"This white paper seeks to provide an overview of the core thematic issues around digital rights and digital safety across the world. The content builds off a global mapping exercise of organisations and knowledge, predominantly focused on Africa and the Middle East, Latin America, Asia-Pacific, Eas...tern Europe and Central Asia. This document is intended to serve as a primer for practitioners and newcomers into the field of digital rights to gain a broad understanding of key issues within this ecosystem." (Introduction, p.5)
more
"Data governance is an integral aspect of digital authoritarianism because it incorporates any type of control, authority, and manipulation of data […]. Within the context of digital authoritarianism, data governance may incorporate both states and non-state actors that collaborate with states to ...facilitate their control over the data sources. This section analyses data governance in the context of its relationship to digital authoritarianism. Among the various facets of the topic, it concentrates mainly on surveillance, privacy, and digital methods of transnational repression that the states use to intimidate and silence their anti-regime activists abroad." (Data Governance, p.3)
more
" ... many newsroom reactions to gender-based online violence appear to have been non-existent, ad hoc, or inadequate. At times, they have even damaged the women journalists targeted. Large global news organisations sometimes identified as “best practice” exemplars by expert responders interview...ed for this study were nevertheless criticised by the journalists interviewed in the course of the research with regard to their responses to the crisis. They were accused of failing to fully understand the gendered nature of the attacks, appreciate the serious psychological impacts, adapt to emerging and increasingly sophisticated threats, and provide effective and holistic support that recognises intersectional risks and hybrid security threats. A number of outlets were also criticised for insensitive and counterproductive victim-blaming and/or speech-restrictive behaviours. Many of the journalists interviewed for this study expressed exasperation and a sense of abandonment by their employers when they were in the midst of an online violence storm, even when there were credible threats of offline violence associated with these attacks. This was linked to gender-unaware policies, or those that had stagnated as a result of a failure to take account of increasing online toxicity and hostility towards journalists - especially on social media platforms - in the context of escalating disinformation, along with political polarisation and populism." (p.4)
more
"The right to privacy has come under increased attack in many African countries, with the proliferation of digital technologies being matched by state measures that negate this right. In the past few years, many countries across the continent have enacted various laws that permit surveillance, manda...te telecommunication intermediaries to facilitate the interception of communication, stipulate the mandatory collection of biometric data, limit the use of encryption, require the localisation of personal data, and grant law enforcement agents broad search and seizure powers. This report therefore maps and analyses the laws and policies that impact on privacy, notably those that regulate surveillance, limitations on encryption, data localisation, and biometric databases. This analysis could inform remedial and mitigatory steps to protect the right to privacy, which may include strategic litigation and advocacy for legislative and policy reforms. Moreover, the results of this analysis are also crucial for monitoring developments and trends on privacy regulation and practice in the region." (Introduction, p.5-6)
more
"Die in diesem Open-Access-Buch zusammengeführten interdisziplinären Untersuchungen des „Forums Privatheit“ gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal ändern. Nahezu jede Lebensregung... hinterlässt Datenspuren, ermöglicht vielfältige und intensive Datensammlungen über Menschen, unterstützt Verhaltensbeeinflussungen und verstärkt Ungleichgewichte in der Informationsmacht. Es analysiert die Auswirkungen der Digitalisierung auf den rechtlichen und politischen Schutz der Grundrechte, die ökonomischen Beziehungen, die gesellschaftliche Integration und die individuelle Entfaltung. Das Buch zeigt aber auch auf, wie Digitalisierung und ihre gesellschaftlichen Rahmenbedingungen technisch, sozial, ökonomisch und rechtlich gestaltet werden können, um Privatheit und Selbstbestimmung zu schützen." (Verlag)
more
"Surveillance of journalists has become a very topical and controversial issue that now requires attention at a number of levels – the level of the state, CSOs, and journalism organisations themselves. The systematic and arbitrary harvesting of journalists’ information, tracking and targeting of... journalists is on the increase especially in the SADC region where some regimes seek to retain control of the media and stifle divergent views and suffocate opponents. In countries such as Zambia, Zimbabwe, Namibia and Malawi, there is deep-rooted fear that enacted cyber laws are already being used for surveillance purposes. For instance, South Africa uses the RICA Act to regulate the interception of communication and Zimbabwe has the Interception of Communications Act while Zambia deploys the Electronic Communications and Transactions Act of 2009. Thus, anecdotal evidence in Southern Africa shows that governments in the region are increasingly resorting to digital tools for surveillance and this is a serious cause for concern. At least three Southern African countries; Botswana, Zambia, and Zimbabwe have acquired sophisticated tools developed by an Israeli company, Circles, which they use to monitor the behavior of their citizens online. This calls for journalists, their organisations and other media- support institutions to act in ways that protect journalists from surveillance, be it by state or non-state agency. There is need, therefore, to come up with a toolkit of strategies that journalists in Southern Africa can make use of in quotidian news gathering and reporting practices." (Introduction)
more
"This report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution... of power (e.g. influence over policy decisions and corporate governance), access to resources (e.g. equitable access to education, wages or privacy protections), and construction of gender norms and roles (e.g. assumptions regarding victims and perpetrators of cyber-facilitated violence)." (Executive summary)
more
"This Primer is intended to increase awareness and provide a basic understanding of cyber threats, cybersecurity, and cyber resilience as they relate to development programming for USAID staff. It does not provide specific cybersecurity programming or operational recommendations or address technical... cybersecurity needs of USAID or its implementing partners. This Primer is a resource on cybersecurity for the broader development community and spotlights how USAID’s approach to cybersecurity in development is evolving." (p.7)
more
"The Child Online Safety Index (COSI) measures the level of online safety for children across the world based on six pillars: Cyber Risks, Disciplined Digital Use, Digital Competency, Guidance & Education, Social Infrastructure, and Connectivity. Each of these pillars are formed by 2-8 focused areas..., allowing for a comprehensive assessment of online safety for children. A COSI score was calculated for each country ranging from 0 (the worst online safety for children) to 100 (the best online safety for children)." (https://www.dqinstitute.org)
more
"There is no “one size fits all” approach to digital contact tracing technologies (DCTT). Technology design should not be static, but it should be capable of evolving depending upon local conditions, new evidence, and changing preferences and priorities. Technology companies alone should not con...trol the terms, conditions, or capabilities of DCTT, nor should they presume to know what is acceptable to members of the public. DCTT should be designed to have a base set of features that protect privacy, with layers of additional capabilities that users may choose to activate. An initial default should be that user location data are not shared, but users should be provided with easy mechanisms and prompts to allow for opting-in to this capability, with encouragement to the public if it is shown to be critical to achieving public health goals. Data collected through DCTT should be made available to public health professionals and to researchers in de-identified form to support population-level epidemiologic analyses." (Summary, p.2)
more
"The Operational Handbook for Contact Centres for online safety of children contains action guidelines as well as knowledge, procedures and rules for successful work through the helpline for providing quality assistance and support to children, youth, families, professionals, teachers and others wor...king with children and young people on the safer and secure use of the Internet and protection of children and young people when using modern technologies, as well as reporting illegal or harmful content on the Internet (hotline). The document also contains examples of good international and regional practices on the functioning of similar centres (Safer Internet Centres). The purpose of the Operational Handbook is to analyse the work of the Safer Internet Centres and offer guidance to the National Contact Centre for online safety of children in the Republic of Serbia on how to improve its efficiency and enhance its impact. This analysis also included a wider context in which the children helplines and reporting lines function, mapped out some of the new risks that children and young people might encounter in the digital environment, as well as the necessary support and resources needed for effective response and implications for the operational efficiency." (p.6)
more
"It is our sincerest hope that this guide will have provided you with a greater understanding about online child sexual exploitation. We hope it has also given you a clearer realisation of the important role that you and your faith community can play in helping to prevent and end this crime. Togethe...r, we can combine the spiritual maturity, influence, expertise and authority you carry as leaders in your community, with the technical experience gained from policymakers, law enforcement and child-focused experts to ensure this violence stops." (Conclusion, p.36)
more
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv...a de los Derechos de la niñez y adolescencia nos presenta la expansión del Internet y su creciente presencia en la vida cotidiana de las nuevas generaciones. No se trata de diabolizar los avances tecnológicos ni los cambios en las comunicaciones humanas, producto de dichos avances, sino de reconocer las oportunidades y las amenazas que representan el uso masivo de las mismas. El acceso a Internet es para niños, niñas y adolescentes una herramienta de enorme valor para la obtención de información, comunicación y expresión de sus puntos de vista, así como el conocimiento de nuevas y variadas realidades. Para muchos el acceso a Internet, en la fase histórica en que vivimos, tiene un significado similar a lo que fue la incorporación de la lectoescritura a principios del siglo pasado: una herramienta imprescindible de integración, comunicación y acceso a los bienes de la cultura. Desde esta mirada, el no acceso constituye una brecha de exclusión que se entrelaza y potencializa con otras variables asociadas a la producción social de la vulnerabilidad. Por otra parte, no podemos desconocer que las potencialidades del internet coexisten con riesgos y amenazas. Para los niños, niñas y adolescentes navegar en Internet tiene riesgos similares o tal vez superiores a los que supone el transitar cualquier espacio público sin el acompañamiento responsable de un adulto [...]Muchas experiencias dan cuenta de continuidades entre violencias virtuales y físicas. Solo a modo de ejemplo, podemos citar el bullying que es extendido a través del cyberbullying o la utilización de Internet para reclutar posibles víctimas de trata o de explotación sexual. El dualismo del Internet nos enfrenta al desafío de articular acceso e inclusión con protección. Acceso seguro con realización de derechos y es aquí donde es necesario reafirmar algunos principios y conceptos presentes en la Convención de los Derechos del niño. En primer lugar, el principio de corresponsabilidad, los niveles de protección de los niños, niñas y adolescentes requieren una corresponsabilidad entre familia, comunidad y Estado." (Palabras introductorias, p.7)
more
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor...ld about the correct balance between citizen privacy and national security in the context of the internet. In the face of this shifting landscape it is critical for human rights activists to understand how internet surveillance works, and what privacy and anonymity really mean in a digital world." (Back cover)
more
"As part of its ongoing commitment to fighting online child sexual abuse content and, in particular, to helping its members realise the objectives of the Mobile Alliance Against Child Sexual Abuse Content, the GSMA has worked with INHOPE, Save the Children, ECPAT, IWF, Net Safe Latvia, Meldpunt, ICM...EC and Interpol to collate information which will help organisations build fully-functioning hotlines in countries where no such facility is currently in place. This information is presented in the document below." (p.3)
more
"Internet censorship poses a large and growing challenge to online freedom of expression around the world. Censorship circumvention tools are critical to bypass restrictions on the internet and thereby to protect free expression online. Circumvention tools are primarily designed to bypass internet f...iltering. Therefore, the core principle behind these technologies is to find alternative paths for data packets. These alternative paths use one or more collaborative servers in order to bypass the network of blocking mechanisms. This document provides a comparison among different circumvention tools, both in terms of their technical merits, as well as how users of these tools describe their experience with them. The countries included in this report are Azerbaijan, Burma, China and Iran." (Executive summary, p.9)
more
"While the safety of children and young people in digital spaces has become an important issue of qualitative as well as quantitative research in the developed world and has led to a significant body of knowledge, the research efforts in the developing nations, with few exceptions, are still relativ...ely early stage. A brief analysis of digitally relevant developing world characteristics suggests that various contextual factors such as technological, economic, market, educational, and cultural parameters need to be taken into account at the levels of risk analysis and risk evaluation and with regard to response strategies." (Summary/conclusions, p.30)
more