0% found this document useful (0 votes)
50 views21 pages

Study Guide - SPECPOL - AIMUNIV 1

Uploaded by

21savage456abcd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views21 pages

Study Guide - SPECPOL - AIMUNIV 1

Uploaded by

21savage456abcd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ADAMJEE INTRA MODEL UNITED NATIONS

IV

SPECIAL POLITICAL AND DECOLONIZATION


COMMITTEE

STUDY GUIDE
Addressing Malpractices in Media Censorship &

Cybersecurity Vulnerabilities
Message from the Academics Team

Greetings delegates,

It is our utmost pleasure to have you as a part of Adamjee Intra Model United
Nations IV At our conference, we put some of the most contentious geopolitical
issues of the modern age at the forefront of different committees. The issue that
is to be discussed at the committee, Special Political and Decolonization
Committee (SPECPOL) is,

“Addressing Malpractices in Media Censorship & Cybersecurity


Vulnerabilities”

We look forward to your participation in the committee and enhancing your


knowledge of the intricacies surrounding the various aspects of the committee's
fundamentals.

The study guide attached below will give you an extensive overview of the issue
and various conflicts that have unfolded due to this problem. However, it is not
an exhaustive account of all of the aspects of the agenda, and adequate research
is also expected on your part.

We look forward to heated discourse and substantive and sustainable solutions


to the agenda. Best of luck to all of you, and we await to serve all of you on the
day of the conference!

Warmest Regards,

Head of Academics:
Shakiya Sharmin Ahona

On behalf of the Academics Department


Adamjee Intra Model United Nations IV
Message from the Executive Board Members

Dear Delegates,

We, the Executive Board members, eagerly await to meet you all in the first Adamjee Intra
Model United Nations IV session. We hope that all of you are preparing rigorously for the
conference, and may all of you be able to showcase your diplomacy skills blended with your
knowledge and aptitude. We expect you to have your thoughtful arguments and conclusions
rehearsed and revised well before presenting them to us.

We encourage you to review this study guide and familiarise yourself with the agenda, its
background, the stances of major nations, and the potential solutions to the issue at hand.
Furthermore, we want to remind all delegates of the importance of ethical conduct throughout
the conference. We expect all delegates to demonstrate integrity, professionalism, and respect
towards the opinions of fellow delegates while engaging in diplomacy and negotiation.

We wish you all the best for AIMUN IV. We will try our best to provide any kind of
assistance and utmost guidance to all of you. If you have any queries, feel free to contact any
of the Executive Board members.

Warm regards,

Chairperson:
Siam Murshed

Director:
Arony Aswad

Rapporteur:
Tasnim Ishraque
About the United Nations

The United Nations is an international organization founded in 1945. Currently comprised of


193 Member States, the UN and its work are guided by the purposes and principles of its
founding charter. The UN has evolved to keep pace with a rapidly changing world. But one
thing has stayed the same: it remains the one place on Earth where all the world’s nations can
gather, discuss common problems, and find solutions that benefit all of humanity.

About the Special Political and Decolonization Committee


One of the six central General Assembly committees is the Special Political and
Decolonization Committee of the United Nations or SPECPOL. Since its founding in 1961,
SPECPOL has been essential in addressing political, peacekeeping, and
decolonization-related challenges. Its main priorities include promoting world peace and
security, settling conflicts, and dealing with problems brought on by the decolonization
process. SPECPOL is essential to promote international communication, cooperation, and
peace. The committee supports the UN's overarching goal of preserving world peace and
security by concentrating on political issues and decolonization. SPECPOL facilitates the
development of diplomatic strategies and consensus-building measures to address complex
global concerns effectively.

SPECPOL MANDATE
SPECPOL works to solve political issues and global decolonization initiatives within the
framework of the United Nations. The primary duties of the committee include:

1) Decolonization: SPECPOL's main objective is to supervise and support the


decolonization process. In conformity with the ideals outlined in the UN Charter, this
entails supporting non-self-governing territories as they transition to independence or
self-government.

2) Peacekeeping: SPECPOL actively participates in peacekeeping operations in unstable


and conflict-ridden areas. The committee backs programs that encourage amicable
dispute resolution, stop conflict from escalating further, and offer humanitarian aid to
impacted populations.

3) Political Affairs: SPECPOL discusses and develops strategies to handle various


international political issues. It considers topics including territorial conflicts,
statehood, self-determination, and sovereignty while attempting to reach diplomatic
agreements through discussion and negotiation.
4) International Security: The committee concentrates on issues related to disarmament
and international security. It looks at efforts to stop the spread of weapons of mass
destruction, disarmament agreements, and arms control.

5) Space Affairs: SPECPOL is also in charge of debating and establishing guidelines for
the peaceful use of space. The committee discusses satellite technology, space-related
security issues, and space exploration.

Agenda Overview
Agenda: The Question of Abortion as a Fundamental Human Right

What is Media Censorship?


● Censorship:

Censorship, the suppression of words, images, or ideas that are “offensive,” happens
whenever some people succeed in imposing their personal political or moral values on others.
Censorship can be carried out by the government as well as private pressure groups.

Media censorship is a global phenomenon that has foreshadowed information outlets for
centuries. A common ground for censorship is maintaining an orderly state, whereas the
underlying motive is to keep the public ignorant of the information that can potentially
threaten authorities. The worldwide Internet connectivity in the contemporary era allows
information to pass through within and beyond borders in minimal time; therefore, an
increasing number of media consumers depend on the Internet for a wide variety of
information. Historically, access to news has not been this easy: the press in most of Europe
in the 18th century was under the draconian reins of censorship, which gradually abated by
the 19th century due to public demand.

However, autocratic and heavily centralized governments still openly or subtly employ
censorship to silence government opposition. To combat information coup, tech-savvy
journalists and independent reporters channel information through social media, blogs, and
news websites. The governments survive by using stringent Internet surveillance apparatus
that effectively block websites and subtly filter information; hence, only selective news can
penetrate the firewall. The governments also hunt down citizens and journalists accessing
disallowed websites to create a ubiquitous atmosphere of fear, harassment, and persecution.
The role of media in society is not limited to bringing information to the public; therefore,
media mustn't capitalize on selling meaningless sensations that can potentially harm people,
sects, races, and religions. This paper will focus on information coup through media
censorship and the responsibility media is laden with to cultivate tolerance and responsibility
in the public.
MEDIA CENSORSHIP MALPRACTICES
The advent of digital media has transformed the landscape of information dissemination,
providing unprecedented access to various perspectives. However, this evolution has also
brought forth challenges as malicious actors exploit the dynamic nature of the digital realm.
Once confined to physical constraints, traditional media censorship methods have evolved
into highly sophisticated digital strategies. Governments, interest groups, and other entities
use content filtering, website blocking, and online surveillance to control narratives, suppress
dissent, and manipulate public opinion. Not only that, this attempt at controlling the media
has also crossed national boundaries and become a significant national security issue for
many countries. This has made necessary the collaborative efforts of the International
community to come together and address the challenges posed by censorship malpractices.

Threats to Freedom of Expression:

At the core of media censorship, malpractices lie the direct assault on the fundamental human
right of freedom of expression.

Online Surveillance and Privacy Erosion

People’s right to privacy is coming under ever more tremendous pressure from the use of
modern networked digital technologies whose features make them formidable tools for
surveillance, control, and oppression, a new UN report has warned. This makes it essential
that these technologies are reined in by effective regulation based on international human
rights law and standards.

The report – the latest on privacy in the digital age by the UN Human Rights Office* – looks
at three key areas: the abuse of intrusive hacking tools (“spyware”) by State authorities; the
critical role of robust encryption methods in protecting human rights online; and the impacts
of widespread digital monitoring of public spaces, both offline and online.

The report details how surveillance tools such as the “Pegasus” software can turn most
smartphones into “24-hour surveillance devices”, allowing the “intruder” access not only to
everything on our mobiles but also weaponizing them to spy on our lives.

Urgent steps are needed to address the spread of spyware, the report flags, reiterating the call
for a moratorium on the use and sale of hacking tools until adequate safeguards to protect
human rights are in place.

Encryption is a key enabler of privacy and human rights in the digital space, yet it is being
undermined. The report calls on States to avoid taking steps that could weaken encryption,
including mandating so-called backdoors that give access to people’s encrypted data or
employing systematic screening of people’s devices, known as client-side scanning.
The report also raises the alarm about the growing surveillance of public spaces. Previous
practical limitations on the scope of surveillance have been swept away by large-scale
automated data collection and analysis, as well as new digitized identity systems and
extensive biometric databases that greatly facilitate the breadth of such surveillance
measures.

New technologies have also enabled the systematic monitoring of what people say online,
including collecting and analyzing social media posts.

Governments often fail to adequately inform the public about their surveillance activities, and
even where surveillance tools are initially rolled out for legitimate goals, they can easily be
repurposed, often serving ends for which they were not originally intended.

The report emphasizes that states should limit public surveillance measures to “strictly
necessary and proportionate,” focusing on specific locations and time. The duration of data
storage should similarly be limited. There is also an immediate need to restrict the use of
biometric recognition systems in public spaces.

All States should also act immediately to implement robust export control regimes for
surveillance technologies that pose severe risks to human rights. They should also ensure
human rights impact assessments are carried out that consider what the technologies in
question are capable of and the situation in the recipient country. In short, the right to privacy
is more at risk than ever.

Restrictions on Dissenting Voices:

Media censorship malpractices frequently manifest in suppressing dissenting voices, limiting


the diversity of opinions within public discourse. Delegates are encouraged to explore
instances where governments or entities curtail the voices of opposition figures, activists, and
marginalized groups, stifling the democratic exchange of ideas.

Digital Divide and Information Inequality:

Digital inequality, or the digital divide, refers to the gap between those with access to modern
information and communications technology (ICT) and those without.

A person’s ability – or inability – to access computers and smart devices can impact many
facets of their life, from paying bills to receiving emergency SMS alerts. It can also impact
their health.

Although technologies such as artificial intelligence and blockchain are opening new
frontiers of productivity and providing opportunities to people and societies, they pose
numerous risks. Almost half the world’s population, 3.7 billion people, mostly women, and
most in developing countries, are still offline. Collectively, the task is to help design digital
environments that can connect everyone with a positive future. This is why there is a need for
a joint effort, with collaboration among national and local governments, the private sector,
civil society, academia, and multilateral organizations.

Now more than ever, we need a global town hall to address these issues and to capitalize on
technology’s transformational potential to create new jobs, boost financial inclusion, close the
gender gap, spur a green recovery, and redesign the cities. The UN deputy chief underlined
the value of engagement, as achieving universal connectivity cannot be left solely to
governments or individual tech companies. The critical barriers to digital inclusion are related
to:

Accessing networks – living in urban areas where high-speed broadband is usually available
versus rural environments where internet connectivity could be problematic or even
non-existent.

The cost of devices or data – socioeconomic factors, including income and employment, can
limit a person’s ability to purchase and access digital technology.

Skills and literacies – education, experience, language, racial background, gender, and age
can impact a person’s ability and experience to navigate the digital realm to find, evaluate,
create, and communicate information.

Legal Constraints and Repressive Legislation:

Modern discussions of censorship center on the legitimacy of the regulatory structures and
actions through which expression and communication are governed and the extent to which
these structures meet the requirements of democratic societies.

Online Harassment and Intimidation:

Beyond formal legal restrictions, the rise of online harassment poses a significant threat to
freedom of expression. The committee should delve into how journalists, activists, and
individuals face intimidation, trolling, and cyberbullying, hindering their ability to express
opinions freely and contributing to a harmful effect on public discourse.

Governments worldwide plan to enact sweeping legislation that will crush freedom of
expression online. Several countries are establishing a vast censorship framework under the
guise of preventing “harm” and holding large tech companies accountable. Although
authorities claim their goal is to protect us from “disinformation,” vague definitions and
loopholes will create avenues for broad application, overreach, and abuse.

In Ireland, for example, citizens can now be imprisoned for possessing material that officials
decide is “hateful.” Under the RESTRICT Act in the US, the government may soon have the
authority to monitor the internet activity of any American deemed a security risk. Many new
laws will not only have a chilling effect, but they will also restrict the public’s access to
information. In Canada, a state agency can now filter and manipulate what Canadians can see
online, and in Australia, a single government official can compel social media companies to
remove posts.

Through this international effort, government officials and NGOs aim to gain total control
over online speech by forcing tech companies to comply with their desired rules. UK
lawmakers have threatened to imprison social media managers who don’t censor enough
content. Brazil has introduced some of the strictest penalties for platforms that fail to remove
“fake news.” Under the European Union’s Digital Services Act, large tech companies must
share their data with “vetted researchers” from non-profits and academia, ceding content
moderation to NGOs and their state affiliates.

Technological Manipulation:

Technological manipulation delves into how technology is exploited to shape narratives,


disseminate misinformation, and influence public opinion. Delegates are urged to explore the
dynamic landscape of technological manipulation, recognizing the challenges and
implications it poses in the context of media censorship malpractices.

Technology companies such as Apple, Facebook, and Google have incorporated various
design features into their mobile devices, operating systems, and social media applications,
making them addictive.

Impact on Countries:

Examining the impact of media censorship malpractices and cybersecurity vulnerabilities on


countries is essential for understanding the broader geopolitical and socio-economic
implications. Delegates should consider the complex and multilayered issues that arise at the
nation-state level because of these.

Countries face numerous challenges due to media censorship malpractices. From the erosion
of crucial democratic institutions to the gradual disappearance of cultural and information
sovereignty, the impacts of media malpractices are massive.

These impacts often pose significant challenges for a country attempting to uphold and secure
its national interest. The lack of confidence in democracy and the distrust in the government
due to these practices frequently results in social unrest. Not only that, but media censorship
is also relevant in global diplomacy, where a country’s image may be positively or negatively
impacted depending on how it chooses to operate its own media landscape. Another
significant but rarely mentioned impact is the economic one. Economic growth and
prosperity become highly curtailed without the free and open exchange of ideas. Censorship
prevents this and stifles individual innovation.

Press Freedom:

In an era of transformative digital and social change, the protection of press freedom emerges
as a crucial necessity. Yet, press freedom is continuously on the defensive as new forms of
censorship and media malpractices seek to limit its scope and thwart its capacity as a check
on power.

Journalists worldwide are now facing all kinds of challenges that impede their crucial work.
They are being silenced, intimidated, and harassed, and even the very technologies that they
employ are made to work against them. Algorithms and filters appear impartial, but they
allow their creators, operators, and regulators the capacity to encourage or discourage certain
viewpoints. All of this has made impartial and honest journalism challenging.

These problems exceed the bounds of any one state and encompass journalists all around the
world. This means that the solutions must be similarly broad in scope. Protection mechanisms
and other necessary legal and political steps should be taken internationally to ensure
journalism can function as intended without any impediments.

Cybersecurity Vulnerabilities
As technology makes the world increasingly interconnected, the cybersecurity threat looms
large. With the growing relevance of technology in all aspects of national and international
life, the threats grow in proportion. The challenges themselves are of a wholly new kind and
as such require new ways of thinking about and solving them.

Evolving Landscape

The threats we face in the digital era are wholly different from anything we have ever faced.
These challenges are the direct result of the new technologies that have emerged. Simply put,
harmful actors attempt to turn these technologies against their users.

This can take several forms, including state-sponsored espionage, disruption of critical
infrastructure, the increased sophistication of cyber threats, and economic espionage. The few
mentioned here are not the total of all the challenges faced. More and more threats and
concerns are emerging along with the further development of digital technology. This
continuous evolution remains unabated, and new challenges always take on new shapes.
Nevertheless, the most crucial thing to note here is the willingness to address them
innovatively.

Protection of Critical Infrastructure

Due to the increased reliance on interconnected digital networks, protecting critical


infrastructure has become increasingly urgent. Nowadays, more than ever, the critical
infrastructure is shared and interconnected. This is also the very basis of its vulnerability.
Healthcare networks, financial systems, energy grids, and transportation are all highly
interconnected. This means that any failure in a single sector also cascades to the rest of the
system.
This means that the threats also encompass multiple aspects of the critical infrastructure, not
just one. For example, ransomware threats often attack essential services such as healthcare
or public services. This can have severe and widespread harmful consequences.

To address this, countries must consider building international regulatory frameworks to


ensure the safety of critical infrastructure. These regulatory frameworks must be international
in scope, recognizing that critical infrastructure protection is, at its core, a collaborative
effort. Nonetheless, beyond mere preventive measures, the committee should also consider
developing backup contingency plans and investing in new technologies that swiftly respond
to cyber threats.

Cyber Espionage and Information Warfare

The increased reliance on digital technology has meant new vulnerabilities have emerged.
Nation-states and other actors that seek to exploit these vulnerabilities have jumped at this
opportunity. This has resulted in new forms of cyber warfare and espionage. One particular
type of cyber warfare that is deeply concerning is state-sponsored cyber espionage. Hostile
nation-states may seek to acquire sensitive military, political, or economic information to get
an edge over another country. Cyber-attacks are also unique in that it isn’t easy to attribute
them to a specific source hence, ambiguity and anonymity can be maintained. This has made
it a desirable, relatively low-cost method of harming another country. As expected, this has
significant diplomatic ramifications for all countries as it erodes trust and unnecessarily
heightens tensions.

Beyond cyber-attacks, information warfare in the form of disinformation, propaganda, and


psychological operations to foment unrest by manipulating democratic processes,
manipulating public opinion, and eroding social cohesion has also become common.
Information warfare should be addressed in a way that focuses on safeguarding a country’s
sovereignty and independence. Practices that seek to disrupt the basic political life of another
country should be prevented through international frameworks.

Questions a resolution must answer:


1. What are the most common forms of malpractices in media censorship, both online
and offline?

2. What ethical and legal frameworks surround media censorship, and how can they be
strengthened to combat malpractices?

3. What role can technology play in both facilitating and combating media censorship?

4. What are the responsibilities of different stakeholders (individuals, corporations,


organizations, governments) in addressing cybersecurity vulnerabilities?

5. What innovative approaches and technologies can be used to improve cybersecurity


resilience and mitigate vulnerabilities?
6. How can we effectively foster international cooperation and collaboration to address
global cybersecurity challenges?

7. How can we balance protecting national security and ensuring freedom of expression
in the digital age?

Types of Documentation
Documentation is one of the most essential parts in a Model UN conference. There are
multiple forms of documents that delegates are required to prepare. The three important
documents that delegates of UNHRC at AIMUN IV will be required to prepare are as
follows:

1. Position Paper: A position paper is a document submitted by the delegates individually


before the Model UN conference. It outlines the country's stance on the agenda, providing a
brief summary of their perspective and proposed solutions.

2. Working Paper: A working paper is a collaborative document that delegates in a


committee together develop during the conference. It contains proposed solutions on the
agenda and is subject to debate and revision. It serves as an initial draft of a resolution and is
not yet an official committee document. It is not a mandatory document; delegates can often
wish directly to prepare the draft resolution.

3. Draft Resolution: A draft resolution is the final document presented in a committee that
outlines proposed solutions on the agenda. It is a formal document that specifies actions to
be taken to solve the problem at hand. Delegates debate and amend the draft resolution
before voting on its adoption as an official committee resolution.

This guide explains the position paper and draft resolution in detail, along with samples.

Position Paper Guidelines:


In simple terms, it will outline your country’s stance and the importance of the agenda. It is
an individual document and must reflect your country’s perspective.
Formatting:

● Font Size: 12

● Font: Times New Roman

● Text Alignment: Justified

● Paragraph Spacing: Single-spaced

● Line Spacing: 1.5

● Limit: 250 words

● Cover Page: Optional

● Watermark: The National Emblem is optional

● Citation/Referencing Style: MLA

● Citations/References must be included at the end of your paper

● Plagiarism, AI writing, or copy-pasting information from the Study Guide or any


other online source will nullify the Position Paper.

● Deadline will be announced later.


Sample Position Paper
Draft Resolution Guideline:
A draft resolution is a written legal document where a group of delegates address the issue of
the agenda the committee is discussing and compiles all the solutions together. Producing a
resolution is one of the principal objectives of a MUN as it compiles the results of all the
discussions, writings, and negotiations that occurred in the committee. It is mainly a written
suggestion for addressing a specific problem discussed in the committee and how the
involved parties would like to solve it realistically.
A draft resolution has three major parts:
1. Heading
2. Preambulatory clauses
3. Operative clauses
Heading: The first component included in a Draft Resolution (DR) is the draft resolution is
the heading. It contains four pieces of information: the committee name, the sponsors, the
signatories, and the topic. The topic and committee name ought to be self-evident. The
sponsors are the author delegates of the DR. They agree and support all the solutions
provided in the resolution. The signatories are the delegates who might not completely
support the resolution but would like to see it discussed. A draft resolution usually needs
several sponsors and signatories before being presented to the committee.

Preambulatory Clauses: The second section of the resolution draft is the preambulatory
clauses. All of the issues that the committee seeks to resolve are listed in the preambulatory
clauses. It could outline the justifications behind the committee's work on the issue and
highlight previous international actions. It may contain:
● Past UN resolutions, treaties, or conventions related to the topic.
● Past regional, non-governmental, or national efforts in resolving this topic.
● References to the UN Charter or other international frameworks and laws.
● Statements made by the Secretary-General or a relevant UN body or agency.
● General background info formation or facts about the topic, its significance, and its
impact.

Each preambulatory clause begins with a preambulatory phrase and ends with a comma.
One should start preambulatory clauses with preambulatory phrases. Here are some
examples of preambulatory phrases:

Preambulatory Phrases

Affirming Deeply conscious Fully aware Having received Recalling

Alarmed by Deeply convinced Fully believing Having studied Recognizing


Approving Deeply disturbed Further deploring Keeping in mind Referring

Aware of Deeply regretting Further recalling Noting with regret Seeking

Bearing in mind Desiring Guided by Noting with Taking into


deep concern account

Believing Emphasizing Having adopted Noting with Taking into


satisfaction consideration

Confident Expecting Having considered Noting further Taking note

Contemplating Expressing its Having Noting with Viewing with


appreciation considered approval appreciation
further

Convinced Expressing its Having devoted Observing Welcoming


satisfaction attention

Declaring Fulling Having examined Reaffirming

Deeply concerned Fully alarmed Having heard Realising

N.B. Any of these phrases can be reused by adding “further” or “deeply” in front of it. For
example, “Noting” can be reused by becoming “Further noting,” or “Concern by” can be
reused by becoming “Deeply Concerned by”.

Operative Clauses: The third and most crucial section of the Draft Resolution is the
operative clauses. It outlines the approaches the resolution's sponsors suggest to address the
problems. The issues indicated in the pre-ambulatory clauses should be addressed in
operative clauses. An operative clause should answer the “who, what, when, where, why, and
how” questions. By doing so you can strengthen the operative clauses. All of the operative
clauses should follow the format given below:
● Every operative clause should be numbered.
● Each operative clause should support the progression of your desired solution.
● Sub-clauses may be added to a clause to provide more information
and clarification.
● Operative clauses are punctuated by a semicolon, except your last
operative clause, which should end with a period (full stop).

You should write operative clauses starting with operative phrases. Some examples are:

Operative Phrases

Accepts Congratulates Endorses Further Resolves Sanctions

Affirms Considers Expresses its Has Resolved Solemnly Affirms


Appreciation

Approves Decides Expresses its Hope Hopes Strongly Condemns

Asks Declares Further asks Invites Strongly Urges


Accordingly

Authorizes Demands Further Calls for Notes Supports

Calls Deplores Further Invites Proclaims Suggests

Calls for Designates Further Proclaims Reaffirms Takes note of

Calls upon Draws the Further Reminds Recommends Transmits


Attention

Condemns Emphasizes Further Regrets Trusts


Recommends

Confirms Encourages Further Requests Reminds Urges

Requests Wishes

N.B. Any of these operative phrases can be reused by adding “further” or “strongly” in front
of it. For example: “Requests” can be reused by becoming “Further requests” or “Asks” can
be reused by becoming “Strongly asks”

Here’s a list of more preambulatory and operative phrases.

Annexure: You can add an annexure section to a draft resolution, though optional. An
annexure is like an extension of the operative clauses. If you cannot answer the how, when,
or where question in the operative clause, you can add an annexure to that specific clause. It
is not frequently used. If the answer to the how question is too long, then it is good to write it
in the annexure. By doing so you can keep your operative clauses well-ordered while still
keeping them precise.

The committee's most formal document is a draft resolution. The language used when writing
a draft resolution is crucial. It is strongly advised that you keep your writing formal and
adequate. It is also essential to be precise while writing a draft resolution. Conduct
appropriate research and gather data from reliable sources to strengthen the authenticity of
the solution you offer in the draft resolution.

Sponsors and Signatories:

Sponsors: A sponsor is a delegate or a group of delegates who have drafted the resolution.
They are a key player in developing solutions and have been selected to represent a specific
bloc. Sponsors, having read all the draft resolution points, agree to it completely. Sponsors
have to vote a ‘Yes’ to the draft resolution when it comes to voting. They cannot vote ‘No
‘or ‘Abstain’ on the voting.

Signatories: All countries who wish to support the draft resolution being discussed merely.
They can agree to one or more clauses but have not. They have no obligation regarding
voting. They can vote yes, no, or abstain as they wish and according to their roll call. In a
general assembly, at least 20% of the committee must be signatories for introducing a draft
resolution.

Sample Draft Resolution:


Draft Resolution 1.1
Committee: United Nations Human Rights Council

Agenda: Ethnic Cleansing of Rohingya people, and increased xenophobia, racism, and racial
discrimination worldwide

Sponsors: A, B, C [Full Official Name of Countries]

Signatories: X, Y, Z [Full Official Name of Countries]

The Human Rights Council,

Concerned about the lack of recognition of cultural diversity in human rights, justice, and the
right to development,

Reaffirming Clause 1. Article 4 of General Assembly Resolution 2312, "States granting


asylum shall not permit persons who have received asylum to engage in activities contrary to
the purposes and principles of the United Nations,"
Recognizing that all civilizations and cultures share a standard set of universal values,

Further reaffirming the 1951 Convention relating to the Status of Refugees, together with the
1967 Protocol,

1. Calls upon member nations, international organizations, and NGOs to support intercultural
and inter-communal initiatives on human rights to promote all human rights;

2. Requests the United Nations Educational, Scientific and Cultural Organization to support
the initiatives aimed at promoting intercultural, inter-religious and inter-ethnic dialogue on
human rights;

3. Stresses the necessity of using the media, new information, and communications
technologies freely not to create negative opinions about any specific ethnic or religious
group;

4. Requests humanitarian aid be sent in to help the civilians trapped in this conflict and the:

a. aid would mostly be in the form of food donations that would be distributed to the
refugees,

b. aid would be given to refugees located in Bangladesh to help ease the strain of the
additional people in the country;

5. Invites nations to encourage nongovernmental organizations and nonprofit organizations to


make contributions to aid the refugees;

6. The government of Myanmar urges UN investigators to carry out a complete and thorough
investigation of the region to allow the UN to assess the current situation in Myanmar better.

You might also like