15a humanitarianism...

13
Humanitarianism in the Network Cyber- warfare Age Policy Analysis and Innovation

Upload: wget2013

Post on 24-Dec-2014

240 views

Category:

Government & Nonprofit


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Humanitarianism in the Network Cyber-warfare Age

Policy Analysis and Innovation

Page 2: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Humanitarianism in the Network Agewww.unocha.org/hina Recommendation 4 - Develop robust

ethical guidelines around the use of information

“do no harm” standards for the ethical use of new forms of data, including protocols for protecting privacy and guaranteeing informants’ safety, and ensuring that these clearly addressed the separate issues of liability, privacy and security.

Introduction

Page 3: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

The transition to the Network Age

off-line tools -> cloud services

not enough data -> detailed personal information

limited sharing -> open data exchanges

quickly outdated -> real-time data and two-way communication

Just humanitarian orgs–> private companies, volunteer and technical communities, governments

Introduction

Page 4: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Types of sensitive informationPersonally identifiable

information (PII)

Community identifiable Information (CII)

Meta-data and secondary data that help identify the first two

Introduction

Page 5: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Legal considerations More privacy laws

Liability and legal issues complex and getting worse

Need waivers for disasters and crisis

Agreements with private companies – and their users

Legal issues

Page 6: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Ethics of information in a crisis Informed consent – what is meaningful in

a crisis, particularly when linked to aid?

Responsibility of the humanitarian organization to ensure that information is handled responsibly

Think through the implications of technology – when it works and when it doesn’t

Ethical issues

Page 7: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Data Protection Guidelines1. Collected in a legal manner for a legitimate

purpose.2. Don’t collect what you don’t need3. Risk assessment 4. Informed consent 5. Accurate and up-to-date.6. Secured to prevent unintended uses.7. Data that is no longer needed should be

destroyed.8. Accountability – access, request and removal

processes9. Avoid duplication of information collection

efforts

Ethical issues

Page 8: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Operational mechanisms Responsible project design

Privacy Impact AssessmentsEthical review boards

Responsible sharingInformation classificationAnonymization and

aggregation1. .

Ethical issues

Page 9: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

The age of cyber-warfareHumanitarian information will be a

tempting target, so will our social capitol and trust

Spyware and other tools are cheap and easy to use

Armed and political groups will have organized cyberwarfare wings

Security issues

Page 10: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

The threats Targets:

Humanitarian organizations Communities or ethnic groups Crime and fraud - $$$$$$

Types of attacks: Nuisance and protest Data-theft and monitoring Social attacks Physical infrastructure disruptions

Government surveillance, filtering and censorship: ???

Security issues

Page 11: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Data security

Only protect what needs protecting Basic hygiene Cybersecurity assessments Work with experts where needed

Humanitarian “cyber”-spaceOpenness and transparencyDialogue with cyber-groupsAvoid over-securitization

Security issues

Page 12: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Recommendations

Advocate for legal frameworks for sharing data in emergencies

Strengthen codes of conduct and operational procedures for the ethical use of information

Invest in risk analysis and information security

Support ethical innovation Prioritize open data and

transparency

Conclusions

Page 13: 15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

Thank you! Credit also to Leith Baker,

mFieldwork (mfieldwork.com)

Conclusions