{"id":368,"date":"2020-10-30T15:34:29","date_gmt":"2020-10-30T10:04:29","guid":{"rendered":"https:\/\/projects.itforchange.net\/digital-new-deal\/?p=368"},"modified":"2020-12-22T11:47:33","modified_gmt":"2020-12-22T06:17:33","slug":"a-new-convention-for-data-and-cyberspace","status":"publish","type":"post","link":"https:\/\/projects.itforchange.net\/digital-new-deal\/2020\/10\/30\/a-new-convention-for-data-and-cyberspace\/","title":{"rendered":"A New Convention for Data and Cyberspace"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"368\" class=\"elementor elementor-368\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7d32700 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d32700\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7be362c\" data-id=\"7be362c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd2bb67 elementor-nav-menu__align-center elementor-nav-menu__text-align-center elementor-nav-menu--dropdown-tablet elementor-nav-menu--toggle elementor-nav-menu--burger elementor-widget elementor-widget-global elementor-global-976 elementor-widget-nav-menu\" data-id=\"dd2bb67\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;horizontal&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;fas fa-caret-down&quot;,&quot;library&quot;:&quot;fa-solid&quot;},&quot;toggle&quot;:&quot;burger&quot;}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t<nav migration_allowed=\"1\" migrated=\"0\" role=\"navigation\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-horizontal e--pointer-double-line e--animation-slide\"><ul id=\"menu-1-dd2bb67\" class=\"elementor-nav-menu\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-home menu-item-1048\"><a href=\"https:\/\/projects.itforchange.net\/digital-new-deal\/\" class=\"elementor-item\">Home | Essays<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1047\"><a href=\"https:\/\/projects.itforchange.net\/digital-new-deal\/interviews\/\" class=\"elementor-item\">Interviews<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-post menu-item-1714\"><a href=\"https:\/\/projects.itforchange.net\/digital-new-deal\/2021\/01\/25\/foreword-a-digital-new-deal-as-if-people-and-planet-matter\/\" class=\"elementor-item\">Foreword<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1716\"><a href=\"https:\/\/projects.itforchange.net\/digital-new-deal\/pdf\/\" class=\"elementor-item\">PDF Version<\/a><\/li>\n<\/ul><\/nav>\n\t\t\t\t\t<div class=\"elementor-menu-toggle\" role=\"button\" tabindex=\"0\" aria-label=\"Menu Toggle\" aria-expanded=\"false\">\n\t\t\t<i aria-hidden=\"true\" role=\"presentation\" class=\"eicon-menu-bar\"><\/i>\t\t\t<span class=\"elementor-screen-only\">Menu<\/span>\n\t\t<\/div>\n\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" role=\"navigation\" aria-hidden=\"true\"><ul id=\"menu-2-dd2bb67\" class=\"elementor-nav-menu\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-home menu-item-1048\"><a href=\"https:\/\/projects.itforchange.net\/digital-new-deal\/\" class=\"elementor-item\" tabindex=\"-1\">Home | Essays<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1047\"><a href=\"https:\/\/projects.itforchange.net\/digital-new-deal\/interviews\/\" class=\"elementor-item\" tabindex=\"-1\">Interviews<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-post menu-item-1714\"><a href=\"https:\/\/projects.itforchange.net\/digital-new-deal\/2021\/01\/25\/foreword-a-digital-new-deal-as-if-people-and-planet-matter\/\" class=\"elementor-item\" tabindex=\"-1\">Foreword<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1716\"><a href=\"https:\/\/projects.itforchange.net\/digital-new-deal\/pdf\/\" class=\"elementor-item\" tabindex=\"-1\">PDF Version<\/a><\/li>\n<\/ul><\/nav>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98c7e8f elementor-widget elementor-widget-spacer\" data-id=\"98c7e8f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cca8092 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cca8092\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc54190\" data-id=\"dc54190\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a32ab33 elementor-widget elementor-widget-text-editor\" data-id=\"a32ab33\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"text-align: center;\"><strong>A New Convention for Data and Cyberspace<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e67c0e elementor-widget elementor-widget-text-editor\" data-id=\"1e67c0e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"text-align: center;\">Richard Hill<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d796020 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d796020\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-d9d4d98\" data-id=\"d9d4d98\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e5f7ec4\" data-id=\"e5f7ec4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5eff539 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5eff539\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>This essay argues that the time has come for the international community to negotiate and agree to a new treaty \u2013 a Convention for Data and Cyberspace \u2013 which would contain explicit principles for extending well-established offline legal frameworks and principles to the online world, particularly with respect to certain key domains. There would appear to be wide support for such a treaty, given that many countries have come together, in the context of trade negotiations, to constitute treaty provisions covering specific areas. However, the essay argues that trade negotiations are an inherently inappropriate forum to develop such provisions, given their secretive, undemocratic nature and their susceptibility to lobbying by large private companies. Deliberations on such a new treaty need not be a prolonged process, since the goal is merely to transpose to the online world principles that are already well accepted offline. There is a regular treaty-making mechanism, the ITU Plenipotentiary Conference, that takes place every four years. This forum could conveniently be used for the process of negotiating the kind of treaty being proposed here.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbb7c62 gallery-spacing-custom elementor-hidden-tablet elementor-hidden-phone elementor-invisible elementor-widget elementor-widget-image-gallery\" data-id=\"bbb7c62\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-gallery.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-gallery\">\n\t\t\t<div id='gallery-1' class='gallery galleryid-368 gallery-columns-3 gallery-size-full'><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon portrait'>\n\t\t\t\t<img width=\"1414\" height=\"2000\" src=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/5.png\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/5.png 1414w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/5-212x300.png 212w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/5-724x1024.png 724w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/5-768x1086.png 768w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/5-1086x1536.png 1086w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/5-17x24.png 17w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/5-25x36.png 25w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/5-34x48.png 34w\" sizes=\"100vw\" \/>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon portrait'>\n\t\t\t\t<img width=\"1810\" height=\"2560\" src=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" aria-describedby=\"gallery-1-414\" srcset=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-scaled.jpg 1810w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-212x300.jpg 212w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-724x1024.jpg 724w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-768x1086.jpg 768w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-1086x1536.jpg 1086w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-1448x2048.jpg 1448w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-17x24.jpg 17w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-25x36.jpg 25w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/Richard-Hill-without-Data-Node-Undershadow-34x48.jpg 34w\" sizes=\"100vw\" \/>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='gallery-1-414'>\n\t\t\t\tIllustration by Kevin Ilango\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon portrait'>\n\t\t\t\t<img width=\"1414\" height=\"2000\" src=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/6.png\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/6.png 1414w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/6-212x300.png 212w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/6-724x1024.png 724w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/6-768x1086.png 768w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/6-1086x1536.png 1086w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/6-17x24.png 17w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/6-25x36.png 25w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/6-34x48.png 34w\" sizes=\"100vw\" \/>\n\t\t\t<\/div><\/figure>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1f20dc2\" data-id=\"1f20dc2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f4f11c4 elementor-hidden-desktop elementor-widget elementor-widget-image\" data-id=\"f4f11c4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img width=\"525\" height=\"743\" src=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-724x1024.jpg\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-724x1024.jpg 724w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-212x300.jpg 212w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-768x1086.jpg 768w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-1086x1536.jpg 1086w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-1448x2048.jpg 1448w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-17x24.jpg 17w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-25x36.jpg 25w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-34x48.jpg 34w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/A-New-Convention-scaled.jpg 1810w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Illustration by Kevin Ilango<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5c70e63 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5c70e63\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-9e19b1e\" data-id=\"9e19b1e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-4ff61d1\" data-id=\"4ff61d1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2197509 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2197509\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"text-align: left;\"><span lang=\"en-US\"><b>1. Introduction<\/b><\/span><b><\/b><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74748ff elementor-widget elementor-widget-text-editor\" data-id=\"74748ff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><!-- wp:paragraph {\"align\":\"center\"} --><\/p>\n<p>Just as the proliferation of steam power and mechanization inaugurated the industrial age three centuries ago, the growing centrality of data and associated technologies are poised to dramatically revolutionize the nature of social and economic life today. As in the early years of industrialization, we once again find ourselves in the midst of a frenzied race to capitalize on these new technologies, and the frameworks that will organize and control them. The issue of international governance is thus of paramount importance. A<span lang=\"en-US\">s <\/span><span lang=\"en-US\">Roger Brownsword <\/span><span lang=\"en-US\">puts <\/span><span lang=\"en-US\">it<\/span><span lang=\"en-US\">:<\/span><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-baf01fb elementor-widget elementor-widget-text-editor\" data-id=\"baf01fb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>\u201c\u2026 what happened to us over the last 20 years is that, both publicly and privately, we have become increasingly reliant on information technologies (creating new kinds of vulnerability, both collective and personal), we have migrated many routine activities to on-line<!-- Let this be as is since we are quoting here --> environments in ways that are deeply disruptive (we live for many hours each day in our on-line worlds), and we have begun to appreciate that the technological management of our activities has major regulatory implications. If we want to retain a degree of control over our futures, then we need to exert some influence over the spheres of regulatory significance \u2013 which is to say, we need to work on creating the right kind of regulatory environment not only for information technologies but also for a raft of other technologies that are enabled by information technology and that are converging to shape our futures.\u201d<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b1d150 elementor-widget elementor-widget-text-editor\" data-id=\"5b1d150\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>While numerous efforts have been made to achieve such a regulatory environment in the national context, the nature of the internet and information technology, as well as the economic activities built around them, require more broad-based interventions. This, unfortunately, has been made difficult by the vested interests of hegemonic powers, as well as the contested terrain of international law. Indeed, as I have <a href=\"http:\/\/www.apig.ch\/Chatam%20IG%20formatted%20final.pdf\">noted before<\/a><a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-1\" href=\"#article-footnote-368-1\">1<\/a>, the current order of global governance is arguably similar to that of feudal Europe, where multiple arrangements of decision-making including the Church, cities ruled by merchant-citizens, kingdoms, empires, and guilds co-existed with little agreement on who held charge over a given territory or subject.<\/p>\n<p>Within this tangled system, internet governance has evolved under the rubric of what is called \u2018the multistakeholder model\u2019. Couched in a discourse that promotes egalitarian values and greater participation, <a href=\"https:\/\/www.tni.org\/files\/download\/03_tni_state-of-power-2015_the_true_stakes_of_internet_governance-1.pdf\">this model<\/a><a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-2\" href=\"#article-footnote-368-2\">2<\/a> has, in reality, been employed as a means to circumscribe the power of national governments (and intergovernmental organizations) vis-\u00e0-vis private transnational corporations. It has fostered not only a strikingly undemocratic regime, but also one that has been dominated by the geopolitical and economic interests of the United States. Be it for the vast unilateral surveillance apparatus that it has built, or the added advantage of its Silicon Valley behemoths, the US has continually worked to ensure that the governance of internet-based technologies remains firmly in its control even as it has postured towards allowing others \u2013 but not other governments \u2013 to take charge. Furthermore, recent developments in international negotiations point towards accelerated efforts to have large parts of the international community \u2018locked in\u2019 to agreements that mandate a liberalized regime involving little regulatory oversight and free flow of data across borders.<\/p>\n<p>This essay argues that the international community needs to not accede to these prevailing trends. There is ample scholarship produced over the years that explores alternative modes of internet governance which may be built upon to craft a democratic and thoughtful regulatory framework that addresses the needs and concerns of a wide variety of actors.<\/p>\n<p>Many in the international community are beginning to realize the importance of regulatory provisions for the digital sphere, and are more open to discussing them in the context of trade negotiations. While the recognition that such issues must be discussed in an intergovernmental forum is a positive sign, trade negotiations are an inherently inappropriate forum for such talks given their secretive, undemocratic nature and their susceptibility to lobbying by large private companies. Of course, there is likely to be inertia and pushback from the powers that be. But this is precisely because they have a lot to lose from any \u2018fragmentation\u2019 of the internet that shuts them out from access to large markets and sources of data. If the rest of the international community can come together, it is possible to force them into a reasonable agreement.<\/p>\n<p>The time has come to initiate negotiations for a new treaty \u2013 let us call it a Convention for Data and Cyberspace \u2013 as a first step towards ushering in a rational and equitable global internet governance regime. It will contain explicit principles for extending well-accepted offline law to the online world, with specific emphasis on key domains. Given the current international environment, there ought to be considerable support for such an initiative. Moreover, there is sufficient consensus on fundamental legal principles in offline law to have them form a foundation for ordering the governance of the digital world.<\/p>\n<p>The essay will begin by outlining fifteen key areas (sections 1.1 to 1.15) of well-established offline law that are undeveloped or not deployed at all in the digital realm, briefly touching upon the key points that need to be considered when developing and transposing these legal frameworks. Section 2 will argue for a new treaty and make concrete proposals for what it may look like. Finally, drawing on the pioneering work of the Just Net Coalition (a network of civil society organizations from around the world), sections 3.1 to 3.11 will set out the principles and provisions that could constitute this treaty and form the bedrock for a new epoch in internet governance.<\/p>\n<p>The fifteen key areas mentioned above are:<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa0293c elementor-widget elementor-widget-text-editor\" data-id=\"fa0293c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1. Democratic control over key online issues and decisions<\/p>\n<p>2. Infrastructure, such as access to the internet, email, and directories<\/p>\n<p>3. Freedom from unwarranted restrictions on freedom of speech (censorship is delegated to unaccountable private companies)<\/p>\n<p>4. Provision of reliable information and protection against defamation<\/p>\n<p>5. Privacy of communications<\/p>\n<p>6. Protection of personal data<\/p>\n<p>7. Security standards required to correct market failures due to information asymmetries and externalities<\/p>\n<p>8. Curbing abuse of dominant market power that arises because of network effects and economies of scale<\/p>\n<p>9. Refraining from producing, procuring, and\/or stockpiling dangerous technologies that will inevitably fall into the hands of ill-intentioned actors<\/p>\n<p>10. Equitable taxation of digital services<\/p>\n<p>11. Equitable distribution of the value-added of a newly-discovered natural resource: Data<\/p>\n<p>12. Equitable application of labor laws for online work<\/p>\n<p>13. Equitable application of consumer protection laws for online transactions<\/p>\n<p>14. Equitable distribution of the value of intellectual property rights<\/p>\n<p>15. Efficacy and safety of new technologies such as artificial intelligence<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f48abf0 elementor-widget elementor-widget-text-editor\" data-id=\"f48abf0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.1 Democratic control over key online issues and decisions<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b92f9a elementor-widget elementor-widget-text-editor\" data-id=\"2b92f9a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>The importance of democratic control over internet governance at the national level was recognized more than 20 years ago. As Zoe Baird notes:<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8a6c43 elementor-widget elementor-widget-text-editor\" data-id=\"b8a6c43\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>\u201cIn the early years of internet development, the prevailing view was that government should stay out of internet governance; market forces and self-regulation would suffice to create order and enforce standards of behavior. But this view has proven inadequate as the internet has become mainstream. A reliance on markets and self-policing has failed to address adequately the important interests of internet users such as privacy protection, security, and access to diverse content. And as the number of users has grown worldwide, so have calls for protection of these important public and consumer interests. It is time we accept this emerging reality and recognize the need for a significant role for government on key internet policy issues.\u201d<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42361e3 elementor-widget elementor-widget-text-editor\" data-id=\"42361e3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Similar considerations hold at the international level too. Indeed, <span lang=\"en-US\">as the UK Conservative Party put the matter in its 2017 Manifesto:<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c522e3 elementor-widget elementor-widget-text-editor\" data-id=\"7c522e3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>\u201cThe internet is a global network and it is only by concerted global action that we can make true progress.<\/p><p>We believe that the United Kingdom can lead the world in providing answers. So we will open discussions with the leading tech companies and other like-minded democracies about the global rules of the digital economy, to develop an international legal framework that we have for so long benefited from in other areas like banking and trade. We recognize the complexity of this task and that this will be the beginning of a process, but it is a task which we believe is necessary and which we intend to lead.<\/p><p>By doing these things \u2013 a digital charter, a framework for data ethics, and a new international agreement \u2013 we will put our great country at the head of this new revolution; we will choose how technology forms our future; and we will demonstrate, even in the face of unprecedented change, the good that government can do.\u201d<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7561f82 elementor-widget elementor-widget-text-editor\" data-id=\"7561f82\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>These statements implicitly recognize that current arrangements for the governance of the internet (the so-called multistakeholder model) are not adequate.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-3\" href=\"#article-footnote-368-3\">3<\/a> Unfortunately, there has been little progress to date with respect to establishing democratic control.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-4\" href=\"#article-footnote-368-4\">4<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95fff0f elementor-widget elementor-widget-text-editor\" data-id=\"95fff0f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.2 Infrastructure, such as access to the internet, email, and directories<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-972d2a6 elementor-widget elementor-widget-text-editor\" data-id=\"972d2a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>The state has always been implicated in the creation of large scale social and economic infrastructure. Many nations and empires, for instance, have built and maintained roads in order to facilitate communication networks such as the postal service. The early development of the internet was funded by governments as well.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-5\" href=\"#article-footnote-368-5\">5<\/a><\/p>\n<p>It is thus surprising that most governments do not mandate, by law or regulation, that affordable internet access, including email and basic directory services, be made available to all. Given that all governments ensure (or strive to ensure) affordable access to roads, water, electricity, sewage disposal, physical mail, etc., why shouldn\u2019t they ensure (or strive to ensure) affordable access to the internet and email? Indeed, a 2018 United Nations (UN) resolution implicitly urges states to ensure universal and affordable access.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-6\" href=\"#article-footnote-368-6\">6<\/a><\/p>\n<p>We can also question why states should implicitly, and without democratic control, delegate the rollout of affordable internet access infrastructure to private companies, particularly dominant social media platforms. No justification is forthcoming on this point. Yet, this is a worrisome and growing trend. Indeed, as one researcher puts it, \u201cThat corporations which are already gatekeepers of internet content are increasingly becoming caretakers of its backbone infrastructures raises questions of transparency, accountability, and undemocratic concentration of power.\u201d<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-7\" href=\"#article-footnote-368-7\">7<\/a>\u00a0<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd55b58 elementor-widget elementor-widget-text-editor\" data-id=\"cd55b58\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.3 Freedom from unwarranted restrictions on freedom of speech (censorship is delegated to unaccountable private companies)<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd91017 elementor-widget elementor-widget-text-editor\" data-id=\"bd91017\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>It is universally accepted that freedom of speech is a basic right, and that the right applies equally online.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-8\" href=\"#article-footnote-368-8\">8<\/a> There is also universal \u201cconcern about the spread of disinformation and propaganda on the internet, which can be designed and implemented so as to mislead, violate human rights and privacy, and incite violence, hatred, discrimination, or hostility\u201d.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-9\" href=\"#article-footnote-368-9\">9<\/a><\/p>\n<p>It has long been understood that, in a democratic society, restrictions on freedom of speech can only be imposed by law, and that government actions to restrict freedom of speech must be subject to review by impartial and independent tribunals.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-10\" href=\"#article-footnote-368-10\">10<\/a><\/p>\n<p>However, dominant social media platforms exercise de facto censorship based on unilaterally imposed \u201cstandards of conduct\u201d. Since platforms are private entities, they can publish \u2013 or not \u2013 what they see fit, without any judicial oversight (except for allegations of copyright infringement, defamation, or other illegal activities).<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-11\" href=\"#article-footnote-368-11\">11<\/a><\/p>\n<p>The current regime, particularly in the US, is perceived as giving too much power to social platforms to control what is or is not published, in effect restricting freedom of speech.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-12\" href=\"#article-footnote-368-12\">12<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc8ff0a elementor-widget elementor-widget-text-editor\" data-id=\"fc8ff0a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.4 Provision of reliable information and protection against defamation<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d56aa29 elementor-widget elementor-widget-text-editor\" data-id=\"d56aa29\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>As noted above, the current regime results in the publication of a great deal of misleading or downright incorrect information. Further, the limited liability of intermediaries makes it difficult to remove defamatory material: since the dominant platforms are based in the US, a \u201cvictim\u201d must file a lawsuit in the US in order to force a platform to remove such material. This is not consistent with offline law, according to which victims of defamation can, under certain conditions, file lawsuits in their own country.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85c4110 elementor-widget elementor-widget-text-editor\" data-id=\"85c4110\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.5 Privacy of communications<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-718d5bd elementor-widget elementor-widget-text-editor\" data-id=\"718d5bd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>It is universally accepted that online privacy is important and that technical solutions such as encryption can be a critical means to ensure such privacy.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-13\" href=\"#article-footnote-368-13\">13<\/a> There is also universal concern about \u201cthe arbitrary or unlawful collection, retention, processing, and use or disclosure of personal data on the internet\u201d.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-14\" href=\"#article-footnote-368-14\">14<\/a><\/p>\n<p>Existing international law is out of date and does not provide sufficient protection for the privacy of communications.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-15\" href=\"#article-footnote-368-15\">15<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0a5c9c elementor-widget elementor-widget-text-editor\" data-id=\"b0a5c9c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.6 Protection of personal data<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4126c6c elementor-widget elementor-widget-text-editor\" data-id=\"4126c6c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>It is universally recognized that unlawful or arbitrary collection of personal data is a highly intrusive act, which may violate the right to privacy.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-16\" href=\"#article-footnote-368-16\">16<\/a> There is also a universal concern about \u201cthe negative impact that surveillance and\/or interception of communications, including extraterritorial surveillance and\/or interception of communications, as well as the collection of personal data, in particular when carried out on a mass scale, may have on the exercise and enjoyment of human rights.\u201d<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-17\" href=\"#article-footnote-368-17\">17<\/a> That surveillance is carried out not just by governments (in the interest of national security) but also by private companies for commercial purposes,<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-18\" href=\"#article-footnote-368-18\">18<\/a> and such private surveillance may have negative national security implications.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-19\" href=\"#article-footnote-368-19\">19<\/a><\/p>\n<p>Members of the Council of Europe, and some other states, have addressed this issue by adopting the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. The European Union has gone further, adopting the General Data Protection Regulation (GDPR).<\/p>\n<p>But apart from these regional instruments, existing international law is out of date and does not provide sufficient protection for data privacy.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-20\" href=\"#article-footnote-368-20\">20<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a35126e elementor-widget elementor-widget-text-editor\" data-id=\"a35126e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.7 Security standards required to correct market failures due to information asymmetries and externalities<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cabecf elementor-widget elementor-widget-text-editor\" data-id=\"5cabecf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Security experts have long recognized that the lack of information and communication technology (ICT) security creates a negative externality.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-21\" href=\"#article-footnote-368-21\">21<\/a> For example, if an electronic commerce service is hacked and credit card information is disclosed, the users of the service will have to change their credit cards. This is a cost both for the end user and the credit card company. However, that cost is not visible to the e-commerce service. Consequently, the service does not have an incentive to invest in greater security measures. Furthermore, users do not have the information or the technical expertise required to determine whether any particular product or service has adequate security. That is, there is an asymmetry of information in which the supplier knows more than the customer.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-22\" href=\"#article-footnote-368-22\">22<\/a><\/p>\n<p>Such market failures can only be corrected by regulatory action, specifically, by imposing liability on suppliers of insecure devices and\/or mandating minimum security standards. This is the case for airplanes, automobiles, electrical appliances, pharmaceuticals, etc. Why should it not be the case for ICTs?<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-23\" href=\"#article-footnote-368-23\">23<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f875ce elementor-widget elementor-widget-text-editor\" data-id=\"4f875ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.8 Curbing abuse of dominant market power that arises because of network effects and economies of scale<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dccb02 elementor-widget elementor-widget-text-editor\" data-id=\"2dccb02\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>It is an observed fact that, for certain services (for example, internet searches, social networks, online book sales, online hotel reservations, etc.) one particular provider becomes dominant.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-24\" href=\"#article-footnote-368-24\">24<\/a> If the dominance is on account of better services, then market forces are at work and there is no need for regulatory intervention.<\/p>\n<p>However, if the dominance is due to economies of scale and network effects,<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-25\" href=\"#article-footnote-368-25\">25<\/a> then a situation akin to a natural monopoly might arise, leading to abuse of dominant market power.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-26\" href=\"#article-footnote-368-26\">26<\/a> For example, platforms might abusively use personal data to set high prices of goods for certain customers,<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-27\" href=\"#article-footnote-368-27\">27<\/a> a dominant national provider might impede the operation of an international competitor,<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-28\" href=\"#article-footnote-368-28\">28<\/a> a dominant company may excessively influence governments,<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-29\" href=\"#article-footnote-368-29\">29<\/a> or a dominant search engine might provide search results that favor certain retail sites.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-30\" href=\"#article-footnote-368-30\">30<\/a><\/p>\n<p>In such cases, regulatory intervention is certainly required. Yet, enforcement of national competition law is inadequate,<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-31\" href=\"#article-footnote-368-31\">31<\/a> particularly in the US,<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-32\" href=\"#article-footnote-368-32\">32<\/a> and there is no international competition law.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-33\" href=\"#article-footnote-368-33\">33<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ca93db elementor-widget elementor-widget-text-editor\" data-id=\"0ca93db\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.9 Refraining from producing, procuring, and\/or stockpiling dangerous technologies that will inevitably fall into the hands of ill-intentioned actors<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0d074a elementor-widget elementor-widget-text-editor\" data-id=\"f0d074a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Some recent, and very dangerous, cyberattacks were based on malware that was stockpiled by a government (for its own potential cyberwarfare), but fell into criminal hands.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-34\" href=\"#article-footnote-368-34\">34<\/a> This is not acceptable. As stated in 2017 by the Microsoft president:<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-35\" href=\"#article-footnote-368-35\">35<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afa8251 elementor-widget elementor-widget-text-editor\" data-id=\"afa8251\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>\u201cThe time has come to call on the world\u2019s governments to come together, affirm international cybersecurity norms that have emerged in recent years, adopt new and binding rules, and get to work implementing them.\u201d<\/p><p>\u201cSuch a [set of binding rules set forth in a] convention should commit governments to avoiding cyberattacks that target the private sector or critical infrastructure or the use of hacking to steal intellectual property. Similarly, it should require that governments assist private sector efforts to detect, contain, respond to, and recover from these events, and should mandate that governments report vulnerabilities to vendors rather than stockpile, sell, or exploit them.\u201d<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-811692e elementor-widget elementor-widget-text-editor\" data-id=\"811692e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.10 Equitable taxation of digital services<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa5ee5b elementor-widget elementor-widget-text-editor\" data-id=\"fa5ee5b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>At present, multinational companies in general, and ICT companies in particular, minimize (or even avoid) tax payments by structuring their operations to take advantage of the differences in tax laws in different countries.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-36\" href=\"#article-footnote-368-36\">36<\/a> As a result, many ICT companies pay little or no tax. Since most activities are moving online, this can result in a significant loss of revenue for states, impeding their ability to provide basic services to their citizens. Further, it is important to recall that large companies are the main beneficiaries of various forms of state aid: subsidies, state-funded research and development, initiatives to favor exports, infrastructure such as roads and electricity, etc.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c487751 elementor-widget elementor-widget-text-editor\" data-id=\"c487751\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.11 Equitable distribution of the value-added of a newly-discovered natural resource: data<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e31532 elementor-widget elementor-widget-text-editor\" data-id=\"8e31532\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>It is obvious that personal data has great value when collected on a mass scale and cross-referenced.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-37\" href=\"#article-footnote-368-37\">37<\/a> Indeed, the monetization of personal data drives both internet services and the provision of so-called free services such as search engines.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-38\" href=\"#article-footnote-368-38\">38<\/a><\/p>\n<p>Yet, at present, there are no laws or regulations that would ensure an equitable distribution of the value-added of data. On the contrary, the entire value-added is captured by a handful of dominant companies.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-39\" href=\"#article-footnote-368-39\">39<\/a> This is not sustainable.<\/p>\n<p>A recent study<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-40\" href=\"#article-footnote-368-40\">40<\/a> discusses the nature of digital production and digital economy, the political economy of the key resources in the digital economy \u2013 data and digital intelligence derived from data, the public sector\u2019s legitimate role in the new landscape, and lists important areas for engagement by public sector workers. Furthermore, according to longstanding international law, states have the sovereign right to safeguard and control the exploitation of their natural resources in the interest of citizens.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f1aefa elementor-widget elementor-widget-text-editor\" data-id=\"1f1aefa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.12 Equitable application of labor laws for online work<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c012a6 elementor-widget elementor-widget-text-editor\" data-id=\"8c012a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>It is obvious that many types of work are moving online, either partly or entirely, and certain types of traditional work (such as taxi driving) are being transformed by online platforms.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-41\" href=\"#article-footnote-368-41\">41<\/a> There is general agreement that labor laws must continue to be applied even as the economy transitions to more online work.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-42\" href=\"#article-footnote-368-42\">42<\/a>\u00a0<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e339b38 elementor-widget elementor-widget-text-editor\" data-id=\"e339b38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.13 Equitable application of consumer protection laws for online transactions<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b32768c elementor-widget elementor-widget-text-editor\" data-id=\"b32768c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>In most countries, consumers have recourse to a fast and inexpensive national dispute resolution mechanism if they are dissatisfied with a product or service. But they rarely have effective recourse if the product or service was bought from a foreign vendor through the internet.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-43\" href=\"#article-footnote-368-43\">43<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d82b6d elementor-widget elementor-widget-text-editor\" data-id=\"8d82b6d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.14 Equitable distribution of the value of intellectual property rights<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-314accb elementor-widget elementor-widget-text-editor\" data-id=\"314accb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Current intellectual property laws are dysfunctional and do not achieve their stated goals.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-44\" href=\"#article-footnote-368-44\">44<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4d1657 elementor-widget elementor-widget-text-editor\" data-id=\"a4d1657\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>1.15 Efficacy and safety of new technologies such as artificial intelligence<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10df465 elementor-widget elementor-widget-text-editor\" data-id=\"10df465\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>More and more aspects of daily life are being controlled by automated devices, and in the near future, such devices will take over many services that are today provided manually, such as transportation. To do that, automated devices will have to make choices and decisions.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-45\" href=\"#article-footnote-368-45\">45<\/a> It is important to ensure that these choices and decisions comply with our ethical values. In this context, it is worrisome that some modern artificial intelligence algorithms cannot be understood, to the point where it might be impossible to find out why an automated car malfunctioned.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-46\" href=\"#article-footnote-368-46\">46<\/a><\/p>\n<p>At present, some actions have been proposed at the national level,<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-47\" href=\"#article-footnote-368-47\">47<\/a> but there does not appear to be adequate consideration of these issues at the international level.<\/p>\n<p>As the above discussion shows, in certain key domains, current international law is not sufficiently explicit, meaning it does not map, with sufficient clarity, offline law to the online world. Based on these observations, the following section will explain why a new treaty is needed and how it could be negotiated.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-675203e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"675203e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><b>2. The need for a new treaty<\/b><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-328777b elementor-widget elementor-widget-text-editor\" data-id=\"328777b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>It has long been understood (and formalized in modern times in the 1648 Treaty of Westphalia) that there are, or should be, international rules restricting and\/or guiding the ways in which states interact with themselves and with their citizens. Such rules are referred to as international law. The scope and density of international law has increased steadily over time, leading to fundamental advances such as the abolition of slavery and colonialism, the explicit formulation of fundamental human rights, and the formation of international agencies dedicated to the development of international law.<\/p>\n<p>There are numerous treaties (the main source of international law) that relate to the rights and obligations of states regarding ICTs.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-48\" href=\"#article-footnote-368-48\">48<\/a> However, as noted above, there are areas in which current international law is inadequate.<\/p>\n<p>This gap has recently been explicitly recognized by most developed and some developing countries, which have joined together in the context of trade negotiations to develop treaty provisions that address some of the issues outlined above.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-49\" href=\"#article-footnote-368-49\">49<\/a> However, the proposals that are being put forward are largely intended to enshrine the current situation, which favors dominant internet companies.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-50\" href=\"#article-footnote-368-50\">50<\/a><\/p>\n<p>Several states too are initiating national processes that address some of the key issues outlined above. In that light, it would appear that states would be willing to support the initiation of a process to negotiate a new international treaty, specifically to address these matters. Such a treaty should not be an outcome of trade-related negotiations, because these issues are not directly linked to trade, and because trade negotiations are conducted in secret and without sufficient input from civil society and citizens.<\/p>\n<p>It is likely that certain hegemonic powers (the US in particular) would oppose the negotiation of a new treaty along the lines outlined below. However, civil society and enlightened states could come together to negotiate a treaty without the US, as they have done in the past for banning nuclear weapons and certain types of conventional weapons, protection of geographic origin of products, etc. Once there is broad agreement on the content of a new treaty, its formalization would not necessarily be a long-drawn-out affair, as existing treaty-making mechanisms could be deployed to this end. In particular, the Plenipotentiary Conference held every four years \u2013 the next one will be in 2022 \u2013 by the International Telecommunication Union (ITU), could convene a World Conference on International Telecommunications (WCIT; the last one was held in 2012). WCIT could address many of the issues outlined above. Issues that are outside the scope of the ITU could be addressed in other forums such as ILO, UNCITRAL, UNCTAD, WIPO, etc.<\/p>\n<p>Such a new treaty \u2013 a Convention for Data and Cyberspace \u2013 should be inspired by the Delhi Declaration<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-51\" href=\"#article-footnote-368-51\">51<\/a> and by the Digital Justice Manifesto.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-52\" href=\"#article-footnote-368-52\">52<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0d14e4 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"a0d14e4\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><b>3. The contents of the new treaty<\/b><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0125ad2 elementor-widget elementor-widget-text-editor\" data-id=\"0125ad2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>The proposed new treaty would contain provisions along the following lines.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-53\" href=\"#article-footnote-368-53\">53<\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c26be8 elementor-widget elementor-widget-text-editor\" data-id=\"8c26be8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.1 Human rights<\/strong><\/span><\/p>\n<ul>\n<li>Parties shall adopt a binding instrument specifying that any restrictions to freedom of speech, freedom of communication, or privacy, on grounds of security concerns or otherwise, must be for strictly defined purposes and in accordance with globally accepted principles of necessity, proportionality, and judicial oversight. (See for example specific proposals by the JustNet Coalition.)<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-54\" href=\"#article-footnote-368-54\">54<\/a><\/li>\n<\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aed5656 elementor-widget elementor-widget-text-editor\" data-id=\"aed5656\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.2 Data<\/strong><\/span><\/p><ul><li>In order to ensure the protection of personal data, thus increasing consumer trust, Parties shall accede to Convention 108 of the Council of Europe and the 2018 protocol amending that convention (CM(2018)2 of May 18, 2018).<\/li><li>Parties shall ensure that national laws regarding personal data conform to the provisions of Convention 108 as amended in 2018, and shall apply those provisions to cross-border data flows.<\/li><li>Parties shall enact a national data policy which includes, in addition to personal data protection, provisions to ensure equitable distribution of the value derived from the monetization of data.<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a57cb1e elementor-widget elementor-widget-text-editor\" data-id=\"a57cb1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.3 Competition<\/strong><\/span><\/p><ul><li>Parties shall enact a national competition\/antitrust law which is not restricted to preventing consumer harm.<\/li><li>Parties shall develop and accede to global antitrust rules and an international enforcement mechanism for such rules.<\/li><li>Parties shall enact data-sharing legislation.<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fb1ff0 elementor-widget elementor-widget-text-editor\" data-id=\"5fb1ff0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.4 Taxation<\/strong><\/span><\/p><ul><li>Parties may impose local presence and\/or data localization requirements in order to facilitate the enforcement of tax laws.<\/li><li>Parties shall develop and accede to global taxation rules and an international enforcement mechanism for such rules.<\/li><li>Parties may impose customs duties on data flows, in particular, when such flows are eroding existing tax bases and\/or when alternate types of tax bases are insufficient to generate required tax revenues.<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65bae52 elementor-widget elementor-widget-text-editor\" data-id=\"65bae52\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.5 Access to the internet<\/strong><\/span><\/p><ul><li>Parties shall accede to the 2012 version of the International Telecommunication Union\u2019s <em>International Telecommunication Regulations<\/em>.<\/li><li>Parties shall transpose to national law the provisions of ITU-Recommendation D.50, <em>International Internet Connection<\/em>.<\/li><li>Each Party shall administer its procedures for the allocation and use of scarce telecommunications resources, including frequencies, telephone numbers, internet protocol addresses, internet domain names, and rights-of-way, in an objective, timely, transparent, and non-discriminatory manner, in public interest.<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-839200d elementor-widget elementor-widget-text-editor\" data-id=\"839200d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.6 Micro, small, and medium enterprises (MSMEs)<\/strong><\/span><\/p><ul><li>Parties shall ensure that MSMEs have affordable access to internet connectivity, international payment platforms, and international physical delivery services.<\/li><li>Parties shall establish an international clearing house to facilitate and simplify mutual recognition of national e-signatures on customs and other legally required signed documents.<\/li><li>Each Party shall ensure that retail platforms do not themselves supply goods or services offered for sale on the platform.<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63cfe96 elementor-widget elementor-widget-text-editor\" data-id=\"63cfe96\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.7 Artificial intelligence<\/strong><\/span><\/p><ul><li>Parties shall adopt a model law or a treaty on ethical principles for artificial intelligence.<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9b8663 elementor-widget elementor-widget-text-editor\" data-id=\"a9b8663\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.8 Access to technology<\/strong><\/span><\/p><ul><li>Each Party shall ensure that enterprises around the world have access to modern technology on affordable, objective, timely, transparent, and non-discriminatory terms.<\/li><li>Parties are encouraged to procure open source software for government use.<\/li><li>No provisions of trade-related agreements shall be construed as preventing the procurement of open source software for government or private use.<\/li><li>Access to source code may be mandated under national law for specific purposes, such as verification of compliance with national laws and regulations (competition, taxation, safety, environment, etc.).<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-854f7d4 elementor-widget elementor-widget-text-editor\" data-id=\"854f7d4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.9 Consumer protection<\/strong><\/span><\/p>\n<ul>\n<li>Parties shall enact national law or regulations mandating minimum security requirements for ICT devices, in particular, those interconnected to form the Internet of Things (IoT).<\/li>\n<li>Parties shall enact national law or regulations to prohibit unsolicited commercial emails (spam) and shall establish effective enforcement mechanisms, including at the international level.<\/li>\n<li>Parties shall transpose to national law the provisions of ITU-Recommendation E.157, <em>International Calling Party Number Delivery<\/em>, and shall have enacted national laws prohibiting the misuse of international telephone numbers (see ITU-Recommendation E.156, <em>Guidelines for ITU-T Action on Reported Misuse of E.164 Number Resources<\/em>).<\/li>\n<\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de45a95 elementor-widget elementor-widget-text-editor\" data-id=\"de45a95\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.10 Employment and working conditions<\/strong><\/span><\/p>\n<ul>\n<li>Parties shall take appropriate measures to address the employment issues arising from e-commerce, including by implementing relevant recommendations of the International Labour Organization.<\/li>\n<\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-842498e elementor-widget elementor-widget-text-editor\" data-id=\"842498e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-size: 24px;\"><span style=\"color: #552c6f;\"><strong>3.11 Security<\/strong><\/span><\/p>\n<ul>\n<li>Parties shall refrain from hacking personal accounts or private data held by journalists and private citizens involved in electoral processes.<\/li>\n<li>Parties shall refrain from using ICTs to steal the intellectual property of private companies, including trade secrets or other confidential business information, and to provide competitive advantage to other companies or commercial sectors.<\/li>\n<li>Parties shall refrain from inserting or requiring \u201cbackdoors\u201d in mass-market commercial technology products.<\/li>\n<li>Parties shall agree to a clear policy for acquiring, retaining, securing, using, and reporting of vulnerabilities that reflects a strong mandate to report them to vendors in mass-market products and services.<\/li>\n<li>Parties shall exercise restraint in developing cyber weapons and ensure that any that are developed are limited, precise, and not reusable; Parties shall also ensure that they maintain control of their weapons in a secure environment.<\/li>\n<li>Parties shall agree to limit proliferation of cyber weapons; governments shall endeavor not to distribute, or permit others to distribute, cyber weapons and to use intelligence, law enforcement, and financial sanctions tools against those who do.<\/li>\n<li>Parties shall limit engagement in cyber offensive operations to avoid creating mass damage to civilian infrastructure or facilities.<\/li>\n<li>Parties shall endeavor to assist private sector efforts to detect, contain, respond, and recover in the face of cyberattacks; in particular, they shall enable the core capabilities or mechanisms required for response and recovery, including Computer Emergency Response Teams (CERTs); intervening in private sector response and recovery would be akin to attacking medical personnel at military hospitals.<\/li>\n<li>Parties shall facilitate the establishment of an international cyberattack attribution organization to strengthen trust online.<\/li>\n<li>Parties shall, individually and in cooperation, develop and apply measures to increase stability and security of international telecommunication networks and in the use of ICTs in order to achieve effective use thereof and avoidance of technical harm thereto, as well as to maintain international peace and security, the harmonious development of ICTs, and to prevent ICT practices that may pose threats to international peace and security.<a class=\"bfn-footnoteHook\" id=\"article-footnote-hook-368-55\" href=\"#article-footnote-368-55\">55<\/a><\/li>\n<li>In case of ICT incidents, Parties shall consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment, and the nature and extent of the consequences.<\/li>\n<li>Parties shall not knowingly allow their territory to be used for internationally wrongful acts using ICTs.<\/li>\n<li>Parties shall consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs, and implement other cooperative measures to address such threats.<\/li>\n<li>Parties shall not conduct or knowingly support ICT activity contrary to their obligations under international law, that intentionally damages critical infrastructure, or otherwise impairs the use and operation of critical infrastructure to provide services to the public.<\/li>\n<li>Parties shall take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly Resolution 58\/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions.<\/li>\n<li>Parties shall respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts; they shall also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty.<\/li>\n<li>Parties shall take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products; they shall prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions.<\/li>\n<li>Parties shall encourage responsible reporting of ICT vulnerabilities, and share associated information on available remedies to such vulnerabilities, to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure.<\/li>\n<li>Parties shall not conduct, or knowingly support, activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cybersecurity incident response teams) of another State; a Party shall not use authorized emergency response teams to engage in malicious international activity.<\/li>\n<\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa850ab elementor-widget elementor-widget-text-editor\" data-id=\"fa850ab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><!-- wp:paragraph {\"align\":\"center\"} --><\/p>\n<div class=\"bfn-footnotes\"><h3 class='bfn-footnotes-title'>Notes<\/h3><ul class=\"bfn-footnotesList\"><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-1\" href=\"#article-footnote-hook-368-1\">1<\/a> Richard Hill (2016) Internet governance, multi-stakeholder models, and the IANA transition: shining example or dark side?, <em>Journal of Cyber Policy<\/em>, 1:2, 176-197, DOI: 10.1080\/23738871.2016.1227866.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-2\" href=\"#article-footnote-hook-368-2\">2<\/a> Hill, R. (2015). &#8216;The True Stakes of Internet Governance&#8217;. <em>Transnational Institute<\/em>. <a href=\"https:\/\/www.tni.org\/files\/download\/03_tni_state-of-power-2015_the_true_stakes_of_internet_governance-1.pdf\">https:\/\/www.tni.org\/files\/download\/03_tni_state-of-power-2015_the_true_stakes_of_internet_governance-1.pdf<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-3\" href=\"#article-footnote-hook-368-3\">3<\/a> Hill, Richard (2014), &#8220;The Internet, its governance, and the multi-Stakeholder model&#8221;, Info, vol. 16. no. 2, March 2014, section 5.3.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-4\" href=\"#article-footnote-hook-368-4\">4<\/a> <a href=\"https:\/\/twn.my\/title2\/resurgence\/2014\/287-288\/cover07.htm\">https:\/\/twn.my\/title2\/resurgence\/2014\/287-288\/cover07.htm<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-5\" href=\"#article-footnote-hook-368-5\">5<\/a> Hill, Richard (2013), &#8220;Internet governance: the last gasp of colonialism, or imperialism by other means&#8221;, in Rolf H. Weber, Roxana Radu, and Jean-Marie Chenou (eds), The evolution of global Internet policy: new principles and forms of governance in the making?, Schulthess\/Springer, section 2.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-6\" href=\"#article-footnote-hook-368-6\">6<\/a> A\/HRC\/38\/L.10\/Rev.1, <a href=\"https:\/\/documents-dds-ny.un.org\/doc\/UNDOC\/LTD\/G18\/203\/73\/PDF\/G1820373.pdf?OpenElement\">https:\/\/documents-dds-ny.un.org\/doc\/UNDOC\/LTD\/G18\/203\/73\/PDF\/G1820373.pdf?OpenElement<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-7\" href=\"#article-footnote-hook-368-7\">7<\/a> Nothias, Toussaint (2020), \u201cAccess granted: Facebook\u2019s free basics in Africa\u201d, <em>Media, Culture &amp; Society<\/em>, Vol. 42(3) 329\u2013348 <a href=\"https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/0163443719890530\">https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/0163443719890530<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-8\" href=\"#article-footnote-hook-368-8\">8<\/a> A\/HRC\/38\/L.10\/Rev.1, <em>op. cit.<\/em><\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-9\" href=\"#article-footnote-hook-368-9\">9<\/a> A\/HRC\/38\/L.10\/Rev.1, <em>op. cit.<\/em><\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-10\" href=\"#article-footnote-hook-368-10\">10<\/a> See in this respect the 30 March 2017 Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, document A\/HRC\/35\/22. At<br \/><a href=\"http:\/\/ap.ohchr.org\/documents\/dpage_e.aspx?si=A\/HRC\/35\/22\">http:\/\/ap.ohchr.org\/documents\/dpage_e.aspx?si=A\/HRC\/35\/22<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-11\" href=\"#article-footnote-hook-368-11\">11<\/a> See for example <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/sep\/09\/facebook-deletes-norway-pms-post-napalm-girl-post-row\">https:\/\/www.theguardian.com\/technology\/2016\/sep\/09\/facebook-deletes-norway-pms-post-napalm-girl-post-row<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-12\" href=\"#article-footnote-hook-368-12\">12<\/a> <a href=\"https:\/\/botpopuli.net\/trump-and-cda-section-230-the-end-of-an-internet-exception\">https:\/\/botpopuli.net\/trump-and-cda-section-230-the-end-of-an-internet-exception<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-13\" href=\"#article-footnote-hook-368-13\">13<\/a> A\/HRC\/38\/L.10\/Rev.1, <em>op. cit.<\/em><\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-14\" href=\"#article-footnote-hook-368-14\">14<\/a> A\/HRC\/38\/L.10\/Rev.1, <em>op. cit.<\/em><\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-15\" href=\"#article-footnote-hook-368-15\">15<\/a> JNC (2014), <a href=\"http:\/\/justnetcoalition.org\/2014\/on_UN_HCHR_privacy_report.pdf\">http:\/\/justnetcoalition.org\/2014\/on_UN_HCHR_privacy_report.pdf<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-16\" href=\"#article-footnote-hook-368-16\">16<\/a> A\/RES\/68\/167, <a href=\"https:\/\/undocs.org\/A\/RES\/68\/167\">https:\/\/undocs.org\/A\/RES\/68\/167<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-17\" href=\"#article-footnote-hook-368-17\">17<\/a> A\/RES\/68\/167, <em>op. cit.<\/em><\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-18\" href=\"#article-footnote-hook-368-18\">18<\/a> <a href=\"https:\/\/www.publicaffairsbooks.com\/titles\/shoshana-zuboff\/the-age-of-surveillance-capitalism\/9781610395694\/\">https:\/\/www.publicaffairsbooks.com\/titles\/shoshana-zuboff\/the-age-of-surveillance-capitalism\/9781610395694\/<\/a>, <a href=\"https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/\">https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-19\" href=\"#article-footnote-hook-368-19\">19<\/a> <a href=\"https:\/\/www.cigionline.org\/publications\/data-dangerous-comparing-risks-united-states-canada-and-germany-see-data-troves\">https:\/\/www.cigionline.org\/publications\/data-dangerous-comparing-risks-united-states-canada-and-germany-see-data-troves<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-20\" href=\"#article-footnote-hook-368-20\">20<\/a> JNC (2014), <em>op. cit.<\/em><\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-21\" href=\"#article-footnote-hook-368-21\">21<\/a> <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2007\/01\/information_sec_1.html\">https:\/\/www.schneier.com\/blog\/archives\/2007\/01\/information_sec_1.html<\/a>; a comprehensive discussion is given in pages 103-107 of the Global Internet Report 2016 of the Internet Society, see in particular the examples on p. 101. The Report is available at: <a href=\"https:\/\/www.internetsociety.org\/globalinternetreport\/2016\/\">https:\/\/www.internetsociety.org\/globalinternetreport\/2016\/<\/a>. See also item 5 on page 8 of: <a href=\"https:\/\/www.ntia.doc.gov\/files\/ntia\/publications\/eo_13800_botnet_report_for_public_comment.pdf\">https:\/\/www.ntia.doc.gov\/files\/ntia\/publications\/eo_13800_botnet_report_for_public_comment.pdf<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-22\" href=\"#article-footnote-hook-368-22\">22<\/a> ISOC (2016) <a href=\"https:\/\/future.internetsociety.org\/2016\/index.html\">https:\/\/future.internetsociety.org\/2016\/index.html<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-23\" href=\"#article-footnote-hook-368-23\">23<\/a> Indeed, there have been calls for such minimum standards. See for example sections 2.1 and 2.3 of <a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-position-papers-and-opinions\/infineon-nxp-st-enisa-position-on-cybersecurity\">https:\/\/www.enisa.europa.eu\/publications\/enisa-position-papers-and-opinions\/infineon-nxp-st-enisa-position-on-cybersecurity<\/a>; pages 109 ff. of the Legislative Proposals of the US Cyberspace Solarium Committee, available at: <a href=\"https:\/\/www.solarium.gov\/\">https:\/\/www.solarium.gov\/<\/a>; and pages 15-21 of the \u201cCybersecurity Lessons from the Pandemic: Legislative Proposals\u201d, same web site.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-24\" href=\"#article-footnote-hook-368-24\">24<\/a> <a href=\"https:\/\/www.technologyreview.com\/s\/607954\/why-tesla-is-worth-more-than-gm\/\">https:\/\/www.technologyreview.com\/s\/607954\/why-tesla-is-worth-more-than-gm\/<\/a> and<br \/><a href=\"https:\/\/www.technologyreview.com\/s\/608095\/it-pays-to-be-smart\/\">https:\/\/www.technologyreview.com\/s\/608095\/it-pays-to-be-smart\/<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-25\" href=\"#article-footnote-hook-368-25\">25<\/a> Which is in fact the case for many dominant providers of services on the Internet, see:<a href=\"https:\/\/www.technologyreview.com\/s\/607954\/why-tesla-is-worth-more-than-gm\/\"> https:\/\/www.technologyreview.com\/s\/607954\/why-tesla-is-worth-more-than-gm\/<\/a> and <a href=\"https:\/\/www.technologyreview.com\/s\/608095\/it-pays-to-be-smart\/\">https:\/\/www.technologyreview.com\/s\/608095\/it-pays-to-be-smart\/<\/a>; see also pages 9 and 12 of UNCTAD\u2019s <em>Information Economy Report 2017: Digitalization, Trade and Development<\/em>, <a href=\"http:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=1872\">http:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=1872<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-26\" href=\"#article-footnote-hook-368-26\">26<\/a> <a href=\"https:\/\/newint.org\/features\/2016\/07\/01\/smiley-faced-monopolists\/\">https:\/\/newint.org\/features\/2016\/07\/01\/smiley-faced-monopolists\/<\/a>; and the more radical criticism at: <a href=\"http:\/\/www.rosalux-nyc.org\/wp-content\/files_mf\/scholz_platformcoop_5.9.2016.pdf\">http:\/\/www.rosalux-nyc.org\/wp-content\/files_mf\/scholz_platformcoop_5.9.2016.pdf<\/a>; specific criticism of a dominant online retailer is at: <a href=\"http:\/\/www.truth-out.org\/news\/item\/38807-1-of-every-2-spent-online-goes-to-amazon-can-we-break-the-company-s-stranglehold\">http:\/\/www.truth-out.org\/news\/item\/38807-1-of-every-2-spent-online-goes-to-amazon-can-we-break-the-company-s-stranglehold<\/a> and <a href=\"https:\/\/ilsr.org\/amazon-stranglehold\/\">https:\/\/ilsr.org\/amazon-stranglehold\/<\/a>; see also: <a href=\"http:\/\/www.nytimes.com\/2016\/12\/13\/opinion\/forget-att-the-real-monopolies-are-google-and-facebook.html?_r=0\">http:\/\/www.nytimes.com\/2016\/12\/13\/opinion\/forget-att-the-real-monopolies-are-google-and-facebook.html?_r=0<\/a>; and: <a href=\"https:\/\/www.theguardian.com\/commentisfree\/2017\/feb\/19\/the-observer-view-on-mark-zuckerberg\">https:\/\/www.theguardian.com\/commentisfree\/2017\/feb\/19\/the-observer-view-on-mark-zuckerberg<\/a>, and <a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2018\/01\/facebook-doesnt-care\/551684\/\">https:\/\/www.theatlantic.com\/technology\/archive\/2018\/01\/facebook-doesnt-care\/551684\/<\/a>. For a survey indicating that users are concerned about this issue, see: <a href=\"https:\/\/ec.europa.eu\/futurium\/en\/system\/files\/ged\/ec_ngi_final_report_1.pdf\">https:\/\/ec.europa.eu\/futurium\/en\/system\/files\/ged\/ec_ngi_final_report_1.pdf<\/a>. For a very cogent historical analysis, making an analogy to the age of the Robber Barons, see: <a href=\"http:\/\/www.potaroo.net\/ispcol\/2017-03\/gilding.html\">http:\/\/www.potaroo.net\/ispcol\/2017-03\/gilding.html<\/a>. See also pp. 18-19 of the World Bank\u2019s 2016 Word Development Report (WDR-2016), titled \u201cDigital Dividends\u201d, available at: <a href=\"http:\/\/documents.worldbank.org\/curated\/en\/896971468194972881\/pdf\/102725-PUB-Replacement-PUBLIC.pdf\">http:\/\/documents.worldbank.org\/curated\/en\/896971468194972881\/pdf\/102725-PUB-Replacement-PUBLIC.pdf<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-27\" href=\"#article-footnote-hook-368-27\">27<\/a> <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/jun\/04\/surge-pricing-comes-to-the-supermarket-dynamic-personal-data\">https:\/\/www.theguardian.com\/technology\/2017\/jun\/04\/surge-pricing-comes-to-the-supermarket-dynamic-personal-data<\/a><\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-28\" href=\"#article-footnote-hook-368-28\">28<\/a> <a href=\"https:\/\/techcrunch.com\/2016\/11\/28\/ubers-china-app-is-now-separate-from-its-global-app-and-a-nightmare-for-foreigners\/\">https:\/\/techcrunch.com\/2016\/11\/28\/ubers-china-app-is-now-separate-from-its-global-app-and-a-nightmare-for-foreigners\/<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-29\" href=\"#article-footnote-hook-368-29\">29<\/a> <a href=\"http:\/\/www.huffingtonpost.com\/entry\/google-monopoly-barry-lynn_us_59a738fde4b010ca289a1155?section=us_politics\">http:\/\/www.huffingtonpost.com\/entry\/google-monopoly-barry-lynn_us_59a738fde4b010ca289a1155?section=us_politics<\/a> and <a href=\"https:\/\/www.nakedcapitalism.com\/2017\/08\/new-america-foundation-head-anne-marie-slaughter-botches-laundering-googles-money.html\">https:\/\/www.nakedcapitalism.com\/2017\/08\/new-america-foundation-head-anne-marie-slaughter-botches-laundering-googles-money.html<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-30\" href=\"#article-footnote-hook-368-30\">30<\/a> The European Commission found that Google had done this, see: <a href=\"http:\/\/europa.eu\/rapid\/press-release_STATEMENT-17-1806_en.htm\">http:\/\/europa.eu\/rapid\/press-release_STATEMENT-17-1806_en.htm<\/a> and <a href=\"http:\/\/europa.eu\/rapid\/press-release_MEMO-17-1785_en.htm\">http:\/\/europa.eu\/rapid\/press-release_MEMO-17-1785_en.htm<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-31\" href=\"#article-footnote-hook-368-31\">31<\/a> <a href=\"https:\/\/www.accc.gov.au\/publications\/digital-platforms-inquiry-final-report\">https:\/\/www.accc.gov.au\/publications\/digital-platforms-inquiry-final-report<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-32\" href=\"#article-footnote-hook-368-32\">32<\/a> <a href=\"http:\/\/www.boundary2.org\/2018\/10\/richard-hill-too-big-to-be-review-of-wu-the-curse-of-bigness-antitrust-in-the-new-gilded-age\/\">http:\/\/www.boundary2.org\/2018\/10\/richard-hill-too-big-to-be-review-of-wu-the-curse-of-bigness-antitrust-in-the-new-gilded-age\/<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-33\" href=\"#article-footnote-hook-368-33\">33<\/a> <a href=\"https:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=2622\">https:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=2622<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-34\" href=\"#article-footnote-hook-368-34\">34<\/a> <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/04\/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet\/\">https:\/\/arstechnica.com\/information-technology\/2017\/04\/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet\/<\/a>; <a href=\"https:\/\/www.silicon.co.uk\/security\/nsa-malware-security-210253\">https:\/\/www.silicon.co.uk\/security\/nsa-malware-security-210253<\/a>; <a href=\"https:\/\/www.vice.com\/en_us\/article\/7x5vnz\/notpetya-ushered-in-a-new-era-of-malware\">https:\/\/www.vice.com\/en_us\/article\/7x5vnz\/notpetya-ushered-in-a-new-era-of-malware<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-35\" href=\"#article-footnote-hook-368-35\">35<\/a> <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2017\/02\/14\/need-digital-geneva-convention\/#sm.00017arazqit2faipqq2lyngzmxx4\">https:\/\/blogs.microsoft.com\/on-the-issues\/2017\/02\/14\/need-digital-geneva-convention\/#sm.00017arazqit2faipqq2lyngzmxx4<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-36\" href=\"#article-footnote-hook-368-36\">36<\/a> <a href=\"http:\/\/www.oecd-ilibrary.org\/taxation\/addressing-the-tax-challenges-of-the-digital-economy_9789264218789-en\">http:\/\/www.oecd-ilibrary.org\/taxation\/addressing-the-tax-challenges-of-the-digital-economy_9789264218789-en<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-37\" href=\"#article-footnote-hook-368-37\">37<\/a> See for example pp. vii and 2 of the GCIG report, available at: <a href=\"https:\/\/www.cigionline.org\/publications\/one-internet\">https:\/\/www.cigionline.org\/publications\/one-internet<\/a>. Henceforth referenced as \u201cGCIG\u201d. See also 7.4 of<br \/><a href=\"http:\/\/www.oecd-ilibrary.org\/taxation\/addressing-the-tax-challenges-of-the-digital-economy_9789264218789-en\">http:\/\/www.oecd-ilibrary.org\/taxation\/addressing-the-tax-challenges-of-the-digital-economy_9789264218789-en<\/a>; and <a href=\"http:\/\/www.other-news.info\/2016\/12\/they-have-right-now-another-you\/\">http:\/\/www.other-news.info\/2016\/12\/they-have-right-now-another-you\/<\/a>; and the study of data brokers at: <a href=\"https:\/\/www.opensocietyfoundations.org\/sites\/default\/files\/data-brokers-in-an-open-society-20161121.pdf\">https:\/\/www.opensocietyfoundations.org\/sites\/default\/files\/data-brokers-in-an-open-society-20161121.pdf<\/a>; <a href=\"https:\/\/www.internetsociety.org\/blog\/public-policy\/2017\/03\/my-data-your-business\">https:\/\/www.internetsociety.org\/blog\/public-policy\/2017\/03\/my-data-your-business<\/a>; <a href=\"http:\/\/www.economist.com\/news\/leaders\/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource\">http:\/\/www.economist.com\/news\/leaders\/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource<\/a>; and <a href=\"http:\/\/www.itu.int\/en\/council\/cwg-internet\/Pages\/display-June2017.aspx?ListItemID=7\">http:\/\/www.itu.int\/en\/council\/cwg-internet\/Pages\/display-June2017.aspx?ListItemID=7<\/a>; and <a href=\"https:\/\/www.theguardian.com\/world\/2017\/aug\/23\/silicon-valley-big-data-extraction-amazon-whole-foods-facebook\">https:\/\/www.theguardian.com\/world\/2017\/aug\/23\/silicon-valley-big-data-extraction-amazon-whole-foods-facebook<\/a> and pages 6-7 of UNCTAD\u2019s <em>Information Economy Report 2017: Digitalization, Trade and Development<\/em>, <a href=\"http:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=1872\">http:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=1872<\/a> and <a href=\"http:\/\/www.autoritedelaconcurrence.fr\/doc\/reportcompetitionlawanddatafinal.pdf\">http:\/\/www.autoritedelaconcurrence.fr\/doc\/reportcompetitionlawanddatafinal.pdf<\/a> and <a href=\"https:\/\/www.diplomacy.edu\/blog\/2018predictions#1\">https:\/\/www.diplomacy.edu\/blog\/2018predictions#1<\/a>. An excellent discussion of this topic, with numerous references, is given in pp. 9 ff. of Third World Network, Briefing no. 3 for the World Trade Organization 11th Ministerial Conference, Buenos Aires, 10-13 December 2017, at: <a href=\"http:\/\/www.twn.my\/MC11\/briefings\/BP3.pdf\">http:\/\/www.twn.my\/MC11\/briefings\/BP3.pdf<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-38\" href=\"#article-footnote-hook-368-38\">38<\/a> <a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2014\/08\/advertising-is-the-internets-original-sin\/376041\/\">http:\/\/www.theatlantic.com\/technology\/archive\/2014\/08\/advertising-is-the-internets-original-sin\/376041\/<\/a> and 7.4 of the cited OECD report; and <a href=\"http:\/\/www.other-news.info\/2016\/12\/they-have-right-now-another-you\/\">http:\/\/www.other-news.info\/2016\/12\/they-have-right-now-another-you\/<\/a> and<br \/><a href=\"https:\/\/www.internetsociety.org\/blog\/public-policy\/2017\/03\/my-data-your-business\">https:\/\/www.internetsociety.org\/blog\/public-policy\/2017\/03\/my-data-your-business<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-39\" href=\"#article-footnote-hook-368-39\">39<\/a> <a href=\"https:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=2466\">https:\/\/unctad.org\/en\/pages\/PublicationWebflyer.aspx?publicationid=2466<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-40\" href=\"#article-footnote-hook-368-40\">40<\/a> <a href=\"http:\/\/library.fes.de\/pdf-files\/iez\/16034.pdf\">library.fes.de\/pdf-files\/iez\/16034.pdf<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-41\" href=\"#article-footnote-hook-368-41\">41<\/a> <a href=\"https:\/\/repositorio.cepal.org\/handle\/11362\/42046\">https:\/\/repositorio.cepal.org\/handle\/11362\/42046<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-42\" href=\"#article-footnote-hook-368-42\">42<\/a> <a href=\"https:\/\/www.ilo.org\/global\/topics\/future-of-work\/lang--en\/index.htm\">https:\/\/www.ilo.org\/global\/topics\/future-of-work\/lang&#8211;en\/index.htm<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-43\" href=\"#article-footnote-hook-368-43\">43<\/a> <a href=\"https:\/\/unctad.org\/en\/Pages\/DTL\/STI_and_ICTs\/ICT4D-Legislation\/eCom-Consumer-Protection-Laws.aspx\">https:\/\/unctad.org\/en\/Pages\/DTL\/STI_and_ICTs\/ICT4D-Legislation\/eCom-Consumer-Protection-Laws.aspx<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-44\" href=\"#article-footnote-hook-368-44\">44<\/a> <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3119041\">https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3119041<\/a>; <a href=\"https:\/\/www.theguardian.com\/commentisfree\/2012\/nov\/30\/america-dysfunctional-patent-system-innovation\">https:\/\/www.theguardian.com\/commentisfree\/2012\/nov\/30\/america-dysfunctional-patent-system-innovation<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-45\" href=\"#article-footnote-hook-368-45\">45<\/a> <a href=\"http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?pubRef=-\/\/EP\/\/NONSGML%2BCOMPARL%2BPE-582.443%2B01%2BDOC%2BPDF%2BV0\/\/EN\">http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?pubRef=-\/\/EP\/\/NONSGML%2BCOMPARL%2BPE-582.443%2B01%2BDOC%2BPDF%2BV0\/\/EN<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-46\" href=\"#article-footnote-hook-368-46\">46<\/a> <a href=\"https:\/\/www.technologyreview.com\/s\/604087\/the-dark-secret-at-the-heart-of-ai\/\">https:\/\/www.technologyreview.com\/s\/604087\/the-dark-secret-at-the-heart-of-ai\/<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-47\" href=\"#article-footnote-hook-368-47\">47<\/a> <a href=\"http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?pubRef=-\/\/EP\/\/NONSGML%2BCOMPARL%2BPE-582.443%2B01%2BDOC%2BPDF%2BV0\/\/EN\">http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?pubRef=-\/\/EP\/\/NONSGML%2BCOMPARL%2BPE-582.443%2B01%2BDOC%2BPDF%2BV0\/\/EN<\/a> and <a href=\"http:\/\/wam.ae\/en\/details\/1395302639203\">http:\/\/wam.ae\/en\/details\/1395302639203<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-48\" href=\"#article-footnote-hook-368-48\">48<\/a> <a href=\"http:\/\/www.apig.ch\/UNIGE%20Catalog.pdf\">http:\/\/www.apig.ch\/UNIGE%20Catalog.pdf<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-49\" href=\"#article-footnote-hook-368-49\">49<\/a> <a href=\"http:\/\/trade.ec.europa.eu\/doclib\/press\/index.cfm?id=1974\">http:\/\/trade.ec.europa.eu\/doclib\/press\/index.cfm?id=1974<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-50\" href=\"#article-footnote-hook-368-50\">50<\/a> <a href=\"https:\/\/ourworldisnotforsale.net\/2017\/ALAI_E-commerce.pdf\">https:\/\/ourworldisnotforsale.net\/2017\/ALAI_E-commerce.pdf<\/a>; <a href=\"https:\/\/www.buzzfeednews.com\/article\/burcukilic\/big-tech-is-pushing-for-a-new-kind-of-free-trade\">https:\/\/www.buzzfeednews.com\/article\/burcukilic\/big-tech-is-pushing-for-a-new-kind-of-free-trade<\/a>; <a href=\"https:\/\/ourworldisnotforsale.net\/2019\/WTO_12_reasons_v2.pdf\">https:\/\/ourworldisnotforsale.net\/2019\/WTO_12_reasons_v2.pdf<\/a>; additional references can be found at: <a href=\"http:\/\/ourworldisnotforsale.net\/\">http:\/\/ourworldisnotforsale.net\/<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-51\" href=\"#article-footnote-hook-368-51\">51<\/a> <a href=\"https:\/\/justnetcoalition.org\/delhi-declaration\">https:\/\/justnetcoalition.org\/delhi-declaration<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-52\" href=\"#article-footnote-hook-368-52\">52<\/a> <a href=\"https:\/\/justnetcoalition.org\/digital-justice-manifesto\">https:\/\/justnetcoalition.org\/digital-justice-manifesto<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-53\" href=\"#article-footnote-hook-368-53\">53<\/a> Detailed rationales for 3.2 through 3.10 are provided in <a href=\"http:\/\/www.apig.ch\/Development%20proposals.pdf\">additional references<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-54\" href=\"#article-footnote-hook-368-54\">54<\/a> <a href=\"http:\/\/justnetcoalition.org\/2014\/on_UN_HCHR_privacy_report.pdf\">http:\/\/justnetcoalition.org\/2014\/on_UN_HCHR_privacy_report.pdf<\/a>.<\/li><li class=\"bfn-footnoteItem\"><a class=\"bfn-footnoteRef\" id=\"article-footnote-368-55\" href=\"#article-footnote-hook-368-55\">55<\/a> This and the following provisions are based on the eleven norms of paragraph 13 of the 2015 Report of the UN Intergovernmental Group of Experts in the Field of Information and Telecommunications in the Context of International Security (UN document A\/70\/174), and on the 2012 International Telecommunication Regulations.<\/li><\/ul><\/div>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2642cdc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2642cdc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-149f52b\" data-id=\"149f52b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1373c85 elementor-widget elementor-widget-image\" data-id=\"1373c85\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"267\" height=\"189\" src=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/author.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/author.png 267w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/author-24x17.png 24w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/author-36x25.png 36w, https:\/\/projects.itforchange.net\/digital-new-deal\/wp-content\/uploads\/2020\/10\/author-48x34.png 48w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ad59ab9\" data-id=\"ad59ab9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66089e0 elementor-widget elementor-widget-text-editor\" data-id=\"66089e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><span style=\"color: #000000;\">Richard Hill is currently a civil society activist in the area of ICTs, including internet governance and data privacy. He has participated in numerous civil society, intergovernmental, and multistakeholder discussions and has published blogs and peer-reviewed articles. He was formerly a senior official at the International Telecommunications Union.<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ae0724a\" data-id=\"ae0724a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A New Convention for Data and Cyberspace Richard Hill This essay argues that the time has come for the international community to negotiate and agree to a new treaty \u2013 a Convention for Data and Cyberspace \u2013 which would contain explicit principles for extending well-established offline legal frameworks and principles to the online world, particularly &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/projects.itforchange.net\/digital-new-deal\/2020\/10\/30\/a-new-convention-for-data-and-cyberspace\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;A New Convention for Data and Cyberspace&#8221;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":[],"categories":[4],"tags":[2],"_links":{"self":[{"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/posts\/368"}],"collection":[{"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/comments?post=368"}],"version-history":[{"count":42,"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/posts\/368\/revisions"}],"predecessor-version":[{"id":1563,"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/posts\/368\/revisions\/1563"}],"wp:attachment":[{"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/media?parent=368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/categories?post=368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/projects.itforchange.net\/digital-new-deal\/wp-json\/wp\/v2\/tags?post=368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}