©1998-2004 ITU Telecommunication Development Bureau (BDT) E-Strategies. Page - 1 Policy Issues for e-Applications (e-Commerce) Alexander NTOKO Chief, E-Strategies.

Slides:



Advertisements
Similar presentations
1 EBIP Synthesis Report Preliminary policy messages Vladimir López-Bassols, OECD EBIP Workshop October 2001, Rome.
Advertisements

A strategy for a Secure Information Society –
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
QMUL Cloud Legal Project Cloud Legal Project: Began in Oct 2009 as 3 year project - funded by Microsoft. Focus? To address legal and regulatory issues.
© ITU Telecommunication Development Bureau (BDT) page - 1 Alexander NTOKO Chief, E-Strategy Unit ITU Telecommunication Development Bureau Seminar.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
© Telecommunication Development Bureau (BDT) E-Strategies. Page - 1 E-commerce Issues for Policy Makers Alexander NTOKO Head, E-Strategy Unit.
Access to and Use of Traditional Knowledge A view from industry Bo Hammer Jensen.
Conference on Accelerating Global Commerce Through Technology and Policy Elliot E. Maxwell September 20, 2002 The E-Commerce Policy Landscape.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
E-commerce Strategies
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
In Harmony, In the Cloud: Harmonizing Data Protection Rules In a Cross-Border World Steve Mutkoski Worldwide Director Policy Microsoft Corporation.
CHAPTER 4 E-ENVIRONMENT
Understand the role of business in the global economy. 1.
Confidentiality and Privacy Controls
© ITU Telecommunication Development Bureau (BDT) – E-Strategies Unit.. Page - 1 Building Trust and Security for E-government Dubai, United Arab.
The White Paper Ian Moss. THE COMMUNICATIONS WHITE PAPER  In May of this year the Government announced that it was planning a Communications White Paper.
Understand the role of business in the global economy.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Framework for Global Electronic Commerce Communications 411 Relevant Site:
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
PART FOUR – COMMERCIAL LEGISLATION in the UAE Legislative Structures affecting business in the UAE: An Overview Ch 16.
The Impact of Syrian Trade Policies on Agricultural Trade Performance Basheer Hamwi.
Baker & McKenzie Presented by Gabriela Vendlova 3 December 2002 Intellectual Property Rights: Importance of Trademark Protection in the Digital World.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
The Draft SADC Annex on Trade in Services UNCTAD Secretariat Sub-regional Conference on Improving Industrial Performance and Promoting Employment in SADC.
Cryptography, Authentication and Digital Signatures
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
World summit on the information society 1 WSIS: Internet Governance President of the WSIS Phase II Preparatory Committee Ambassador Janis Karklins April.
Internet Banking Key Issues Internet Banking Working Group May 14, 1998.
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
On Requirements for Mobile Commerce By Aj.Pongthep Termsnguanwong.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
Article 28(2) USD Introduction. The Problem Fraud and Misuse scale Evolving risks Impact on end users –Direct financial impact –Direct inconvenience Indirect.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
POLICY CHALLENGES AND OPPORTUNITIES.  Introduction  Overview of EAC  Challenges in Implementing EAC CU  Opportunities Abound  Lessons from the European.
CHAPTER 1 RESOURCES OF ELECTRONIC MARKETING. On-Line Age Narrowcasting Specific product for specific market Listservs On-line messages Electronic funds.
Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,
1 EXPANDING E-BUSINESS OPPORTUNITIES FOR VIETNAM Presented by Russell Pipe Director of E-Government Programs Kenan Institute Asia – Bangkok at the VIETNAM.
ADDRESS BY MINISTER OF COMMUNICATIONS Dr Ivy Matsepe-Casaburri LAUNCH OF ELECTRONIC COMMERCE POLICY July 1999.
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Business in the Global Economy
Legal and Ethical Issues in E-Commerce
Internet Governance: An Analysis from Developing country’s perspective
IPR’s: new challenges and opportunities
Confidentiality and Privacy Controls
E-Commerce for Developing Countries (EC-DC)
National-level ICT training strategy
Dashboard eHealth services: actual mockup
ITU Telecommunication Development Bureau (BDT)
Shandong University of Finance and Economics, China
Multimedia Training Kit
Presentation transcript:

© ITU Telecommunication Development Bureau (BDT) E-Strategies. Page - 1 Policy Issues for e-Applications (e-Commerce) Alexander NTOKO Chief, E-Strategies Unit ITU Telecommunication Development Bureau (BDT) Web: ITU/BDT Arab Regional Workshop on e-Services Policies Damascus, Syria April 2004

o Legal Issues Privacy Data protection Liabilities of Service Providers Intellectual property rights, copyright Digital signatures Electronic contracts Consumer protection Jurisdiction for Cross-border transactions

o Financial Issues Customs Taxation Revenue implication for Governments Monetary Policies Banking Regulations Currencies

o Technology issues Security Encryption Authentication Telecommunications infrastructure Internet: Bandwidth, Affordability, Accessibility and QoS. Standards, interoperability Electronic payment systems

o Economic issues Impact on workforce des-intermediation re-intermediation Effects of automation Market access Micro Businesses Skills availability Revenue implications

o Cultural issues Content Diversity Multilingualism Cultural diversity Censorship Cultural implications – indigenous people

o Governance issues International coordination of the Internet Internet cc Domain Names and IP Address Management Information and Network Security Payment of international links Certification Authorities Root certification, Hierarchy of CAs Cross Certification International coordination

o Trade issues (e-business) WTO Agreements – Impact on Global E- commerce? Duty-free entry of goods in electronic form Free Trade Zones Market Access in a Borderless World Tangible vs. Electronic Goods

Near consensus: paperless o Paperless transactions: Law has traditionally presumed the presence of paper records in writing. Near consensus that governments need to make amendments to laws in order to bring media-neutrality of statutes, evidence rules for electronic records (note: evidence was used in Clinton and Microsoft legal battles), recognition of electronic signatures combined with a reliable certification authority. o Many countries now enacting laws to recognize electronic media as valid for e-transactions. o But what about interoperability of the technology requirements and legal frameworks?

Near consensus proposals o Privacy only self-regulation – So far, has not worked. Governments are becoming more active in by proposing new regulations. o Encryption – Export Restrictions o Jurisdiction for Cross-border Transactions o Role of private sector, government and international organizations – Being discussed in WSIS process. o Content – Censorship and Cultural Diversity o Internet governance and domain names o Liability of intermediaries

Near consensus: Privacy Bad practices: o Keep track of user browsing and choices without his/her consent o Sell user data (e.g., addresses) to be used for Spamming and Spimming. o US and EU Regulations being put in place. o Use spending profile for advertisement. o Pull user data from cookies stored in the users computer

Near consensus: Encryption o Recommended key lengths public key systems: 1024 bits keys symmetric systems: 128 bits keys o Export Restrictions and Usage for encryption with long keys (e.g. more than 512 bits for RSA and bits for symmetric) now solved for most countries (except 6). o New algorithms developed to replace DES gaining worldwide adoption.

Encryption: key length problem o US Data Encryption Standard (DES) 56-bit keys is now inadequate o Triple-DES is one improvement: encrypting the output of DES twice using three keys o AES now replacing DES as main symmetric algorithm. o Long term (20 years): 128-bits symmetric keys are adequate and difficult to break o Must distinguish authentication and integrity services from confidentiality services o Quantum Cryptography seen as response to growing computing power (used for cracking encryption).

Encryption: key length problem o RSA RC5 56-bit key crack challenge, early 1997 o Bovine RC5 Effort: tens of thousands computers linked over Internet, more than 4,000 teams o 72 quadrillion (72,057,594,037,927,936) possible keys to test o 268 million key blocks distributed to teams o Peak rate of processing: 7 billion keys/second o Oct 22, 1997: RSA announces successful crack o Conclusion: 56-bit key not sufficient o Remember Moores law: computing power doubles every 18 months – How long before computing power makes 128 bit Key length insufficient???

Cost and time of brute force attacks o Assumption: 3 years equipment life and continual use o Authors: Blaze, Diffie,Rivest, Schneier, Shinomura,Thompson

No consensus: Encryption o Should citizens rights to privacy take precedence over law enforcement concerns? o … not possible to prevent criminals from using encryption … little point in preventing legal users from protecting themselves

No consensus: Encryption o Key escrow: copy of any secret key is deposited with Trusted Third Party (TTP) o National law might require that TTP hands over secret key on certain situations o Key recovery: encryption system allows authorized organizations to rebuild key on request (back door access to private key) o Both schemes allow access to encrypted data

No consensus: Encryption o Some European companies are concerned about using US-based Trusted Third Parties (TTPs), since they may contravene their own countrys data protection laws o A number of countries are becoming concerned about maintaining national root TTPs, to prevent dominance of their national economies by foreign brands o National security and sovereignty in dealing with encrypted data.

Certification Authority Issues o Issuing certificates is relatively easy o Managing effectively and securely is difficult: CAs must maintain a Certification Revocation List (CRL), must not store private keys (risk of identity theft),... o Trust depends on integrity and security of CAs practices and procedures o Users will have many certificates (e.g., one for Intranet, one for Extranet, one at home) o Interoperability: Need for harmonized policies for generic identity certificates.

Role of Governments, International Organizations and Private sector o Some e-applications frameworks ignore the role of governments & international organizations: everything should be private- sector driven o Jeffrey Ritter, the chairman of the American Bar Association's committee on Internet law, seeks a middle ground between industry and public policy. "The private sector will be mistaken if they believe they can formulate the rules for e-commerce without the input and consultation of governments," he said.

International coordination frameworks Considering that time is ripe to: 1. seek a better international understanding on how to achieve a friction free and borderless information society while meeting general public interest objectives 2. define the key issues that require strengthened international coordination 3. many organizations are proposing frameworks for global e-applications coordination

Need for a global framework The global information society requires an appropriate framework covering technical, policies, commercial, and legal aspects. This should foster interoperable technical solutions, competitive business practices and consistent rules. It does not need to consist of detailed and harmonised rules on all relevant aspects. What is required is a concerted examination of the problems and the priorities, in order to allow the international community to address them in a substantive and coordinated manner.

Need for global framework o Building trust in electronic transactions by ensuring the security and privacy of transactions and data, and the protection of users. o Establishing ground rules so that national laws, government policies,customs tariffs, standards, market access, and intellectual property measures create a level playing field for electronic transactions.

Need for global framework o Enhancing the information infrastructure through common interoperable standards, and access to open networks. o Maximizing the benefits of electronic transactions by developing awareness and skills, encouraging widespread SME adoption, and ensuring participation and use by all countries.

Conclusion While waiting for all these issues to be addressed, it is important for Governments to work with the relevant stakeholders (international organizations, public and private sector and civil society) to promote policies that will enhance the development and use of e-applications. ITU, within the framework of its E-strategies Programme is working with governments, private sector and other entities to address some of the technology policy issues related to fostering the development and use of e-services/applications. Thank you for your attention