0% found this document useful (0 votes)
41 views5 pages

Draft Resolution

The document discusses draft resolution 2.1 from the United Nations Educational, Scientific, and Cultural Organization committee on securing the right to online privacy. It outlines 7 points calling for stronger privacy regulations for technology companies, educating the public on privacy, and collaborating internationally on privacy initiatives.

Uploaded by

Nguyen Anh Thu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views5 pages

Draft Resolution

The document discusses draft resolution 2.1 from the United Nations Educational, Scientific, and Cultural Organization committee on securing the right to online privacy. It outlines 7 points calling for stronger privacy regulations for technology companies, educating the public on privacy, and collaborating internationally on privacy initiatives.

Uploaded by

Nguyen Anh Thu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Draft Resolution 2.

Committee: United Nations Educational, Scientific, and Cultural Organization


Topic: Securing the right to online privacy in the Digital Age
Sponsor: State of Israel, Federal Republic of Germany, Republic of South Africa, Italian
Republic, Republic of Tunisia.
Signatories: New Zealand, Republic of Yemen, United States of America, Federation of
Malaysia, United Kingdom of Great Britain and Northern Ireland, Republic of India, Russian
Federation, People’s Republic of China, United Mexican States.

Noting with deep concern that here is a lack of legal and institutional frameworks, processes,
and infrastructure to support the protection of data and privacy rights,
Bears in mind disastrous consequences of a data breach and the need for timely response in
case of such accident,
Emphasizing the need to conduct pragmatic actions towards tackling online privacy invasion,
Encouraging agencies of the UN bodies to collaborate closely with other Member States to
bring out the optimum resolutions,
Calling upon collaboration with national and international organizations for possible ideas on
introducing effective data protection policies,

1. Strongly urges to reinforce stricter regulations for preventing the online privacy
infringements of technology companies:
a. Requiring technology companies to have transparent commitments with
internet users about the using of their personal data, including but not limited
to:
i. No arbitrary usage of collected information, without the users’ consent,
such as selling the data to a third party for financial purposes,
ii No retention of personal information for longer than reasonably
necessary,
iii. No abuse of sensitive personal information such as but not limited to
precise geolocation, race, ethnicity, religion, private communication, sexual
orientation, health information…,
b. Encouraging the governments to strengthen their policies on managing
technology companies by:
i. Executing stricter punishment for violations. The forms of punishment
should include but not limited to fines, suspending the businesses and
criminal penalties,
ii. Establishing a framework for controlling and processing personal data.
The framework should outline specific responsibilities and privacy protection
standards for data controllers and processors,
c. Issuing a code of conduct to:
i. Incorporating all the conditions for the lawful processing of personal
information or set out obligations that provide a functional equivalent of all
the obligations set out in those conditions,
ii. Prescribing how the conditions for the lawful processing of personal
information are to be applied, or are to be complied with, given the
particular features of the sector or sectors of society in which the relevant
responsible parties are operating,
iii. Specifying appropriate measures for information matching programmes
if such programmes are used within a specific sector; or for protecting the
legitimate interests of data subjects insofar as automated decision making;

2. Urges member states to exercise efforts into enhancing public perception and educating
people to protect their online privacy:
a. Informing people about the disastrous consequences of data violation:
i. The loss of privacy can lead to an increased risk of harm from identity theft,
fraud, or other injury,
ii. Elevating a person's stress and anxiety levels and causing them to shudder
with fear,
iii. Resulting in a violation of personal boundaries and a loss of trust, not only
in the invader but often with the victim's own ability to set up and maintain
boundaries to protect their privacy,
iv. Causing people to expend time and money to prevent future fraud, such as
signing up for credit monitoring, contacting credit reporting agencies and
placing fraud alerts on their accounts, and so on,
b. Emphasizing human rights on privacy protection:
i. Redefining the importance of personal information. Clarify that personal
information is not just a kind of data, but rather a kind of property which
belongs to its owner,
ii. No organization, internet services provider or even the government has the
rights to freely use or exploit the user’s information for wrong purposes,
iii. The owners are the ones who have control over their information. Any
single action with the information requires the user’s permission,
c. Suggesting tools people can use to protect their online information:
i. Using a strong password, encryption, or security to hide wireless networks
from outsiders,
ii. Installing antivirus software to prevent hackers from accessing personal and
financial information, and tracking one’s location,
iii. Limiting the personal information shared on social media,
vi. Restricting access to sensitive data;

3. Encourages collaboration among member states in incentivising innovative initiatives to


tackle online privacy invasion, and promoting national and international organizations for
possible ideas on:
a. Developing new modern technology and infrastructure to ensure the security of their
societies and catching up with the fast-moving tendency of the Internet,
b. Documenting effective practices and protection laws,
c. Maintaining political support for the promotion of the right to privacy and building
consensus about the limits that existing human rights law impose on state
surveillance,
d. Documenting reports on the laws and practices surrounding state surveillance,
protection of personal data, exploitation and vulnerability of data by governments and
companies;

4. Emphasizes the necessity for data technology-based solutions to be employed, including


but not limited to:
a. Allowing pseudonymous personalization techniques:
i. Allowing users to remain anonymous with regard to the personalized system
and the whole network infrastructure, whilst enabling the system to still
recognize the same user in different sessions so that it can cater to their needs
individually,
ii. Preventing data collection by hiding or blocking potentially identifying
information such as cookies and IP addresses,
iii. Having a virtual private network (VPN) gives people online privacy and
anonymity by creating a private network from a public internet connection,
especially when they’re on public Wi-Fi at a library, coffee shop, or other
public location,
b. Restricting the application of AI and biometric technologies:
i. Checking the operation of AI and biometric technology by governmental
institutions and technology companies in terms of purposes, using methods,
and infringement on the internet users’ privacy,
ii. Imposing limitations for the application of AI and biometric technologies
base on the nation’s framework to protecting personal privacy;

5. Provides appropriate remedies for victims of personal data breach:


a. Fully acquiring the situation of their issues,
b. Instituting a civil action for damages in a court having jurisdiction against a
responsible party for breach of any provision of online privacy, whether or not there is
intent or negligence on the part of the responsible party,
c. A court hearing proceedings in terms of subsection (b) may award an amount that is
just and equitable, including:
i. Payment of damages as compensation for patrimonial and non-patrimonial
loss suffered by a data subject as a result of breach of online privacy,
ii. Aggravated damages,
iii. Interest and costs of suit on such scale;

6. Promotes IT, online security awareness and privacy campaigns:


a. Providing appropriate online security practices especially to vulnerable groups
(employees in organizations, parents and guardians, children and youth, etc.),
b. Issuing resource and guidance that aim at providing practical and effective advice to
public and private organizations, allowing the readers to prepare and implement
information security awareness initiatives that apply to them;
7. Requests to provide transparency about the uses of algorithms and personal data, including
but not limited to:
a. Giving information of used algorithms and personal data,
b. Giving explanations for the uses of algorithms and personal data, focusing on some
aspects such as the purposes and the using circle of such data,
c. Establishing a channel by which individuals can seek information about transparency.

You might also like