perhaps recommend that the voice of the HLP is very much welcomed, but not necessarily representative of the multistakeholder community.

      Comment by Gaya on August 15, 2018

      Network shutdowns – need to capture – in relation to disaster management and response

      Comment by Pablo Hinojosa on August 15, 2018

      At the “Know Your Net – Enabling A-Z competences with Net Tech in the Pacific” workshop there was an excellent discussion about three critical challenges that the Internet is facing in terms of its future stability and security. These are: IPv6, DNSSEC and routing security. The future of the Internet highly depends on the successful implementation of policies and best practices and the increased implementation of these three critical measures.

      Comment by Gaya on August 15, 2018

      Privacy be design needs to be emphasized along with informed consent standards

      Comment by Pablo Hinojosa on August 15, 2018

      Actually, on second thoughts, this mention to the HLP can more appropriately be placed in the section on Multistakeholder Participation in Internet Governance (???).

      Comment by Ali Hussain on August 15, 2018

      The inclusion should also shape the technology in a way that is easily acceptable in diverse social culture.

      Comment by Ali Hussain on August 15, 2018

      The implementations strategy must also take in account the age factors. The young womens today have more capacity and capability and access to absorb the Internet then mid aged women. So there is need to capacity development of women specific program to educate them about safe use pf technology.

      Comment by Gaya on August 15, 2018

      Abuse and online harassment missing

      Comment by Kenn Yee on August 15, 2018

      Suggestion for addition after “resources and support that help to empower access need to be considered”: , crafting a policy framework based on best practices for accessibility as a norm for developers to follow.

      Comment by Ali Hussain on August 15, 2018

      The standard should be prepared for IoT security and protecting users privacy. These standard must be regulated while allowing the IoT in any country this can help in mitigating security concern of IoT adoption .

      Comment by Ying-Chu Chen on August 15, 2018

      If government want regulated some internet new services, government should also invite technical group inside, to take the advice from technical groups or communities. Or, to build the process in the multistakholder model to include more diversity and broader opinions.

      Comment by Ying-Chu Chen on August 15, 2018

      We need to make the balance in development, innovation, economy and human rights.
      It also relates with company governance with ethics issue.

      Comment by Kenn Yee on August 15, 2018

      Instead of “better and effective policies”, suggestion to specify what the goals of such policies are.
      Suggested text: The Internet is a global open platform, and policies should effectively pursue this;

      Comment by ZHAOHAN Li on August 15, 2018

      Nowadays, it cannot be denied that many countries have the access gap in AP region, but we believe that the situation is getting better because the governments have recognized this issue and they’re working hard to improve this situation. However, there is one thing that few people concern, that is,balance is needed between over-access and lack of access in a country especially the access to education information. Resources are limited,children in the areas with high level of accessibility may face the problem of Internet addiction or over-reliance, while those in the areas lack of Internet access cannot benefit from Internet. Empowerment should be lead the Internet to a more benefit way, it needs balance and reasonable guidance to the access issue for different areas of AP region countries. Aged people also need special capacity building.

      Comment by Andrew Kalman on August 15, 2018

      After attending across border lesson, i want to add if IGF and its sponsors could contribute in building Law Enforcement capacity in future. Currently Pacific LEA are in major needs in strenghtening our capabilities in the global fight against crime.

      Comment by Ying-Chu Chen on August 15, 2018

      There are different development levels in each Asia Pacific region and country. East Asia, South Asia, Southern-Ease Asia, Oceanic countries, etc. Some countries are doing their economy in technology development well, but some countries are just beginning.

      Developed countries can share or transfer their e-commerce or other on-line services experience to developing countries to prevent the harming again.

      Comment by Ying-Chu Chen on August 15, 2018

      Free Trade Agreement make different barriers in the physical world, besides, we also need to consider about Non-tariff barriers to trade to protect their local business.

      Comment by Maureen H on August 15, 2018

      The eGovernment workshop involved getting ideas from the participants of what they would like to have in their eGovernment website if they were asked for input. As most of them in this group were from Vanuatu, and I know that Vanuatu is currently setting up their infrastructure for an eGovernment website, I will include these inputs into my report on the workshop and send a copy to the Vanuatu Government’s Office of Information and Communication. Hopefully the APRIGF can contribute some input into the development of their country’s new eGov system.

      Comment by ZHAOHAN Li on August 15, 2018

      Law enforcement agencies and the technical community need more communications and collaboration together. Make LEA have more technical guidance and info on the practical security issues, and make the two sides understand each other’s concerns comprehensively. All the stakeholders need to contribute.

      Comment by Bart Hogeveen on August 15, 2018

      I am not sure law enforcement should get such a prominent role in safeguarding that the internet is a safe place. Sure, LE needs to enforce the law but I think responsibility to safety on, and security of the Net rests with users, ISPs, industry and the like. Furthermore LE across the globe never will have the ability to live up to such a responsibility.

      Comment by Bart Hogeveen on August 15, 2018

      If these questions should reflect the discussion during APrIGF; I feel the focus was much more on capacity development, awareness raising, and another interesting view, different interpretations of security across the region. The threat perception in the Pacific being different from Asia and Aus/NZ.

      Comment by ZHAOHAN Li on August 16, 2018

      It’s not opposite between data localization and cross-border data flow. Data localization and legislation should develop together with the national regulation on cross-border data-flow, need more integration and balance.

      Comment by ZHAOHAN Li on August 16, 2018

      In the panel on Privacy in the Digital Age & the Rule of Law, a concern was expressed that there must be some balance in the issue of privacy: the balance between individuals and states, individuals and businesses, individuals and individuals. There is an initial consensus that it’s necessary to pursue the balance on privacy issues from the perspective of pragmatism. Law enforcement need specific data to some extent to solve the crime problems as well as safeguard public security.

      Comment by Ming Yip on August 16, 2018

      A solid and detailed guideline for the enforcement body is essential. We cannot guarantee that the enforcement body would not perform any acts that go beyond the line and infringes ones’ privacy, even when its intention is to promote national security. In that connection, there must also be ways to stop those enforcement bodies from continuously infringing individual privacy.

      In relation to the balance, it is also suggested that the guidelines should incline more to the protection of individual privacy, which is believed fundamental in human rights.

      Comment by Ming Yip on August 16, 2018

      A more solid and detailed guideline is essential for enforcement bodies. We cannot guarantee that the enforcement bodies would not go beyond the line that excessively infringes ones’ privacy. In that connection, there have to be ways or directives to prevent those enforcement bodies from continuously infringing ones’ individual privacy, even when its intention is to protect national security.

      In relation to the balance, it is suggested that the guideline should incline more on the side of individual privacy, as this is fundamental in human rights.

      Comment by Ying-Chu Chen on August 16, 2018

      Internet shutdown will be a big impact to the economy, people can’t use internet service by the internet, they have to waste a lot of time stay in the queue and waiting.

      Comment by Ming Yip on August 16, 2018

      Aside from internet governance, internet itself is not generally known by the public in some pacific islands. As reflected by the local youth in yIGF, many of them said that the fact that they do not understand what internet is has hindered the progress of internet access.

      In this connection, I think different stakeholders should also educate more on the basic concepts of internet in some pacific islands, which is also an important capacity building section. So with more knowledge on internet, internet access may be promoted, and so as internet governance eventually.

      Comment by Kenn Yee on August 16, 2018

      Internet shutdowns are a huge disruption to a nation’s economy and society regardless of the length of the shutdown and whatever the motivations . National and local authorities need to be informed that such shutdowns are ineffective in addressing public unrest or other issues, and large economic costs are unnecessarily incurred.

      Comment by Kenn Yee on August 16, 2018

      Alongside the goal of inclusion, consideration needs to be given for safeguards to ensure the well-being of vulnerable groups, such as children, in their usage of the Internet. These safeguards should be crafted with the interests of vulnerable groups in mind, to ensure that they are protected from Internet-related dangers and inappropriate content.

      Comment by Kenn Yee on August 16, 2018

      As an alternative to data localisation and data protectionist policies, procedures to define provisions for data access should be discussed and developed via a multistakeholder approach.

      Comment by Gunela Astbrink on August 16, 2018

      Digital literacy should extend beyond learning how to use email and basic tools to safety online and to develop critical thinking to ensure that people understand what is reputable online information. Critical thinking is a key to online empowerment.

      Comment by Kenn Yee on August 16, 2018

      Outreach and capacity-building efforts for Internet governance, whether local or regional, should also follow a multistakeholder and collaborative approach towards a shared goal of bolstering the community.

      Comment by Gunela Astbrink on August 16, 2018

      Accessibility for people with disability is a cross-cutting issue that is exemplified by the number of APrIGF sessions ie topics that were relevant. For example, apart from the specific disability session, accessibility was discussed in preparing for natural disasters, e-government services and digital literacy and taking Internet governance to the masses.

      Comment by Gunela Astbrink on August 16, 2018

      Emerging technologies such as IoT can be life-changing for people with physical disability but needs to be designed to be interoperable with various devices including assistive technologies.

      Comment by Gunela Astbrink on August 16, 2018

      Technologies should be designed to take into account the needs of the whole community including people with disability. This is done through existing international guidelines.

      Comment by PAUL WILSON on August 16, 2018

      I will repeat something that I said at the mic. :-)

      This is a reminder about the purpose of this document, which is to report the discussions and agreements of the APrIGF 2018.

      So, this document isn’t a place to add new points or positions which were not actually raised or discussed on the floor, in the workshops of the meeting.

      Also, it is very useful when posting comments here, to state the actual WS or session which they relate to. That will help the drafting team to add the right footnotes and references in the final document.

      Comment by Reysa on August 16, 2018

      Digital skills programs and initiatives should respond to local contexts which includes local languages, socio- cultural considerations, technology accessibility and challenges unique to disadvantaged groups.

      Comment by Reysa on August 16, 2018

      Our messages have tendency to be too complex that an ordinary individual who have less exposure to technical contents and scholarly concepts. Transforming our message into understandable language for all can be of help. This can encourage more participation. It is a common knowledge that some segments of the local community are not confident to speak up. Creating ways to encourage them to speak up and tell their stories is a good start.

      Comment by Reysa on August 16, 2018

      I totally agree Gunela. Developing meta cognitive skills is always an important component. Teaching them how to think and to understand the concepts rather than just giving them activities where they have a tendency to do rote memorization is really important. Those who are not comfortable with technology use are inclined to memorize. It defeats the purpose to innovate.

      Comment by Reysa on August 16, 2018

      I have observed that the discussion and ICT development focuses on psychosocial disabilities? I suggest that the next forum with also tackle this issue. What are the assistive technologies to support this group?

      Comment by Yannis Li on August 17, 2018

      A true Internet access shall not be limited to certain platforms or information only.

      Comment by Gunela Astbrink on August 17, 2018

      The concept of universal design was discussed in WS 44.

      Comment by Gunela Astbrink on August 17, 2018

      IoT and disability was raised in WS44

      Comment by Gunela Astbrink on August 17, 2018

      This issue was raised in WS 83

      Comment by Jeff Garae on August 17, 2018

      The current situation in the Pacific especially in Vanuatu is the lack of digital information contents, digital access, skills and information availability for various purposes that suits Vanuatu’s social and economical population. While there are now some implementation to spread access coverage, tailored information/contents for Vanuatu.
      In addition, creating user/business avenues and demand-driven access to motivate more use of Internet apart from just social media, email access and sms, etc. which could encourage local, regional and international access and connections are ideal to increase access and empowerment in the pacific.

      Comment by Jeff Garae on August 17, 2018

      I fully agree with Kenn Yee on the multi-stakeholder and collaborative approach outreach and capacity-building efforts for internet governance.
      The Pacific should get more involved in this approach as I think it will be the most suitable and working model to fit the geographical and diverse cultural existing in the pacific. And with the rapid pace and technological shift involving cloud technologies and services, the pacific needs to step up, evolve and utilise the Internet for their benefits and greater wider Asia Pacific region.

      Comment by Jeff Garae on August 17, 2018

      Online Privacy and Protection (or data protection) is a new concept for people in the pacific especially in Vanuatu. People in the rural areas of Vanuatu who daily use Social Media for communication generally do not know what is online privacy, data privacy/protection and even the concept of protecting personal data/information. The “value” of personal data online does not raise a concerning alarm to most end-users in the pacific. And with the unregulated nature of social media platforms, users do not take a step back to self-evaluate them on what/how their daily online presence are like.

      Comment by Jeff Garae on August 17, 2018

      There are several points/inputs with Cybersecurity and APrIGF:

      1. I think the opening sentence/statement is very good and states well what cybersecurity in the Asia Pacific region. Highlighting the words: “…growing concern, developing economies, security measures, online economies and emerging technologies…” really expresses the need to address cybersecurity gaps with multi-stakeholders security collaboration and partnership approaches with capacity building and promoting cybersecurity especially in the Pacific.

      2. This is a proposal to add to the APrIGFG 2019 sessions: more dialogue and discussion around addressing cybersecurity gaps with (1) more emphasis on security research inputs from industry research centers, academic research centers and governmental research centers, (2) innovation technologies within Cybersecurity domain, (3) law enforcement approaches, and (4) introduction of security techniques and methodologies which could help protect end-users help themselves over the internet, (5) Cyber Security standards such as ISO 27000 security Series standards, etc.

      Elaborating on how law enforcement play effective role in ensuring a safe Internet environment for users, existing collaborations with law enforcement research centers and agencies have indicated working relationships with security companies, academic institutions and financial institutions. Such working partnership are indicating positive way forward to addressing cybersecurity issues which the Asia Pacific region. Hence, encouraging the Pacific region to establishing partnership with law enforcement would be a bonus to their capacity building strategies.

      3. Encryption Standards and regulations. This input is more of a general input, where I am hoping to include discussion and inputs for the Asia Pacific region.

      4. I am supporting other speakers and people who commented on inviting more technical people to attend and create more session. I am not sure how much relevance this would be to the whole Internet governance forum (especially around management, logistics, etc.), but including technical work shop sessions such as Security tool training, and mini cyber security challenges especially for YIGF and pacific attendees would be a capacity building suggestion.

      5. Finally, my observation for the Pacific on a way forward with cyber security is to encourage effective partnership with security firms, institutions, academic institutions, law enforcement, ISPs, regulators. Finally learn from developed nations who are implementing effective cyber security strategies.

      Comment by Jeff Garae on August 17, 2018

      I agree with you Joyce.

      Comment by John Jack on August 18, 2018

      CERTs will play a key role in monitoring behavior of activities and providing advisories and they need to mentioned.

      Comment by John Jack on August 18, 2018

      The Prime Minister mentioned about money laundering and especially people with such intentions are using the Pacific as their safe havens to carry out such an act. As such, we need to look at security developments in terms of internet technologies that will 1) prevent such acts from being committed and 2) if they are committed, tracing of such activities including powers to enforce full force of the law across borders.

      Comment by John Jack on August 19, 2018

      Cross-border data flow should increase to facilitate for efficient trade between countries. Laws of the land should be given priority over introduce or foreign laws.

      Comment by John Jack on August 19, 2018

      How do we know that applications that are developed satisfy the needs of all users of the app? If we do not have that access at the very beginning, then we would not have known the answer now. But it is more important that we build that into the very core of our education system so that youths are empowered knowledge and information as they walk out of college. It would be a little bit of a challenge for those that never made it to the elementary schools. But the vocational training centres should be able to bridge the gap.

      Comment by Sunny Chendi on August 19, 2018

      I believe its worth mentioning the National SIGs. IGA, IGF initiatives and how these forums facilitating the multi-stakeholder participation at a local level and their contribution to the regional/global IGF.

      Also a little about APASA initiative by the I* partners objectives for supporting the NRIs.

      Comment by Ken Katafono on August 19, 2018

      Definitely agree with your statement Joyce

      Comment by Ken Katafono on August 20, 2018

      Basic elements of Internet Governance should be introduced in schools together with other computer-related curricula, particularly in the Pacific. Many young people don’t understand what the Internet actually is let alone how its governance is managed. Teaching young people how the Internet actually came about and how it continues to be run today should be a precursor to teaching them how to use a computer and access the Internet.

      Comment by Pablo Hinojosa on August 20, 2018

      Agree, John Jack! Perhaps it deserves a mention in the report that there has been a most positive development, in the recent 2-3 years, as new CERTs are being established in the Pacific. Tonga, PNG and Vanuatu are three great examples on inclusive CERT developments that bring great cybersecurity benefits to the community.

      Comment by Marlon on August 20, 2018

      One of the key points highlighted during the workshop is the need for education and awareness.

      1. Technical solutions and competencies are the technical deterrence to secure systems, to try and reduce or prevent technical vulnerabilities.

      2. Legislation and laws are an approach to try and deter a behavioral motive but not necessarily prevent deter technical attacks. The bad guys do not care about laws.

      3. Education and awareness is a user preventive measure from exposure to security vulnerability due to illiteracy and ignorance.

      Therefore Education and awareness is an equally important measure to cyber security

      Comment by Yeseul Kim on August 20, 2018

      I agree with Andrew and Mariko’s opinion although I also think we should bear in mind what Paul has said here.

      So what about adding one or two sentences focusing on the specific conditions that APAC regions face (or even may pacific regions face) in the beginning of the synthesis document so that it can be widely known to the world community? As Pacific IGF was also held during the APrIGF this year, this will not go against what Paul suggested above – to report the discussions and agreements of the APrIGF 2018.

      Comment by Maheeshwara Kirindigoda on August 20, 2018

      Internet Restrictions and shutdowns affect Digital Economy at large. Internet restriction and shutdowns may cause serious problem when it comes to Emerging Technology usages.

      Same time most of the emerging technologies need to be used to uplift the standards of people. Privacy is a major concern we all have to think of.

      Comment by Nuwan Waidyanatha on August 20, 2018

      Given the volume of IOT devices, it is difficult for regulators to validate the security of each device. Would be similar to testing every brand and variation of items in a grocery market shelves. Self regulation by identifying who does comply with IOT security standards and other guidelines is necessary. While ISOC is taking an initiative to provide such checklists; possibly the National CERTs could be the ones responsible for providing tools and guidelines for the consumers.

      Comment by Nuwan Waidyanatha on August 20, 2018

      Community Networks are proven and are becoming a trend. Perhaps some discussion is necessary. While community networks were a session in 2018 APrIGF it was also a session in 2017; specifically supporting ICT resilience and emergency communication. Community networks were also identified as means for solutions for landlocked and small developing islands. The backhaul for such networks would come from big players like Facebook, Google.

      Comment by Maheeshwara Kirindigoda on August 20, 2018

      Internet Governance is still a topic of few. Real meaning of the Engagement still missing mainly within the developing nations. As countries we doesn’t need to make fake multistakeholderism within IG process just to make world know. When time passes real multistakeholderism will come in to ithe process.

      School on Internet governance will be a key to educate people. Here we in Sri Lanka try to create academic syllabus to IG with the aim to promote in to University level model.

      Comment by Maheeshwara Kirindigoda on August 20, 2018

      Incorrect paragraph selected. on above comment

      Comment by Daphne Smithers on August 20, 2018

      As discussed in WS 83, Public Libraries are ideal places for Internet access where users can be guided in a secure, inclusive, impartial, free and non-threatening environment. In New Zealand, for example, free Digital Literacy/Skills sessions are commonly held in Public Libraries on specific topics or for marginalised groups. Communities in small developing nations can be empowered through provision of Internet and information access in Libraries.

      Comment by Maureen H on August 20, 2018

      During the Digital Literacy session, I raised the huge reluctance by holders of traditional knowledge about healing medicines made from natural plants, to digitise information that has been gained by the use of generations of healers. They believe that by secularising this information would take away their “mana” – the God-given gift of healers. So how do we access and retain valuable information about the healing properties of our natural biodiversity, so that it doesn’t get lost over time and so that modern science can make use of the information to benefit others?

      Comment by Naveed Haq on August 20, 2018

      Compromised IoT devices, such as webcams or even lightbulbs, can be used to form “botnets”, networks of Internet-connected externally controlled devices. These devices, referred to in this context as “bots”, are often infected with malicious software and used for disruptive or criminal purposes. Understanding the growing impact that IoT security has on the Internet and its users is critical for safeguarding the future of the Internet. IoT manufacturers, IoT service providers, users, standards developing organizations (SDOs), policymakers, and regulators will all need to take action to protect against threats to Internet infrastructure.

      Comment by Naveed Haq on August 20, 2018

      One of the key obstacles to improving internet penetration in rural and remote areas is last mile connectivity. The lack of commercial viability, as well as huge network roll-out costs worry operators who are reluctant to make the necessary investments. Community Networks are considered as an excellent supplement solution to address last mile connectivity. They do require a strong support from policy makers and some of the steps that could be taken in this regards are:
      1. Streamline or eliminate related regulatory requirements, especially those that are not applicable to small, community-based networks.
      2. Expand universal service and other public funding opportunities, and publicize / include community networks as eligible for funding through universal service fund.
      3. Introduce approaches to provide spectrum access and innovative licensing for community network operators.
      4. Encourage community initiatives to build networks aiming to reduce digital divide.

      It is also important to consider that not one solution can work / can apply everywhere and the most critical aspect behind success of a community network is ‘sustainability’ that usually comes with a supporting business model.

      Comment by Hiro Hotta on August 20, 2018

      Vanuatu is ranked as one of the top (potential) sufferers in
      WorldRiskIndex. Countries/territories in Asia/Pacific region
      are among the tops as well.
      Disasters are unavoidable. Internet accessibility during after
      disasters is essential for the human lives. Preparation for
      Natural Disasters was a well-attended session.

      The above should be touched in the synthesis paper as it is
      one of the very important issues in AP region.

      Comment by James Boorman on August 20, 2018

      Cybersecurity is focused on best efforts to make things more secure, without ever achieving 100% security. The goal of a truly secure Internet is an aspirational target. There needs to be increased effort on developing, implementing and revising minimum standards and good practices that address identified key risks for end users, organisations, critical infrastructure, nations and regions. This will require a multi stakeholder approach to identify and address key risks, it’s not just a problem for the network operators and IT professionals. Capacity building efforts need to consider: cybersecurity strategy and policy; cybersecurity culture and society; cybersecurity education, training and skills; legal and regulatory frameworks; and standards, organisations and technologies.

      National level leadership and dedicated, ongoing funding will be required for measurable and sustainable capacity building to deliver a more secure Internet, strengthening every link in the global cyber security chain.

  • Open input period for the 2019 APrIGF Vladivostok Synthesis Document (92 comments)

    • Comment by Gayatri on July 16, 2019

      We should highlight hate speech

      Comment by Mili on July 17, 2019

      A strong law enforcement and regulation framework is needed to substitute the failure of the state in restoring peace and justifying their need to use Internet shutdowns as a mechanism.

      Comment by Gaya on July 17, 2019

      1. Network shutdowns have a series of negatie impact on human rights including the right to access, information, education, health, expression and assembly and association
      2. NS are not efficient or effective solutions – they are a part of the problem.
      3. Asia is the leading region on network shutdowns
      4. The UN has repeatedly held that NS are not desirable – we need a call to the end for the practice on NS
      Half the participants were women

      Comment by Gaya on July 17, 2019

      We need a rights based approach to technology and regulation of technology. We hae to acknowledge that tech is not neutral and that it can harm disadvantaged communities. We thus need to have a rights based approach where we recognise the impact of different technologies including codes on people. Encourage greater multi disciplinary discussions and look at the impacts

      Comment by Gaya on July 17, 2019

      When NS happens it means in addition to harmful content we are also shutting down essential information and content – especially for safety

      Comment by Chris Buckridge on July 17, 2019

      There are different roles that government, industry (both small and large actors) and other stakeholder groups can play in promoting the adoption of standards. It’s also important to be very clear about the arguments for such adoption and how they are targeted for most effect.

      Comment by Elliott on July 17, 2019

      On the impact of the GDPR on the APAC region. Many APAC countries are implementing privacy & data protection laws directly informed by the GDPR (see Indonesia’s proposed law and Australia’s upcoming amendments to the Privacy Act). Very welcome to see this GDPR influence as the digital economy grows faster in APAC than any other region in the world!

      Comment by Elliott on July 17, 2019

      Particularly on the note of underserved and rural regions, who currently don’t have full access to the digital economy; what happens once the economies of scale which power the non-digital economy cease? What happens when the balance tips in favour of digital transactions, supply chain management and inventory control? Will the non-digital solutions cease and leave the underserved communities behind?

      It’s the job of the internet community to make sure that these communities are not left behind on the march to innovation.

      Comment by Sebastian Hoe on July 17, 2019

      WS10
      Child-Led research by 22 amazing guangzhou young delegate (upper primary school age). They research over 8 chinese cities of children perspective. Comprising of quantitative and qualitative data.

      3 key takeaways.

      1. Mental health component in Internet Governance IG issues are intertwined with social issues. Safer internet, cybersecurity & regulation. Qualitative case example cited by young delegate, child commit suicide as parent confiscate their phone. Mental wellness need to be address via education and also Multistakeholder approach.

      2. Need for evidence-based practice, this child-led research is an example whereby such research can be utilize for professionals whether from internet governance or relevant field that works with children such as social worker.

      3. Child perspective must be balance with adult perspective that promotes the welfare and wellness of the child in Safer internet, cybersecurity & regulation.

      🇸🇬

      Comment by YingChu Chen on July 17, 2019

      1. Need to define what is “traditional business”?Some business just don’t want to change their transaction with internet or they would like to choose cash and decline the credit card or other cashless payment.

      2. E-commerce is a way to purchase commodities or services on the internet. If some business don’t have the capacity to do business in electronic way, should we push them to e-commerce?

      3. If the “traditional business” means industries, we need to define which industry should do digital transformation? Manufacturing? Publish? Medias? Retail? Each industry has to face different digitalization issues. So, please make more clear with industry or commerce. If we only talk about online retailing, please use specific words.

      Comment by YingChu Chen on July 17, 2019

      ICT may contribute to SDGs in their way. Emerging technology may make everything change rapidly. People need to learn more skills and compete with algorithms, robotics.

      Government has the power and should provide social welfare policy to take care of the minority groups, lower income people, make every sector can participate economic activities.

      Big tech companies may take their responsibility to make feedback to the society. But government may provide some incentives to encourage big tech companies or startups to hire some disable people or provide job opportunities to women, minority groups.

      That is the concept of social safety net. Social safety net is provided by government or institution or other communities. When people lost their job, the social safety net may provide some basic welfare to help them, e.g, training new skills or re-training to build more ability. That may help those unemployed people to re-build their confident and back to the economy activities.

      Social safety net also to help to make a stable society, decrease the criminal event.

      This is not a responsibility for ICTs or government, this is for all sectors. Rapid development technology may instead of human being in the future. There will be some more unknown jobs (for now) for the future society.

      If we need a social welfare policy, how to have a social welfare policy with multistakeholder model?

      Comment by Alisha Gurung on July 18, 2019

      Network shutdown is still happening in the Asia Pacific and when that’s done , general public is completely ok with the government’s decision thinking it must be for them. The general public isn’t aware of their access rights..so a strong awareness with regard to ones access rights is required in the Asia Pacific and in countries like Bhutan where Sig has not been retained yet.

      Comment by Hanyu Yang on July 18, 2019

      Internet Governance normally related with the “subject and rules”, it is necessary to sort out who will be get involved in the issue and what rules will be applicable. And more ,it usually expressed by different stakeholders of the internet governance which will related with technology and public policy. Indeed the solution also will be solved by the combination of technologies and policies. In particularly, the technology is the foundation of the internet or cyberspace, and the activities of main parties、 the foundation of the policies also based on the technologies. In addition, the internet governance get the different stakeholders get involved and became globalized which is necessary to consider the factors time and pay attention to the changes in the internet governance system.

      Comment by Rilla Gusela Sumisra on July 18, 2019

      – Broaden the ethics education (more to algorithm ethic) to engineer/ IT students to government because the universities or schools are officially recognized or by ministry of education in their own countries. Recommendation: The ACM Code of Ethics and Professional Conduct (“the Code”) expresses the conscience of the profession.
      – Broaden/ categorize ethical issues , because this is not only computing that included. For example such as Product design, coding/programing, operational handling content because the data is from all background

      Comment by Alisha Gurung on July 18, 2019

      We 51 protection of child online: importance of child safely complaints tools

      1) takes about different child abuses like cyber bullying, emotional abuse, sexting, sexual abuse, sexual exploitations, child
      pornography and so on..

      2) talked about iwf(internet watch foundation) which allows people all over the world to report online child abuse.

      3) talked about what solutions can be provided which mostly stated that awareness is the key and the parents, teachers, government and the operators should come together to tackle the issue..

      Comment by Mokabberi on July 18, 2019

      hello, I am mokabberi from Iran, advisor of cyber policy research institute.

      My comments:
      how can we promote inclusive norm making process reqarding these below consideration:
      1. shaping Fair, democratic, global and ethical internet governance mechanism is key precondition for cyber security norm making process can overcome mistrusts.
      2. we should also work on norms of responsible behavior of tech company
      3. ITU can play role in cyber security standardization to secure ICTs products supply chain security
      4.we should also consider smart lethal weapons and fake attributions
      l thinks this process will lead to more militarization of cyberspace and cyber weapean race and establishing AIEA for cyberspace and let some country for unilateral coercive measure in cyberspace like digital countermeasure
      This process like applying IHLs in digital realm and turn it into conflict zone is against the vision of peaceful and development-oriented internet for human goods

      Comment by Mokabber on July 18, 2019

      hello, I am mokabberi from Iran, advisor of cyber policy research institute.

      My comments:
      how can we promote inclusive norm making process reqarding these below consideration:
      1. shaping Fair, democratic, global and ethical internet governance mechanism is key precondition for cyber security norm making process can overcome mistrusts.
      2. we should also work on norms of responsible behavior of tech company
      3. ITU can play role in cyber security standardization to secure ICTs products supply chain security
      4.we should also consider smart lethal weapons and fake attributions
      l thinks this process will lead to more militarization of cyberspace and cyber weapean race and establishing AIEA for cyberspace and let some country for unilateral coercive measure in cyberspace like digital countermeasure
      This process like applying IHLs in digital realm and turn it into conflict zone is against the vision of peaceful and development-oriented internet for human goods

      Comment by Mokabber on July 18, 2019

      My comments:
      how can we promote inclusive norm making process reqarding these below consideration:
      1. shaping Fair, democratic, global and ethical internet governance mechanism is key precondition for cyber security norm making process can overcome mistrusts.
      2. we should also work on norms of responsible behavior of tech company
      3. ITU can play role in cyber security standardization to secure ICTs products supply chain security
      4.we should also consider smart lethal weapons and fake attributions
      l thinks this process will lead to more militarization of cyberspace and cyber weapean race and establishing AIEA for cyberspace and let some country for unilateral coercive measure in cyberspace like digital countermeasure
      This process like applying IHLs in digital realm and turn it into conflict zone is against the vision of peaceful and development-oriented internet for human goods

      Comment by Alisha Gurung on July 18, 2019

      We 51 protection of child online: importance of child safely complaints tools

      I would further like to state that cyber security classes should be mandated in all schools by the governments of each nation and more awareness should be made for parents,teachers and also to children on this regard..

      Comment by Mokabberi on July 18, 2019

      My comments:
      how can we promote inclusive norm making process reqarding these below consideration:
      1. shaping Fair, democratic, global and ethical internet governance mechanism is key precondition for cyber security norm making process can overcome mistrusts.
      2. we should also work on norms of responsible behavior of tech company
      3. ITU can play role in cyber security standardization to secure ICTs products supply chain security
      4.we should also consider smart lethal weapons and fake attributions
      l thinks this process will lead to more militarization of cyberspace and cyber weapean race and establishing AIEA for cyberspace and let some country for unilateral coercive measure in cyberspace like digital countermeasure
      This process like applying IHLs in digital realm and turn it into conflict zone is against the vision of peaceful and development-oriented internet for human goods

      Comment by Mokabberi on July 18, 2019

      One suggestion:
      A percent of (for example about 5 percent) of taxes of global tech companies and digital platforms that payed to governments can allocated for IGF budget for the implementation of IGF strategic plan and research and development Fund in the field of internet governance in national and international level . By this initiative funding problems of NRIS will be solved.

      Comment by Mokabberi on July 18, 2019

      hello,
      this suggestion can be enclouded in aprigf massage :
      One suggestion for increase of financial Strengths of IGF
      A percent of (for example about 5 percent) of taxes of global tech companies and digital platforms that paid to governments can allocated by them for IGF budget for the implementation of IGF strategic plan and research and development Fund in the field of internet governance in national and international level . By this initiative funding problems of NRIS will be solved.

      Comment by Vishaarad on July 18, 2019

      “Currencies” being set up by Technology corporations is a concern. Eg it is starting of with Faceboook

      Comment by Jenna on July 18, 2019

      This year, there is high and active youth participation in APrIGF, which reveals that the youth community in Asia-Pacific is growing robustly. Young people in this age are digital natives, therefore, it is essential for the community to include their voice in the policy-making process, and their opinions are actually beneficial for policy-making.

      WS 6 is basically a workshop initiated by youth, moderated by youth and for youth. Workshop like this not only helps open a door to Internet Governance for youth, but also helps get their voice heard. In order to help widening their horizon and exposure in Internet Governance, and to include more of their opinons, it is suggested to include at least one youth speaker on every workshop, so that the youth perspectives on every topics or issues can be considered.

      Comment by Steven on July 18, 2019

      Under some countries which reach relative gender equality but the application of the IG related events are male/female dominating, it may not be appropriate to try to balance the amount of male/female. Since the real problem is in the awareness of the IG or other reasons, we should raise the awareness of the people instead of creating the the illusion of the gender diversity.

      Comment by Jenna on July 18, 2019

      Social media has an increasing influence on Internet users nowadays, where we highly rely on it to receive different kinds of information, from international news to life updates of your friends. However, there are no strict rules on these social media platform, which means the reliability of this information is questionable. Corporations try to establish the community committees to review reports received regarding fraud, fake news, bullying case, etc. However, due to various factors, including gaps in capacity and knowledge, culture differences, languages, personal judgement, value, and emotion. bias is generated and the core issues in these problems are usually not addressed. Therefore, it will be appreciated if these social media platforms can adopt emerging technologies such as AI as part of this report reviewing process, which can help eliminate bias generated by humans during the decision-making process. With an auditing process in the algorithm, it is believed that it can help improve the effectiveness in resolving issues related to social media and help eliminated bias generated by AI too.

      Comment by Vishaarad (Fiji) on July 18, 2019

      using of AIs regulating Digital Economies

      Comment by Vishaarad on July 18, 2019

      Does Blockchain collect too much personal information?

      Comment by Jenna on July 18, 2019

      Encryption is the foundation of human right online that every Internet users deserve to have. Without encryption, we have no privacy. We have the right to express freely both physical and on the Internet, which our opinions should not be intervened or censored by any authorities or being manipulated or interpreted in a way that is beyond our initial thoughts. Therefore, it is important to ensure encryption is universally applied on the Internet, in order to protect the universal value and standards towards human rights, where the Internet can always serve as a space for us to fight for our rights even if we are experiencing unfairness in certain situations in the reality.

      Comment by Rilla Gusela Sumisra on July 18, 2019

      WS50:
      – There are some countries which started to give regulation about crypto assets and some are not. We may need structured model for govern crypto assets because if we don’t have the model it will be difficult to define. But it’s also already provided by internet draft IETF before.

      – For crypto assets governance, The Important point is the communication among business and engineers, It is not easy to solve but it’s important to start communicate each other.

      – If there will be new crypto currency platform released, we should concern about the users and security, for example Libra from Facebook including WhatsApp, Instagram, and Messenger, targeted to be able to transact with Libra starting in early 2020. However, it is not yet clear whether the availability is simultaneous worldwide or gradually in several countries first. But the main point is where almost all Facebook and those social media users is in the youth categories, so It’s important for giving awareness and education and comprehensive information about cryptocurrency in our communities

      Comment by Rilla Gusela Sumisra on July 19, 2019

      WS30
      – There are a lot of methods of AI, IoT and IT Technologies. The importance is what is the real definition of ethics, and what are ethics for coders and we have to concern that if ethic definition always changing
      – Innovation is important, as well as innovation of permission while maintaining algorithm accountability
      – Building communities that can help the programmer/ future developers and engineers after graduation maintain of algorithm ethics of the behind computing machine

      Comment by Kenneth Pamintuan on July 19, 2019

      I represent as one of the voices of the youth. Based on the Townhall Session held on July 18, 2019, me and my fellow youth participants from YIGF 2019 suggested implementing a “youth section” for the synthesis document from hereon. Knowing that the youth comprises of the majority of internet users online, especially on social media platforms, we would like to extend our help and participate more in these synthesis documents beyond what is expected of us. A large portion of the youth has broad access to the latest trends with the internet, so giving them the opportunity to voice out their opinions into a dedicated section where their thoughts will be focused upon. The youth playing a bigger role in both the multi-stakeholder model and the synthesis document is crucial when highlighting their important perspectives regarding the numerous issues with internet governance.

      Comment by Ivana Saberon on July 19, 2019

      We represent the voice of the youth. As we all know, the youth composes most of the internet users in this generation and that we are also the future of the internet, we hold a substantial responsibility in shaping the platform in the present for the betterment of tomorrow. And so we believe that a representative from the youth participants should be given the opportunity to partake a place in the workshop panels, and to voice out the youth perspectives regarding the themes and sub-themes that will be discussed in the forums.

      Comment by Dustin Sampang on July 19, 2019

      The Internet has become a place for people to make a living. One of the platforms for this is video sharing. Popular sites such as YouTube has served as the platform for content creators to generate their own income by means of their own videos, typically funded by ad revenue. What creates issue with this is that there are content creators who rely on the content of other people, adhering to “fair use” as their legal protection. Despite such protection, this does not stop creators to file lawsuits citing copyright infringement. Theft of intellectual property is also an issue that reaps the same consequences. This legal conflict is a threat to the thriving entertainment industry, as well as economic prospects for individuals. Therefore, a clear and detailed criteria on what constitutes as theft of intellectual property should be imposed.

      Comment by Mokabberi on July 19, 2019

      hello, from mokabberi from iran.
      my comments
      we have seen some organized disinformation and fake news in social media with geopolitical purpose ,for example we clearly see that some networks of fake accounts and bots are producing fake news against shia muslims in the name of sounni muslims and at the same time, they are spreading disinformation and hate speech against sunni muslims in the name of shia muslims. We all know who benefits from conflict between muslims and Who benefits from conflict between russia and europe.
      what should be done with this organized disinfo at global level that want to make hostilities among nations and religious groups in the world to gain iligimate economical and political interest?
      Regulation? Digital ethics? Awareness and digital litracy?
      Declaration by stakeholders?

      Comment by Steven on July 21, 2019

      The encryption technology is thus a controversial point which needs to further discuss. To what extent should this encryption apply to our communication? How can we fight against the hate speech, fake news, child pornography etc if these are circulating in the encryption personal message? If there is cybercrime in the encryption message, can government intervene in and get the encryption key? If the cybercrime is cross-countries, how do governments battle against it and sustain the freedom of speech online?

      Comment by Julian on July 22, 2019

      Human Rights online should just not limit what we can do in the internet, but it should not be ignored as well. I think the Human Rights online should be its own thing, it should be redefined, privacy offline is not necessarily what is online, free speech offline is not necessarily what it should be online. There is a difference and as such defined differently. It is an interesting topic, it should be highlighted but its definition should be clarified. Human Rights was not defined in a day. The existing one may not at all apply online.

      Comment by Julian on July 22, 2019

      With the internet being this ever-evolving entity, human rights on the internet should be ever-evolving as well. We should move forward and see the internet as it is and as it will be with rights ever changing and not as something set in stone.

      Comment by Mili Semlani on July 22, 2019

      Emerging technologies were amongst the hot topics and interestingly we discussed them from the ethics perspective too. One of the key terms that came along was a “rights based Internet” to help reinforce the open and accessible invariants of the Internet. But with ethics the challenge is where does it come in? At the programmer level, or early education? As ethics is a morality, it is also the major onus of all humans themselves in their own capacities. A good practice may be to focus on developing inter disciplinary curricula and ICT education to sound the unethical challenges that may spring from emerging tech.

      Comment by Shah Rahman on July 22, 2019

      Rising awareness among developing countries nation’s most important then introducing policy framework. In many cases have seen for example in Bangladesh they didn’t know using social media they’re doing crime. Policy and regulations will be much more effective only when everyone have good understanding of right or wrong on the internet.

      Comment by Shah Rahman on July 22, 2019

      With the trend of Digital ecosystem facilities us doing e-commerce, online shopping,mobile money transfer…etc. on the other hand consumers are not have adequate knowledge of rights, there’s products received found not satisfy quality thts has been assured by the e-commerce platform and most of the case they didn’t mentioned penalty or they have tendency to overlook it as result consumers are loosing better service.
      Though have rising digital economy through digital services or platform but have huge lack of digital governance for which end user can be beneficial for the developing countries.

      Comment by Shah Rahman on July 22, 2019

      WS30

      Computing machines or machine learning algorithm should be free from biased. However considering diversity of data in algorithm can provide machine to take right decisions. Inclusion of ethics and norms programmer or Innovator can direct a machine from wrong to right.however besides those, need good human centric principles and morality to address awareness behind computing machines.

      Comment by YingChu Chen on July 23, 2019

      We may think in 1) Development in cyber norms 2) How to implement cyber norms.
      Norms and law are different. But norms and law are similar and overlaping. Norms are collection from expertise. Develop the norms, self-regulation with the norms. Norms should be developed from bottom-up in multistakeholder model. UNGGE cyber norms is from government view of point.
      If norms have power, it is dangerous. It becomes to be regulations or laws. We need to careful about the cyber norms more.

      Comment by YingChu Chen on July 23, 2019

      With DNSSEC topic:
      1. Europe and Asia Pacific are both big regions. Each country has different development process and some countries will think to upgrade their Internet Infrastructure first , then maybe security.
      2. Small Medium Enterprises may not afford the cost of deploying DNSSEC. They have to face these issues, upgrade the server, higher cost and latency issue. They need to satisfy their customer and also think about secure. They choose to satisfy their customer first, then think about security.
      3. Big Tech company should take the responsibility to help the DNSSEC deployment. For example, some e-commerce websites have never heard about SSL or https. But one day, Google ask them if not use SSL to encrypt the data transmission, they will take down the search engine optimize ranking. Then those websites will deploy the SSL. Maybe it can be worked in DNSSEC deployment.

      Comment by YingChu Chen on July 23, 2019

      Your statement looks like in accessibility and internet infrastructure to close the digital divide or inclusion in rural area. Perhaps can definite clear about this section more clear, for example: digital transformation in rural area / region will be better in talk digital economy development in rural region.

      Without internet infrastructure, digital transformation and basic internet / telecommunication infrastructure, it will be very difficult to talk about next step in e-business or e-commerce.

      Comment by YingChu Chen on July 23, 2019

      1. Thinking for a e-portal for Pacific islands countries. What’s the purpose for the e-portal? Who will be the audience to this websites?

      2. e-Government can provide a transparent way to encourage people to participate the government activities and know their government. e-Government also present a government may their services online. Then people can understand the government services from the website and interact with their government. The structure are not hierarchy anymore. It becomes more horizontal.

      3. e-Government or e-Portal may help foreign users know your country well. They may know any incentives to the business, any policies encourage foreign enterprises to invest in local. Also government may ask to foreign to upgrade the infrastructure and training / education local people. Some countries encourage foreign companies to set a branch there with taxation reduction or tax relief, but they have to provide more job opportunities, training and re-training to local people.

      4. To foreign immigration or expats, they may want to know more information with any welfare or public equipment, e.g. raising children, child education, those policies from e-gov website.

      Comment by Shah Rahman on July 23, 2019

      Network shutdown is common phenomenon in the Asia Pacific specially in developing countries where nation’s are really not aware of there right, it seems government is all in all to dominate people’s freedom of speech over online.
      They don’t bother to shut whole internet though have high impact of digital economy . To overcome this barrier combined voice and collaborative effort like isp, Telco,human rights, end users should raise voice to stop this bad practices. Internet governance should regulate participating all stakeholders, not only by government however criticism of those practice may reduce shut down issues.

      Comment by Shah Rahman on July 23, 2019

      Stackholder concern may focus on accountability could lead to a top-down rather than bottom-up framing for a partnership. Also need to focus on realities on the ground and to build space for listening and dialogue. However multilateralism it is seen as an attractive alternative. particularly in the corporate world,
      multistakeholder governance as offering a more direct hand and poten-tially a legitimate role in national and global governance. Most important to identify dentifies gaps and limitations in governance and questions the illusion of democracy and participation.

      Comment by Shah Rahman on July 23, 2019

      Use of e-governance can make public administration fast and effective, provide better services, and respond to the demands of transparency and accountability.

      E-governance stimulates economic growth and promotes social inclusion of disabled and vulnerable sections of society.

      E-governance can provide benefits in the form of new employment, better health, better education, knowledge sharing, skills developments and capacity building for sustainable development.

      Overall Quick and fast e-services eliminate middlemen and save both time and money.

      Comment by James Ah Wai on July 24, 2019

      From our end in the Pacific, yes totally agreed in raising awareness so that everyone using internet will understand the threats, challenges and business opportunities that comes with the internet and at the same time aware of some proper and respectful way of using the internet platform within their respective roles.
      As for me being both involved in the Government and community so its best to use both connection to make the multitakesholder approach at national level a success. Can put together Government resources and community participation to build guidelines for a safer internet for everyone in the community.

      Comment by Samridh Kudesia on July 26, 2019

      I want to raise the dilemma that I as a consumer face on a daily basis. While I would like to use local, smaller vendors for their online services so that the bigger corporate giants do not form a monopoly, I am also aware that these small vendors might not be able to keep my data as secure as the bigger companies could. This is a conflict, and I would love for the community to come up with a way to resolve this issue.

      Comment by Vishaarad on July 26, 2019

      Regulation: Russia and Iran’s internet isolation is of serious issue since it will also affect IXPs and impose their authorities on the routing pf global internet traffic in and out of their respective borders.

      Comment by Mandy Chan on July 26, 2019

      Apart from including the youth, I think it is also important for us to include the elderly in the discussion. With the advancement and spread of smart gadgets, more and more middle-aged people and elderly are now using these smartphones for online activities and to connect with their family and friends. However, for quite a number of them are not as alert as young people, who are digital natives, when it comes to issues like cybersecurity and privacy protection. Some of them have only little understandings on these dangers, which means that they are probably more prone to cyber crimes, privacy breach and so on. It is essential to include them in the discussion of internet governance so that we can understand better about their difficulties and better address them.

      Comment by Shreedeep Rayamajhi on July 26, 2019

      Especially in Asia Pacific the level of information in terms of disinformation is very less. Social media has been used as a tool of communication and has been bombarded with information both relevant and irrelevant. In both the case there is a threat of the vulnerable group. Trust Factor in internet was always limited as there was limited participation and recognition of inclusion. The Trust is growing with the mutlistakeholder approach where inclusion and diversity play a crucial role in the adaptation and mitigation process

      Comment by Steven on July 27, 2019

      Before adding the new stakeholder in the discussion of Internet governance, we should consider its uniqueness and the urgency to include them. Different subthemes under the Internet governance may show the different level of uniqueness and urgency to include them in the discussion. For example, in the access and universality session, the urgency to include the different social status people may outweigh the urgency to include the elderly. As the technology is evolving, there should also be consecutive research focusing on which potential stakeholders are lagging behind. In different issues, there would be different stakeholders we need to focus on more. How to build up a more flexible multistakeholder participation and give the most needed but ignored stakeholders the priority to participate is our next thing.

      Comment by Nadira Alaraj on July 27, 2019

      UA is a foundational requirement for multilingual Internet, in which users around the world can navigate via DNS entirely in local languages. UA needs coordination efforts by the private sector, technical & academic communities, civil society, and governments to ensures that all domain names and email address internationalization (EAI) can be used by all Internet-enabled applications, devices, and systems.
      There is an importance need to make everyone from the stakeholders aware of the UA and its tight connection with the IDNs and what advantages it can provides to the general public. Awareness is not enough but creating the drive or motives to demand all stakeholders of serious efforts towards the inclusiveness of the IDNs and EAI.
      There are few research and development experiments in APAC region on IDNs and EAI, but more resources is needed to work on standardization.
      Creating a consistent environment of enabling the access of local content with local domain name and send and receive emails using the local email address.

      Comment by Nadira Alaraj on July 27, 2019

      [ Internet Governance & Multi-Stakeholder Participation ]

      No one denies the importance to make the voice of underrepresented communities be heard at APrIGF or any other IGFs. But at the end of the day, it will discussions that “could” be heard by the decision making bodies but there might not be any follow up.
      What would be a good approach is to develop the connection between APrIGF Community (like MSG, or other subject matter experts to join ITU Government delegates for consultancy during the development of ITU resolutions.

      Comment by Nadira Alaraj on July 27, 2019

      [WS6. Analyzing Perspectives on Youth Participation in the Multi-stakeholder Landscape: A Contextual Follow-Through Session on Motivations to Sustainability Efforts]

      APrIGF has to be proud of having youth organizing a session and sharing experiences. Attended the meeting thinking that there will be discussions on how the Youth fit into the overall scene in the IGFs, but the focus of the workshop was on the different youth initiatives. What was shared of the youth engagement in the Philippines would give an example of how youth are contributors to policy development in their own country.

      Comment by Nadira Alaraj on July 27, 2019

      Norms should be developed from bottom-up in multistakeholder model.

      Great research, this bottom-up of putting Norms when talking about children stopped me.
      The digital norms are taking the net citizen to a completely different path of norms that was practiced before the Internet. Hence, the MS model that you are mentioning that need to be developed on an equal footing. To bring the experience and wisdom of the past with the practices of today.

      Comment by Nadira Alaraj on July 27, 2019

      So far cybersecurity laws have failed to protect the freedom of speech.
      The problem that most states are putting regulations without wider public consultation. It depends on parliament members to comment or endorse new laws.
      Would be possible to do some changes in the jurisdiction model to bring balanced views?

      Comment by Nadira Alaraj on July 27, 2019

      [WS48. A roadmap for studying ICT laws and building a database for Asia]
      I didn’t attend this session, however, the organizer of this workshop could benefit of the pilot project that was done by iGmena to: Internet Legislation Atlas
      “The ILA aims to pinpoint opportunities for improvements and contribute to raising the awareness of concerned stakeholders, and empowering civil society to participate in the Internet policy dialogue in the regional and global level and influence the decision-making process in the local level. This is done through:

      Mapping the legal landscape in each country as it relates to the Internet and civil society.
      Outlining gaps and ambiguities among existing laws and regulations in relation to international human rights standards.
      Highlighting opportunities for advocacy regarding Internet-related law and policy in each country drawing on international human rights standards and best practices.
      Connecting civil society to resources that will help them navigate the legal environment.”

      Comment by Nadira Alaraj on July 27, 2019

      [WS12. Coping with misinformation in an era of information deluge: Who is Responsible?]

      Who is responsible: basically, every single person of us who share information either verbally, by email or through social media networks without authenticating it.
      The challenge that we all face that the misinformation are getting smarter and hard to even an intelligent person to identify it. For example, the AI deep fake application which is available to anyone easy to use. This application can give anyone the tool to take a photo and use audio to make a video. This application has a double edge sword as artist and ad producer could be creative to do very creative videos but on the other hand, those who produce disinformation could use it as well to mislead the general public.

      As disinformation are using AI, Many issues must be considered.
      -Increase evidence-based policy research as there is a lack of evidence on the impact or influence of the use of technology or AI for disinformation campaigns.
      -Clickbait and targeted advertising business models that are based on the promotion of sensationalist news as a means of competing in the market for individuals’ attention. Big companies employ algorithms that exploit user data. Hence, there is a need to have serious discussions on how to protect users data.
      Hence Data protection
      If the illegal collection and access to users’ data is stopped, micro-targeted disinformation campaigns would lose much of their effectiveness and threat potential. As is already clear, weak data protection rules and enforcement not only impact user privacy and choice, but also lead to constant monitoring, profiling, and “nudging” towards political and economic decisions.

      Comment by Nadira Alaraj on July 27, 2019

      [WS35. Language Diversity in Asia-Pacific: Challenges towards Digital Dividends]
      According to UNESCO, there are more than 6000 languages worldwide.
      To have a practical approach to digital language diversity and local content is to adopt policies that encourage local content producers. Countries in APAC region adopted the official languages, hence all content hast to depend on those languages and reduce the dependency on content produced from the developed countries.
      This approach might put some communities into a disadvantage. But empowering minorities to produce their content and in their own languages will help to preserve it.

      On another aspect, algorithm bias in search engines does create a divide based on the language the users are searching with.

      Comment by Nadira Alaraj on July 27, 2019

      The challenging of implementing good eGovernment services in developing economies is the infrastructure and reaching to the last mile.
      Hence along with the development of the portal, the Government has to develop the right strategies to the grantee that their e-services do reach out to every single citizen. It might be done by allocating certain stations in the remote areas.

      Comment by Yeseul Kim on July 28, 2019

      Thanks for all the comments.
      My question here is, how many people are aware of existing organizations working on the same issues? For example, Nadira mentioned IGmena working on collecting domestic laws from each difrerent region and it’s important to work toward more collaborative law makings regarding the internet. However, there are already existing organizations present worldwide which have been working on the same topic – Internet & Jurisdiction based in Paris, for example. Gayatri and het peers are also working on archiving the laws from Asian countries regarding the Internet. IGmena’s work should also be part of this broader institutional and organizational effort. And there will be other groups – probably government officials and lawyers from each region – who have done the same job.

      My question is, how can we break this silo-ed works from each different organizations with the same aim and purpose? I think the next step for the Internet Governance should be bridging the existing organizations which are ultimately doing the same works without knowing what others are doing

      Comment by Yeseul Kim on July 28, 2019

      And how can we increase the power of law enforcement worldwide esepcially when there are some states or soverign nations which resist to follow the rulings of the international court, etc?

      Comment by Charmaine Lo Kam Yin on July 28, 2019

      The advance of technology has undoubtedly brings convenience and benefits to society. However, according to PwC’s Global State of Information Security Survey dated 2015, the cybercrime market worth $114 billion, which is bigger than the cocaine market ($85 billion, quote from the United Nations Office on Drugs and Crime, World Drug Report 2011). Therefore, I believe it is necessary to evaluate the Cyber Maturity Framework of organizations which provide new technologies prior launching /on a regular basis. The Cyber Maturity Framework consists of four capability areas: Respond, Identify, Detect and Protect).

      Respond:
      Assesses the organisation’s ability to respond and recover from external and internal attacks against its systems and data.

      Identify:
      Assesses the organisation’s ability to understanding the threats and appropriately manage the associated security risk to systems, assets, data and capabilities.

      Detect :
      Assesses the organisation’s ability to detect external and internal attacks of varying sophistication against its systems and data.

      Protect:
      Assesses the organisations ability to implement security controls to reduce the risk of threats being realised (e.g. loss of data or system outage).

      Comment by Charmaine Lo Kam Yin on July 28, 2019

      I believe partnerships and collaborations between different companies and regulators may help the underserve communities and regions to catch up with the pace of digital boom.
      For instance, Ant Financial (Alibaba Group’s mobile payment affiliate) decided to partner with Touch N’ Go to develop their e-wallet rather than break in with Alipay in Maylasia. This can ensure healthy business synergy in both companies. Also, the regulators may consult the fintech companies when building new regulations to ensure the law is down to earth and can be implemented while balancing the business development and cybersecurity.

      Comment by James Ah Wai on July 28, 2019

      In my view Governments are the victim of the social media contents on the internet. Have been working for the government of Samoa for 20 years and have seen abuses nowadays with the introduction of social media up their game to a another level. With freedom of expression and human rights people are not afraid to put anything on the internet despite some violent contents and misleading information as they can create their own fake news that suits their agenda. There is no control on verification of any information before uploading it.
      Hate speech, abusive language and misinformation is very disturbing when using these platforms. Some people tend to pour hate and fake news to stir up peace in Economies and will lead to disputes and lost of Trust to leadership. Some of the abuse have actually go beyond the limit, where it started with politics but now aims at families and children of the victims which is my BIG question is where does freedom of speech and human Rights DRAW THE LINE…Thus the RIGHTS support the Abuser who is free to make fake/hate news and disturb the peace within the community or the poor VICTIM..
      There were times our Govt was tempted to block social media especially Facebook but we have recognized its important role for genuine family connection around the Globe. We can’t underestimate how the social media platform have make life easier in bringing communication and accessibility to our home and roofs and many other benefits to our daily life but we have to understand that we need to use it with respect and its not something to bring shame and hurt to other human beings.
      We have moved to review our legislation’s and the government have reintroduced our criminal libel law to protect the victims from such disrespectful acts by some. The only challenge about the Act we can’t prosecute actions done from overseas but only contents that were uploaded locally.We have now in the pipeline of establishing a new Digital Transformation Authority that will oversees important changes in technology, as well as monitoring Government ICT services to meet the standard and security required. It will also through this Authority to make sure that Government critical information is protected and secure safely.

      Comment by Mary Rose Ofianga on July 29, 2019

      [WS17. The Future of Digital Identity and Human Rights] Many of the governments are into digital identities. In the case of the Philippines, a National ID the law was just recently signed by the president. In a way, this is beneficial to the citizens in improving ease of transactions with among government agencies. But the question is, how resilient is our government in protecting our date. A data breach already happened in the Philippines which put 70M Filipinos’ personal data at risk. In the case of the National ID Law, we have to make sure that the Data Privacy Act will be reinforced to the government as the data controller and processor. Aside from that, a protocol has to be established to make sure that these data wont be compromised for whatever misuse.

      Comment by Mary Rose Ofianga on July 29, 2019

      [WS23. Big tech everywhere: Is this the future of the Internet?  ] During the panel discussion there was a concern about Big Fall of Big Tech. It becomes a trend that big tech companies are acquiring small tech companies to expand their products and services, leaving people with still limited options on online products and services. However, we may not be able to stop these big companies from doing that, that is our business, certainly. But what we can do is start and keep supporting tech startups in out locality, help build the startup ecosystem, and create more options, even gradually. Let’s promote permissionless innovation, support our local tech startups, and raise awareness about internet governance to this community.

      Comment by Pablo Hinojosa on July 30, 2019

      Paragraph #2 is quite negative to the Internet. While consideration of risks and threats is important, it is best to address the Internet evolution in a positive light and find opportunities in every threat. Possible rephrase:

      One of the main themes discussed at the APrIGF in Vladivostok, was peaceful collaboration towards a safer Internet. This included questions such as (paragraphs 2 and 3):

      ====
      How can the Internet community participate more actively in the international cybersecurity discussions and encourage more co- operative measures? What shall the digital ethics be for businesses? How shall we take into account the concept of public goods and the commons vs. data ownership and privatization of knowledge? How can we keep the positive elements of “localized” Internet while being aware of its downsides? To enhance trust and security, how can we enhance the capacity building effort and how do we bridge the gap between technical and non-technical understanding of securing the Internet?

      While there are growing concerns on issues such as misinformation, fake news, hate speech and harassment, online violence and terrorism, organized cybercrimes, market concentration in cloud services, data breaches resulting in a decrease of trust as well as a wave of state regulations to mitigate the cybersecurity risks. To maintain cyber hygiene, what kind of policies and governance model shall be adopted to tackle these issues and achieve a safer Internet? What should be the key considerations for states when creating these regulations? How shall we maintain legal interoperability of laws and extraterritorial data protection on the Internet? Should the Internet be regulated by the states solely and what is the impact of these existing regulations on the Internet? How should the balance be drawn between state interference on Internet infrastructure and a free and open Internet?

      =====

      Comment by Steven on July 30, 2019

      In the YIGF session, participants discussed about the fact checking system in social media. Youth expressed the concern about the rampant fake news in South-east Asia country like Philippine. All of us agree on the implementation of clear and appropriate regulation, which needs the collaboration of all stakeholders. However, to uphold the freedom of speech, we propose to suspend the account instead of removing the account as social media companies do when violating the community standard. We should also rely on AI to inspect the content while we investigate the manpower behind in the fact checking mechanism and study the controversial content. With the advent of AI checking the content and generating the news, the traditional journalism can fully engage in the mechanism with its role to give the people to right to know the truth to alleviate the threat of losing job.

      Comment by Talant Sultanov on July 30, 2019

      As about half of the world’s population is now connected to the Internet, the other half is still offline. People in the unconnected communities generally reside in remote, rural and other hard to reach areas. Due to the low rate of return, the private sector does not find it profitable to connect such communities. At the same time, governments do not always have the funds to build the necessary infrastructure. There is, however, a help-yourself model, where communities themselves can take steps to get connected – Community Networks (CNs). Community Networks are of the people, by the people, for the people.

      Community Networks and other community-based connectivity initiatives could be a viable alternative to traditional large scale commercial networks in providing access to unconnected communities. Slowing growth in voice and internet connectivity has prompted renewed interest in alternative approaches to addressing the needs of the billions of people in developing countries who still suffer from ineffective communications services due to affordability and coverage limitations. Community Networks, aside from helping to meet worldwide aspirations for universal access, as encapsulated in the Sustainable Development Goals, also provide other advantages including more local control over how the network is used, greater potential for attention to the needs of women and other marginalized groups, retention of more funds within the community and increased potential to foster a sense of agency and empowerment within the community. These networks provide the trainings for the local residents on safe use of the internet. Raising capacity is one of the key aspects of such initiatives.

      Communities tackle the infrastructures that are embedded in and affect deploying and adopting telecoms. These infrastructures include all sorts of social, technical, political, legal, administrative, methodological and institutional structures and processes. We must continue identifying policy and regulatory changes needed at the national level, as well as financial and technical support that CNs in the region require so they are on the same playing field as telecoms and further highlight issues such as the need for increased access to spectrum/telecom data which will contribute to breaking down structural inequalities when it comes to access. CNs relate very well to the over-all theme of “Enabling a safe, secure and universal internet for all”. Community Network are run by the communities and for the communities, making internet affordable and accessible for otherwise unconnected people.

      Comment by Talant Sultanov on July 30, 2019

      * [WS55. Community Networks – Connecting the Hardest Half]
      The above comment is in relation to this section

      Comment by Vishaarad on July 30, 2019

      With Facebook, users can opt to close their account and choose to permanently have their data deleted but what about Facebook’s facial recognition AI, will it “unlearn” to recognise faces of deleted users even though this may not be evident to other users.

      Comment by Vishaarad on July 30, 2019

      Users who are not part of or members of organisations need to be encouraged and included in the Multi-stakeholder participation, (since they make up the largest number), through fellowships and similarly for youths. Regional SIGs should cater for non IG professionals and youths. Fellowships should also be encouraged for senior citizens.

      Comment by Vishaarad on July 30, 2019

      I agree

      Comment by kanumuri s Raju on July 30, 2019

      Dear one and all

      This is kanumuri s Raju from India. In order to make internet safe , make every internet user rights needs in place we must act on these

      1) educate all internet users how to use it , safe gaurdimg their privacy face cyber attacks as most of them are uneducated.

      2 ) no junk data in internet web sites

      ,3) eastablish skill centers .

      4)! No fake news based on
      False inputs.

      ) Act on people missing .

      6} collobiration open partner ships

      7)saving eco system / electronics recycling

      8) make governece important

      9) qos important. Localization imp.

      Comment by Rilla Gusela Sumisra on July 31, 2019

      WS37. Is e-Government an effective mechanism for developing economies

      – People need simple, fluent, integrates e-government services or we could state that importance of basic info needs first to support life capabilities. The thing to need attention while constructing E-government is there must be right people or who understand the functions of social institutions and society. Besides, we have to see what must be caught such as emerging trends and issues. For example, in the Pacific, the most important thing is to have a connection. Even though there are connections but still limited and few. and it should be noted that there are still few people working on the ICT. E-government is capable of work with ICT companies in their respective regions to achieve effective e-governance and digital economic growth. If it has already been implemented, the most important thing is to increase securities in the system / app in e-government because using a real name system, we can conclude ideally is the resilience of and sustainable system.
      – Fiji 5 Years transformation online. Digital transformation program to bring government services online, such as online record of birth, death and marriage, business and company registration, etc.
      – In Indonesia, for example of government applications in education sector are government library app which we could rent e-book from this app, public school enrollment can be done online for junior and senior high school level. In health sector, there is Online Self registration in the public hospitals to make an appointment with doctor, etc.
      – For those who have just started an e-government website, for example, several countries in the Pacific island can be made with recommendations from several websites from other countries and analyze what features which must to have, good to have or not particularly, Examples for must to have are main news page, weather forecast, focus on tourism (by occupation) simplify the website topics, sign up and log in, Message us, Contact, FAQ, Health topics, search engine. For good to have are Education sites, Every Drop Counts, Text to speech for disability people, Social Media, E-services of government information.

      Comment by Rilla Gusela Sumisra on July 31, 2019

      • WS9. Parallel Workshop: Build Concept on AI and Society for good Global

      The concept from academic aspect is the curriculum that could influence learning process of building concept on AI, maybe only some countries in Asia Pacific have implemented it, but not at all and now starting to be implemented.

      The awareness methods could be formal and informal training. For examples of formal training are such as open online class and supplement lesson. For informal training from tutorials or videos on internet that we can access by our self and make group of club to give this knowledge.
      AI is not the new things for programmer, therefore to deepen practices on developing AI products, they should more explore and take the initiatives to be professionals and not only depend to the lessons in the universities. the result that can be achieved for example such as competition that could maximize their knowledge which they already receive at class and school, and the integral projects which can give the best solutions towards Sustainable Development Goals and some kind of issues such as poverty and disaster recovery and others.
      As we know AI helps economic and industry sectors more convenience in advertising and analyzing the data. It could be said that machine learning and open data will help global system development. This world is AI lace but not all countries pay attention about inclusion problem, we need to focus on AI economies and we have to improve security and privacy protection.

      Comment by James Ah Wai on July 31, 2019

      I was hoping if all countries that are now registered under the Global Internet Governance Forum can formalized a convention to safe guard the internet use. I know there is a Budapest convention for cyber crime by the Council of Europe (185). It now serves as the binding International instrument to fight against cyber crime.
      It provides guidelines for any country developing comprehensive national legislation against Cybercrime and as a framework for international cooperation between State Parties to this treaty.
      In saying this, we now have Non-European countries like USA, Japan and Australia as well as our neighbors Tonga who have signed and ratified the convention. I believe its a good platform for better collaboration and investigation if the perpetrator resides within these Countries or Regions.

      Comment by Rilla Gusela Sumisra on July 31, 2019

      WS22. IoT Security – A Differentiator for Consumers

      – Based on some reports and news, there are some IoT Technologies which are not implement strong security. that are compromised by hackers even as homes and businesses continue to add these and other connected devices to their networks and it was realized that most challenges were of privacy/confidentiality and data integrity. Based on those issues, the companies should improve from layer security, framework and platform devices.
      – There is the fact that innovation of IoT products could help people with disability but we also have to concern about the security and who will be responsible for facilitate this concern
      – The raising awareness about security in IoT. At least consumers understanding about what data will they give, term and agreements with the IoT services and strengthen transparency accountability of IoT manufacturers about information of their IoT Products and integrity .
      – There is no real regulation about differentiator for customer on IoT, bringing companies to participate/ involve or maybe it would be better if they had a common framework. The movement that we can do is work together

      Comment by Edmon Chung on July 31, 2019

      Universal Acceptance is a part of a bigger issue of making sure that the Internet’s Critical Infrastructure protocols evolve over time in an open standards manner. For the synthesis document, I would suggest that we add text suggesting that: Universal Acceptance of Internationalized Domain Names (IDN) and Email Address Internationalization (EAI) for systems online is a matter of priority not only for ensuring that Asia Pacific users can utilize their native language to navigate the Internet, but also as an imperative for the continued evolution of the core Internet infrastructure protocols, including the enhancement of scalability (e.g. IPv6), security (e.g. DNSSEC) and multilingual capability (e.g. IDN) of such protocols.

      Comment by Amrita Choudhury on July 31, 2019

      Growing misinformation, disinformation, hate speech and harassment is definitely a growing issue. However, there can be no binary solution to this issue.
      Fake news has always been there in our society, the only concern is with the use of technology the reach and impact has dramatically increased.
      Apart from regulations, or companies introducing measures within their products or services to reduce such incidents, capacity building and educating the community on digital etiquette is important. The civil society can play a critical role in this. Also, there is a need for more academic research on these issues – including what motivates some communities to react or spread/ share news while not others, etc.
      It is an issue of the whole community and can only be addressed when the whole multistakeholder community works on it together. Blocking, shutting or restricting the internet will not help.
      Having said that various initiatives are being taken by online companies in tackling these issues. While few have helped, there is more that needs to be done.

      Comment by Dr.N.Sudha Bhuvaneswari on July 31, 2019

      Cyber Security is still a fully undiscovered area and participation by the internet community to focus on capacity building effort will alone is not suffice and there should be some capacity building that are technically designed to handle insecured situations on the Internet. The community can also aim to come out with a Security Framework that can act as a platform for future enhancements.

      Comment by Naveed Haq on July 31, 2019

      One of the issues discussed during the week was routing security. Every year, thousands of routing incidents occur, each with the potential to harm user trust and handicap the Internet’s potential.

      Spoofed Internet traffic is a persistent threat, and often the root cause of reflection Distributed Denial of Service (DDoS) attacks.All stakeholders including policymakers, must take steps to strengthen the security of the global routing system.

      Best practices, like the Mutually Agreed Norms for Routing Security, provide a clear path for network operators to take towards addressing these routing threats.

      While we action on cybersecurity threats on the Internet application layer, we cannot fail to Protect the Core (technical layer)

      Comment by Sein Ma Ma on July 31, 2019

      Agree on this point. Not only the youth, but the elderly are also important to have good knowledge and awareness about cybersecurity, cyberbullying, fake news, hate speeches, etc. and all the things that can be dangerous via the internet.
      For instance, a gullible person may be both a youth or middle-aged and even an elderly who is used to believe the occurrences on the internet and spread the news about it which can harm someone direct or indirect way by emotionally, financially, socially, and reputationally.

      Therefore, the elderly should be added too in the discussion of Internet Governance so they become familiar with both the advantages and disadvantages of the internet and how to protect themselves. And we are able to realize their perceptive of using the internet and lessons learned in order to have the idea how we should better promote the awareness of Internet Governance for all age level.

      Comment by Sein Ma Ma on July 31, 2019

      Agree on this point. Not only the youth, but the elderly are also important to have good knowledge and awareness about cybersecurity, cyberbullying, fake news, hate speeches, etc. and all the things that can be dangerous via the internet.
      For instance, a gullible person may be both a youth or middle-aged and even an elderly who is used to believe the occurrences on the internet and spread the news about it which can harm someone direct or indirect way by emotionally, financially, socially, and reputationally.

      Therefore, the elderly should be added too in the discussion of Internet Governance so they become familiar with both the advantages and disadvantages of the internet and how to protect themselves. And we are able to realize their perceptive of using the internet and lessons learned in order to have the idea how we should better promote the awareness of Internet Governance for all age level.

      Comment by Naveed Haq on July 31, 2019

      [WS55.Community Networks] One of the key obstacles to improving internet penetration in rural and remote areas is last mile connectivity. The lack of commercial viability, as well as huge network roll-out costs worry operators who are reluctant to make the necessary investments

      Policy makers and Regulators can facilitate initiatives like Community Networks to bridge last mile connectivity gaps by:

      – Streamlining or eliminating regulatory requirements, especially those that are not applicable to small, community-based networks.
      – Provide tax, customs, regulatory, and licensing fee exemptions.
      – Provide clear, public guidance on the specific policies and regulatory requirements (and exemptions) for community networks.
      – Expand universal service and other public funding opportunities to community networks.
      – Introduce innovative approaches for licensing and spectrum access

      Comment by Naveed Haq on July 31, 2019

      The United Nations estimates that one in six people live with disability – that is a total of 650 million women, men and children in the Asia-Pacific region.

      People with Disability (PWDs) face various challenges in accessing the Internet based on their impairment. For example, persons with visual impairments can face compatibility challenges when screen reader software is used to access visual displays that are not labelled or hyperlinks that do not make sense when read out of context.

      If designers of digital technologies and content keep accessibility at the heart of design activities, people with disability can be empowered to do more themselves, without having to rely on others. In contrast, if designers miss out on accessibility, they continue to develop products and content that increases barriers for people with disability when using digital technologies and content.

      Although, there are known and easy to implement guidelines to address the barriers, many developers of web content, mobile applications and related digital technologies usually do not consider people with disability while designing or updating their products. With such a large number of the population with disabilities, businesses are potentially losing out if accessibility issues are not considered, and the universal design concept is not understood and adopted. Universal design means that businesses improving consumer products such as hardware, software, websites and applications to make them usable for a broader section of the community including people with disability, in turn, gain reach to a much larger consumer base in more situations.

      It is very important to recognize PWDs as one of the stakeholders in the development of policies and technologies, and to educate the community (especially content developers) about the importance of equal access for PWDs. Promoting digital accessibility contributes to the achievement of the United Nations Sustainable Development Goals (SDGs) and ensure that the rights of PWDs are met.

      Comment by Naveed Haq on July 31, 2019

      Diminishing trust is a challenge for the Internet – all of the creativity and innovation we see on the Internet is based on users trust. Internet of Things (IoTs) will play a crucial role in maintaining this trust.

      Poorly secured IoT devices and services can serve as entry points for cyber attacks, compromising sensitive data and threatening the safety of individual users. Understanding the growing impact that IoT security has on the Internet and its users is critical for safeguarding the future of the Internet.

      Many organizations are working hard on IoT security and privacy issues, but there is a need for all stakeholders, including policymakers, manufacturers, and consumers, to make good choices about the future of IoT and security.

  • Asia Pacific Regional Internet Governance Forum 2016 Taipei Synthesis Document – Draft v2 (39 comments)

    • Comment by ANG PENG HWA on August 16, 2016

      Comment: Minor tweaks, mostly for grammar and clarity. Also, I think replaced the word “balance” because the solution to arriving at a balance is a compromise, which may not be appropriate here. And in keeping with the tenor of competing, I have used that in place of “conflict”.

      The right to be forgotten as a principle must be approached with caution. Significant and competing issues relating to its extraterritorial application, digitised media archives and the integrity of historical records, the rights of individuals and media freedoms must be weighed carefully.

      Moreover, emerging jurisprudence suggests competing public interest as it imposes a burden of proving public interest on people searching for information or intermediaries facilitating that search such as libraries, educational institutions, archives and search engines.

      Comment by ANG PENG HWA on August 16, 2016

      Really minor: hyphenate “gender-based”

      Comment by Maheeshwara Kirindigoda on August 17, 2016

      There should be a way that promote and motivate more
      An Internet service provider (ISP) is an organization that community-owned, non-profit ISP’s and IXP’s.

      Comment by Paul Wilson on August 17, 2016

      As a general principle it is important that this document should primarily reflect the proceedings of the APrIGF 2016. Ideally this would be demonstrated by referencing every paragraph here to a specific APrIGF session (or sessions) in which the comment or contribution was made. I wonder if we can make an effort to add these references? IMHO this would increase the value and credibility of this document immensely.

      Comment by Paul Wilson on August 17, 2016

      A smaller point:
      Capitalisation of “Internet” and “Internet governance” should be consistent.

      My proposal is to capitalise “the Internet” because in this community we strive for the preservation of a single Internet as opposed to “many internets”. The proper noun (capitalised) is therefore correct.

      Comment by Paul Wilson on August 17, 2016

      [to document the input from participants]

      to document the contributions and conclusions of participants

      Comment by Paul Wilson on August 17, 2016

      [participation in the movement]

      participation in the IGF process

      Comment by Paul Wilson on August 17, 2016

      [Asia Pacific Regional Internet Governance Forum]

      The Asia Pacific Regional Internet Governance Forum

      Comment by Paul Wilson on August 17, 2016

      [internet governance]

      Internet governance

      Comment by Paul Wilson on August 17, 2016

      [observations and recommendations]

      contributions and suggestions

      – “contributions” is consistent with paragraph 4.
      – “suggestions” is better than “recommendations”, because it avoids the implication of formality

      Comment by Paul Wilson on August 17, 2016

      [This document also intends to form an input to the ]

      This document will be submitted as an input to the

      Comment by Paul Wilson on August 17, 2016

      [Given the wide spectrum of social, economic, political and geographic diversity in the region,]

      Given the social, economic, political and geographic diversity in the region

      – “wide spectrum of” is redundant here.

      Comment by Paul Wilson on August 17, 2016

      [they skew wealth further ]

      they skew benefits further

      – benefits of the Internet are not only financial.

      Comment by Paul Wilson on August 17, 2016

      – I don’t think this paragraph says anything substantial. Therefore I suggest to delete it completely, unless someone is able to clarify what is being said here (eg re the type of “global changes”, and their implications).

      Comment by Paul Wilson on August 17, 2016

      [protection of information systems]

      protection of online systems

      Comment by Paul Wilson on August 17, 2016

      [must meet internationally guaranteed right to privacy]

      must meet internationally recognised rights to privacy

      Comment by Paul Wilson on August 17, 2016

      [Considering the nature of cross-border data transfer for online services, users’ difficulties in being aware of these complications and differing levels of protection in relevant jurisdictions, the highest level of protection should be guaranteed as a default safeguard.
      ]

      Considering the nature of cross-border data transfer for online services, differing levels of protection in relevant jurisdictions and general lack of user awareness, the highest level of protection should be guaranteed as a default safeguard.

      Comment by Paul Wilson on August 17, 2016

      [Across Asia legislation]

      Across the Asia Pacific region, legislation

      Comment by Paul Wilson on August 17, 2016

      Perhaps a new paragraph here about diversity of participation in Internet governance processes, and the proposed “report card” on diversity of IGF events?

      Should we include a summary of APrIGF 2016 participation in this document, eg as an appendix?

      Comment by Paul Wilson on August 17, 2016

      [The use of the multistakeholder model in Internet governance was approved by the United Nations and receives broad support internationally.]

      The multistakeholder model of Internet governance has been recognised and endorsed by the United Nations, and receives broad support internationally.

      Comment by Paul Wilson on August 17, 2016

      [Digital economy and trade are key enablers for the development of the world economy. Now that the digital economy has becomes the economy as such, it does not have any borders. ]

      Digital economy and trade are key enablers for the development of the world economy, yet they severely challenge traditional national borders.

      Comment by Paul Wilson on August 17, 2016

      – It is not clear what this paragraph is referring to. The specific process underway within ICANN, which has resulted from the IANA transition process, is the CCWG on ICANN Accountability. Its “work stream 2” will continue to produce improvements in ICANN structure and processes, but it’s not clear that this is what Para 31 is referring to.

      Comment by Paul Wilson on August 17, 2016

      – This seems to repeat the content of Para 34, so I suggest that this one (#35) can be deleted).

      Comment by Paul Wilson on August 17, 2016

      [for publication]

      for publication, and submission to the IGF 2016 Community Intersessional Program

      Comment by Paul Wilson on August 17, 2016

      It’s not clear where this input have come from, or why they are provided here within Appendix 2. I think this needs to be better explained. Maybe also the input needs to be provided in the main text and not within this appendix where it may be lost.

      Same comment goes for 42/45/59 below.

      Comment by Paul Wilson on August 17, 2016

      See para 40.

      Comment by Paul Wilson on August 17, 2016

      See para 40 above.

      Comment by Paul Wilson on August 17, 2016

      See 40 above.

      Comment by Yusuke KANEKO/Yohei MITSUHIRO/Rika TSUNODA on August 17, 2016

      [The use of the multistakeholder model in Internet governance was approved by the United Nations and receives broad support internationally. ]

      The use of the multistakeholder model in Internet governance was supported by governments, private sector, civil society, the technical community and the international organizations, among others.

      Reason to change;
      Multistakeholder model is not approved only by the United Nations.

      Comment by Yusuke KANEKO/Yohei MITSUHIRO/Rika TSUNODA on August 17, 2016

      [Its implementation and efficiency thus undergo continuous testing and refinement.]

      Multistakeholder models should be continuously prioritalized in policy making process.

      Reason to change;
      Multistakeholder models has supported the Internet resources and contributed to the development of the Internet.

      Comment by Yusuke KANEKO/Yohei MITSUHIRO/Rika TSUNODA on August 17, 2016

      [through a consensus-making process ]

      in policy making process

      Reason to change;
      We change this phrase in order to fit to the next sentence.(Please see our next comment.)

      Comment by wanawit ahkuputra on August 18, 2016

      Why “the setting of global encryption standards is encourage” relate to the security stability and resiliency of the internet infrastructure”

      Comment by wanawit ahkuputra on August 18, 2016

      VI. Digital Economy and Trade

      VI. Digital Economy and Trade Agreement

      “challenge traditional national borders”

      Is that challenge the jurisdiction .\

      Comment by Gunela Astbrink on August 23, 2016

      Please add ‘disability’ in the last sentence to read: “The application of human rights should also consider issues of gender, disability, age and sexuality.” Article 9 of the UN Convention on the Rights of Persons with Disabilities discusses the right to accessible and affordable ICT for people with disability.

      Comment by Prof. Rakesh Mehrotra on August 26, 2016

      Since internet has become global, each and every citizen must have equal right to govern it and hence the share in internet governance must be proportionate to the concentration of global population.

      In view of above para 28 requires changes

      Comment by KS Park on August 26, 2016

      “suggests competing public interest” sounds too weak in pointing out the problem. how about “Moreover, emerging jurisprudence is problematice because it imposes a burden. . . .”?

      Comment by Kenta Mochizuki, Attorney at Law (New York), Public Policy & Corporate Governance, Corporate Management Group, Yahoo Japan Corporation on August 26, 2016

      We would like to propose the following paragraph to be provided after para. 16 “II. Security”.

      [Proposed Text]
      17. It is paramount to foster Internet freedom and ensure a safer Internet environment for all. Particular attention should be paid to address rapidly increasing challenges to protect youth online. The enhancement of ICT literacy of youth is important, but the protection of youth from illegal and harmful online contents is also indispensable not only for the Asia-Pacific region. All stakeholders including, but not limited to governments, private sector, civil society, the technical community, and international organizations should cooperate and collaborate each other in adopting regulatory, self-regulatory, and other effective policies and frameworks to protect children and young people from abuse and exploitation through ICTs, while upholding the freedom of expression online guaranteed by the free flow of information.

      Comment by Kenta Mochizuki, Attorney at Law (New York), Public Policy & Corporate Governance, Corporate Management Group, Yahoo Japan Corporation on August 26, 2016

      Thank you so much, Paul and Wanawit. I would like to propose to replace with the following (but with brackets):

      Digital economy and trade are key enablers for the development of the world economy, yet they severely challenge traditional national [borders][jurisdictions]. Now that the digital economy has becomes the economy as such, it does not have any borders. The digital economy and trade cannot be successful without the free flow of information and appropriate domestic and global rules. On the other hand, there is a growing trend that some governments take protectionist approaches on trade by limiting the free flow of information and/or requiring data localization, and the trend hinders the further growth of the world economy. Therefore, constructing the further network of free trade agreements which requires member states to maintain the free flow of information and to ensure the prohibition of data localization as well as source code disclosure unless there is a legitimate public policy reason is recommended. In this regard, close collaboration and thorough discussion among governments, private sector, civil society, the technical community, and international organizations are indispensable.

      Comment by Kenta Mochizuki, Attorney at Law (New York), Public Policy & Corporate Governance, Corporate Management Group, Yahoo Japan Corporation on August 26, 2016

      Taking into account all the above proposals, I would like to propose the following text:

      28. V. Multistakeholder Approach
      The multi-stakeholder approach to Internet governance, which includes full and active participation by all stakeholders including, but not limited to governments, private sector, civil society, the technical community, and international organizations, has been continuously and widely supported by all the stakeholders. This approach should be the basis of domestic and international policy making processes and initiatives which are inclusive, transparent and accountable to all the stakeholders in the world. All the stakeholders should be equal to get involved in the discussion of the Internet governance.

  • (Archive) Outcomes Document - Pre-Meeting Draft (37 comments)

    • Comment by Paul Wilson on July 1, 2015

      This is my comment on the whole page.  Just for demo purposes.

       

      Comment by Arthit on July 1, 2015

      For easier discussion, this part should be better break up into one paragraph per one discussion topic.

      Comment by Arthit on July 1, 2015

      May be not only recommendations, but documented concerns, agreements, and disagreements.

       

      Comment by Jonathan Brewer on July 1, 2015

      The basic method of Internet connectivity is now Wi-Fi.

      Some Asia-Pacific countries prohibit private companies from operating Wi-Fi hotspots, restricting this activity to incumbent telecommunications operators.

      Bridging the Digital Divide depends on free and open access for all people and companies to the radio spectrum that Wi-Fi relies on.

      Comment by NetMission on YIGF on July 1, 2015

      Redefined Youth Participation – Refine and rediscover  a new model to youth participation beyond current practices for better integration rIGF and related youth IGF. Models like small-scale group discussion are effective in closing the gap between youth delegates and rIGF delegates. At the same time, it is important to recognize the language barriers and to encourage the production of related conference material in local languages (if possible).

      Comment by Izumi Aizu on July 1, 2015

      How about using “summarize” instead of “represent” in the first sentence? Just to avoid possible misunderstanding.

      Comment by Arthit on July 1, 2015

      3. Preventing Data-based Discrimination — more and more data, including personal data and public data, are collected and available for processing, this can leads to better services, new products, improved efficiency in different kinds of operations, which all could lead to better life of people in the society. At the same time, this could lead to discrimination to a person or a community based on collected data or analysed output. We should ensure that this will be prevented from the design of the network.

      Comment by Izumi Aizu on July 1, 2015

      “Suggestions” instead of “Recommendations” if there is strong opposition, but otherwise, “Recommendations” is fine. This is Not a political or diplomatic document.

      Comment by Wanawit Ahkuputra on July 1, 2015

      2. “Universal Acceptance” I do believe that the term were specific to ICANN Initiative Ramp up at ICANN 52 and under  The primary drivers for Universal Acceptance stem from the 4 elements. In this APrIGF we focus on 2 elements which refer in Universal Acceptance as

      Non-Latin based TLDs: TLDs with names written in scripts other than ASCII, such as Hindi, Japanese and Greek.”

      which in this placeholder we call Internationalized Domain Name (IDN)

      and

      “International Email: The introduction of non-ASCII names in email. While IDNs solved part of the ability to have non-ASCII names for servers, it doesn’t solve the ability to have non-ASCII names for mailboxes.”

      which in this place holder we call Email Address Internationalization (EAI)

      I fully understand that the term specify in the place holder item 2. is more generic term and better term that what use in the Universal Acceptance Initiative Background section.

      If the term EAI is came from IETF and IDN is the ICANN term but not refer in the background of Universal Acceptant. We should make it clear that which should be the based of our definition

      I support the term already use in this document is more generic and understandable.

       

      Comment by Wanawit Ahkuputra on July 1, 2015

      +1 @IZUMI

      Comment by Wanawit Ahkuputra on July 1, 2015

      Reference to : IGF 2014 Chair’s Summary :Connecting Continents for Enhanced Multistakeholder Internet Governance• 2-5 September 2014, Istanbul, Turkey •

      “Summary and way forward” and

      “Ways Forward/Recommendations”

      were use in the document.

      Comment by Wanawit Ahkuputra on July 1, 2015

      Reference to : IGF 2014 Chair’s Summary :Connecting Continents for Enhanced Multistakeholder Internet Governance• 2-5 September 2014, Istanbul, Turkey •

      Section 1.1 page 7

      “A revitalisation of the format and content of the Chair’s Summary to suggest intersessional work modalities for the IGF and to make the IGF outcomes and outputs more portable and visible, so that they can be taken forward, as appropriate and on voluntary basis, by relevant Internet governance bodies, institutions and organisations.”

      That might be also give the idea of the spirit of why APrIGF would like to have the outcome document. But in IGF they call Chair’s Summary.

      Comment by Arthit on July 1, 2015

      “Chair’s Summary” is interesting, as it clearly signify where’s the Summary comes from.

      My suggestion is that, APrIGF could adopted a different or a same name, no need to be exactly the same as the global IGF, as long as it clearly signify where’s the document comes from.

      Whether this document will be a Summary, a Recommendation, a Statement, etc. is left to be discussed — some people already did this at http://comment.rigf.asia/table-of-contents/aprigf-asia-2015/aprigf-macao-2015-outcomes-document/#psR

       

      Comment by Arthit on July 1, 2015

      Some countries allow wifi hotspots without licenses, although their cybercrime law put (criminal) liabilities to intermediaries like wifi — so less people eager to share their wifi. Community wifi also got affected, as the operator of the network will face legal risks.

      Example: Article 15 of Thailand’s 2007 Computer-related Crime Act.

      Comment by Arthit on July 1, 2015

      Support more integration of regional Youth IGF and regional IGF. — The arrangement of timetable should allow Youth participants to join any session as they wish. May be by have a separated, preparatory process, of Youth IGF one day before IGF.
      Encourage workshop proposal to include youth as a panelist. Although, during the workshop process, youth should be treat as equal to other participants — there will be no special treatment.
      Find ways to support national Youth IGF to happen.

      Comment by Arthit on July 1, 2015

      +1 @Izumi

      Comment by Arthit on July 1, 2015

      These priority issues are sorted by? ..  Alphabetical order?

      Comment by Samuel Akinsola on July 1, 2015

      This is a stage we can appreciate and manage the internet and its resources for a better use.

      There are alot of diversities with the internet but all works for our advantage if we know just how and when to use it.

      We cannot forget the stone age, centuries ago where thinking level was just sifficient for that era and in this age we need something very admirable and that can make us discover the future. The internet is its name and it has its starting point.

      Evolution is caused by thinking change that will effect the human race. The internet has totally brought change that has affected the way we dress, behave and think; what of the way we learn? it is drastically changing. Notwithstanding we need a way of curbing its consequencies to work for our good at all times.

      The ineternet has provided a platform to commit subtle crime, more secretive more conscious, yet it has not changed our uniqueness as humanbeigns.

      I really appreciate the topic for the 2015 and hope it serves even a better purpose to grass root local communities around the continent and the world to be a tool that gives sound information and not to create a decadence in moral statndard.

      Comment by Jac on July 2, 2015

      Best practices or ways forward

      Comment by Izumi Aizu on July 2, 2015

      Using  “Chair’s Summary” might be problematic – as in the process of IGF Improvement, more than Chair’s Summary, some kind of more tangible outcome document has been proposed.

      Having said that, using “summary” may not a bad idea.

       

      Comment by Mohit Saraswat on July 3, 2015

      Building Trust on the Internet ( Surveillance state in AP)- In my view, it is very important that all the stakeholder have optimum trust in the platform. To achieve the same all the stakeholders have to shoulder responsibilities.

      End user are to be made aware of their privacy needs.
      Content provider and Collaboration tools ( Read Twitter, Facebook) that form important part of the ecosystem have to derive and develop plans to incorporate trust; Segregating private and public space for the end user.
      Government and regulator have to be made responsible for respecting and building trust.

      Comment by Don on July 3, 2015

      With respect to Universal Acceptance…

      The Internet DNS has already provided support for IDNs and they have been in production since 2009.  What needs to happen now, both in respect to IDNs and all new TLDs, is that the developers of computer programmes and systems need to catch up so that they take advantage of these new facilities.

      Readers, including businesses, governments and civil society participants, should make sure that their own systems are UA Ready – that is that they can accept, validate, store, process and display all domain names equally.   This is an issue not just at the top level, but at second and subsequent levels as well.

      They should also encourage their suppliers and the providers of services they use to become UA Ready.

      [NB: This editing application is an example of one that does NOT accept IDN e-mail addresses]

       

       

       

      Comment by Bianca on July 3, 2015

      agree with tying in with Global IGF

      Comment by Bianca @ NetMission, MAG member on July 3, 2015

      More importantly, the idea is to integrate the YIGF participants as much as possible to the main session. They might not be able to participate confidently in the APrIGF, but they would bring their observations back to their small-scale group discussion. It plants a seed and a path for gradual progress.

      Comment by Arthit Suriyawongkul on July 3, 2015

      Or probably “Data-driven discrimination”.

      Comment by Arthit Suriyawongkul on July 3, 2015

      Replacing “recommendations” with an agreed term in the Sub-heading.

      Comment by Arthit Suriyawongkul on July 3, 2015

      Can we call this “Privacy-by-design”?

      Comment by Sivasubramanian M on July 6, 2015

      Internet Governance participants could consider Core Internet values as a set of values that the Internet ought not to slip away from. The architectural values –  Internet as dumb technology, end to end architecture, inter-operability and openness – values arising out of the Internet’s design by the intent of the early inventors and the natural evolution of the Internet beyond their intent- could be deemed as unalterable core values. The underlying technical values result in larger sociological benefits. For instance the technical value of interoperability results in the sociological benefit of a Global Network of networks. The architectural values of openness and interoperability make the Internet as a Network of networks that require little architectural changes when a new network joins the Internet, or even when there are unforeseen technological developments such as Mobile Networks or unforeseen trends such as IPv6 or the proliferation of the Internet of Things. There are threats to the border-less Internet arising out of geographical borders raised by Governments as well as artificial borders raised by walled gardens and zero rating services. The IGF in its discussion on the horizontal theme of “Policy Options for connecting the next billion” could debate and emphasize that the stakeholders around the world formulate Internet Policy without hurting the core Internet Values.

      Comment by Bianca @ NetMission, MAG member on July 6, 2015

      If go one step further, can also incorporate encouragement of youth to participate in panels to add extra points to the workshop. This mechanism would encourage workshop organisers to add a youth perspective to their workshop.

      Agree on that they should be treated equally as other participants during the conference

      Comment by Bianca @ NetMission, MAG member on July 6, 2015

      Also wanted to establish a sustainable initiative and common ground to exchange and to come up with consensus, for example the establishment of an Asia Pacific regional research network focused on child online safety.

      Comment by Forest Atkinson on July 7, 2015

      Human rights are by universal.  The phrasing “especially the different balance required at different stages of development” should be deleted, as it seems to suggest that the importance attached to human rights varies depending on the stage of development and it is acceptable to trade off cybersecurity against human rights.

      Comment by tan tarn how on July 7, 2015

      Normal
      0

      false
      false
      false

      EN-SG
      ZH-CN
      X-NONE

      MicrosoftInternetExplorer4

      /* Style Definitions */
      table.MsoNormalTable
      {mso-style-name:”Table Normal”;
      mso-tstyle-rowband-size:0;
      mso-tstyle-colband-size:0;
      mso-style-noshow:yes;
      mso-style-priority:99;
      mso-style-qformat:yes;
      mso-style-parent:””;
      mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
      mso-para-margin:0cm;
      mso-para-margin-bottom:.0001pt;
      mso-pagination:widow-orphan;
      font-size:11.0pt;
      font-family:”Calibri”,”sans-serif”;
      mso-ascii-font-family:Calibri;
      mso-ascii-theme-font:minor-latin;
      mso-fareast-font-family:SimSun;
      mso-fareast-theme-font:minor-fareast;
      mso-hansi-font-family:Calibri;
      mso-hansi-theme-font:minor-latin;
      mso-bidi-font-family:”Times New Roman”;
      mso-bidi-theme-font:minor-bidi;}

      I suggest that under priorities we add this:
       
      A Civilised, Safe And Healthy Internet: That access is accompanied by awareness, education and actions by all parties from governments to service providers, content providers, NGOs and individual users, including parents, to develop and maintain an internet that is civilised, safe and healthy, in particular engendering the development of such an Internet by media literacy from an early age.
       

      Comment by tan tarn how on July 7, 2015

      Sorry, my comment earlier was wonky.

       

      I suggest that under priorities we add this:

      A Civilised, Safe And Healthy Internet: That access is accompanied by awareness, education and actions by all parties from governments to service providers, content providers, NGOs and individual users, including parents, to develop and maintain an internet that is civilised, safe and healthy, in particular engendering the development of such an Internet by media literacy from an early age.

      Comment by Jac sm Kee on July 7, 2015

      Ya, maybe “Synthesis or Summary” document is a nice idea

      Comment by nica on July 8, 2015

      Key issues in the Asia Pacific Region

      Comment by nica on July 8, 2015

      Key issues in the AP region

      Comment by nica on July 8, 2015

      this is my comment to para 5. not sure why this appeared here.

  • Asia Pacific Regional Internet Governance Forum 2020 Synthesis Document – Draft 0 (30 comments)

    • Comment by Swaran Ravindra on September 27, 2020

      Digital divide, gender disparity are amongst some of the major barriers of inclusion. However, it may need intervention at many different levels as it is a problem with multiple facts. It needs in-depth research to find out the factors leading to the digital divide. There could be more than what meets the eye. The issues of the South Pacific Islands may be different than those of the rest of the regions int the world.

      Comment by Gaya on September 28, 2020

      Will be good to mention the need to apply business and human rights standards to tech companies – recognising the impact these companies have on the rights and lives of individuals

      Comment by Gaya on September 28, 2020

      Can remove what is in brackets -worried that ethics is too vague – may be we can split that sentence up

      Comment by Joyce Chen on September 29, 2020

      Some issues raised at Townhall:
      – Digital citizenship and importance of digital literacy
      – Accountability and transparency of (big) platforms, governments, and stakeholders
      – Role of governments and private sector (such as media) in the spread of misinformation and erosion of online trust
      – Collaboration and cooperation in cybersecurity “all hands on deck”

      Comment by Nestor Boniche Gonzalez on September 29, 2020

      We can’t leave anyone behind. We must think and work together, articulating the academy with the state, communities and private companies, to truly democratize access to ICT, including the empowerment of people in the safe, productive and meaningful use of technology.

      Comment by YingChu Chen on September 29, 2020

      Transparency is important to different stakeholders. Users know how service providers use our data. People know how government use the data and participate in policy making procedures.
      For example, we talked about smart city development yesterday. But some people don’t know the schedule and worry about the surveillance with CCTV everywhere and harm to privacy.

      Comment by YingChu Chen on September 29, 2020

      We all need to close the digital development gap between rural and urban. Welcome and give opportunities talents to participate local development by affordable and reliable (internet or other) infrastructures.

      Comment by Swaran Ravindra on September 29, 2020

      Also good to comtemplate- what do we perceive as the ideal ecosystem for internet, is there a model country/region to benchmark with?

      Comment by Swaran Ravindra on September 29, 2020

      Some of the pressing concerns for the Pacific in terms of 5g-
      – Do we have as much internet penetration in the South Pacific Countries, Do we have enough phones/PCs, – Are our people IT/Digital literate, Can our ISP’s provide such amounts of bandwidth,

      Comment by Swaran Ravindra on September 29, 2020

      With the increased usage of ICT, there will be a growing concern for human-centric designs. additionally, ethical issues need to be explored and addressed. It may help to advocate for “digital rights”, and have it advocated to every citizen, especially since we are moving towards deploying citizen-centric
      e-services

      Comment by Swaran Ravindra on September 29, 2020

      Once IT/Digital literacy becomes recognized as a “right”, then a framework can be developed for the Pacific,on how to achieve such literacy

      Comment by Joyce Chen on September 29, 2020

      With new, emerging technologies, and the state of current geopolitics, the risk of Internet fragmentation is increasing. Fragmentation will disrupts people’s ability to access the Internet in a seamless way. It will also lead to a loss in innovation – one of the benefits of the global, interoperable Internet.

      Comment by YingChu Chen on September 29, 2020

      Geopolitics really affects the internet development. The content on the internet is cross border, some government govern the internet with their own perspective. Government may prohibit some internet services, content, do censorship to social network platform.
      It may also relate to the tax. Users consume the services in one country but the pay in the other country, the services or goods were delivered in another country. That relates the tariff or consumer tax in different countries.

      Comment by Swaran Ravindra on September 29, 2020

      The Internet’s Environmental Impact: an action-oriented dialogue- It would be helpful to have a tool developed to help gauge or measure the amount of ïmpact on the environment a technological device has. When the impact is measured, then thresholds can get decided, which creates a clearer picture for an end-user or technology user to fix the issues proactively

      Comment by Dr.N.Sudha Bhuvaneswari on September 29, 2020

      Internet being ubiquitous how much online privacy does an individual have? Do we have any latest tools or security techniques that enhances the safety of online transactions and that improves our privacy on the cyber space?

      Comment by Dr.N.Sudha Bhuvaneswari on September 29, 2020

      When filling the digital gap and making Internet available to all regardless of socio-economic status, gender and age. Pointing out on the age factor is digital inclusion applicable for all ages? will this not have a greater impact on the children, kindly suggest more on this.

      Comment by Nabillah Hijazu on September 29, 2020

      What are the roles of all stakeholders in access provision and inclusion, and the provision of education and training for information literacy and digital literacy, including the responsible exercise of these skills with respect for other people? 3 recommendations that should be implemented by Internews to help the community especially.
      First of all is to go back to basics. We might have the understanding that we are going to go into communities with the power and privilege we have compared to the community that we are going to serve. However, we should view anything that we are going to do with the community as a learning process for both parties. Listen first to their information and the knowledge they know so far. Assessment within the community to adapt on what they want and what they need. Only then education and awareness take place to disseminate the knowledge.

      Secondly, we should hold on to the principle of do no harm in a more practical way. When talking about information it can be accessed online and offline. For the online platform, the way we engage with the community should be based on their understanding and we do not want to open can of worms where we educate them on how to get the information but not how to control themselves to impart the knowledge properly. Either urban or rural communities, they are all prone to the danger of the internet and false news. This is where we should be careful on what we go through with them as at the end we could not just leave them without properly briefing them on the online danger too.

      Thirdly, no one is left behind. We tend to assume that rural communities have a lack of access for information. However, there are reports of those educated and also professionals that fell into scams and did not know properly on how to differentiate the quality and originality of the information. This could cause more harm in the society and community. The outreach of the programme should comprise the rural, urban poor and community organizers that will help the community in exercising their knowledge and rights and in a way enhance their literacy.

      Comment by Pablo Hinnojosa on September 30, 2020

      ADD question:
      How the Internet (the Internet sector, but more importantly, the Internet community) can have the most positive impact in the Environment?

      Comment by Pablo Hinnojosa on September 30, 2020

      Some issues to help frame global IGF Environmental Theme:
      a) incentives for sharing data by public and private sectors as digital public goods
      b) environmental data governance
      c) collaborative environmental analytics (citizen science and open datasets)
      d) AI-algorithm transparency for data integration and analytics for digital public goods
      e) dealing with misinformation and fake news about the environment
      f) e-waste and product lifecycle
      g) early warning systems, disaster recovery and emergency response, specially in the Pacific

      Comment by Amrita Choudhury on September 30, 2020

      To be able to address issues of inclusion it is important to have correct data which will help in formulating appropriate strategies so the suitable methodology can approach can be adopted at all levels: building infrastructure, connecting people, addressing social barriers, capacity building. There is also a need for more cooperation between different stakeholders, countries to share data, best practices and have more dialogues. This will help to address many issues.

      Comment by YingChu Chen on September 30, 2020

      We know the pandemic forces some enterprises to do digital transformation. People have to work from home and some people lost their job. Hope the ICT technology may help the people to get chance to have new job.

      The other thing is Google and Apple collaborate together to provide the social distance map to warning. Hope that can protect the privacy to everyone.

      Comment by Jan Jacob Jansalin on September 30, 2020

      With the possibility of the splinternet there should be a call for island nations (governments) to invest in submarine cable infrastructure and not just leave it to the private sector. To a certain extent this improves the backhaul and the bandwidth capacity and significantly contributes to inclusion to less developeed island (provinces) but also enables redundancies to other adjacent nations making bilateral, multilateral nations better.

      Comment by Jan Jacob Jansalin on September 30, 2020

      Could there be some sort of a neutral fact-checking website that is focused on APAC that is wikipedia-like that is led by APrIGF participants where multistakeholders can equally comment on it and yet their identities would be traceable for accountability. The results will show a spectrum of results from various perspectives not just a binary view on truth so people can be more informed. Also the results can be shareable to popular websites with understandable graphics for easy interpretation.

      Comment by Jenna on September 30, 2020

      Fake news is a big concern during COVID-19, it is understandable for some social media platform to establish some mechanism to filter out “inaccurate” information with some fact-checking system. With the “831 Incident in Hong Kong” example raised during the Townhall session on 30 September 2020, I believe our community should pay more attention on how such enterprises are reviewing their content and how they are influenced by the government bodies of different countries. As it is another form of violation of Human Rights to filter out factually accurate content with inaccurate conclusions. This is definitely a potential risk behind the entire fact-checking mechanism, as people may abuse the system by spreading false information online on purpose to limit the dissemination of true and accurate information in any channels with a similar mechanism for whatever reason.

      Comment by Farha Diba on September 30, 2020

      To make IG ecosystem more impactful we need collaboration more especially the youth IG groups collaboration like youth4IG, YCIG etc. I believe that youth has the power to have a good impact on IG. Besides it is important to be aware of IG issues from the early stage of their life.

      Comment by Aye Chan San on September 30, 2020

      Building trust is not a easy process. Building online trust is much harder since many people are not still familiar with the digital technology.
      Transparency could be one of the solution. Government and private sectors companies should provide them how they are using the data for what purpose. The role of media is also very important in building online trust because people are usually convinced by a lot of media. Once the media mislead some information, it will spread throughout many communities. Therefore, misinformation and disinformation should be strongly restricted by the government by digital laws and regulation.

      Comment by YingChu Chen on September 30, 2020

      Encryption technic help to protection privacy to every internet users. Government has the responsibility to take care of safety to every people. Citizens and commercial services can to something to limit the government behavior, ask to the underline to government behavior.

      Transparency Report help enterprise to protect commercial services themselves. Companies may record the requests from government and make those numbers public.

      The link is an example from Google’s transparency report.

      Comment by Josia Paska on September 30, 2020

      In addition to providing access to the internet to more people, we also need to make sure that the internet provides a safe space for minority groups and vulnerable communities. There are at least two issues when it comes to the internet: the monolingualism of it and the lack of content that provides affirmations for minorities and marginalized communities. Therefore, I believe it is important to also think of how we can empower minorities and marginalized communities to populate the internet with native contents by and for the community and to build a safe space so they can not only use, but also thrive on the internet.

      Comment by Felicia Yunike on October 1, 2020

      The 1st policy question is too broad and theoretical. It would be better to make comparative approach between de facto and de jure of the national laws to assess its own interpretation in accordance with its provisions. On the other hand, there is a possibility that national law is influenced by conventions or international agreement which subsequently established universally-applied principles. If I were to suggest, the terms “regulations” could be replaced with principles we internationally adopt as a matter of comparison.

      Comment by Felicia Yunike on October 1, 2020

      The 3rd policy question should be narrowed down a little bit as it may create confusion such as the role of government in the protection of human rights online based on what? the regulations? Please point out a context you want to refer to, since I believe that there are various cases that involve the governments with different measures. For example, there is a legitimacy of surveillance under certain conditions (proportionality, necessity, etc).

  • (Archive) APrIGF Macao 2015 - Synthesis Document - Draft 1 (29 comments)

    • Comment by Satish Babu on July 16, 2015

      “Open Access and Spectrum for Wifi for Development” sounds a bit confusing….can it be changed to “Open Access to Frequency and Spectrum for Development”  as mentioned in the text ?

      Comment by Satish Babu on July 16, 2015

      Should we not expand EAI (Email Address Internationalization) somewhere, either in the bullet or in the text?

      Comment by Satish Babu on July 16, 2015

      Since it is the script that is internationalized (and not necessarily the language), should the last part be “…so people can connect using their own script”?

      Comment by Satish Babu on July 16, 2015

      “…and how these can help provide a trusted environment for the adoption and use of the Internet” in the first line. What does “these” refer to?

      Comment by Satish Babu on July 16, 2015

      Not sure what transpired during discussions, but this item appears to be somewhat unusual in the context of Internet Governance. It would be valid to retain this if any of the participating countries (especially the bigger ones) did make a demand for a second currency.

      Comment by Satish Babu on July 16, 2015

      Second sentence: “broadband consultations” or “broad-based consultations” ?

      Comment by Jeremy Malcolm on July 17, 2015

      I wonder whether you want to add “including open Wi-Fi” to indicate the value of allowing open networks without a login or registration requirement? I did talk about this in the Core Internet Values workshop.

      Comment by Jeremy Malcolm on July 17, 2015

      I’m also a little confused and concerned about what this might mean.

      Comment by Jeremy Malcolm on July 17, 2015

      Overall comment: the synthesis document is rather light on content and heavy on generalities. But this is not necessarily a fatal criticism. I acknowledge that there is some value in beginning with a very high-level, general document while we are kicking the tires of this process.

      Comment by Jonathan Brewer on July 20, 2015

      Frequency and spectrum are interchangeable terms. I suggest the sentence read either:

      “Open access to WiFi frequencies is increasingly important”

      or

      “Open access to WiFi spectrum is increasingly important”

      Comment by Sylvia Cadena on July 22, 2015

      I think it will be better to change the word experiment for something else that captures the comment Jeremy made at the title. My suggestion for this paragraph will be something like this…

      The APrIGF Synthesis Document concept was first raised and discussed at the APrIGF New Delhi 2014 Multi-Stakeholder Steering Group (MSG) meetings, and further refined over the course of MSG deliberations throughout the year. The Synthesis Document aims to identify items of common interest and relevance to Internet governance within the Asia Pacific region. The MSG decided to implement this experimental approach for the first time for the APrIGF Macao 2015, to grow and develop with input from the Asia Pacific Internet community into a more comprehensive and in-depth document in the future.

      Comment by Sylvia Cadena on July 22, 2015

      Request instead of solicit

      Comment by Sylvia Cadena on July 22, 2015

      “frequency and spectrum” is a repetition. Better to use one of the words. I think it will be better to link it to development at the end of the sentence as well. My suggestion will be:

      Wi-Fi has become a vital method for achieving internet connectivity, due to its use for ad-hoc local networking, and its easy accessibility from mobile devices. Open access to the spectrum is increasingly important to support the ongoing demand to access content, services and applications that serve development needs.

      Also, please check for consistency to use either internet or Internet throughout the whole document. At the moment there are a few differences

       

      Comment by Sylvia Cadena on July 22, 2015

      A couple of precisions. Is not the language that is internationalized but the script, better to clarify, and not to use the word spectrum here to avoid misunderstandings. My suggestion:

      The linguistic diversity of Asia Pacific region underlines the necessity for faster realization of universal acceptance of the internationalization of core internet identity technologies (DNS and email) so people can connect using their own script.

      Comment by Sylvia Cadena on July 22, 2015

      So glad to see this comment about Human Rights here! Well done, fully endorse!

      Comment by Sylvia Cadena on July 22, 2015

      I don’t think there is potential for collaboration with the IG space on any issue, as it is not a established body to begin with.

      Emerging technologies for virtual currency might have the potential to power the economy of the next billion. It is important to deepen the understanding of the issues around virtual currency, through dialogue and collaboration in the Asia Pacific region.

      Comment by Jac sm Kee on July 29, 2015

      The role of civil society in access issues is critical to be included. This includes research, assessments, monitoring, capacity building, impact evaluation, and creating and providing alternative infrastructure amongst many other things.

       

       

      Comment by nica on July 31, 2015

      Let’s please be consistent with calling this document as Synthesis Document.

      Comment by Don Hollander on August 3, 2015

      Combined efforts from public, private and community sectors is needed to create sustainable initiatives to solve issues of affordable accessibility and digital literacy for all.   Effort is also necessary to support local languages in all facets.  Developments are also necessary is safe and affordable electronic payment facilities to allow everyone to facilitate sustainable activities.

      Comment by Don Hollander on August 3, 2015

      A call to action here would be beneficial, calling on Spectrum Managers within each community to de-licence WiFi spectrum.

       

      Comment by Don Hollander on August 3, 2015

      Satish, either will be fine, in my view.

      Comment by Don Hollander on August 3, 2015

      “Trust” is a challenging term because it’s so broad.   When I first read this, I thought how can we ensure that justice is served when our trust is broken by naughty people?   Communities adopting similar legal frameworks for addressing scams and allowing cross border enforcement would be a way of building Trust.   If you order a book from me, and I don’t deliver, then you should be able to easily pursue remedies.

      But there’s also the Trust of accuracy of information.   And the Trust that the information that I transmit is secure between me and its intended recipient.

      Comment by Lim May-Ann on August 3, 2015

      Nuances of the concept of the “digital divide” need to be brought in – it’s no longer simply a matter of access, but also affordability. With new technologies, new digital divides have emerged, which have been observed (eg smart phone haves and have nots) but not dealt with.

      Comment by Lim May-Ann on August 3, 2015

      Wi-Fi is a very specific technology and standard; do we mean spectrum for wireless connectivity?

      Comment by Lim May-Ann on August 3, 2015

      This looks rather broad; categorization of people and aggregating data is a way of making sense of the world.

      More facetiously, if we prevent data driven discrimination, does that mean we simply allow discrimination to be non-data driven; i.e. baseless? :)

      Comment by Lim May-Ann on August 3, 2015

      Not all states make explicit the right to freedom of expression.

      Comment by Maureen Hilyard on August 3, 2015

      I agree with Don that for underserved communities in our region affordability is a real barrier to access. Content in local languages should also be valued and encouraged.

      Comment by Maureen Hilyard on August 3, 2015

      Because legislation is the domain of governments should there not be some inclusion here of the importance of government decision makers being involved in these consultations regarding approaches to NN legislation?

      Comment by Maureen Hilyard on August 3, 2015

      Providing a forum at all these larger events for the youth to express their views is vital if the internet and its governance is to develop to meet their future needs. Kudos to APrIGF for the initiatives they have established for Asia Pacific youth.

  • Open input period for the 2020 APrIGF Synthesis Document (17 comments)

    • Comment by SUDHA BHUVANESWARI N on September 10, 2020

      Instead of question, it can be in the summary format

      Comment by SUDHA BHUVANESWARI N on September 10, 2020

      [ as a public good] can be rephrased as for societal welfare

      Comment by SUDHA BHUVANESWARI N on September 10, 2020

      Generally according to my view all questions can be given in summary format stating the outcomes of the main theme

      Comment by APrIGF Secretariat on September 10, 2020

      Thank you for your comment. These are questions for APrIGF attendees to let us know what they hope to see discussed at the APrIGF workshops. The event is still ahead so we are not concluding anything at the moment.

      Comment by Gaya on September 15, 2020

      I would remove and before national laws. Most of our struggle has been with national laws diluting HR guarantees. What international law provides is the bare minimum that needs to be guaranteed.

      Comment by Gaya on September 15, 2020

      In the second line on – essential for ensuring accountability – would rephrase as placing the interest of individuals and societies at the centre of how the internet is regulated and for ensuring that our rights are secure.

      Comment by Kyaw Zaw Lin on September 15, 2020

      The progression of cyber security among the human interactions is an inevitable outcome but the barrier to which people being bullied with terms and data gathering is due to the system created by the people themselves. It’s a perfect world where every individual feeling safe online but the very platform is built by a human which means there’s always a back door flaw for intervention and manipulation. Perhaps the only alternative is a platform to be created, generated and regulated fully by a computer from scratch to development which in this sense requires years of human trust in technology to even start taking its shape in the first place.

      Comment by Debarati Das on September 17, 2020

      The word ‘legitimate’ can mean something that ‘conforms to the law’. In many countries (such as India), several consensual and harmless acts online are classified as ‘obscene’, ‘seditious’ etc., and so, ‘illegitimate’ under the law. Can ‘legitimate’ be replaced with ‘ethical’?

      Comment by Debarati Das on September 17, 2020

      Here, too, can ‘legitimate’ be replaced with ‘ethical’ because various ethical uses of the internet are wrongfully and unconstitutionally classified as illegitimate under the law in countries like India – such as, laws on obscenity, sedition, unlawful activities etc.

      Comment by Shradha Pandey on September 19, 2020

      The applicability of international human rights instruments and conventions has been in conflict with the traditional idea of sovereignty. It would definitely give a stronger clarity if we could clearly state the usage of “human rights” and “ethics” so the conflict and confusion can be avoided in the future.

      Comment by Shradha Pandey on September 19, 2020

      The express use of ‘Privacy by design’ can go a long way in giving a proper direction to the SMEs and Start-ups in relation to their technological innovations. Especially since the SME’s are predominant in the Global South and Privacy and Protection are not given due importance in the design process as compared to the Global North.

      Comment by Shradha Pandey on September 19, 2020

      The idea of ‘barefoot engineering’ has been gaining popularity in current times. Under this the ICT companies use their Corporate Social Responsibility funds to train youth; consequently, absorbing them in company activities and creating new employment opportunities. This creates a positive cycle of digital literacy and employment which can be used to achieve the Sustainable Development Goals.

      Comment by Winston Roberts on September 19, 2020

      I suggest wording this as: “…cause harm to human rights, democratic processes and economic activity.”

      Comment by Winston Roberts on September 19, 2020

      To drafting committee:
      I suggest we include a sub-heading for “The role of the media”. We will surely receive a lot of input in Townhall sessions that could fit under that heading.

      Comment by CHEN BINGYU on September 19, 2020

      Maybe it will be more comprehensive to add “age” as a variable factor like gender? For example, I think social media platforms Twitter and Facebook and online political events provide more opportunities for the youth to express their opinions and participate in such events. Not only in terms of politics, but also influences the youth culture, making youth subculture attracts more people. Especially in China, we can see a rapid growth of youth subculture texts. Typical examples are meme and idol culture.

      Comment by CHEN BINGYU on September 19, 2020

      Some theories of philosophers indicate that the logics of technology heavily influence our traditional logic, preparing us human for digital logic. So, maybe be we can talk about some changes in the definition of our humans, like the studies of “embody” in media and technology.

      Comment by Swapna on September 19, 2020

      One must consider whether the right to receive and impart information should be qualified at all either with legitimate or any other. In any case, anything that is not permissible under existing laws will have its own consequences.

  • Open input period for the 2017 APrIGF Bangkok Synthesis Document (16 comments)

    • Comment by Renata Aquino Ribeiro on July 9, 2017

      This theme of this workshop will also inspire informal meetings at LACIGF2017 and has also been addressed in the Dynamic Coalition on Publicness in the IGF2017.

      Comment by Jonathan Brewer on July 12, 2017

      Libraries in some Asia Pacific economies face regulatory hurdles when providing community Internet Access. These can include a:

      1.) a telecommunications license, or dispensation from a licensing regime.
      2.) a requirement to filter Internet content provided through the network
      3.) a requirement to provide interception capabilities for police / government
      agencies
      4.) a requirement to block Voice over IP technologies including Skype in economies where voice services can only be provided by licensed carriers

      An Asia-Pacific strategy for Community networks and public access to ICT should acknowledge these regulatory hurdles and promote their harmonisation or elimination as a step towards ensuring Universal Access.

      Comment by Jonathan Brewer on July 12, 2017

      Telecommunications licensing requirements are a major barrier to connecting the unconnected in developing Asia. Activities such as setting up a community Wi-Fi network are prohibited or made difficult in many economies by regulation, process, and corruption.

      True progress in this area cannot be made until telecommunications regulations in developing nations are relaxed to allow communities and their technical partners to innovate.

      This group would do well to produce a document summarising regulatory barriers to community networks on a country-by-country basis to highlight the problem and pursue it at a regional level.

      Comment by Sophia on July 13, 2017

      If you omit to the next track in a playlist, Google Play
      Music will slide in with the new track info before receding in to the track record.
      If someone message or calls you, their contact picture and name will arrive until you answer.

      Comment by Yeseul on July 14, 2017

      As I’ve been interested in this topic( and partly inspired by Izumi’s workshop since last year IGF), I’ve written a short paper on the deployment of IPv6 and social, political factors affecting the deployment level. Anyone can find the paper at my blog(borisu0815.github.io), and hope this can help facilitate the discussions.

      Comment by KS Park on July 19, 2017

      Right to be Forgotten is not very welcomed in Asia for a reason. There are many former colonies and dictatorships which until recently have not resolved the past injustices or oppressions that still stand as structural roadblocks in the paths to equality and democracy. In addressing those structures, we need to see the whole truth, not partial truth. Not truth just about public figures, not truth only about high level officials who collaborate with dictatorships or colonial administrations. Not just truth ordained by some offical history books issued by the governments. Not just truths approved through majoritarian decisionmaking as suitable for public discussion. Truth can only be approached only when having all voices heard including subjective ones.

      Proponents of Right to be Forgotten offer that it does not apply to public figure, but sometimes you need more information to decide whether someone is public figure or not. If the information is delisted, you really cannot make that determination properly.

      ​Moreover, people who in the past were not public personas, may become public figures in the future. Then their past may matter.

      People have collective right to know the wrongs of not just others, or even themselves. Collective right to observe, evaluate, and retain what they see in one another. So that they do stand as responsible colleagues to one another and keep themselves from repeating the wrongs. This is how the ethics of a society are done: by learning from the past. Publicness is exactly the space for collective learning.

      There are already many laws in Asian countries that interfere with such communal learning by suppressing even truthful information. For instance, in Korea, we have a truth defamation law where even information not proven to be false can subject to criminal prosecution merely for lowering another person’s reputation. We cannot have another principle such as RTBF that undermine our publicness.

      RTBF, currently framed, also constitutes administrative censorship. Non-judicial administrative body, namely data protection agencies, are empowered to order search engines to manipulate search results. Administrative censorship has been abused deeply and widely in Asia for blinding people from truths inconvenient to the authorities, as you could see in recent internet shutdowns in South Asia. The danger of administrative censorship is that lawful information can be taken down due to progovernment bias can dilute those decisions. Also, the subject of orders are likely to challenge the decision even if there is a judicial review process because the government can always retaliate even just for challenging it.

      Some people like to believe that data protection authorities are different from other organizations that have conducted censorship but I do not see it that way. I already see the evidence that in Peru, other Latin American countries where DPA is really playing the role of censorship. And in Korea, the dangers are also being played out. Internet censorship is not taking down unlawful content, but taking down unethical content and what is ethical is decided by these nine Korean males in their 50s and 60s and nobody can really get a consistent principle out of that. This only goes to show the dangers of DPA authorized to take down truthful public information for the pretext of RTBF.

      Comment by KS Park on July 19, 2017

      Joint Statement of the Dynamic Coalition on Publicness Concerning the Right to Be Forgotten

      The public realm is losing ground. New regulation and jurisprudence are being conceived to address conflicts concerning the digital dimension of the public space and our ability, as Internet users, to reflect on ourselves. One of them is the so-called “right to be forgotten” (RTBF). The version originally formulated and popularized by the European Court of Justice (ECJ) is now being adopted in other regions and with slightly different manifestations including both the right to delist and the right to delete content.
      The underlying motive behind the idea of the RTBF is people’s fear of being discriminated against for their past conduct. If this is the case, we need to recognize that blinding ourselves from one another’s wrongs (or supposed wrongs) is not an effective way of addressing and combating unreasonable discrimination. Under current rulings, the supposed wrongdoers can censor search results about themselves just because they think that certain past conduct is currently irrelevant to the moral evaluation of their character by others. Such self-centered censorship will prohibit people from confronting the real forces that are fanning such discrimination. Discrimination can only be addressed when the problems and its causes are known to society.

      Furthermore, blinding ourselves to information about others’ conduct is not a proportionate way of combating discrimination. Information that the supposed wrongdoers would like to bury deep within the Internet may be vital for the safety of the people who have pending encounters with the individual in question. Suppressing certain truthful information may be necessary to guard against a high likelihood of immediate discrimination, as in the case of former sex workers or sex abuse victims in certain cultures, but such likelihood must be measured against objective criteria not simply against subjective reputational wishes of the supposed wrongdoers. A viable legal provision against discrimination is possible and in many legislations already existent: either in ex ante forms, such as amnesties or expungement provisions, or in ex post forms protecting other personal rights, such as defamation. RTBF goes beyond that by restricting people trying to protect themselves from sharing vital information. A more effective and proportionate remedy against discrimination is allowing more information to be made available about people so that others’ perceptions of them can be properly contextualized.
      Simply put, information is not the reason for discrimination, but prejudice. Prejudice is not based on information, but on the moral decision to do harm by misusing information. We should combat discrimination, not information.

      RTBF depends on the temporal relevance of data, as in the phrase “no longer relevant;”thus, it is fundamentally incompatible with freedom of speech and freedom of information. Data does not become irrelevant with the passage of time because data, while becoming irrelevant in one respect or according to a particular perspective, may become or remain relevant from other angles or for other reasons – e.g., for historians, journalists, social scientists, policy-makers, or cultural studies. In fact, the value of data does not reside in the data in itself but in the eyes of the beholder. People may find relevance in old data that other people do not see. Freedom of speech and freedom of information recognizes that pluralistic ideal and grants people of all remote idiosyncrasies the right to impart or receive information as long as such action does not present a high risk of immediate and substantial harm. Freedom of speech does not judge on the relevance of speech.

      The popular defense of RTBF – that it does not apply to public figures or information of public significance – misses this point. Public interest is in constant flux. Suppression of seemingly insignificant data may suppress the possibility of public discourse because revelation of important public facts is often made possible by assembling a mosaic of facts that seem irrelevant to the majority of the people at given times. This is why RTBF is extremely problematic in many transitioning countries where full information is urgently needed to address impunities from colonial and dictatorial periods. Particularly in those countries, distinguishing between public and private figures is often impossible without the full availability of information.

      Finally, RTBF does not condemn the so-called “no longer relevant information” itself, but rather focuses on making that lawful information available online. In the future, this may mean that, those, especially the impoverished, who are limited to using censored search results will not have access to the information that the rich will be able to uncover by hiring people to conduct brute investigations. RTBF is therefore directly opposed to the Internet’s potential as the equalizer and liberator in terms of facilitating people’s access to information.

      We believe that the RTBF results from a misconception of the public realm in the digital age. There is a need for research to first understand the scope and dynamics of the public space after digitization. An increase in the amount and availability of information online affects our thinking about privacy, and it challenges our understanding of the public and the private. The RTBF as articulated by the ECJ, however, does not even attempt to do that, but rather tries to apply the norm regardless of whether it is public or private.

      For these reasons, we believe that RTBF jurisprudence should be withdrawn and should not be expanded in any way.

      Please sign here. https://docs.google.com/forms/d/e/1FAIpQLSftuxOmHMYdPVWQY3UOoZYnVd_eyWwUMi06nAh3LeVa7E-G4g/viewform?c=0&w=1

      Comment by KS Park on July 27, 2017

      Building networks in geographically remote areas is one of the most important challenges that we need to meet. Internet has thrived because the networks and the content on them were built by private actors voluntarily who try to meet the demands of the users, and because of the shared control among different stakeholders, the multi-stakeholder model is important. To further increase access in geographically remote areas, we must incentivize private actors into building networks, and the private actors who are most efficient in monetizing access are global portals and therefore they are most incentivized in building networks. That is why you see Facebook developing solar panels, Google developing Loony Project, etc. These platforms’ entry into network building create various competition issues, i.e., verticial integration. Also, we can easily think of these content providers building networks or activating networks just for access to their contents, the case on point, Free Basics in India. Through the multi-stakeholder model, we should discuss how and whether to embrace these initiatives.

      Comment by Aris on July 27, 2017

      Can capacity building be part of this section?

      Comment by Aris on July 27, 2017

      Same with the PWD accessibility – can this be included here?

      Comment by vashkar bhattacharjee on July 27, 2017

      a. Providing information intended for the general public to persons with disabilities in accessible formats and technologies appropriate to different kinds of disabilities in a timely manner and without additional cost;
      b. Accepting and facilitating the use of sign languages, augmentative and alternative communication, and all other accessible means, modes and for&mats of communication of their choice by persons with disabilities in official interactions;
      c. Urging private entities that provide services to the general public, including through the Internet, to provide information and services in accessible and usable formats for persons with disabilities;
      d. Encouraging the mass media, including providers of information through the Internet, to make their services accessible to persons with disabilities;
      e. Promote the design, development, production and distribution of accessible information and communications technologies and systems at an early stage, so that these technologies and systems become accessible at minimum cost.
      f. Promote other appropriate forms of assistance and support to persons with disabilities to ensure their access to information;
      g. Promote access for persons with disabilities to new information and communications technologies and systems, including the Internet;
      h. purchase of ICT software and hardware by government for public office, education institution and work place need to be usable with the help of assistive technology for example, all software to be usable with the help of screen reading software.
      i. . concept on Accessible ICT development must include promotion of “universal design” and “assistive technologies”. Government must address the crucial importance of “ICT accessibility standards/guidelines development”.

      Comment by Dollapak on July 28, 2017

      the name of the program is mislead

      the discussion is interesting but it does not touch the point about what is the hack

      actually, I understand about we will show about idea or prototype of “hacking” government or surveillance. but we just talk about platform for collect violent data.

      Comment by Maheeshwara Kirindigoda on August 4, 2017

      This was need to be discuss in a manner how we could use our best practices in the scenario.

      Comment by Maheeshwara Kirindigoda on August 4, 2017

      Duplication of roleplay within countries with problems related to their countries is better.

  • Asia Pacific Regional Internet Governance Forum 2020 Synthesis Document – Draft 1 (14 comments)

    • Comment by Jonathan Brewer on October 21, 2020

      “In the case of 5G, network slicing may likely fragment the Internet.”

      Network slicing is the concept of running multiple logical networks on a common radio access infrastructure. It’s main purpose is to allow 5G infrastructure to be shared between Internet access, industrial control functions, SCADA for utilities, telemetry for self-driving vehicles, IoT sensor networks, and other critical infrastructure applications that do not belong on Internet-connected networks. GSMA provides a complete definition here: https://www.gsma.com/futurenetworks/wp-content/uploads/2017/11/GSMA-An-Introduction-to-Network-Slicing.pdf

      There are few if any valid concerns about network slicing fragmenting the Internet.

      Comment by Jonathan Brewer on October 21, 2020

      “Universal Acceptance (UA) is a fundamental requirement for a truly multilingual and digitally inclusive Internet” – however this very website and feedback form does not accept my email address at the domain tō.nz as being valid.

      Comment by Pablo Hinojosa on October 22, 2020

      This is an improved version which I support.

      Comment by Pablo Hinojosa on October 22, 2020

      Perhaps move purpose of synthesis document BEFORE the Introduction?

      Comment by Pablo Hinojosa on October 22, 2020

      Not sure the right term is “transnational”. Question can be rephrased as: Does this needs to be regulated by International Law?

      Comment by Pablo Hinojosa on October 22, 2020

      A closing paragraph is needed, also to reflect how the Synthesis Document can help to connect APrIGF with the global IGF, also to include statistics of how many people registered and participated at the APrIGF and general statements about the success of the event and the vibrancy of the community.

      Comment by Gunela Astbrink on October 26, 2020

      Please add ‘disability’ after ‘age’ in the third sentence. There are over one billion people globally.

      Comment by Gunela Astbrink on October 26, 2020

      Please add ‘persons with disabilities’ in first sentence after ‘gender and religious minorities’.
      There is cyberviolence against women with disabilities.

      Comment by Gunela Astbrink on October 26, 2020

      Please add ‘disability’ in third sentence after ‘gender’.

      Comment by Anastasiya Kazakova on October 26, 2020

      It may be helpful for readers to provide links to the surveys that “are showing a large decline in trust in the Internet”.

      Comment by Anastasiya Kazakova on October 26, 2020

      Another type of fragmentation to consider is an institutional fragmentation, i.e. fragmentation approaches to the regulation of cyberspace and Internet space.

      Comment by Anastasiya Kazakova on October 26, 2020

      Are developing countries only should be given support? Many economically developed countries have not developed their legislation to ensure lawful access to encrypted materials, and therefore, a dialogue to assist both developing and developed countries seems important.

      Comment by Anastasiya Kazakova on October 26, 2020

      It would be helpful to clearly state that there are different types of attribution (political, legal, and technical), and each type of attribution has its own challenges and requires different approaches/discussions.

      Comment by Anastasiya Kazakova on October 26, 2020

      Technology is neither”the panacea” nor the primary reason for the crisis of trust. Technology, which should remain neutral by default, is not what causes many risks in cyberspace, but the malicious use of technology.

  • APrIGF 2016 Taipei Synthesis Document – Pre-meeting Draft 0 (13 comments)

    • Comment by Satish Babu on June 14, 2016

      I’d suggest the following additional theme:

      – Sustaining Diversity
      In the movement towards including the Next Billion, it is important to provide for explicit measures to support and conserve existing diversity: linguistic (spoken languages & scripts); cultural; ethnic; and even biological/ecological)

      Following topics are also suggested

      – Investigation and prosecution

      There are mutual legal assistance agreements ( MLATs) signed between countries which helps to investigate and prosecute cyber crimes. But the process is very cumbersome. What is the possibility of having a cyber crime convention at least for the AP region, with less complex procedures?

      – Respect to cultural differences

      Privacy levels may depend on cultures. In the AP region culture is different than EU and USA. It is very difficult to deal with privacy violations of AP citizens, with the privacy policies of EU and USA based organizations.

      Comment by Koichiro Komiyama on July 6, 2016

      Cyber Connectivity sounds not clear to me. Also “Merghing Physical Spcae with …” and “bring next billion online” well addressed the importance of connectivity.
      What is new in this paragraph?

      Comment by Koichiro Komiyama on July 6, 2016

      [Q] Is this about what we used to call “universal access”?

      Comment by Koichiro Komiyama on July 6, 2016

      would it be fair to mention a certain bill of certain country in this document?

      Comment by Thilina Pathirana on July 6, 2016

      How about adding connectivity to rural users also to this section

      Comment by Anupam Agrawal on July 6, 2016

      Include the discussion of Armed conflict in case of a Cyber attack.

      Comment by Anupam Agrawal on July 6, 2016

      The design challenges of IOT and what policy considerations needs to be adopted.

      Comment by Anupam Agrawal on July 6, 2016

      New Security Considerations when IOT is merging with Industrial Control systems. Is it creating challenges for Critical National Infrastructure?

      Comment by Sheen Handoo on July 7, 2016

      Add text in support of encryption – encourage setting encryption standards as per global standards- without any maximum limit.

      Comment by Sheen Handoo on July 7, 2016

      Where referring to private sectors to come up with connectivity initiatives/solution, add text “support innovative business models”.

      Comment by Sheen Handoo on July 7, 2016

      Can there be another section specifically on internet blocks? Suggested text: “Shutdown, throttling, and other disruptions of the internet or of a subset of websites, apps, and services are deeply concerning as they have tremendous, negative economic and social consequences. Governments must adhere to their international human rights commitments and ensure that any restrictions on freedom of expression—including disruptions of internet service—meet the thresholds of legality, necessity, and proportionality set out in Article 19 of the International Covenant on Civil and Political Rights”.

      Comment by Maureen Hilyard on July 20, 2016

      Universal access is different.. but I would include it as part of this universality section. I think UA is definitely important.

  • Open input period for the 2018 APrIGF Port Vila Synthesis Document (8 comments)

    • Comment by N.Pravina on July 26, 2018

      How are we going to face the future challenges in cyber threats?

      Comment by N.Pravina on July 26, 2018

      when talking about other elements the resources and support that helps to empower access needs to be considered

      Comment by Dr.Sudha Bhuvaneswari.N on July 26, 2018

      Developing programmes for digital literacy in all languages at the same time it becomes necessary to take steps and measures on involving people actively to participate in such initiatives. For Example: Inclusion of Women into Internet Governance from the Asia Pacific Region exclusively from India demands more compromises with family members, in such situations what steps can we initiate to make the digital literacy to reach the whole mass.

      Comment by Amrita Choudhury on July 31, 2018

      Apart from promoting digital literacy there is a need to improve gender rights online too. To improve inclusion especially of women and protect their rights online, a study called “Views & Perspectives on Gender Rights Online, For the Global South” (http://www.ccaoi.in/UI/links/fwresearch/Report of Study on the Views and Perspectives on Gender Rights Online for the Global South Final.pdf), suggests implementation of better and effective policies; encouraging ICT skills and Science Technology Engineering and Math (STEM) studies amongst women and encouraging digital literacy; policy reforms for ensuring gender inclusive access to the internet; building trust online, including better legislation and enforcement of laws against online harassment; economic incentives to encourage diversity in the workforce; encouraging more engagement amongst women networks and promoting content in local language.

      Comment by B.KILIC on August 4, 2018

      First sentence sounds a bit stretch, digital is one of many enabler for the global economy. We should not forget other enablers such as infrastructure, education, science and technology.

      I think we should distinguish between ” free flow of information” and “free flow of data”. So the sentence can be rephrased as: how do we ensure a successful economy with trust, free flow of data, and appropriate domestic and global rules well balancing privacy, security and other regulatory concerns including financial and tax regulations.

      Comment by B.KILIC on August 4, 2018

      First sentence sounds a bit stretch, digital is one of many enabler for the global economy. We should not forget other enablers such as infrastructure, education, science and technology.

      I think we should distinguish between ” free flow of information” and “free flow of data”. So the sentence can be rephrased as: how do we ensure a successful economy with trust, free flow of data, and appropriate domestic and global rules well balancing privacy, security and other regulatory concerns including financial and tax regulations.

      Comment by B.KILIC on August 4, 2018

      Sorry this should paragraph 10 not 6. Please ignore this comment

      Comment by Smith on August 4, 2018

      Given the current ecommerce proposals being negotiated at the World Trade Organization (WTO), it makes more sense to replace ‘How can they be harmoniously combined with the existing global trade regimes’? with ‘What are the implications of the international trade rules currently being negotiated in the name of ‘ecommerce’ on the ability to regulate these technologies and development more broadly?’

  • APrIGF Macao 2015 Synthesis Document (8 comments)

    • Comment by Izumi Aizu on July 1, 2015

      How about substituting the phrase:

      “The Outcomes Document aims to document” with “The Outcomes Document aims to identify” to avoid duplication of using “document”.

       

      Comment by Hong Xue on July 2, 2015

      The background part looks good,especially the 3rd paragraph.

      What’s not clear to me is the purpose of this OD? What are we going to do with it? Who will be the audience or recipients? Are we going to “released” or “submit” OD to the other international arenas? How would be the relevance of OD to the future rIGF?

      The 3rd paragraph shows the unbinding nature of the OD but it did not clarify the purpose.

      Comment by Jac on July 7, 2015

      As we are renaming the document from “Outcomes document” to something else. Would be good to keep it consistent. How about “APrIGF Synthesis Document”? More accurate?

      Comment by Jac sm Kee on July 7, 2015

      Again, an update of the process would be needed:

      – 1st rough draft based on workshop submissions

      – 2nd iteration from comments through the online platform & public dissemination of the link etc (from dates)

      – 3rd iteration from comments (platform) & (dates)

      – Final version through rough consensus

      Something like this? Or based on the secretariat’s excellent summation so far already in the mailing list

      Comment by Jac sm Kee on July 7, 2015

      from participants at the APrIGF (as well as the broader APrIGF community through remote participation and dissemination at the mailing list)

      Comment by Jac sm Kee on July 7, 2015

      instead of project, why not “express voices, views and thoughts…”

      Comment by nica on July 7, 2015

      +1 jac

      or APrIGF Multistakeholder Synthesis (without the word “Document”)

      Comment by Winston Roberts on July 8, 2015

      I agree that the APrIGF conference needs an outcomes document, to demonstrate that so much effort has been productive. This is important for the organisations which sponsor workshops and for the agencies which fund the participation of regional experts.

       

Source: https://comment.rigf.asia/all-comments/