Regulation by states, or self-regulation by companies themselves? There is almost no field of Internet governance that does not involve this debate. The well-known example in the telecom market is, of course, service costs: business opts for an open...
 20 Jan 2012

Blog post
DataGovAI Summit & Awards is a series of conference plenary & tracks with keynote, panel discussions, workshops, awards presentation, meet-ups, and networking sessions. Each day and session will focus on a different topic. The conference will ha...
 6 Nov 2019

Event
Low and middle income countries are rolling out sophisticated digital identification systems. Will they be a panacea for social and economic inclusion, or are they another way to control people’s personal information? For generations, peopl...
 21 Jan 2019

Blog post
How can you participate in this dialogue? Switzerland invites states, the private sector, the tech community, civil society, academia, cybersecurity experts and other interested parties to participate in this dialogue either by joining online disc...
 1 Oct 2018

Event
An interactive online capacity development programme Internet governance (IG) has become one of the most important policy areas of our time. Topics like privacy protection, human rights online, and cybersecurity are increasingly in the focus of gl...

Course
The MyData conference gathers an international crowd from business, academia, civil society, and governments to take a human-centred approach to personal data and discuss its global management. It is organised around 12 thematic tracks: &...
 30 Aug 2017

Event
The European Union’s General Data Protection Regulation will take effect one year from now - on 25 May 2018. In this post, two central questions are tackled: Who will be affected by the new rules, and what does the regulation apply to? Simply put,...
 30 May 2017

Blog post
The critical Internet infrastructure is no longer a dry tech-geek topic. It has drawn attention from the wider Internet community through discussions on Internet names and numbers (domain names such as .amazon, .wine), the Internet of Things (sel...
Start date:   20 Jul 2020
Register
Course
Internet governance (IG) may be more important to you than you realise. Have you been reading and worrying about cybersecurity threats? Does online surveillance concern you and your colleagues? These are important IG issues. Learning more about IG...

Course
E-diplomacy walks the line between continuity and change in our digital era. Diplomatic activities are increasingly supported by Internet and digital tools, and other information and communications technologies (ICTs). Diplomats rely on the Intern...

Course
Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online child abuse, stolen credit cards and virtual identities, malware and viruses, botnets and denial-of-service attacks on corporate or government...

Course
[Update] The webinar digest and recording are available here. The complaint of a Spanish citizen in 2010 led to the case being referred to the European Court of Justice, which recently decided that Google was required to comply with...
 30 Sep 2014

Event
‘It is about digital, stupid’ is the main message from Jean-Claude Junker, the new president of the European Commission. In the Policy Guidelines for the EC delivered at the European Parliament (15 July 2014), Junker outlined the EU&rsquo...
 27 Aug 2014

Blog post
In what had the nation reeling and rolling its collective eyes to heaven as it let out a cry of disbelief last month, an Irish homeowner who set up a website to show his CCTV footage of bad boys caught in the act of burglarising his home was told by ...
 26 Mar 2014

Blog post
Diplo is pleased to announce a new call for applications for the following courses, which form part of the Advanced Phase of the Internet Governance Capacity Building Programme: Cybersecurity E-participation History of Internet ...
 14 May 2012

Blog post

Description:

This research focuses on data protection regulations in Paraguay in order to analyse whether it contains provisions regulating the computerised processing of personal data and transborder data flows.

Source: 
Internet governance research paper
 Natalia Enciso Benítez , 2011
 
Printer Friendly and PDF

Description:

We are witnessing an extreme proliferation of the social networks, which can be seen in two ways: an expansion of social network websites, and an increase in the number of people who are starting to use them. The author describes the risks associated with social networks, mostly associated with user's privacy, and the responsibility for those risks. This paper also analyses whether the rules proscribed so that social network providers can distance themselves from possible abuses are really designed to help the users be safe.

Source: 
Internet governance research paper
 Maša Kojić , 2010
 
Printer Friendly and PDF
One of the collateral consequences of the recent WikiLeaks situation will be its effects on Internet governance and policy. The foundations of Internet politics have been seriously shaken. The fissures that did not appear during previous stress tests...
 19 Jan 2011

Blog post
Subscribe to DataProtection