JULIE University of Wollongong, Australia

Slides:



Advertisements
Similar presentations
CSO/NGO Consultations Report to IATI Signatories, Partner Countries and Steering Committee Paris, 4 July 2011.
Advertisements

Key challenges in mutual accountability - citizens and csos imperative in accountability Antonio Tujan Jr.
Promoting Cooperative Solutions for Space Sustainability swfound.org ©2011 Secure World Foundation. Used with Permission APPRAISING THE EFFECTIVENESS OF.
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
Why Audit for Transparency Lillie Coney National Committee for Voting Integrity Minneapolis, MN October 26, 2007.
INTERNATIONAL UNION FOR CONSERVATION OF NATURE. 2 Implemented in 12 countries of Africa, Asia, Latin America and the Middle East, through IUCN regional.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
Jasminka Dzumhur, Ombudsperson of BiH “Role of national human rights institutions” Ljubljana, 1. December 2014.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Advocacy Initiatives within the media community in anti-corruption At the Regional Workshop on Anti-Corruption Organised by Sida Presentation by: Gayathry.
African Declaration on Internet Rights and Freedoms Presentation by: Edetaen Ojo Media Rights Agenda, Nigeria.
CHILD FOCUS Belgian Safer Internet Centre How to raise awareness among children, young people and their educators? Example of practice Nadège BASTIENEN.
Working Group Five Demand: identifying deficits and increasing the pool of users The group discussed the role of citizen demand for access to information.
Why do corruption risks need to be addressed now? What are corruption risks in REDD+? What are risk mitigation actions? What are the tools? Who can prevent.
Countering Terrorist Use of the Internet – a perspective from the United Nations (Lomonosov Moscow State University) 11 November 2010.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Media & democracy. “If it were left on me to decide whether we should have a government without newspapers or newspapers without a government, I should.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
Why do corruption risks need to be addressed now? What are corruption risks in REDD+? What are risk mitigation actions? What are the tools? Who can prevent.
On completion of the scenario, students will be able to: Learning Outcomes 1 Critically analyse and prioritise information security risks. 2 Systematically.
Civil Society Participation and Contribution to the UNCAC Review Process Towards Transparency – TI National Contact Vietnam UNCAC Self Assessment Process:
GDPR 12 POINTS 679/2016 DATA LEX 2016.
ICT Net Innovation Initiative
GLOBALG.A.P. Risk Assessment On Social Practice – GRASP
Information Session European Instrument for Democracy & Human Rights Country Based Support Scheme – Papua New Guinea RESTRICTED Call for Proposals EuropeAid/151170/DD/ACT/PG.
Strengthening national capacities for safeguarding intangible cultural heritage: UNESCO’s strategy for and beyond Cécile Duvelle and Frank.
Division for Freedom of Expression, Democracy and Peace
From state broadcaster to public service media
Strategic Communications Training Freedom of Information X State MDA
Towards Commonwealth Model Media Guidelines for Journalists During Elections Guidelines, Training and Other Assistance 24 June 2016.
Building Coalitions for Change Information, Consultation and Public Participation in Policy-making Experience from OECD countries Directorate for Public.
Decrypting Data Compliance in China
Vesa Tanner European Commission Directorate-General Energy
Gender statistics in Information and Communication Technology for Women’s Empowerment and Gender Equality Dorothy Okello, Annual.
GENDER STATISTICS IN INFORMATION AND COMMUNICATION
Business environment in the EU Prepared by Dr. Endre Domonkos (PhD)
IBM Start Now Host Integration Solutions
Video: Digital citizenship is defined as the norms of appropriate,
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
National Cyber Strategy Preparedness: 8 Preparatory Questions
Prof. Dr. Natali Helberger
CAROSAI 30th Anniversary
Policy Patty Toolkit OUR STORY Patty P. Tehrani
Nick Bonvoisin Secretary to the Convention on the
ISTR International Conference
TRUST:Team for Research in Ubiquitous Secure Technologies
Sustainability Corporations, Capital Markets and Global Economy.
ENGAGING WITH THE PRIVATE SECTOR
The role of Supreme Audit Institutions in fragile situations: initial findings Research by David Goldsworthy and Silvia Stefanoni of Development Action.
The European Anti-Corruption Report
Commission strategy to
Student Data & Privacy.
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
ICT Policy سياسات تكنولوجيا المعلومات والاتصالات
World Bank project example
Shrinking Civic Space:
INCIDENT RESPONSE PLAN
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Effectiveness Working Group
CBC IntoSAINT Project Group
Civil society guide on working with the UNCAC
UNODC and CYBERCRIME October 2009.
Project leader: Richard Morton Lead Editor: Jalal Benhayoun
Civil society guide on working with the UNCAC
KONE Corporation Compliance Investigations
Anatomy of a Common Cyber Attack
HUMAN IMMUNODEFICIENCY VIRUS (HIV) PREVENTION & CARE
Presentation transcript:

JULIE POSETTI @julieposetti University of Wollongong, Australia World Editors Forum/WAN-IFRA

The headlines The legal frameworks that support protection of journalistic sources - at international, regional and country levels - are under significant strain They are increasingly at risk of erosion, restriction and compromise - representing a direct challenge to the established universal human rights of freedom of expression and privacy, one that especially constitutes a threat to the sustainability of investigative journalism. There’s now a need to revise and strengthen these laws - or introduce them where they don’t exist, Acts of journalism should be shielded from targeted surveillance, data retention and handover of material connected to confidential sources

Key findings 1. 84 UNESCO Member States out of 121 studied (69 per cent) for this report demonstrated noteworthy developments, mainly with negative impact, concerning journalistic source protection between 2007 and mid- 2015

Key findings 2. The issue of source protection has come to intersect with the issues of mass surveillance, targeted surveillance, data retention, the spill-over effects of anti- terrorism/national security legislation, and the role of third party internet companies known as ‘intermediaries’ 3. Without substantial strengthening of legal protections and limitations on surveillance and data retention, investigative journalism that relies on confidential sources will be difficult to sustain in the digital era

Key findings 4. Transparency and accountability regarding both mass and targeted surveillance, and data retention, are critically important if confidential sources are to be able to confidently make contact with journalists 5. Journalists are increasingly adapting their practice in an effort to partially shield their sources from exposure, but threats to anonymity and encryption undermine these adaptations

Key findings 6. Where source protection is compromised, the impacts can include: • Pre-publication exposure of journalistic investigations which may trigger cover-ups, intimidation, or destruction of information, • Revelation of sources’ identities with legal or extra-legal repercussions on them, • Sources of information running dry, • Self-censorship by journalists and citizens more broadly.

Impacts on journalism practice “The Snowden Affair turned upside down the work of journalists… It’s harder to speak to people. We really have to go out and meet them. It’s face to face” Zine Cherfaoui, El Watan International Editor “Our reporters who cover national security are consistently experiencing problems in just talking to people in the government, just having any conversation with a reporter, receiving a phone call becomes cause for suspicion” Marty Baron, Exec Editor, The Washington Post “You have to assume that everything you do is being recorded or traced” Gerard Ryle, Director, ICIJ

Recommendations A major output of the study is a 11-point assessment tool for measuring the effectiveness of legal source protection frameworks in the digital era The 11 points were developed through consultation with 31 international experts in media law, freedom of expression/privacy, and investigative journalism practice

Recommendations 1. Individual States need to introduce or update source protection laws 2. To optimise benefits, source protection laws should be strengthened in tandem with legal protections extended to whistleblowers, who constitute a significant subset of confidential journalistic sources 3. Source protection laws need to cover journalistic processes and communications with confidential sources – including telephone calls, social media, and emails – along with published journalism that depends on confidential sources.

Recommendations 4. There is a need to educate journalists and civil society actors in digital safety 5. Journalists, and others who rely on confidential sources to report in the public interest, may need to train their sources in secure methods of contact and information-sharing 6. It is recommended to define ‘acts of journalism’, as distinct from the role of ‘journalist’, in determining who can benefit from source protection laws

Recommendations for news industry action Engage with digital issues impacting on source confidentiality protection, and actively campaign for laws and rules that provide adequate protection Ensure that sources are aware of the digital era threats to confidentiality Explain to the public what is at stake in the protection of source confidentiality, especially in the digital age Help audiences become more secure in their own communications, for example explaining how encryption works, and why it is important to protect communications security Key finding to underpin activism: Acts of journalism should be shielded from targeted surveillance, data retention and handover of material connected to confidential sources

Recommendations for civil society Advocate, for robust source protection frameworks Invest in, and partner with, news publishers and academia to research and develop new tools to aid secure digital communication between journalistic actors and their sources Assist in training and implementation of digital security tools among journalistic actors and whistleblowers Work with UNESCO and other UN actors and Governments to develop complementary whistleblower regimes Assisting in training in digital source protection solutions for both journalists and their sources Key finding to underpin activism: Acts of journalism should be shielded from targeted surveillance, data retention and handover of material connected to confidential sources

FIND IT, READ IT & ENGAGE #PROTECTSOURCES @JULIEPOSETTI Find me on SIGNAL Key finding to underpin activism: Acts of journalism should be shielded from targeted surveillance, data retention and handover of material connected to confidential sources