How are the African nations of Mauritania and Rwanda doing when it comes to human rights online?

//This blog post by Ephraim Percy Kenyanito was originally published on Access, an online international human rights organization focused on extending digital rights to users around the world. Click here to read the original post. 

Right now the United Nations Human Rights Council is holding its 23rd Universal Periodic Review (UPR) working group session (November 2nd-13th, 2015). The Universal Periodic Review is the cooperative process by which the Human Rights Council reviews the human rights records of all 193 U.N. member states.

Here’s a look at the digital rights landscape in Mauritania and Rwanda, and the implications for people at risk of human rights violations in these countries.

space

Mauritania – domestic and international human rights obligations

Mauritania has signed on to various international human rights instruments, including the International Covenant on Civil and Political Rights (ICCPR), the Convention against Torture (CAT), the Convention against Enforced Disappearance (ICCPED), and the Optional Protocol to the CAT (OPCAT).

Article 10 of Mauritania’s constitution (PDF) guarantees to all citizens the freedom of expression, assembly, and association. However, according to the UPR, these rights are being violated.

Violation of digital rights in Mauritania

There has been systematic disregard of digital rights in Mauritania. These include:

  • Violation of access to information/ freedom of expression

June 13–21, 2011: The Emirati government applied pressure on an Emirati company to block the website of a Mauritanian newspaper El Badil Al Thalith. This censorship took place after the newspaper published articles criticising Arab leaders, including the United Arab Emirates government.

Click here to read more. 

#IGF2015 – Setting the Scene

Just before the official opening of the 2015 UN Internet Governance Forum (IGF) on November 10, 2015, the core of the current challenges of internet governance were laid out by a panel in a Scene Setting session. Speakers’ interventions corresponded with the sub-themes of this year’s IGF under the overarching topic “Evolution of Internet Governance: Empowering Sustainable Development.” Check out the following infographic to explore the eight challenges outlined during this session.

Please click image to view full infographic. 

infographic smallest

 

Content for the infographic was provided by Christian Möller.

The Internet Policymaking Landscape in Pakistan

// Usama Khilji, a research associate at Bolo Bhi, discusses Bolo Bhi’s recent study analyzing internet policymaking in Pakistan which makes suggestions for crafting ideal internet policy. Click here to learn more about Bolo Bhi.

Internet policymaking in Pakistan has been an uphill task for all stakeholders involved, a process whereby the government justifies proposals for greater control over internet activity with language about security and counter-terrorism while other stakeholders, especially civil society and technology-related businesses, mobilize campaigns to resist such attempts. Through our research on the internet policymaking landscape in Pakistan,  our team at Bolo Bhi  has interviewed key internet policymaking stakeholders to identify the main drivers of Pakistan’s incoherent internet policy: these issues include lack of expertise on technology related matters in the government, a lack of transparency in policymaking processes, ad hoc censorship policies, and failure to have a multi-stakeholder forum where input from stakeholders is taken for the laws and policies under consideration.

The near three-year YouTube ban in Pakistan epitomizes this tense relationship and the push and pull between government, civil society, the private sector, and other actors. The website was banned to appease violent protestors after a video that was deemed blasphemous appeared on YouTube in September 2012 The lifting of the ban has become an ego tussle between Google and the Pakistani government; with academia and civil society criticizing the restriction of access to the website.

Click here to read more.

 

 

The contest of rules: US, China, Russia rival in setting the norms of behavior in cyberspace

//Alexandra Kulikova, program coordinator at the PIR Center in Moscow, discusses implications of and processes for creating soft law on ICT governance. 

The shift of cyberspace governance discussions towards a normative framework demonstrates states’ efforts to formulate ‘rules of the game.’ Recent multinational and bilateral agreements on cyberspace governance fall under the domain of non-binding soft law, in which norms agreed upon are not set in stone. As fundamental differences exist amongst individual state’s visions of cyber governance (for example views on state sovereignty in cyberspace), and with the uncertainties a rapidly developing cyberspace brings, hard laws often imply commitments that are difficult to honor. Non-binding agreements and norms leave room to maneuver as seen in the recent UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security report and talks between the US and China.

While the United Nation’s bureaucracy is typically perceived as ill paced for dynamic ICT governance, in June 2015 a major breakthrough occurred. Representatives from twenty countries formed the fourth Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security. The GGE agreed on a range of non-binding norms for state behavior as well as confidence and capacity building measures in cyberspace – something many were skeptical about. The agreements, reflected in the report published in August, outline some important commitments which states have refused to recognize since the late 1990s when the Russian Federation started promoting the norm building process through the creation of the UN GGE. These include, inter alia, the commitment to not attack each other’s critical infrastructure and cyber emergency response systems (CERTs and CSIRTs); to not knowingly allow illegal third party cyber activity from within their territory; to carry out due investigation on malicious activity before counteractions are taken; to assist in investigations of cyberattacks and cybercrime launched from the country’s territory; and to commit to peaceful use of ICTs as a cornerstone of peace and security in cyberspace and beyond. Building on the success of the previous UN GGE in 2013, which acknowledged the applicability of international law to cyberspace and encouraged future elaboration of norms and confidence building measures (CBMs), the current GGE managed to build upon and agree on some minimum conditions for international cyber stability.

Click here to read more.

View More