Introduction To Internet Governance
Introduction To Internet Governance
The history of this book is long, in Internet time. The original texts and the overall approach,
including the five-basket methodology, were developed in 1997 for a training course on Information
and Communications Technology Policy for Commonwealth state officials. Since 1997, through
subsequent courses and online programmes, Diplo has trained close to 600 diplomats, computer
specialists, civil society activists and academics in the field of ICT/Internet Governance. With
every delivery of the course, materials were updated and improved.
In 2004, for the first time, Diplo published a print version of its materials on Internet Governance,
in a booklet entitled “Internet Governance – Issues, Actors and Divides.” This booklet formed part
of the Information Society Library, and was co-authored by Stefano Baldi, Eduardo Gelbstein and
Jovan Kurbalija. Special thanks are due to Eduardo Gelbstein, who made substantive contributions
in the sections dealing with cybersecurity, spam and privacy, and to Vladimir Radunovic and
Ginger Paque who updated the course materials. Comments and suggestions of other colleagues
are acknowledged in the text. Stefano Baldi, Eduardo Gelbstein and Vladimir Radunovic all
contributed significantly to developing the concepts behind the illustrations in the book.
In 2008, a special version of the booklet was published in cooperation with NIXI-India on the
occasion of the Internet Governance Forum 2008 held in Hyderabad, India.
This booklet has been prepared for the IGF 2009 (Sharm El Sheik, Egypt) in partnership with the
Ministry of Telecommunication of Egypt and the Commonwealth Internet Governance Forum.
ISBN: 978-99932-53-22-8
DiploFoundation
Malta: 4th Floor, Regional Building
Regional Rd.
Msida, MSD 2033, Malta
Switzerland: DiploFoundation
Rue de Lausanne 56
CH-1202 Genève 21, Switzerland
E-mail: [email protected]
Website: http://www.diplomacy.edu
Introduction
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
What Does Internet Governance Mean?. . . . . . . . . . . . . . . . . . . . . . . . . . . 8
The Evolution of Internet Governance. . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
The Internet Governance Cognitive Toolkit . . . . . . . . . . . . . . . . . . . . . . . 14
The Classification of Internet Governance Issues. . . . . . . . . . . . . . . . . . . 29
“Building under Construction”: Internet Governance –
Are We Building the 21st Century Tower of Babel?. . . . . . . . . . . . . . . . . 32
NOTES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
The Infrastructure and Standardisation Basket
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
The Telecommunications Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Transport Control Protocol/Internet Protocol (TCP/IP) . . . . . . . . . . . . . . 40
The Domain Name System (DNS). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Root Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Internet Service Providers (ISPs). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Internet Bandwidth Providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
An Economic Model of Internet Connectivity. . . . . . . . . . . . . . . . . . . . . . 52
Web Standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Cloud Computing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Convergence: Internet-Telecommunications-Multimedia. . . . . . . . . . . . 59
Cybersecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Spam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
NOTES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
The Legal Basket
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Legal Instruments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
National and Community Legal Instruments. . . . . . . . . . . . . . . . 77
International Legal Instruments . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Jurisdiction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Arbitration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Arbitration And The Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Intellectual Property Rights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Copyright. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Trademarks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Patents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Cybercrime. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Labour Law. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
NOTES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
The Economic Basket
E-Commerce. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Consumer Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Taxation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Digital Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
E-Payments: E-Banking and E-Money. . . . . . . . . . . . . . . . . . . . . . . . . . . 109
NOTES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
The Development Basket
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
The Digital Divide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Universal Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Strategies for Overcoming the Digital Divide. . . . . . . . . . . . . . . . . . . . . 120
Developing Telecommunications and
Internet Infrastructures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Financial Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Socio-Cultural Aspects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Telecommunication Policy and Regulation. . . . . . . . . . . . . . . . . 122
NOTES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
The Socio-Cultural Basket
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Human Rights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Content Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Privacy and Data Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Multilingualism and Cultural Diversity . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Global Public Goods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Rights of Persons With Disabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Education. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Child Safety Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
NOTES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Internet Governance Stakeholders
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Governments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Business Sector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Civil Society . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
International Organisations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Internet Community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Internet Corporation for Assigned Names and Numbers . . . . . . . . . . . 165
NOTES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Annex
Fourteen Lessons from the Internet Governance Forum. . . . . . . . . . . . 173
A Map for a Journey through Internet Governance. . . . . . . . . . . . . . . . 186
A Survey of the Evolution of Internet Governance until 2003. . . . . . . . 187
Diplo’s Internet Governance Cube. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
About the Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
SECTION 1
Introduction
Although Internet governance deals with the core of the digital world,
governance cannot be handled with a digital-binary logic of true/false
and good/bad. Instead, Internet governance demands many subtleties
and shades of meaning and perception; it thus requires an analogue
approach, covering a continuum of options and compromises.
Therefore, this book does not attempt to provide definite statements
on Internet governance issues. Rather, its aim is to purpose a practical
framework for analysis, discussion, and resolution of significant issues
in the field.
Introduction 7
INTRODUCTION
Internet
Some authors argue that the term “Internet” does not cover all of the exist-
ing aspects of global digital developments. Two other terms: “Information
Society” and “Information and Communications Technology” are usually
put forward as more comprehensive. They include areas that are outside
of the Internet domain, such as mobile telephony. The argument for the
use of the term “Internet,” however, is enhanced by the rapid transition of
global communication towards the use of Internet Protocol as the main
communications technical standard. The already ubiquitous Internet con-
tinues to expand at a rapid rate, not only in terms of the number of users
but also in terms of the services that it offers, notably Voice over Internet
Protocol (VoIP), which may displace conventional telephony.
Introduction 9
Governance
In the Internet governance debate, especially in the early phase of the
WSIS-2003, controversy arose over the term “governance” and it’s vari-
ous interpretations. According to one interpretation, governance is syn-
onymous with government. Many national delegations had this initial
understanding, leading to the interpretation that Internet governance
should be the business of governments and consequently addressed at the
inter-governmental level with the limited participation of other, mainly
non-state, actors.4 This interpretation clashed with a broader meaning of
the term “governance”, which includes the governance of affairs of any
institution, including non-governmental ones. This was the meaning
accepted by Internet communities, since it describes the way in which
the Internet has been governed since its early days.
The terminological confusion was further complicated by the translation
of the term “governance” into other languages. In Spanish, the term refers
primarily to public activities or government (gestión pública, gestión del
sector público, and función de gobierno). The reference to public activi-
ties or government also appears in French (gestion des affaires publiques,
efficacité de l’administration, qualité de l’administration, and mode de gou-
vernement). Portuguese follows a similar pattern by referring to the public
sector and government (gestão pública and administração pública).
10 Internet Governance
WSIS (2003-2005)
The World Summit on the Information Society (WSIS), held in Geneva
(2003) and Tunis (2005) officially placed the question of Internet
governance on diplomatic agendas. The focus of the Geneva phase of the
summit, preceded by a number of Preparatory Committees (PrepComs)
and regional meetings, was rather broad, with a range of issues related
to information and communication being put forward by participants.
In fact, during the first preparatory and regional meetings even the term
“Internet,” let alone “Internet governance,” was not used.5 Internet gov-
ernance was introduced to the WSIS process during the West Asia regional
meeting in January 2005 and after the Geneva summit became the key
issue of the WSIS negotiations.
After prolonged negotiations and last minute arrangements, the WSIS
Geneva summit agreed to establish the Working Group on Internet govern-
ance (WGIG). The WGIG prepared a report which was used as the basis for
negotiations at the second WSIS Summit held in Tunis (November 2005).
The WSIS Tunis Agenda for the Information Society elaborated on the ques-
tion of Internet governance, including adopting a definition, listing IG issues,
and establishing the Internet governance Forum. The Forum, which held its
first meeting in October 2006 in Athens and its second meeting in Rio de
Janeiro in November 2007, provides a new way for discussing Internet gov-
ernance issues. It is a multistakeholder body, convoked by the UN Secretary
General. The forum’s mandate will be revisited after five years.
12 Internet Governance
Developments in 2006
After the Tunis Summit, which took place in November 2005, three main
developments and events marked the Internet governance debate in 2006.
First was the expiration of the existing memorandum of understanding
(MoU) and the establishment of a new one between ICANN and the US
Department of Commerce. Some had hoped that this event would change
the relationship between ICANN and the US government and that the
former would become a new type of international organisation. However,
the new MoU only made the umbilical cord between ICANN and the US
government “thinner” but maintains the prospect of the eventual inter-
nationalisation of the status of ICANN.
The second event of 2006 was the Internet governance Forum in Athens.
It was the first such forum and, in many respects, it was an experiment
in multilateral diplomacy. The Forum was truly multistakeholder. All
players – states, businesses and civil society – participated on an equal
footing. The Forum also had an interesting organisational structure for
its main events and workshops. Journalists moderated the discussions
and the Forum therefore differed from the usual UN-style meeting for-
mat. However, some critics claimed that the Forum was only a “talk
show” without any tangible results in the form of a final document or
plan of action.
The third main development in 2006 was the ITU Plenipotentiary
Conference held in Antalya, Turkey, in November 2006. A new ITU
Secretary–General, Dr Hamadoun Touré, was elected. He announced a
stronger focus on cybersecurity and development assistance. It was also
expected that he would introduce new modalities in the ITU approach
to Internet governance.
Developments in 2007
In 2007, the ICANN discussion focused on “xxx” domains (for adult mate-
rials), re-opening debates on numerous governance points, including
whether ICANN should deal only with technical problems or also with
issues having public policy relevance. Interventions by the US and other
governments pertaining to “xxx” domains further raised the question of
how national governments should become involved in ICANN delibera-
tions. At the Second IGF, held in November 2007 in Rio de Janeiro, the
main development was adding critical Internet resources (names and
numbers) to the IGF agenda.
Introduction 13
Developments in 2008
The major development of 2008 which will continue to influence IG as
well as other policy spheres, was the election of Barack Obama as the US
President. During his presidential election campaign he used the Internet
and Web 2.0 tools intensively. Some even argue that one of the reasons for
his successful election was the use of the Internet. Among his advisors
one can find many people from the Internet industry, including the CEO
of Google. In addition to his techno-awareness, President Obama will
promote multilateralism which will inevitably influence discussion on
the internationalisation of ICANN and the development of the Internet
governance regime.
In 2008, net neutrality emerged as one of the most important IG issues.
It was mainly discussed in the United States between two main opposing
blocks. The issue of net neutrality even featured in the US presidential
campaign, with President Obama supporting net neutrality. Net neu-
trality is mainly supported by the so-called Internet industry includ-
ing companies such as Google, Yahoo! and Facebook. A change in the
architecture of the Internet triggered by a breach in net neutrality might
endanger their business. On the other side there are telecommunica-
tion companies, such as Verizon and AT&T, Internet service providers
and the multimedia industry. For different reasons, these industries
would like to see some sort of differentiation of packets travelling on
the Internet.
Another major development was fast growth of Facebook and social net-
working. When it comes to Internet governance, the increased use of Web
2.0 tools opened the issue of privacy and data protection on Facebook and
similar services.
Developments in 2009
The first part of 2009 saw the “Washington Belt” trying to figure out the
implications and future directions of US President Obama’s Internet-
related policy. Obama’s appointments to key Internet-related positions did
not bring any major surprises. They follow Obama’s support for an open
Internet. His team also pushed for the implementation of the principle
of net neutrality in accordance with promises made during his election
campaign.
The highlight of 2009 has been the conclusion of the “Affirmation
Commitments” between ICANN and the US Department of Commerce,
14 Internet Governance
The IG Cognitive Toolkit is a set of tools for developing policy and pre-
paring policy argumentation. It has numerous practical functions for
anyone involved in Internet governance. First, the Toolkit should help
navigate the vast amount of information, documents and studies gen-
erated around the Internet governance process. Second, it can help in
developing policy narrative and understanding the policy statements
of others. Ultimately, the Toolkit should improve the quality of negotia-
tions by increasing chances for compromises which are above the level
of the “least common denominator”.
The IG Cognitive Toolkit is part of the growing Internet governance
regime which is in the very early stages of development. Experience
from other international regimes (e.g. environment, air transport,
arms control) has shown that such regimes first tend to develop a
common reference framework, including values, perception of cause
and effect relationships, modes of reasoning, terminology, vocabu-
lary, jargon, and abbreviations. The reference framework is highly
relevant in political life. It shapes how we see particular issues and
what actions we take.
In many cases, the common framework is influenced by the specific
professional culture (the patterns of knowledge and behaviour shared
Introduction 15
The IG Cognitive Toolkit contains a wide variety of tools. Some are used
in addressing deeper policy controversies (narrow vs. broad approach to
IG) while others are used as rhetorical devices for argumentation and
building policy narrative (do not fix it if it is not broken).
An attempt to organise such tools, under the name “Internet governance
Toolkit” would include:
• approaches and patterns;
• guiding principles;
• analogies.
Like the process of Internet governance, the toolkit is in flux. Approaches,
patterns, guiding principles, and analogies emerge and disappear depend-
ing on their current relevance in the policy process.
the end of the WSIS. The discussions at the Internet Governance Forum in
Rio de Janeiro (November 2007) clearly highlight that the broad approach
does not mean that discourse should be vague. The return of the question
of core Internet resources (so called “ICANN issues”) in the Forum agenda
illustrates that the importance of the issues from the narrow approach
will also remain.
For example, in legal discussions, this approach argues that existing laws
can be applied to the Internet with only minor adjustments. In the eco-
nomic field, this approach argues that there is no difference between
regular and “e-” commerce. Consequently there is no need for special
legal treatment of “e-commerce.”
The “new-cyber” approach – or “new wine in new bottles” – argues that
the Internet is a fundamentally different communication system from
all previous ones. The main premise of the “cyber” approach is that the
Internet managed to de-link our social and political reality from the
(geographically separated) world of sovereign states. Cyberspace is dif-
ferent from real space and it requires a different form of governance. In
the legal field, the “cyber” school of thought argues that existing laws on
jurisdiction, cybercrime and contracts cannot be applied to the Internet
and that new laws must be created.
not private owners can be requested to manage this property in the public
interest and which parts of the Internet can be considered a global public
good are some of the difficult questions that need to be addressed. Most
recently, the question of the public nature of the Internet has been re-opened
through the debate on net neutrality.
Policy Uncertainty
The Internet governance debate is conducted in the context of high uncer-
tainty regarding the future technical development of the Internet, and
this uncertainty affected the Internet governance agenda. For example,
in 2002 when the WSIS process started, Google was just one of many
search engines. At the end of the process in November 2005, Google was
established as the primary company shaping Internet use. In 2002, the
use of blogs was in its infancy. Presently, bloggers sway governments,
push the limits of freedom of expression, and have considerable influence
on social and economic life. The list of technological developments with
relevance for Internet governance includes Facebook, Skype, YouTube,
Twitter and Wiki.
20 Internet Governance
Today, many think that the traditional core Internet governance issues
(ICANN-related issues) are gradually losing relevance in comparison to
questions regarding net neutrality, the convergence of different tech-
nologies (e.g., telephony, TV, and the Internet), and governances issues
regarding social networking (Facebook and MySpace) as well as the role
of Google and Wikipedia as “gate-keepers” to digitalised knowledge and
information.
GUIDING PRINCIPLES
Guiding principles represent certain values and interests that are central
to the emerging Internet governance regime. Some of those principles
have been adopted by the WSIS, such as transparency and inclusiveness.
Other principles have been introduced, mainly tacitly, through discus-
sions on Internet governance.
ing to which the network should merely transmit data between two endpoints
rather than introduce intermediaries, is often acclaimed as a guarantee of free
speech on the Internet. This view could lead to the wrong conclusion that tech-
nological solutions are sufficient for promoting and protecting social values.
The latest developments in the Internet, such as the use of firewall technolo-
gies for restricting the flow of information, prove that technology can be used
in many, seemingly contradictory, ways. Whenever possible, principles such
as free communication should be clearly stated at the policy level, not tacitly
presumed at the technical level. The technical solutions should strengthen
policy principles, but should not be the only way to promote them.
ANALOGIES
Internet – Telephony
Similarities: In the early Internet days this analogy was influenced by the
fact that the telephone was used for dial-up access. In addition, a functional
analogy holds between the telephone and the Internet (e-mail and chat),
both being means for direct and personal communication.
A more recent analogy between the telephone and the Internet focusses
on the possible use of the telephony numbering system as a solution for
the organisation of the domain name system.
Differences: The Internet uses packets instead of circuits (the telephone).
Unlike telephony, the Internet cannot guarantee services; it can only
guarantee a “best effort.” The analogy highlights only one aspect of the
Internet: communication via e-mail or chat. Other major Internet applica-
tions, such as the World Wide Web, interactive services, etc., do not share
common elements with telephony.
Used by: Those who oppose the regulation of Internet content (mainly
in the United States). If the Internet was analogous to the telephone, the
content of Internet communication could not be controlled, as is the case
with the telephone.
This analogy is also used by those who argue that the Internet should
be governed like other communication systems (e.g. telephony, post), by
national authorities with a coordinating role of international organisa-
tions, such as the ITU.6
Internet – Mail/Post
Similarities: There is an analogy in function, namely, the delivery of mes-
sages. The name itself, “e-mail,” highlights this similarity.
26 Internet Governance
Paul Twomy, former Chairman of Differences: This analogy covers only one
ICANN, used the following anal- Internet service – e-mail. Moreover, the
ogy between the postal system and postal service has a much more elabo-
ICANN’s function: “If you think of the rate intermediary structure between the
Internet as a post office or a postal sender and recipient of mail than the
system, domain name and IP address-
ing are essentially ensuring that the e-mail system, where the active inter-
addresses on the front of an envelope mediary function is performed by the
work. They are not about what you ISPs or an e-mail service provider like
put inside the envelope, who sends Yahoo! or Hotmail.
the envelope, who’s allowed to read
the envelope, how long it takes for theUsed by: The Universal Postal Convention
draws this analogy between mail and
envelope to get there, what is the price
of the envelope. None of those issues e-mail: “electronic mail is a postal serv-
are important for ICANN’s functions.
ice which uses telecommunications for
The function is focussing on just ensur-
ing that the address works.” transmitting.” This analogy can have
consequences concerning the delivery of
official documents, for instance: receiving
a court decision via e-mail would be considered an official delivery.
The families of US soldiers who died in Iraq have also attempted to make
use of the analogy between mail (letters) and e-mail in order to gain access
to their loved ones’ private e-mail and blogs, arguing that they should be
allowed to inherit e-mail and blogs as they would letters and diaries.
ISPs have found it difficult to deal with this highly emotional problem. Instead of
going along with the analogy between letters and e-mail, most ISPs have denied
access based on the privacy agreement they had signed with their users.
Internet – Television
Similarities: The initial analogy was related to the physical similarity
between computers and television screens. A more sophisticated analogy
draws on the use of both media – web and TV – for broadcasting.
Differences: The Internet is a broader medium than television. Aside from the
similarity between a computer screen and a TV screen, there are major structural
differences between them. Television is a one-to-many medium for broadcasting
to viewers, while the Internet facilitates many different types of communication
(one-to-one, one-to-many, many-to-many).
Used by: This analogy is used by those who wish to introduce stricter
content control to the Internet. In their view, due to its power as a mass
media tool similar to television, the Internet should be strictly controlled.
The US government attempted to use this analogy in the seminal “Reno
Introduction 27
vs. ACLU” Case. This case was prompted by the Communication Decency
Act passed by Congress, which stipulates strict content control in order
to prevent children from being exposed to pornographic materials via the
Internet. The court refused to recognise the television analogy.
Internet – Library
Similarities: The Internet is sometimes seen as a vast repository of infor-
mation and the term “library” is often used to describe it – “huge digital
library,” “cyber-library,” “Alexandrian Library of the 21st Century,” etc.
Differences: The storage of information and data is only one aspect of the
Internet, and there are considerable differences between libraries and
the Internet:
a) traditional libraries aim to serve individuals living in a particular
place (city, country, etc.), while the Internet is global;
b) books, articles, and journals are published using procedures to en-
sure quality (editors). The Internet does not always have editors;
c) libraries are organised according to specific classification schemes,
allowing users to locate the books in their collections. Apart from a
few directories, such as Yahoo! and Google, which cover only a small
part of the information available throughout the Internet, no such
classification scheme exists for the Internet;
d) apart from keyword descriptions, the contents of a library (text in
books and articles) are not accessible until the user borrows a partic-
ular book. The content of the Internet is immediately accessible via
search engines.
Used by: Various projects that aim to create a comprehensive system of
information and knowledge on particular issues (portals, databases, etc.).
Recently, the library analogy has been used in the context of a Google-book
project with the objective of digitalising all printed books.
Used by: This analogy was used in the context of the US “Digital
Millennium Copyright Act” (DMCA), which penalises institutions
that contribute to the infringement of copyrights (developing software
for breaking copyright protection, etc.). The counterargument in such
cases was that software developers, like VCR and photocopy machine
manufacturers, cannot predict whether their products will be used ille-
gally. This analogy was used in cases against the developers of Napster-
style software for peer-to-peer sharing of files, such as Grokster and
StreamCast.
Hamadoun Touré, ITU Secretary General, used an analogy between highways and
the Internet by relating highways to telecommunications and the Internet traffic
to trucks or cars: “I was giving a simple example, comparing Internet and telecom-
munications to trucks or cars and highways. It is not because you own the highways
that you are going to own all the trucks or cars running on them, and certainly
not the goods that they are transporting, or vice versa. It’s a simple analogy. But
in order to run your traffic smoothly, you need to know, when you are building
your roads, the weight, the height and the speed of the trucks, so that you build
the bridges accordingly. Otherwise, the system will not flow. For me, that’s the
relationship between the Internet and the telecommunications world. And they
are condemned to work together.”7
Internet – Highway
Similarities: This analogy is linked to the American’s fascination with
discovering new frontiers. Railroads and highways are usually part of
this process. The Internet as a frontier in the virtual world corresponds
metaphorically to highways in the real world.
Differences: Aside from the transportation aspect of the Internet, there
are no other similarities between the Internet and highways. The Internet
moves intangible materials (data), while highways facilitate the transpor-
tation of goods and people.
Used by: The highway analogy was used extensively in the mid-90s, after
Al Gore introduced the term “information superhighway.” The term “high-
way” was also used by the German government in order to justify the
introduction of a stricter Internet content control law in June 1997: “It’s
a liberal law that has nothing to do with censorship but clearly sets the
conditions for what a provider can and cannot do. The Internet is a means
of transporting and distributing knowledge... just as with highways, there
need to be guidelines for both kinds of traffic.”
Introduction 29
• issues related to the use of the Internet, including spam, network se-
curity and cybercrime;
• issues relevant to the Internet but have an impact much wider than
the Internet and for which existing organizations are responsible,
such as intellectual property rights (IPRs) or international trade;
• issues related to the developmental aspects of Internet governance,
in particular capacity-building in developing countries.
The agenda for the first Internet Governance Forum held in Athens (2006)
was build around the following thematic areas: Access, Security, Openness
and Diversity. At the second IGF in Rio de Janeiro (2007), the fifth thematic
area – Managing Critical Internet Resources – was added to the agenda.
Although the classification changes, Internet governance addresses more
or less the same set of 40-50 specific issues, with the relevance of particular
issues changing. For example, while Spam featured prominently in the
WGIG classification in 2004, its policy-relevance diminished at the IGF
meetings, where it became one of the less prominent themes within the
Security thematic area.
Diplo’s classification of Internet governance groups the set of the main
40-50 issues into five clusters. Adapting the terminology to the world of
diplomacy, Diplo has adopted the term “basket.” (The term “basket” was
introduced into diplomatic practice during the Organisation on Security
and Cooperation in Europe (OSCE) negotiations.) The following five bas-
kets have been used since 1997, when Diplo started developing its clas-
sification scheme:
1. infrastructure and standardisation;
2. legal;
3. economic;
4. development;
5. socio-cultural.
Diplo’s classification reflects both the above-mentioned (WGIG, IGF)
policy approaches as well as academic research in this field. It has been
constantly adjusted through several iterations based on the feedback from
students (alumni of 700 students as of 2009), research results and feedback
from the policy process.
NOTES
1
Numbers related to Internet growth should be taken with a healthy dose of scepticism
and caution. It is now widely documented that the telecommunication boom in the late
1990s and failure of many investments in this sector was caused by the completely unre-
alistic estimation that Internet traffic would double every three months. This completely
wrong assumption was mentioned on a few occasions even by authorities in the field of
communication, including Reed Hundt, the Chairman of the US Federal Communication
Commission. A number of articles have been written about this phenomenon, including:
Odyzko, “Internet Growth: Myth and Reality, Use and Abuse,” http://www.dtc.umn.
edu/~odlyzko/doc/internet.growth.myth.pdf, and “Internet as Hyperbole,” http://folk.
uio.no/gisle/essay/diff.html (accessed on 14 November 2008).
2
The WGIG definition follows the pattern of frequently-used definitions in the regime
theory. The founder of regime theory, Stephen D. Krasner, notes that “Regimes can
be defined as sets of implicit or explicit principles, norms, rules, and decision-making
procedures around which actors’ expectations converge in a given area of international
relations. Principles are beliefs of fact, causation, and rectitude. Norms are standards
of behaviour defined in terms of rights and obligations. Rules are specific prescriptions
or proscriptions for action. Decision-making procedures are prevailing practices for
making and implementing collective choice.” (Krasner, Stephen (1983): “Introduction,”
in Stephen D. Krasner (ed.) International Regimes, Ithaca, NY: Cornell University
Press)
3
Shannon, Victoria (2006) “What’s in an ‘i’? Internet Governance”, International Herald
Tribune, 3 December, available from http://www.iht.com/articles/2006/12/03/tech-
nology/btitu.php (accessed on 14 November 2008).
4
The terminological confusion was highlighted by the way the term “governance” was
used by some international organisations. For example, the term “good governance”
has been used by the World Bank to promote the reform of states by introducing
more transparency, reducing corruption, and increasing the efficiency of administra-
tion. In this context, the term “governance” was directly related to core government
functions.
5
For the evolution of the use of the word “Internet” in the preparation for the Geneva
summit consult, DiploFoundation (2003) The Emerging Language of ICT Diplomacy –
Key Words, available from http://www.diplomacy.edu/IS/Language/html/words.htm
(accessed on 14 November 2008).
6
Volker Kitz provides an argument for the analogy between administration of telephony
systems and Internet names and numbers. See Volker Kitz (2004) ICANN May Be the
Only Game in Town, But Marina del Rey Isn’t the Only Town on Earth: Some Thoughts
on the So-Called “Uniqueness” of the Internet, available from http://www.smu.edu/
csr/articles/2004/Winter/Kitz.pdf (accessed on 14 November 2008).
7
Excerpts from the speech delivered at the ICANN Meeting in Cairo (6 November
2008); visit: https://cai.icann.org/files/meetings/cairo2008/toure-speech-06nov08.
txt . (accessed on 14 November 2008).
SECTION 2
The Infrastructure
and Standardisation
Basket
The Infrastructure and Standardisation Basket 37
The second group consists of issues related to safeguarding the secure and
stable operation of the Internet infrastructure, and includes cybersecurity,
encryption, and spam.
38 Internet Governance
THE TELECOMMUNICATION
INFRASTRUCTURE
THE ISSUES
THE ISSUES
THE ISSUES
The main opposition to the creation of new gTLDs originates from the
business sector, whose concern is that increasing the number of domains
would complicate the protection of their trademarks.
Under pressure to introduce new gTLDs, ICANN initiated consultations to
design a new policy in this field. The new policy should address how to resolve
competing claims for gTLDs, questions of public morality, and registration fees,
among others. The new policy for gTLDs should be introduced in 2009.
names alongside English ones. The IDN technical solutions are currently
undergoing testing with ICANN.
Apart from the technical difficulties, the next, probably more complex,
challenge will be to develop policy and management procedures. There
is increasing pressure for IDN to be managed by countries or groups of
countries speaking the same language. For example, the Chinese govern-
ment has indicated on a number of occasions that IDN in Chinese should
be managed by China. A similar request has been made by Russia for
Cyrillic script. The introduction of an IDN policy will be one of the main
tests for the current Internet governance regime.
ROOT SERVERS
At the top of the hierarchical structure of the domain name system, root
servers attract a lot of attention. They are a part of most policy and aca-
demic debates on Internet governance issues.
the DNS system and the faster resolution of Internet addresses (with the
Anycast scheme, the resolving servers are closer to the end users).
The 13 root servers are managed by a diversity of organisations: academic/
public institutions, commercial companies and government institutions.
Institutions managing root servers receive a root zone file proposed by IANA
(ICANN) and approved by the US Government (Department of Commerce,
DOC). Once the content is approved by the DOC, it is entered into the master
root server operated by VeriSign under contract with the DOC.
The file in the master root server is then automatically replicated in all the
other root servers. Thus, it is theoretically possible for the US Government
to introduce unilateral changes to the entire DNS. This is a source of con-
cern to many governments.
THE ISSUES
Since ISPs connect end users to the Internet, they provide the most direct
and straightforward option for the enforcement of legal rules on the
Internet. With the Internet’s growing commercial relevance and increas-
ing cybersecurity concerns, many states have started concentrating their
law enforcement efforts on ISPs.
THE ISSUES
higher prices, often a lower quality of service, and fails to reduce the digital
divide. In some cases, telecommunication monopolies tolerate the exist-
ence of other ISPs, but interfere at the operational level (e.g. by providing
lower bandwidths or causing disruptions in services).
The problem of spam exposes ISPs to new difficulties. For instance, the
Verizon company’s anti-spam filtering led to a court case. Besides spam,
Verizon’s filter also blocked legitimate messages. This caused inconvenience
to users who did not receive their legitimate e-mail, which led them to initiate
a court case against Verizon.21
The Internet access architecture consists of three tiers. ISPs that connect
end users constitute Tier 3. Tiers 1 and 2 consist of the Internet bandwidth
carriers. Tier 1 carriers are the major IBPs. They usually have peering
arrangements with other Tier 1 IBPs.22 The main difference between Tier
1 and Tier 2 IBPs is that Tier 1 IBPs exchange traffic through peering,
while Tier 2 IBPs have to pay transit fees to Tier 1 providers.23
Tier 1 is usually run by large companies, such as MCI, AT&T, Cable
Wireless, and France Telecom. In the field of Internet backbone carriers,
traditional telecommunication companies have extended their global
market presence to Internet backbones.
THE ISSUES
AN ECONOMIC MODEL OF
INTERNET CONNECTIVITY
IBP
IBP IBP
IBP
IXP
IBP (Internet
Backbone Provider) ISP
·40 main IBPs
·5 top-tier IBPs IXP
IXP (Internet
OTHER EXPENSES: eXchange Point)
·Equipment ·Many ISPs
·Telecom Charges TRANSIT ·National IXPs
·Licences, etc. ·ISP pays IBP ISP
·Running Costs for traffic "MULTILATERAL ISP
PEERING"
·Fee for IXP ISP
ISP (Internet Service Provider) connection
·The Key Link between Users
and Infrastructure ISP
·Approx. 10,000 ISPs Worldwide "BILATERAL PEERING" Other
·No financial settlement ISP
·Cost of connection
PAY FOR ·Only traffic between
INTERNET ACCESS two ISPs
INBOUND/OUTBOUND TRAFFIC
INTERNET
USERS
THE ISSUES
WEB STANDARDS
By the late 80s, the battle over network standards was over. TCP/IP gradu-
ally became the main network protocol, marginalising other standards,
such as the ITU-supported X-25 (part of the Open Systems Interconnection
architecture) and many proprietary standards, such as IBM’s SNA. While the
Internet facilitated normal communication between a variety of networks
via TCP/IP, the system still lacked common applications standards.
A solution was developed by Tim Berners-Lee and his colleagues at CERN
in Geneva, consisting of a new standard for sharing information over the
Internet, called HTML (HyperText Mark-up Language, really just a sim-
plification of an existing ISO standard called SGML). Content displayed
on the Internet first had to be organised according to HTML standards.
HTML as the basis of the World Wide Web paved the way for the Internet’s
exponential growth.
Since its first version, HTML has been constantly upgraded with new fea-
tures. The growing relevance of the Internet has put the question of the
standardisation of HTML into focus. This was particularly relevant during
the “Browser Wars” between Netscape and Microsoft, when each company
tried to strengthen its market position by influencing HTML standards.
While basic HTML only handled text and photos, new Internet applica-
tions required more sophisticated technologies for managing databases,
The Infrastructure and Standardisation Basket 57
CLOUD COMPUTING
The term “cloud computing” is used to describe a new trend in the compu-
ter industry based on the use of computer applications as services delivered
from huge “server farms”. The first glimpse of cloud computing is already
available with the move of e-mail from our hard-disks to mail servers
(Gmail, Yahoo, Hotmail), the use of online word processors (wiki, Google
services). Social networking applications such as Facebook and blogs fur-
ther accelerated trend towards cloud computing. More and more of our dig-
ital assets are moving from our hard disk to the “cloud”. The main players
in cloud computing are Google, Microsoft, Apple, Amazon and Facebook,
who either already have or plan to develop big “server farms”.
Historians of technology can notice that with cloud computing we close
the circle. In the early days of computers, there were powerful main-frame
computers and dumb workstations. The power was in the center. After
that, for a long time, with PCs and Windows applications, computer power
moved to the edges. Is the circle going to be closed with “cloud comput-
ing”? Are we going to have a few big central computers/server farms and
billions of “dumb” units in the form of notebooks, monitors and mobile
phones? The answer to this and other questions will need time. Currently,
we can identify a few Internet governance issues which are very likely to
emerge in parallel with the development of cloud computing.
First, with the more services delivered online, modern society will increase
its dependence on the Internet. In the past, with the Internet down we
58 Internet Governance
weren’t able to send e-mail or browse the Net. In the era of “cloud com-
puting” we may not even be able to write the text or do calculations. This
higher dependence on the Internet will imply higher pressure on its robust-
ness and reliability. It will inevitably lead towards stronger a Internet
governance regime and higher involvement of governments.
Second, with more of our personal data stored in clouds, the question of
privacy and data protection will become central. Will we have control of
our text files, e-mail and other data? May cloud operators use it without
our permission? Who will have access to our data?
Third, with a growing volume of social assets going digital, countries may
become uncomfortable with having national assets outside national “bor-
ders”. They may try to create “national” or “regional” clouds or make sure
that existing clouds are managed with some international supervision.
Nationalisation of “clouds” could be further accelerated by the fact that
all main operators in this field are based in the United States. Some argue
that the current ICANN-centred debate may be replaced by an Internet
governance debate on the regulation of cloud computing.
Fourth, with diverse operators of cloud computing, the question of stand-
ards is becoming highly important. The adoption of common standards
will ensure a smooth transfer of data among different clouds (e.g. from
Google to Apple). One possibility which is being discussed is the adoption
of open standards by the main players in cloud computing.
When it comes to cloud computing there are more questions than answers.
Internet governance of cloud computing is likely to emerge through the
interplay of various actors and bodies. For example, the European Union
is concerned with privacy and data protection. The “Safe Harbour” agree-
ment which was supposed to solve the problem of different privacy regimes
in the USA and EU does not work well. With more digital data crossing
the Atlantic Ocean, the EU and USA will have to address the question of
protection of privacy according to EU standards by the USA companies,
the main operators in cloud computing. When it comes to standards, it is
very likely that the main companies will agree among themselves. Google
has already started a strong push towards open standards by establish-
ing the “Data Liberation Front”, aimed at ensuring a smooth transition
of data among different clouds. These are the first building blocks that
will address the question of the Internet governance of “cloud computing”.
Others are likely to emerge as a solution for concrete policy problems.
The Infrastructure and Standardisation Basket 59
CONVERGENCE: INTERNET-
TELECOMMUNICATION-MULTIMEDIA
The broad and prevailing use of the Internet Protocols has aided in the
convergence of technological platforms for telecommunication, broadcast-
ing, and information delivery. Today, we can make telephone calls, watch
TV, and share music on our computers via the Internet. Only a few years
ago it was handled by different systems.
In the field of traditional telecommunication, the main point of conver-
gence is the Voice over Internet Protocol (VoIP). The growing popularity
of VoIP systems such as Skype is based on lower price, the possibility of
integrating data and voice communication lines, and the use of advanced
PC-based tools. With YouTube and similar services, the Internet is also
converging with traditional multimedia and entertainment services.
While technical convergence is going ahead at a rapid pace, its economic
and legal consequences will require some time to evolve.
THE ISSUES
CYBERSECURITY
THE ISSUES
ENCRYPTION
SPAM
On the legal side, many nation states have reacted by introducing new
anti-spam laws. In the US, the Can-Spam Law involves a delicate bal-
ance between allowing e-mail based promotion and preventing spam.39
Although the law prescribes severe sentences for distributing spam,
including prison terms of up to five years, some of its provisions, accord-
ing to critics, tolerate or might even encourage spam activity. The start-
ing, “default,” position set out in the law is that spam is allowed until
the receiver of spam messages says “stop” (by using an opt-out clause).
Since the law was adopted in December 2003, spam statistics have not
evidenced a decrease in the number of spam messages.
In July 2003, the European Union introduced its own anti-spam law as
part of its directive on privacy and electronic communications. The EU
law encourages self-regulation and private sector initiatives that would
lead towards a reduction in spam.39 In November 2006, the European
Commission adopted its Communication on fighting spam, spyware and
malicious software. The Communication identifies a number of actions to
promote the implementation and enforcement of the existing legislation
outlined above, as the lack of enforcement is seen as the main problem.
law carried out by the Institute for Information Law at the University of
Amsterdam: “The simple fact that most spam originates from outside the
EU restricts the European Union’s Directive’s effectiveness considerably.”
A global solution is required, implemented through an international treaty
or some similar mechanism.
A Memorandum of Understanding signed by Australia, Korea, and the UK
is one of the first examples of international cooperation in the anti-spam
campaign.
The OECD established a Task Force on spam and prepared an anti-spam
toolkit. The ITU has also been proactive by organising the Thematic Meeting
on Countering Spam (2004) for considering various possibilities of establish-
ing a global Memorandum of Understanding on Combating Spam. At the
regional level, the EU established the Network of Anti-Spam Enforcement
Agencies and APEC prepared a set of Consumer Guidelines.
Another possible anti-spam approach was undertaken by the leading Internet
companies that host e-mail accounts: America Online, British Telecom,
Comcast, EarthLink, Microsoft, and Yahoo!. They established the Anti-Spam
Technical Alliance (ASTA) with the main task of coordinating technical and
policy-related anti-spam activities.
THE ISSUES
NOTES
1
The terms Internet and WWW are sometimes used interchangeably, however, there is
a difference. The Internet is a vast network of networks and covers a number of differ-
ent services. Sometimes, the term Internet is used to encompass everything, including
infrastructure, applications (e-mail, ftp, Web) and content. The World Wide Web is
just one of many Internet applications, a system of interlinked documents connected
with the help of the HyperText Transfer Protocol (HTTP).
2
Internet transfer via an electric grid is called Power Line Communication (PLC). The
use of the power grid would make the Internet more accessible to many users. For a
technical and organisational review of this facility, please consult: “Addressing the
Digital Divide with IPv6-enabled Broadband Power Line Communication” (Internet
Society, ISOC Member Briefing No. 13; available at http://www.isoc.org/briefings/013;
accessed on 14 November 2008).
3
The liberalisation of telecommunication markets of WTO members was formalised in
1998 in the so-called Basic Telecommunication Agreement (BTA). Following the adop-
tion of the BTA, more than 100 countries began the liberalisation process, characterised
by the privatisation of national telecommunication monopolies, the introduction of
competition, and the establishment of national regulators. The agreement is formally
called “The Fourth Protocol to the General Agreement on Trade in Services” (adopted
on 30 April 1996 and entering into force on 5 February 1998); http://www.wto.org/
english/tratop_e/serv_e/4prote_e.htm (accessed on 13 November 2008).
4
One of the controversies surrounding the WSIS was the ITU’s intention to become
more involved in the Internet governance process, especially within a domain handled
by ICANN. For more information about ITU’s Internet policy, please consult: http://
www.itu.int/osg/spu/ip/ (accessed on 14 November 2008).
5
For more information about the WTO’s role in the field of telecommunication, please
consult http://www.wto.org/english/tratop_e/serv_e/telecom_e/telecom_e.htm
(accessed on 14 November 2008).
6
Commonly, the opinion is that states may collect more revenue from the market
monopoly of the national operators; the opponents argue that, with the liberalisation
of market, the overall market value rises, thus bringing more income to the state than
in case of monopoly.
7
The current RIRs are: ARIN (the American Registry for Internet Numbers), APNIC
(the Asia Pacific Network Information Centre), LACNIC (the Latin American and
Caribbean IP Address Regional Registry), RIPE NCC (Reseaux IP Européens Network
Coordination Centre – covering Europe and the Middle East) and AFRINIC (the
African Network Information Centre). A detailed explanation of the RIR system is
available at: https://www.ripe.net/info/resource-admin/rir-system.html (accessed
on 14 November 2008).
8
For a detailed discussion on IPv6, please consult the research project: “IP Allocation
and IPv6” by Jean Philémon Kissangou, Marsha Guthrie, and Mwende Njiraini, a part of
the 2005 Internet Governance Capacity Building Programme: http://textus.diplomacy.
edu/Textusbin/portal/Ghome.asp?IDspace=84 (accessed on 14 November 2008).
9
For a comprehensive and highly technical survey of TCP/IP Security, please consult: Chris
Chambers, Justin Dolske, and Jayaraman Iyer, TCP/IP Security, Department of Computer
The Infrastructure and Standardisation Basket 71
22
Peering is “a bi-lateral agreement made by network operators to guarantee access to
each others’ customers at no cost to either party,” as defined by HSCGroup (www.
hscgroup.co.uk). The peering arrangement is a mutual benefit, and is also common
among the ISPs, as well as telecom operators.
23
Tier 2 Internet Bandwidth Providers are usually called ICP (Internet Connection
Points) or Internet Gateways.
24
Andrew Odlyzko views the question of pricing and architecture on the Internet from
a historical perspective. Identifying the thread in the pricing policy from the pricing
of transportation systems in the ancient world, he links with the current Internet
pricing policy. For more information, please consult: Andrew Odlyzko, “Pricing and
Architecture of the Internet: Historical Perspectives from Telecommunications and
Transportation” http://www.dtc.umn.edu/~odlyzko/doc/pricing.architecture.pdf
(accessed on 14 November 2008)
25
Shawn O’Donnel, in the article “An Economic Map of the Internet,” provides an analysis
of how “the Internet dollar flows,” explaining where the consumer’s ISP dollar goes.
http://itc.mit.edu/itel/docs/2002/Internet_Map.pdf; link was suggested by Djordje
Marinkovic, Diplo’s Internet Governance Portal).
26
Thuy T. T. Nguyen and Grenville J. Armitage, “Evaluating Internet Pricing Schemes: A
Three-Dimensional Visual Model,” ETRI Journal, vol.27, no.1, Feb. 2005, pp. 64-74.
27
See the website, which is an “online market” of Internet resources, offering bandwidth,
Internet access and other Internet resources: http://www.bandwidthmarket.com/
(accessed on 14 November 2008).
28
Geoff Huston, “Where’s the Money? – Internet Interconnection and Financial
Settlements,” The ISP Column, Internet Society (January 2005), http://ispcolumn.
isoc.org/2005-01/interconns.pdf (accessed on 14 November 2008).
29
“The Halfway Proposition: Background Paper on Reverse Subsidy of G8 Countries by
African ISPs,” Conference of African Ministers of Finance, Planning and Economic
Development, Johannesburg, South Africa, 19 October 2002.
30
For a comprehensive survey of interconnection costs, please consult: B. Esmat and
Juan Fernandez, “International Internet Connections Costs” in William J. Drake,
“Reforming Internet Governance: Perspectives from the Working Group on Internet
Governance (WGIG),” New York: 2005, pp. 73-86. Mike Jensen, in “Interconnection
Costs” (APC: 2005), provides a comprehensive analysis of the topic at: http://rights.
apc.org/documents/interconnection_costs.pdf (accessed on 14 November 2008).
31
Geoff Huston, “Where’s the Money? Internet Interconnection and Financial Settlement,”
The ISP Column, January 2005, Internet Society, pp. 7-9.
32
One of the limitations of negotiating this issue between governments is that most inter-
connection agreements are concluded between private telecommunication operators.
They are often confidential.
33
Please consult the list of regional and national IXPs: http://en.wikipedia.org/wiki/
Internet_Exchange_Point#List_of_IXPs_and_IXP-operators (accessed on 14 November
2008).
34
For the potential of IXPs in Africa, please consult: “Internet Exchange Points: Their
Importance to the Development of the Internet and Strategies for Their Deployment
The Infrastructure and Standardisation Basket 73
LEGAL INSTRUMENTS
There is a wide variety of legal instruments that has either already been
applied or could be applied to Internet governance:
taxes) and sanctions specify punishments in case the rules are not observed
(e.g., fines, imprisonment, the death penalty in some societies).
Legislative activities have progressively intensified in the field of the Internet.
This is especially the case within OECD countries, where the Internet is
widespread and has a high degree of impact on economic and social rela-
tions. To date, the priority areas for legislative
Regardless of whether the “real”
or “cyber” approach is more appro-
regulations have been privacy, data protec-
priate, the general principle remains tion, intellectual property, taxation, and
that laws do not make prohib- cybercrime.
ited behaviour impossible, only
punishable. The fact that fraud is Yet, social relations are too complex to be reg-
prohibited in both the “cyber” and ulated only by legislators. Society is dynamic
“real” world does not mean that and legislation always lags behind change.
fraud will be eradicated as a result. This is particularly noticeable in this day
This distinction is relevant because
one of the frequent arguments for
and age, when technological development
separate “cyber” regulations is that reshapes social reality much faster than leg-
prohibited behaviour (fraud, crime, islators can react. Sometimes, rules become
etc.) is already prevalent in cyber- obsolete even before they can be adopted. The
space and that “real” law regulations risk of legal obsolescence is an important
cannot be efficiently used.
consideration in Internet regulation.
Social Norms (Customs)
Like legislation, social norms proscribe certain behaviour. Unlike legisla-
tion, no state power enforces those norms. They are enforced by the com-
munity through peer-to-peer pressure. In the early days of the Internet,
its use was ruled by a set of social norms labelled “netiquette,” where peer
pressure and exclusion were the main sanctions. During this period in
which the Internet was used primarily by relatively small, mainly aca-
demic communities, social rules were widely observed. The growth of the
Internet has made those rules inefficient. This type of regulation can still
be used, however, within restricted groups with strong community ties.
Self-Regulation
The US government White Paper on Internet governance (1998) proposes
self-regulation as the preferred regulatory mechanism for the Internet.
Self-regulation has elements in common with previously described social
norms. The main difference is that unlike social norms, which typically
involve a diffuse regulatory system, self-regulation is based on an inten-
tional and well-organised approach. Self-regulation rules are usually
codified in codes of practice or good conduct.
The Legal Basket 79
Jurisprudence
Jurisprudence (court decisions) constitutes an important element of the
US legal system, the first to address Internet legal issues. In this system,
precedents create law, especially in cases involving the regulation of new
issues, such as the Internet. Judges have to decide cases even if they do not
have the necessary tools – legal rules.
The first legal tool judges use is legal analogy, where something new is
related to something familiar. Most legal cases concerning the Internet are
solved through analogies. A list of analogies is available on pages 21-26.
(e.g., legal relations involving two or more entities from different coun-
tries). The criteria for identifying the applicable jurisdiction and law
include the link between an individual and national jurisdiction (e.g.,
nationality, domicile) or the link between a particular transaction and
national jurisdiction (e.g., where the contract was concluded, where the
exchange took place).
International Conventions
The main set of conventions on Internet-related issues was adopted by the
ITU, with the International Telecommunication Regulation (1988) being
the most important for preparing a telecommunication policy framework
for subsequent Internet developments. Apart from the ITU conventions,
the only convention that deals directly with Internet-related issues is the
Council of Europe Cybercrime Convention. However, many other interna-
tional legal instruments address broader aspects of Internet governance,
such as human rights, trade and intellectual property rights.
The Legal Basket 81
Soft Law
“Soft law” has become a frequently used term in the Internet governance
debate. Most definitions of soft law focus on what it is not: it is not a legally
binding instrument. Since it is not legally binding, it cannot be enforced
through international courts or other dispute resolution mechanisms.
Soft law instruments contain principles and norms rather than specific
rules. It is usually found in international documents such as declarations,
guidelines, and model laws.
The main WSIS documents, including the Final Declaration, Plan of
Action, and Regional Declarations have the potential to develop certain
soft law norms. They are not legally binding, but they are usually the
result of prolonged negotiations and acceptance by all countries. The
commitment that nation states and other stakeholders put into negotiat-
ing soft law instruments and in reaching a necessary consensus creates
the first element in considering that such documents are more than
simple political declarations.3
Soft law provides certain advantages in addressing Internet governance
issues. First, it is a less formal approach, not requiring the official com-
mitment of states and, thereby, not requiring prolonged negotiations.
Second, it is flexible enough to facilitate the testing of new approaches
82 Internet Governance
Ius Cogens
Ius cogens is described by the Vienna Convention on the Law of Treaties
as a “norm, accepted and recognised by the international community of
States as a whole, from which no derogation is permitted and which can
be modified only by a subsequent norm of general international law hav-
ing the same character.”4 Professor Brownlie lists the following examples
of ius cogens rules: the prohibition of the use of force, the law of genocide,
the principle of racial non-discrimination, crimes against humanity, the
rules prohibiting trade in slaves and piracy.5 In Internet governance, ius
cogens could be used for the introduction of a certain set of rules such as
the prohibition of online child pornography.
JURISDICTION
CONFLICT OF JURISDICTION
The principles for establishing jurisdiction (territoriality, nationality, and
effect) inevitably lead to situations where jurisdiction is invoked by courts
from several states. Problems with jurisdiction arise when disputes involve
84 Internet Governance
ARBITRATION
Knowledge and ideas are key resources in the global economy. The protec-
tion of knowledge and ideas, through Intellectual Property Rights (IPRs),
has become one of the predominant issues in the Internet governance
debate, and has a strong development-oriented component.
IPRs have been affected by the development of the Internet, mainly through
the digitisation of knowledge and information, as well as through new
possibilities for their manipulation. Internet-related IPRs include copy-
right, trademarks, and patents.16
COPYRIGHT
pasting” texts from the Web to more complex activities, such as the dis-
tribution of music and video files via the Net without significant cost.
Paradoxically, the Internet also empowers copyright holders, by providing
them with more powerful technical tools for protecting and monitor-
ing the use of copyright material. In the most extreme case, copyright
holders can prohibit access to copyrighted materials altogether, which
would render the whole concept of copyright irrelevant.
These developments endanger the delicate balance between authors’
rights and the public interest, which is the very basis of the copyright
law.
So far, copyright holders, represented by the major record and multime-
dia companies, have been more proactive in protecting their interests.
The public interest has only been vaguely perceived and not sufficiently
protected. This however has gradually been changing, mainly through
numerous global initiatives focusing on the open access to knowledge
and information.
file-sharing software.
Following DMCA pro-
visions, the US Record
Association requested
these companies to desist
from the development of
file-sharing technology
that contributes to the
infringement of copy-
rights. Initially, the US
courts chose not to hold
software companies like
Grokster and StreamCast
responsible for possible
copyright infringement,
under reasonable cir-
cumstances. However,
in June 2005, the US
Supreme Court ruled
that software developers
were responsible for any
possible misuses of their
software.
• “interdiction,” preventing access to the Net for those who try to down-
load pirated music.
Professor Lawrence Lessig, of the Stanford Law School, has warned
that such measures might be illegal. He noted that among the measures
passed to deal with copyright infringement, those specified above were
not included. Would the companies that took such self-help measures
be breaking the law?
THE ISSUES
Amend Existing or Develop New Copyright Mechanisms?
How should copyright mechanisms be adjusted to reflect the profound
changes effected by ICT and Internet developments? One answer sug-
gested by the US government White Paper on Intellectual Property and
the National Information Infrastructure is that only minor changes are
needed, mainly through “dematerialising” the copyright concepts of “fixa-
tion,” “distribution,” “transmission,” and “publication.” This approach
was followed in the main international copyright treaties, including the
Trade-Related aspects of Intellectual Property Rights (TRIPS) and WIPO
Copyright Conventions.
However, the opposite view argues that changes in the legal system must
be profound, since copyright in the digital era no longer refers to the “right
to prevent copying” but also to the “right to prevent access.” Ultimately,
with ever-greater technical possibilities of restricting access to digital
materials, one can question whether copyright protection is necessary at
The Legal Basket 91
all. It remains to be seen how the public interest, the second part of the
copyright equation, will be protected.
TRADEMARKS
PATENTS
Some patents have been granted for business processes, and some of these
were controversial, such as British Telecom’s request for licence fees for
the patent on hypertext links, which it registered in the 1980s. In August
2002, the case was dismissed.18 If British Telecom had won this case,
Internet users would have to pay a fee for each hypertext link created
or used. It is important to stress that the practice of granting patents to
software and Internet-related procedures has not been accepted in Europe
and other regions.19
CYBERCRIME
THE ISSUES
Definition of Cybercrime
The definition of cybercrime is one of the core issues of cyberlaw, since it
will uphold a practical legal result by also impacting the coverage of cyber-
crime. If the focus is on offences committed against computer systems,
cybercrime would include: unauthorised access, damage to computer data
or programs, sabotage to hinder the functioning of a computer system or
network, unauthorised interception of data to, from, or within a system or
network, as well as computer espionage. A definition of cybercrime as all
crimes committed via the Internet and computer systems would include
a broader range of crimes, including those specified in the Cybercrime
94 Internet Governance
LABOUR LAW
NOTES
1
One of the strongest supporters of the “real law” approach is Judge Frank Easterbook
who is quoted as saying, “go home, cyberlaw does not exist.” In the article “Cyberspace
and the Law of the Horse” he argues that although horses were very important there
was never a Law of the Horse. Judge Easterbrook argues that there is a need to concen-
trate on the core legal instruments, such as contracts, responsibility, etc.; http://www.
law.upenn.edu/law619/f2001/week15/easterbrook.pdf. Judge Frank Easterbrook’s
argument provoked several reactions, including one from Lawrence Lessig in The Law
of the Horse: What Cyberlaw Might Teach; http://www.lessig.org/content/articles/
works/finalhls.pdf (accessed on 14 November 2008).
2
A few international attempts have been made to harmonise international private law.
The main global forum is the Hague Conference on International Private Law, which
has adopted numerous conventions in this field.
3
There is a high frequency of the use of the word “should” in the WSIS documents,
one of the features of soft law instruments. For more information consult: Jovan
Kurbalija, The Emerging Language of ICT Diplomacy—Qualitative Analysis of Terms
and Concepts, DiploFoundation,
4
Article 53 of the 1969 Vienna Convention on the Law of Treaties.
5
Ian Brownlie, Principles of Public International Law, 5th Ed. (Oxford: Oxford
University Press, 1999), p. 513.
6
For more information see:
• Richard Paul Salis, A Summary of the American Bar Association’s (ABA) Jurisdiction
in Cyberspace Project: “Achieving Legal and Business Order in Cyberspace: A Report
on Global Jurisdiction Issues Created by the Internet,” available at: http://www.lex-
electronica.org/articles/v7-1/Salis.htm.
• Jonathan Zittrain, Jurisdiction in Cyberspace, Internet Law Program, available at:
http://cyber.law.harvard.edu/ilaw/mexico_2006_module_9_jurisdiction.
• Jurisdiction Over Internet Disputes: Different Perspectives Under American and
European Law in 2002, ABA Section on International Law and Practice (Annual
Spring Meeting, New York City, May 8, 2002): http://www.howardrice.com/
uploads/content/jurisdiction_internet.pdf. (accessed on 14 November 2008).
7
Among the most important resources in this field is the Princeton Principles on
Universal Jurisdiction (2001): http://www1.umn.edu/humanrts/instree/princeton.
html (accessed on 14 November 2008).
8
Peter Malanczuk, Akehurst’s Modern Introduction to International Law (London:
Routledge, 1997), p. 113.
9
For an overview of cases involving extraterritorial jurisdiction related to Internet con-
tent, see Yulia A, Timofeeva, Worldwide Prescriptive Jurisdiction in Internet Content
Controversies: A Comparative Analysis, Connecticut Journal of International Law, 20,
p. 199, 2005, available at: http://ssrn.com/abstract=637961 (accessed on 14 November
2008).
10
Other court cases include the German Federal Court of Justice case against Fredrick
Toben, former German national with Australian nationality who had posted at an
Australian-based website, materials questioning the existence of the holocaust: http://
www.ihr.org/jhr/v18/v18n4p-2_Toben.html (accessed on 14 November 2008).
The Legal Basket 97
11
For a following of the case development, see: http://www.eff.org/legal/Jurisdiction_
and_sovereignty/LICRA_v_Yahoo/ (accessed on 14 November 2008).
12
Racist content and pornography (in cases presented above) are not the only contro-
versial issues – other examples include illegal gambling, tobacco advertising, and sale
of drugs.
13
The full text of the convention is available at: http://www.uncitral.org/uncitral/en/
uncitral_texts/arbitration/NYConvention.html (accessed on 14 November 2008).
14
Other UNCITRAL instruments include: UNCITRAL Arbitration Rules (1976),
UNCITRAL Conciliation Rules (1980), UNCITRAL Notes on Organising Arbitral
Proceedings (1996), and the UNCITRAL Model Law on International Commercial
Conciliation (2002).
15
Uniform Domain Name Dispute Resolution Policy, The Internet Corporation for
Assigned Names and Numbers, 26 August 1999: http://www.icann.org/udrp/udrp-
policy-24oct99.htm (accessed on 14 November 2008).
16
Other IPRs include: designs, utility models, trade secrets, geographical indications
and plant varieties.
17
For a comprehensive survey of the main issues involving UDRP please consult: “WIPO’s
Overview of WIPO Panel Views on Selected UDRP Questions” at: http://arbiter.wipo.
int/domains/search/overview/index.html (accessed on 14 November 2008).
18
CNET News.com. Loney, M., “Hyperlink patent case fails to click” at: http://news.
com.com/2100-1033-955001.html (accessed on 14 November 2008).
19
For more information about the debate in Europe on software patentability, please con-
sult: http://swpat.ffii.org and http://www.eubusiness.com/Rd/patents.2006-02-02
20
For the text of the convention, please consult: http://conventions.coe.int/Treaty/en/
Treaties/Html/185.htm (accessed on 14 November 2008).
21
For critical views about the Cybercrime Convention expressing the concern of civil
society and human rights activists, please consult:
• The Association for Progressive Communication Report on the Cybercrime
Convention: http://rights.apc.org/privacy/treaties_icc_bailey.shtml.
• TreatyWatch.org website at http://www.treatywatch.org/ (accessed on 14 November
2008)
SECTION 4
E-COMMERCE
E-commerce has been one of the main engines promoting the growth
of the Internet over the last ten years. The importance of e-commerce
is illustrated by the title of the document that initiated the reform of
Internet governance and established ICANN: “Framework for Global
Electronic Commerce” (1997), which states that “the private sector
should lead” the Internet governance process and that the main func-
tion of this governance will be to “enforce a predictable, minimal-
ist, consistent, and simple legal environment for e-commerce.” These
principles are the foundation of the ICANN-based Internet governance
regime.
DEFINITION
The choice of a definition for e-commerce has many practical and legal
implications.1 Specific rules are applied depending on whether a par-
ticular transaction is classified as e-commerce, such as those regulating
taxation and customs.
For the US government, the key element distinguishing traditional com-
merce from e-commerce is “the online commitment to sell goods or serv-
ices.” This means that any commercial deal concluded online should be
considered an e-commerce transaction, even if the realisation of the deal
involves physical delivery. For example, purchasing a book via Amazon.
com is considered an e-commerce transaction even though the book is
usually delivered via traditional mail. The WTO defines e-commerce more
precisely as: “the production, distribution, marketing, sale, or delivery of
goods and services by electronic means.” The World Customs Organisation
defines e-commerce as: “a way of conducting business by utilising com-
puter and telecommunications technology to exchange data between
independent organisational computer information systems in order to
complete a business transaction.”
102 Internet Governance
What should be the link between TRIPs and the protection of IPRs
on the Internet?
Since the WTO’s TRIPS agreement (Trade-Related Aspects of Intellectual
Property Rights) provides much stronger enforcement mechanisms for
IPRs, developed countries have been trying to extend TRIPS coverage to
e‑commerce and to the Internet by using two approaches. First, by citing
the principle of “technological neutrality” they argue that TRIPS, like oth-
er WTO rules, should be extended to any telecommunication medium, in-
cluding the Internet. Second, some developed countries requested the clos-
er integration of WIPO’s “digital treaties” into the TRIPS system. TRIPS
provides stronger enforcement mechanisms than WIPO conventions. Both
issues remain open and they will become increasingly important in future
WTO negotiations. During the current stage of trade negotiations, it is not
very likely that e-commerce will receive prominent attention on the WTO
agenda. The lack of global e-commerce arrangements will be partially com-
pensated by some specific initiatives (regarding, for example, contracts and
signatures) and various regional agreements, mainly in the EU and the
Asia-Pacific region.
REGIONAL INITIATIVES
The EU developed an e-commerce strategy at the so-called “Dot Com
Summit” of EU leaders in Lisbon (March 2000). Although it embraced a
private and market-centred approach to e-commerce, the EU also intro-
duced a few corrective measures aimed at protecting public and social
interests (the promotion of universal access, a competition policy involving
consideration of the public interest and a restriction in the distribution of
harmful content). The EU adopted the “Directive on Electronic Commerce”
as well as a set of other directives related to electronic signatures, data
protection, and electronic financial transactions. In the Asia-Pacific region,
the focal point of e-commerce co-operation is Asia-Pacific Economic
Co-operation (APEC). APEC established the E-Commerce Steering Group,
which addresses various e-commerce issues, including consumer pro-
tection, data protection, spam, and cyber security. The most prominent
initiative is APEC’s Paperless Trading Individual Action Plan, aiming to
create completely paperless trade in goods in the region by 2010.
CONSUMER PROTECTION
Consumer trust is one of the main preconditions for the success of e-com-
merce. E-commerce is still relatively new and consumers are not as con-
fident with it as with “real” world shopping. Consumer protection is an
important legal method for developing trust in e-commerce. E-commerce
regulation should protect customers in a number of areas: the online
handling of payment card information, misleading advertising, and the
delivery of defective products. A new idiosyncrasy of e-commerce is the
The Economic Basket 105
TAXATION
DIGITAL SIGNATURES
ing that “advanced electronic signatures” will have stronger legal effect
in the legal system (e.g. easier to prove these signatures in court cases).
The EU regulation on digital signatures was one of the responses at the
multilateral level. While it has been adopted in all EU member states, a
difference in the legal status of digital signatures still remains.
At the global level, in 2001, UNCITRAL adopted the Model Law on Electronic
Signatures, which grants the same status to digital signatures as to handwrit-
ten ones, providing some technical requirements are met. The International
Chamber of Commerce (ICC) issued a “General Usage in International
Digitally Ensured Commerce” (GUIDEC), which provides a survey of the best
practices, regulations, and certification issues.10 Directly related to digital
signatures are Public Key Infrastructure (PKI) initiatives. Two organisations,
the ITU and the IETF, are involved with PKI standardisation.
THE ISSUES
E-PAYMENTS: E-BANKING
AND E-MONEY
THE ISSUES
1. The further use of both e-banking and e-money could bring about
changes to the worldwide banking system, providing customers with
additional possibilities while simultaneously reducing banking charg-
es. Bricks-and-mortar banking methods will be seriously challenged
by more cost-effective e-banking.13 It should be noted that many tra-
ditional banks have already adopted e-banking. In 2002, there were
only 30 virtual banks in the United States. Today it is difficult to find
a bank without e-banking services.
2. Cybersecurity is one of the main challenges to the wider deployment
of e-payments. How can one ensure the safety of financial transac-
tions via the Internet? Cybersecurity has been discussed in another
part of this publication. On this point, it is important to stress the re-
sponsibility of banks and other financial institutions for the securi-
ty of online transactions. The main development in this respect was
the Sarbanes-Oxley Act, adopted by the US Congress as a reaction to
the Enron, Arthur Andersen, and WorldCom financial scandals.
This act tightens financial control and increases the responsibility of
financial institutions for the security of online transactions. It also
shares the burden of security responsibility between customers, who
have to demonstrate certain prudence, and financial institutions.14
3. Surveys of e-commerce list the lack of payment methods (e.g., cards)
as the third reason, after security and privacy, for not using e-com-
merce. Currently, e-commerce is conducted primarily by credit card.
This is a significant obstacle for developing countries that do not have
The Economic Basket 111
NOTES
1
The legal relevance of establishing a clear definition is openly explained in the EU’s
interactive page on e-commerce: “Normally, we avoid defining electronic commerce,
aside from the vague non-definition of e-commerce being about doing business elec-
tronically. However there is a need for a legal definition for legal papers….” (Source:
http://ec.europa.eu/archives/ISPO/ecommerce/drecommerce/answers/000025.html;
accessed on 14 November 2008).
2
This section of the WTO website focuses on e-commerce: http://www.wto.org/eng-
lish/tratop_e/ecom_e/ecom_e.htm (accessed on 14 November 2008).
3
For more information about the USA/Antigua Online Gambling Case, please consult:
http://www.wto.org/english/tratop_e/dispu_e/cases_e/ds285_e.htm (accessed on
14 November 2008).
4
For more information about EU’s e-commerce initiatives, please consult: http://europa.
eu.int/information_society/eeurope/2002/action_plan/ecommerce/index_en.htm
(accessed on 14 November 2008).
5
Source: Maastricht Economic Research Institute on Innovation and Technology (MERIT)
http://www.merit.unimaas.nl/cybertax/ (accessed on 14 November 2008).
6
For a discussion on various aspects of taxation policy and the Internet, please consult:
• Arthur J. Cockfield, Transforming the Internet into a Taxable Forum: A Case Study
in E-Commerce Taxation, 85 MINN. L. REV. 1171, 1235-36 (2001);
• Edward A. Morse, State Taxation of Internet Commerce: Something New under the
Sun?, 30 CREIGHTON L. REV. 1113, 1124-27 (1997);
• W. Ray Williams, The Role of Caesar in the Next Millennium? Taxation of E-Commerce:
An Overview and Analysis, 27 WM. MITCHELL L. REV. 1703, 1707 (2001).
7
“Making the ‘Internet Tax Freedom Act’ Permanent Could Lead to a Substantial
Revenue Loss for States and Localities” by Michael Mazerov: http://www.cbpp.org/7-
11-07sfp.htm (accessed on 14 November 2008).
8
For a more detailed explanation of these three approaches, please consult: Survey of
Electronic and Digital Signature Initiatives provided by the Internet Law & Policy Forum:
http://www.ilpf.org/groups/survey.htm#IB (accessed on 14 November 2008).
9
Directive 1999/93/EC by the European Parliament and Council on 13 December 1999
on a Community Framework for Electronic Signatures.
10
GUIDEC (General Usage for International Digitally Ensured Commerce) by the
International Chamber of Commerce: http://www.iccwbo.org/home/guidec/gui-
dec_one/guidec.asp (accessed on 14 November 2008).
11
Gavin Longmuir, “Privacy and Digital Authentication” (http://caligula.anu.edu.au/~gavin/
ResearchPaper.html (accessed on 14 November 2008). This paper focuses on the personal,
communal, and governmental aspects of the need for authentication in a digital world.
12
Saleh M. Nsouli and Andrea Schaechter, “Challenges of the ‘E-Banking Revolution’,”
Finance and Development (September 2002, Volume 39, Number 3), International
Monetary Fund: http://www.imf.org/external/pubs/ft/fandd/2002/09/nsouli.htm
(accessed on 14 November 2008).
13
This article provides an introduction to online banking and a survey of the advantages
and disadvantages in comparison to traditional banking: http://www.bankrate.com/
brm/olbstep2.asp (accessed on 14 November 2008).
The Economic Basket 113
14
For more information, please consult: Edwin Jacobs, “Security as a Legal Obligation:
About EU Legislation Related to Security and Sarbanes-Oxley in the European Union”:
http://www.arraydev.com/commerce/JIBC/2005-08/security.htm (accessed on 14
November 2008).
15
Directive 2000/46/EC of the European Parliament and Council of 18 September 2000
on the taking up, pursuit of, and prudential supervision of the business of electronic
money institutions.
16
For arguments against micro-payments, please consult: “The Case against Micropayments”
by Clay Shirky: http://www.openp2p.com/pub/a/p2p/2000/12/19/micropayments.html
(accessed on 14 November 2008).
17
The Basel Group is based at the Bank for International Settlements. It provides a regular
“Survey of Developments in Electronic Money and Internet and Mobile Payments.” Please
consult: http://www.bis.org/publ/cpss62.pdf (accessed on 14 November 2008).
18
For more information, please consult: http://www.oag.state.ny.us/press/2002/aug/
aug21a_02.html (accessed on 14 November 2008).
SECTION 5
The Development
Basket
The Development Basket 117
The digital divide can be defined as a rift between those who, for techni-
cal, political, social, or economic reasons, have access and capabilities
to use ICT/Internet, and those who do not. Various views have been put
forward about the size and relevance of the digital divide.
The Development Basket 119
UNIVERSAL ACCESS
FINANCIAL SUPPORT
Developing countries receive financial support through various chan-
nels, including bilateral or multilateral development agencies, such as the
UNDP or the World Bank, as well as regional development initiatives and
banks. With increased liberalisation of the telecommunications market,
a tendency for developing telecommunication infrastructures through
foreign direct investment has grown. Many developing countries continu-
ously struggle to attract private investment.
Currently, most Western telecommunication companies are in a con-
solidation phase, after accumulating huge debts for over-investing in the
1990s. While they are still reluctant to invest, it is widely expected that
in the medium-term they will invest in developing countries, since the
market in the developed world is over-saturated with huge capacities built
up in the late 1990s.
During the WSIS process, the importance of financial support for bridg-
ing the digital divide was clearly recognised. One idea proposed at WSIS
was the establishment of an UN-administered Digital Solidarity Fund to
help technologically disadvantaged countries build telecommunication
infrastructures. However, the proposal to establish a Digital Solidarity
122 Internet Governance
Fund did not garner broad support from the developed countries, which
favoured direct investment instead of the establishment of a centralised
development fund. After the WSIS, the Digital Solidarity Fund was estab-
lished in Geneva as an independent foundation mainly supported by cities
and local authorities worldwide.
SOCIO-CULTURAL ASPECTS
The socio-cultural aspect of digital divides encompasses a variety of
issues, including literacy, ICT skills, training, education, and language
protection.
For developing countries, one of the main issues has been the “brain
drain,” described as the movement of highly skilled labour from develop-
ing to developed countries. Through brain drain, developing countries lose
out in a number of ways. The main loss is in skilled labour. Developing
countries also lose the investment in training and education of the migrat-
ing skilled labour. It is likely that brain drain will continue, given the vari-
ous employment/emigration schemes that have been introduced in the
US, Germany, and other developed countries in order to attract skilled,
mainly ICT-trained, labour.
One development that may stop or, in some cases, even reverse brain drain,
is the increase in the outsourcing of ICT tasks to developing countries. The
most successful examples have been the development of India’s software
industry centres, such as Bangalore and Hyderabad.
At the global level, the UN initiated the Digital Diaspora Network to pro-
mote development in Africa, through the mobilisation of the technological,
entrepreneurial, and professional expertise and resources of the African
Diasporas in the field of ICT.
NOTES
1
“Falling through the Net?”, The Economist, 21 September 2000
2
Digital Opportunities for All: Meeting the Challenge. Report of the Digital Opportunity
Task Force (DOT Force) including a proposal for a Genoa Plan of Action. 11 May 2001
(available online at http://www.g8italia.it/_en/docs/STUWX141.htm; accessed on 14
November 2008).
3
For more information regarding Network Neutrality, please consult the following
study: Romina Bocache, Andrei Mikheyev, Virginia Paque: “The Network Neutrality
Debate and Development.” Internet Governance and Policy Discussion Papers,
DiploFoundation, March 2007: http://www.diplomacy.edu/poolbin.asp?IDPool=453
(accesed on 14 November 2008).
4
European Union. Directive 2002/22/EC on universal service and users’ rights relating to
electronic communications networks and services (Universal Service Directive) (avail-
able online at http://ec.europa.eu/information_society/topics/telecoms/regulatory/
new_rf/documents/l_10820020424en00510077.pdf; accessed on 14 November 2008).
5
See: United Nations. Press Release PI/1490. Development Potential of Wireless Internet
Technology Explored at Headquarters Conference Resolution adopted by the General
Assembly 56/183. World Summit on the Information Society. 27 June 2003 (available
online at http://www.un.org/news/Press/docs/2003/pi1490.doc.htm; accessed on 14
November 2008);
Larry Press. Wireless Internet Connectivity for Developing Nations// First Monday.
Volume 8, number 9 (September 2003). (available online at http://www.firstmonday.
org/issues/issue8_9/press/; accessed on 14 November 2008).
6
More information about the Digital Diaspora Network initiative is available on UN
ICT Task Force website at http://www.unicttaskforce.org/stakeholders/ddn.html
(accessed on 14 November 2008).
SECTION 6
The Socio-Cultural
Basket
The Socio-Cultural Basket 127
HUMAN RIGHTS
CONTENT POLICY
The first group consists of content that has a global consensus for its con-
trol. Included here are child pornography, justification of genocide, and
incitement or organization of terrorist acts, all prohibited by international
law (ius cogens).6
The second group consists of content that is sensitive for particular coun-
tries, regions or ethnic groups due to their particular religious and cul-
tural values. Globalised online communication poses challenges for local,
cultural and religious values in many societies. Most content control in
Middle Eastern and Asian countries is officially justified by the protection
of specific cultural values. This often means that access to pornographic
and gambling websites is blocked.7
The third group consists of political censorship on the Internet. In 2007
“Reporters without Borders” reported that 13 countries perform political
censorship on the Internet.8
Geo-Location Software
Another technical solution related to content is geo-location software,
which filters access to particular web content according to the geographic
or national origin of users. The Yahoo! сase was important in this respect,
since the group of experts involved, including Vint Cerf, indicated that
in 70-90% of cases Yahoo! could determine whether sections of one of
its websites hosting Nazi memorabilia were accessed from France.13 This
assessment helped the court come to a final decision, which requested
Yahoo! to filter access from France to Nazi memorabilia. Geo-location
software companies claim that they can identify the home country without
mistake and the city in about 85% of cases, especially if it is a large city.14
With the introduction of IPv6 addressing formats, where each device
connected to the Internet has its own address, geo-location will become
even easier.
International Initiatives
At the international level, the main initiatives arise in European countries
with strong legislation in the field of hate speech, including anti-racism
and anti-Semitism. European regional institutions have attempted to
impose these rules on cyberspace. The primary legal instrument address-
ing the issue of content is the Council of Europe Additional Protocol on
the Cybercrime Convention.
The EU has initiated content control, adopting the European Commission
Recommendation against Racism via the Internet. On a more practical
level, the EU introduced the EU Safer Internet Action Plan, which included
the following main points:
• setting up a European network of hotlines for the reporting of illegal
content;
• encouraging self-regulation;
• developing content rating, filtering, and benchmark filtering;
• developing software and services;
The Socio-Cultural Basket 133
THE ISSUES
The third side of the privacy triangle is the least publicised, yet perhaps the
most significant privacy issue. Both states and businesses collect consid-
erable amounts of data about individuals. Some of this data is exchanged
with other states and businesses to impede terrorist activities. However,
in some situations, such as those to which the European Directive on Data
Protection applies, the state supervises and protects data about individu-
als held by businesses.
The last aspect of privacy protection, not represented within the triangle of
Figure 1, is the potential risk to privacy from individuals. Today, any indi-
vidual with sufficient funds may own powerful surveillance tools. Even a
simple mobile phone equipped with a camera can become a surveillance tool.
Technology has “democratized surveillance,” to quote The Economist. Many
instances of the invasion of privacy have occurred, from simple voyeurism to
the sophisticated use of cameras for recording card numbers in banks and
for electronic espionage. The main problem for protection from this type of
privacy violation is that most legislation focuses on the privacy risks stem-
ming from the state. Faced with this new reality, a few governments have
taken some initial steps. The US Congress adopted the “Video Voyeurism
Prevention Act,” prohibiting the taking of photos of unclothed people with-
out their approval. Germany and a few other countries have adopted similar
privacy laws, preventing individual surveillance.
as spelled out in its directive. This request inevitably led to a clash with
the US self-regulation approach to privacy protection.
This deep-seated difference made any possible agreement more difficult
to achieve. Moreover, adjusting US law to the EU Directive would not
have been possible since it would have required changing a few impor-
tant principles of the US legal system. The breakthrough in the stale-
mate occurred when US Ambassador Aaron suggested a “Safe Harbour”
formula. This reframed the whole issue and provided a way out of the
impasse in the negotiations.
A solution was hit upon where EU regulations could be applied to US
companies inside a legal “Safe Harbour.” US companies handling EU
citizens’ data could voluntarily sign up to observe the EU’s privacy pro-
tection requirements. Having signed, companies must observe the formal
enforcement mechanisms agreed upon between the EU and the US.
When it was signed in 2000 “Safe Harbour” was received with a great
hope as the legal tool that could solve similar problems with other coun-
tries. However, the record is not very encouraging. It has been criticised
by the European Parliament for not protecting sufficiently the privacy
of EU citizens. US companies were not particularly enthusiastic about
using this approach. According to a recent study done by Galexia, out
of 1597 companies registered in the Safe Harbour Framework, only 348
meet the basic requirements (e.g. privacy policy).29 Given the high impor-
tance of privacy and data protection in the European Union, it is likely
to expect higher pressure to find some solution for the dysfunctional
“Safe Harbour” agreement.
MULTILINGUALISM AND
CULTURAL DIVERSITY
Since its early days, the Internet has been a predominantly English-
speaking medium. According to some statistics, approximately 80% of
web content is in English, whereas 80% of the world’s population does
not speak English. This situation has prompted many countries to take
concerted action in promoting multilingualism and in protecting cultural
diversity. The promotion of multilingualism is not only a cultural issue, but
is directly related to the need for the further development of the Internet.30
If the Internet is to be used by wider parts of society and not just national
elites, content must be accessible in more languages.
140 Internet Governance
THE ISSUES
First, the promotion of multilingualism requires technical standards
that facilitate the use of non-Roman alphabets. One of the early initia-
tives related to the multilingual use of computers was undertaken by the
Unicode Consortium – a non-profit institution that develops standards to
facilitate the use of character sets for different languages. In their turn,
ICANN and IETF took an important step in promoting Internationalised
Domain Names (IDN). IDN should facilitate the use of domain names
written in Chinese, Arabic and other non-Latin alphabets.
Second, many efforts have endeavoured to improve machine translation.
Given its policy of translating all official activities into the languages of
all member states, the EU has supported various development activities
in the field of machine translation. Although major breakthroughs have
been made, limitations remain.
Third, the promotion of multilingualism requires appropriate governance
frameworks. The first element of governance regimes has been provided
by organizations such as UNESCO. UNESCO has instigated many initia-
tives focusing on multilingualism, including the adoption of important
documents, such as the Universal Declaration on Cultural Diversity.
Another key promoter of multilingualism is the EU, since it embodies
multilingualism as one of its basic political and working principles.
The evolution and wide usage of Web2.0 tools, allowing ordinary users
to become contributors and content developers easily, offers an oppor-
tunity for greater availability of local content in a wide variety of lan-
guages. Nevertheless, without a wider framework for the promotion of
multilingualism, the opportunity might end up creating an even deeper
gap, if the existing positive feedback loop is not cut: “new Internet users
find it helpful to learn English and employ it on-line, thus reinforc-
ing the language’s prestige and forcing subsequent new users to learn
English as well”.31
THE ISSUES
models which both provide income and enable the creative development of
the Internet.
The UN estimates that there are 500 million persons with disabilities in the
world today. This number is increasing every year due to factors such as war
and destruction, unhealthy living conditions, or the absence of knowledge
about disability, its causes, prevention and treatment.34 The Internet pro-
vides new possibilities for social inclusion of people with disabilities. In order
to maximise technological possibilities for people with disabilities there is a
need to develop the necessary Internet governance and policy framework.
The main international instrument in this field is the Convention on the
Rights of Persons with Disabilities, approved by United Nations in 2006
and already signed by 139 countries, which establishes rights that are now
in the process of being included in national legislations, which will make
them enforceable within a few years.35
Awareness of the need for technological solutions that include the persons
with disabilities is increasing with the work of organizations that teach
and foster support for the disabled community, such as the IGF Dynamic
Coalition on Accessibility and Disability36 and the Internet Society Disability
and Special Needs Chapter.37
The lack of accessibility arises from the gap between the abilities required
to use hardware, software and content, and the available abilities of a per-
son with a disability. To narrow this gap there are two directions of policy
actions: first, to include accessibility standards in the requirements for the
The Socio-Cultural Basket 143
EDUCATION
The Internet has opened new possibilities for education. Various “e-learn-
ing,” “online learning,” and “distance learning” initiatives have been intro-
duced; their main aim is to use the Internet as a medium for the delivery
of courses. While it cannot replace traditional education, online learning
provides new possibilities for learning, especially, when constraints of
time and space impede attendance in person in classes. Some estimates
forecast that the online learning market will grow to approximately US$10
billion by 2010.
Traditionally, education has been governed by national institutions. The
accreditation of educational institutions, the recognition of qualifications,
and quality assurance are all governed at the national level. However, cross-
border education requires the development of new governance regimes.
Many international initiatives aim at filling the governance gap, especially in
areas such as quality assurance and the recognition of academic degrees.
144 Internet Governance
THE ISSUES
The impact of the violence of these games on the behaviour of young people
is being widely debated. The most infamous games involve sophisticated
weapons (showing features of real weapons, and/or other fantasy features)
and bloodshed, and are usually tagged as “stress eliminators”. Indeed, the
top 10 games for different hardware platforms, including Microsoft Xbox,
Nintendo DS, Nintendo Wii, PC, Playstation, PSP, were dominated by
“action”/violent games.
Addressing the Challenges
The major challenge that educators and parents are facing in protecting
children online is the fact that the “digital natives” are much more knowl-
edgeable on how to use ICT - they know more, yet they understand less.
Close peers-parents-educators-community cooperation is thus of the utmost
importance. Parents, policy-makers and the wider community worldwide
are, nevertheless, slowly becoming aware of the situations mentioned above,
and increasingly creating initiatives for safeguarding children in computer-
mediated environments.
To raise the awareness among the stakeholders, the European Commission
has launched the InSafe project as a European network of e-safety aware-
ness nodes, providing numerous awareness-building materials for parents
and educators in several languages, free for download and dissemination.
The Polish media campaign on cyber-bullying resulted in sets of video clips
and an e-Learning course on Internet safety for kids. NetSafe initiative in
New Zealand, founded in 1998, is among the first national initiatives on
Internet safety, which gathers the key stakeholders including ministries,
business sector and media.
Certainly among the most successful models of national awareness and
training campaigns is the Cyber-Peace Initiative (CPI) of Egypt, under the
auspices of the Suzanne Mubarak Women’s International Peace Movement.
A group of young enthusiasts titled “Net-Aman”, as well as a group of par-
ents’ representatives, have been formed and trained to lead further activi-
ties. Together with partners, including the Ministry of Telecommunications
and Microsoft of Egypt, as well as international partners such as ChildNet
International, they have reached out to tens of thousands of youth and
parents around the country within the past few years. Additionally, they
have produced several awareness and educational kits for kids, parents and
educators, translated into Arabic. Having the forthcoming IG forum meeting
in Egypt in 2009, it is likely that the model might get more visibility and get
replicated to other countries as well.
The Socio-Cultural Basket 147
NOTES
1
The ACP Charter includes: Internet access for all; freedom of expression and associa-
tion; access to knowledge; shared learning and creation – free and open source software
and technology development; privacy, surveillance and encryption; governance of the
Internet; awareness, protection and realisation of rights. For more information visit:
http://www.apc.org/en/node/5677
2
For more information see: http://www.globalnetworkinitiative.org
3
(http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm)
4
The Council of Europe adopted the following main declarations of relevance for
human rights and the Internet: The Declaration of Freedom of Communication on
the Internet (28th May 2003, The Declaration on Human Rights and the Rule of Law
in the Information Society (13th May 2005)
5
For more information consult: http://www.freedomhouse.org/uploads/specialre-
ports/NetFreedom2009/FreedomOnTheNet_FullReport.pdf
6
Timothy Zick (1999). Congress, the Internet, and the intractable pornography problem:
the Child Online Protection Act of 1998, Creighton Law Review, 32, pp. 1147, 1153,
1201.
7
For a discussion of Internet gambling, see: Jenna F. Karadbil (2000), Note: Casinos
of the next millennium: a look into the proposed ban on internet gambling, Arizona
Journal of International and Comparative Law, 17, 413, 437-38.
8
See “Internet Under Surveillance:” http://www.rsf.org/rubrique.php3?id_rubrique=433
(accessed on 14 November 2008).
9
Jonathan Zittrain and Benjamin Edelman, Documentation of Internet filtering world-
wide (Open Net Initiative): http://cyber.law.harvard.edu/filtering/ (Accessed on 14
November 2008).
10
Chinese authorities use IP blocking. Official Saudi filtering is provided through “a
proxy farm system.” For more information, see: http://www.isu.net.sa/saudi-internet/
contenet-filtring/filtring-mechanism.htm (accessed on 14 November 2008).
11
See: Electronic Frontiers, Australia, “Internet censorship in Australia” (20 December
2002), http://www.efa.org.au/Issues/Censor/cens1.html (accessed on 14 November
2008).
12
For more information about Platform for Internet Content Selection (PICS), see: http://
www.w3.org/PICS/iacwcv2.htm (accessed on 14 November 2008).
13
Although Vint Cerf participated in the panel, he objected to the final report, which he
said “did not focus on the flaws or the larger implications of installing online gates”
(source: “Welcome to the world wide web, passport, please?” (New York Times, 15
March 2001; http://www.quova.com/page.php?id=33&coverage_id=86 (accessed
on 14 November 2008).
14
Akami claims that it can identify people’s geographical location as far as their ZIP
codes. This is the technological limit. Information about street addresses cannot be
obtained from IP numbers. “Silicon Valleys Quova Inc., one of the leading providers
of this technology, claims it can correctly identify a computer user’s home country
98 percent of the time and the city about 85 percent of the time, but only if its a large
city. Independent studies have pegged the accuracy rate of such programs, which also
The Socio-Cultural Basket 149
are sold by companies such as InfoSplit, Digital Envoy, Netgeo, and Akami, at 70 to 90
percent” (source: “Rise of internet borders prompts fears of web’s future” by Arianna
Eunjung Cha, Washington Post, January 4, 2002, p. E01).
15
For a survey of articles about the Google-China Case, see: http://searchenginewatch.
com/sereport/article.php/2165031 (accessed on 14 November 2008).
16
Published in the New Scientist Internet edition: http://www.newscientist.com/news/
news.jsp?id=ns99992797 (accessed on 14 November 2008).
17
See Jonathan Zittrain and Benjamin Edelman, Localised Google search result exclu-
sions: statement of issues and call for data: http://cyber.law.harvard.edu/filtering/
google/ (accessed on 14 November 2008).
18
The Wall Street Journal article on “Will all of us get our 15 minutes on a YouTube
video?” by Lee Gomes: http://online.wsj.com/public/article/SB115689298168048904-
5wWyrSwyn6RfVfz9NwLk774VUWc_20070829.html?mod=rss_free (accessed on 11
April 2008).
19
EU Information Society, “Safer internet action plan:” http://europa.eu.int/informa-
tion_society/programmes/iap/index_en.htm (accessed on 14 November 2008).
20
See: Church of Scientology censors net access for members at http://www.xenu.net/
archive/events/censorship (accessed on 14 November 2008).
21
Valuable comments and inputs were provided by Katitza Rodriguez.
22
A report issued by the American Civil Liberties Union: Jay Stanley. (2004). The surveil-
lance-industrial complex: How the American government is conscripting businesses
and individuals in the construction of a surveillance society. This report explains the
problem of the privatisation of surveillance and new challenges linked to the protec-
tion of privacy: http://www.aclu.org/FilesPDFs/surveillance_report.pdf (accessed on
14 November 2008).
23
See the text of the Patriot Act at: http://www.epic.org/privacy/terrorism/hr3162.html
(accessed on 14 November 2008).
24
For a discussion of customer trust in business privacy protection, see: Rick Whiting (August
19, 2002). Wary customers don’t trust business to protect privacy, Information Week: http://
www.informationweek.com/shared/printableArticle.jhtml?articleID=6503045 (accessed
on 14 November 2008).
25
Gramm-Leach-Bliley Act, Public Law (1999): http://frwebgate.access.gpo.gov/cgi-
bin/getdoc.cgi?dbname=106_cong_public_laws&docid=f:publ102.106 (accessed on
14 November 2008).
26
Children’s Online Privacy Protection Act of 1998: http://www.ftc.gov/ogc/coppa1.
pdf U.S.C. §§ 6501-6505 (accessed on 14 November 2008).
27
Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, §
264; Department of Health and Human Services, Standards for Privacy of Individually
Identifiable Health Information; Proposed Rule, 64 Fed. Reg. 59917, http://www.epic.org/
privacy/medical/HHS_medical_privacy_regs.html (accessed on 14 November 2008).
28
Council of Europe, Convention for the protection of individuals with regard to the
automatic processing of personal data, ETS No. 108: http://conventions.coe.int/Treaty/
en/Treaties/Html/108.htm (accessed on 14 November 2008).
29
Galexia, the US Safe Harbour – Fact or Fiction?, 2008
150 Internet Governance
30
For more information regarding multilingualism on the Internet please consult the
following study: Qusai AlShatti, Raquel Aquirre and Veronica Cretu. Multilingualism
– the communication bridge. DiploFoundation’s Internet Governance Research Project,
2006/2007 (http://textus.diplomacy.edu/thina/TxFsetW.asp?tURL=http://textus.
diplomacy.edu/thina/txgetxdoc.asp?IDconv=3241; accessed on 15 April, 2008).
31
On English content on the Internet, Wikipedia: http://en.wikipedia.org/wiki/English_
on_the_Internet#Internet_content (accessed on 15 April, 2008)
32
For more information regarding the Internet as a global public good, please consult the fol-
lowing study: Seiiti Arata and Stephanie Psaila. Protection of Public Interest on the Internet.
DiploFoundation’s Internet Governance Research Project, 2005/2006: http://www.diplo-
macy.edu/ig/Research/display.asp?Topic=Research%20Themes%20II#Protection
33
Valuable comments and inputs were provided by Jorge Plano.
34
http://www.hrea.org/index.php?base_id=152
35
See: http://www.un.org/disabilities/
36
See: http://www.intgovforum.org/cms/index.php/dynamic-coalitions/80-accessibi
lity-and-disability and http://www.itu.int/themes/accessibility/dc/
37
See: http://www.isocdisab.org
38
See: http://www.w3.org/TR/WCAG10/
39
See: http://www.isoc.org/briefings/002/isocbriefing02.txt
39
This text was prepared by Vladimir Radunovic for the Advanced Course on
Cybersecurity and Internet Safety (Internet Governance Capacity Building Program
– DiploFoundation)
SECTION 7
Internet Governance
Stakeholders
Internet Governance Stakeholders 153
GOVERNMENTS
The last six years – since the introduction of Internet governance to policy
agendas in 2003 – have been a learning process for many governments.
Even for large and wealthy countries, dealing with Internet governance
issues posed numerous challenges, such as management of the multidis-
ciplinary nature of Internet governance (technological, social, economic,
and social aspects) and involving a wide variety of actors. On the go,
while they were grasping the new issue, many governments had to train
officials, develop the policy, and actively participate in various Internet
governance fora. In this section, we will address the main challenges for
governments in the field of Internet governance.
National Coordination
In 2003, at the beginning of the WSIS process, most countries addressed
Internet governance issues through “technical” ministries, usually
those that had been responsible for relations with the International
Telecommunication Union (ITU). Gradually, as they realised that Internet
governance is more than “wires and cables”, governments started involv-
ing officials from other, less technical ministries, such as those of culture,
media and justice. The multi-faceted nature of Internet governance also
implied a wide diversity of bodies addressing Internet governance issues,
such as ICANN and technical standardisation organisations.
The principal challenge for many governments has been to develop a
strategy to gather and effectively coordinate support from non-state
actors such as universities, private companies, and non-governmental
organisations that had the necessary expertise to deal with Internet
governance issues. During the WSIS process, most large- and medium-
sized states managed to develop sufficient institutional capacity to follow
global Internet governance negotiations. Some of them, such as Brazil,
developed an innovative national structure for following the Internet
governance debate.4
Policy Coherence
Given the multi-disciplinary nature of Internet governance and the high
diversity of actors and policy fora, it is particularly challenging to achieve
policy coherence. It is a management challenge that will require many
governments to have a flexible form of policy coordination, including
horizontal communication among different ministries, the business
156 Internet Governance
Currently, the IGF Secretariat is based in Geneva and all IGF preparatory
meetings are held in Geneva.
For large and developed countries, the permanent missions were part
of the broad network of institutions and individuals that dealt with
the WSIS and Internet governance processes. For small and developing
countries, permanent missions were the primary and, in some cases,
the only players in the processes. The WSIS portfolio added to the
agenda of the usually small and over-stretched missions of develop-
ing countries. In many cases, the same diplomat had to undertake the
tasks associated with the WSIS along with other issues such as human
rights, health, trade, and labour.
the process. The WGIG process resulted in a Final Report that voiced
differences, but also provided a process-related solution for the future
discussion by establishing the Internet Governance Forum.
CIVIL SOCIETY
Civil society has been the most vocal and active promoter of a multi-
stakeholder approach to Internet governance. The usual criticism of
civil society participation in previous multilateral fora had been a lack
of proper coordination and the presence
WSIS has relatively low partici-
of too many, often dissonant voices. In the pation of the main NGOs (reg-
WSIS process, however, civil society repre- istered with the UN ECOSOC).
sentation managed to harness this inher- Out of close to 3000 NGOs with
ent complexity and diversity through a the consultative status with the
few organisational forms, including a Civil UN ECOSOC, only 300 NGOs
participated in the WSIS.
Society Bureau, the Civil Society Plenary,
162 Internet Governance
and the Content and Themes Group. Faced with limited possibilities
to influence the formal process, civil society groups developed a two-
track approach. They continued their presence in the formal process by
using available opportunities to participate and to lobby governments.
In parallel, they prepared a Civil Society Declaration as an alternative
vision to the main declaration adopted at the Geneva WSIS summit.
At the WGIG, civil society attained a high level of involvement due to
its multistakeholder nature. Civil society groups proposed eight candi-
dates for the WGIG meetings, all of whom were subsequently appointed
by the UN Secretary General. In the Tunis phase (the second phase of the
WSIS, after Geneva), the main policy thrust of civil society organisations
shifted to the WGIG, where they influenced many conclusions as well as
the decision to establish the Internet Governance Forum as a multistake-
holder space for discussing Internet governance issues. Civil society has
continued to be actively involved in the IGF activities.
INTERNATIONAL ORGANISATIONS
The ITU was the central international organisation in the WSIS process.
It hosted the WSIS Secretariat and provided policy input on the main
issues. The ITU involvement in the WSIS process was part of its on-going
attempt to define and consolidate its new position in the fast-changing
global telecommunications arena, increasingly shaped by the Internet.
The ITU role has been challenged in various ways. The ITU was losing its
traditional policy domain due to the WTO-led liberalisation of the global
telecommunications market. The latest trend of moving telephone traf-
fic from traditional telecommunications to the Internet (through Voice
over IP) further reduced the ITU’s “regulatory footprint” in the field of
global telecommunications.
The possibility that the ITU might have emerged from the WSIS process
as the de facto “International Internet Organisation” caused concern in
the US and some developed countries, while garnering support in some
developing countries. Throughout the WSIS, this possibility created
underlying policy tensions. It was particularly clear in the field of Internet
governance, where tension between ICANN and the ITU had existed
since the establishment of ICANN in 1998. The WSIS did not resolve
this tension. With the increasing convergence of various communica-
Internet Governance Stakeholders 163
tion technologies, it is very likely that the question of the more active
role of the ITU in the field of Internet governance will be re-emerging
in policy discussion.
Another issue concerned the anchoring the multidisciplinary WSIS agen-
da within the family of UN specialised agencies. Non-technical aspects
of communications and Internet technology, such as social, economic,
and cultural features, are part of the mandate of other UN organisations.
The most prominent player in this context is UNESCO, which addresses
issues such as multilingualism, cultural diversity, knowledge societies,
and information sharing. The balance between the ITU and other UN
organisations was carefully managed. The WSIS follow-up processes also
reflect this balance, with the main players including the ITU, UNESCO,
and the United Nations Development Programme (UNDP).
OTHER PARTICIPANTS
In addition to the formal stakeholders at the WSIS, other players – the
Internet community and ICANN – who were not officially recognised as
stakeholders participated in the process mainly through the civil society
and business sectors.
THE ISSUES
NOTES
1
The exception was the government of the United States and a few developed countries
(Australia, New Zealand and, at that time, the European Commission).
2
The selection of the members of the WGIG combined both representation and exper-
tise criteria. The representation structure was guided by a principle of one-third of
participants from governments, civil society, and the business sector. Government
representatives were selected according to the usual criteria of the UN regional groups.
While observing the representation aspect, the selected members were supposed to
be knowledgeable about the subject in order to contribute substantially to the WGIG
discussion.
3
See: World Summit on the Information Society, “Declaration of Principles,” WSIS-03/
GENEVA/DOC/4-E, 12 December 2003, Article 49.
4
The Brazilian model of the management of its country domain name is usually taken
as a successful example of a multistakeholder approach. The national body in charge
of Brazilian domains is open to all users, including government authorities, the busi-
ness sector, and civil society. Brazil gradually extended this model to other areas of
Internet governance, especially in the process of the preparation for the IGF-2007,
which was hosted in Rio de Janeiro.
5
Charles Lesage, La rivalite franco-britannique. Les cables sous-marins allemands
(Paris, 1915) p. 257-258; quoted in: Daniel R. Headrick, The Invisible Weapon:
Telecommunications and International Politics 1851-1945 (Oxford University Press:
1991), p. 110.
6
Cukier, K. N. (2005). The WSIS wars: an analysis of the politicization of the Internet.
In: D. Stauffacher and W. Kleinwächter (eds). The World Summit on the Information
Society: moving from the past into the future. New York: United Nations ICT Task Force,
p. 176.
7
In a telegram, the US government criticised ITU involvement in the establishment
of CORE: “without authorization of member governments to hold a global meeting
involving an unauthorized expenditure of resources and concluding ‘international
agreements.’”
8
The convenience of “one stop shopping” was one of the arguments for establishing the
ITU as the central Internet governance player.
9
Valuable comments were provided by Ayesha Hassan.
10
Establishment of the Universal Dispute Resolution Procedures (UDRP).
11
The Internet community fulfils all the criteria in Peter Haas’s definition of an epis-
temic community, a “professional group that believes in the same cause and effect
relationships, truth test to accept them, and shares common values; its members share
a common understanding of the problem and its solutions.” (Peter Haas (1990), Saving
the Mediterranean: the politics of international environmental co-operation (New York:
Columbia University Press, p. 55).
12
See: http://cyber.law.harvard.edu/is99/governance/introduction.html#_ftn10 (accessed
on 14 October 2009)
SECTION 8
Annex
Annex 173
ANNEX I
complementing each others’ approaches and skills. Both have considerable dip-
lomatic experience: Mr Desai was in charge of the preparation of several major
UN summits; Mr Kummer has had a successful career in Swiss diplomacy. While
Mr Desai was managing “the stage” of the IGF main events, Mr Kummer has
been building understanding and inclusiveness through timely online, off-stage
communication and participation in the major events of the various professional
communities gathered around the IGF. Their in-depth knowledge of UN rules,
procedures and practice has helped them to find creative solutions and imple-
ment the effective, although unwritten, modus operandi of the IGF. Mr Desai
explains one element of the IGF’s success as follows: “For the dialogue to work
all the participants have to recognize that the value of this forum is the presence
of the others; but to realize this value everyone must adjust their expectations
of how others should behave and, above all, listen rather than just talk.”
As newcomers in the IG field, Mr Desai and Mr Kummer provide a non-partisan
contribution to long-standing debates on issues related to ICANN (domain
names, Internet numbers and root servers). Their success has also challenged
the “urban diplomatic myth” that technical issues must be managed by techni-
cal experts. Sometimes, as this case shows, the “diplomatisation” of dealing
with technical issues can help overcome traditional disputes in specialised
technical communities and move the policy process forward.
successful in this respect. Diplomats and policymakers can learn from the
IGF about effective trust-building through time and careful sequencing,
and also about time and timing in policy processes in general.
less open to “forum shopping” and other policy manipulations. Although the
IGF made breakthroughs in this process, much more needs to be done.
the IGF Secretariat. It is expected that remote participation will increase sig-
nificantly during the next IGF in Sharm El Sheikh (November 2009).
The experience from the IGF shows that remote participation significantly
increases the inclusiveness and openness of international meetings. It cre-
ates a link between the global and local scenes, which is often missing in
international diplomacy.
13. Recognize the Interplay between Formal Protocol (or Lack of)
and Equal Participation
One challenge facing the IGF is the juxtaposition of the formal culture of UN
diplomacy and the informal culture of the Internet community. After three
annual IGF meetings, it seems that the informal culture has prevailed. While
this culture creates an inclusive atmosphere and facilitates the participation of
youth and wider communities worldwide, it may also pose a few challenges.
The informal atmosphere may make participants from national cultures with
strong respect for social hierarchy feel uncomfortable and hesitant to contrib-
ute. Furthermore, in diplomatic, legal and some other professional cultures,
participation in debates is structured by professional protocols. Therefore, the
informality of proceedings and discussion may inhibit the participation of
some delegates and create potential inequality. The IGF addressed this risk by
seeking ways to accommodate various levels of formality, offering various
settings where different stakeholders can participate at ease. For example,
the IGF increased the level of protocol of some, mainly plenary, sessions, adding
more of the typically diplomatic rules of procedure (e.g., speaking slots, asking
questions) and organised special sessions for parliamentarians.
NOTES
1
An interesting parallel is the use of SMS services on mobile phones, through which
text remains essential in human communication in spite of powerful voice and video
based tools.
2
Meaningful and substantive comments were provided by Ginger Paque and Marilia
Marcel, who are also the driving force behind the remote participation working group
(www.igfremote.com).
3
A detailed report about remote participation at IGF 2008 is available at http://www.
igfremote.com/ReportRPIGF-final.pdf.
4
Preliminary surveys show that 80-100 international organisations, standardisation
bodies, forums and other entities cover different aspects of Internet governance. Even
for large, developed states, this wide field is almost impossible to cover. . The IGF
has tried to reduce and harness complexity by “distilling” IG-related aspects from
other policy processes (privacy, intellectual property, human rights, development,
e-commerce, etc.).
186 Internet Governance
ANNEX II
ANNEX III – A SURVEY OF THE EVOLUTION OF INTERNET GOVERNANCE UNTIL 2003
Actor International
United States Internet “Guardians” Private Sector Countries Civil Society
Period Organisations
The Department of
Defence (DoD)
runs DNS
1986 The National Science
Foundation (NSF)
takes over from the
DoD
1994 NSI signs a contract with the
NSF to manage DNS for the
period 1994-1998
THE START OF “THE DNS WAR”
After the NSF outsources the management of DNS to NSI (a private company), the Internet community (mainly ISOC) tries for many years to return DNS
management to the public domain. It succeeds after 4 years. Here is a survey of this process, which involved a lot of diplomatic techniques, such as:
negotiation, coalition building, using leverage, consensus building, etc.
June 1996 IANA/ISOC – Plan to take over
from NSI after the end of its con-
tract; the introduction of addi
tional domains; a strong oppo-
sition from the trademark sector
against new top domains; also a
strong opposition from the ITU
Spring 1997 An IAHC (International Ad Hoc Committee) Proposal
Participants in the IAHC: 2 representatives from the trademark interest groups,
WIPO, ITU and NSF; and 5 representatives from the IETF
Conclusion of gTLDMoU specifying: DNS as a “public resource”; seven new
domains; strong protection for trademarks˝
Establishment of CORE (Council of Registers – signing ceremony in March 1997
at the ITU, Geneva); CORE collapsed immediately
Strong opposition from the USA Government, NSI and EU
Annex 187
Actor International
United States Internet “Guardians” Private Sector Countries Civil Society
Period Organisations
1997 USA government
transfers the
management of DNS
to the Department
of Commerce (DOC)
June 1998 A DOC white paper Proposals are received from:
invites the main IFDT (International Forum on
players to propose White Paper), ORSC (Open Root
188 Internet Governance
The WHAT axis is related to the ISSUES When we move pieces in the IG cube
of Internet governance (e.g. we get the intersection – HOW. This is
infrastructure, copyright, privacy). It the section of the cube that can help us
conveys the multi-disciplinary aspect to see how particular issues should be
of this approach. regulated, both in terms of cognitive-
legal techniques (e.g. analogies) and in
The WHO axis of the cube focusses on terms of instruments (e.g. soft law,
the main ACTORS (states, international treaties, and declarations). For example,
organisations, civil society, the private one specific intersection can help us to
sector). This is the multistakeholder see HOW privacy issues (what) should
side. be addressed by civil society (who) at
the national level (where).
The WHERE axis of the cube deals with
the FRAMEWORK in which Internet Separate from the Internet governance
issues should be addressed (self- Cube is a fifth component – WHEN.
regulatory, local, national, regional, and
global). This is a multi-layered
approach to Internet governance.
Annex 191
Jovan Kurbalija
Jovan Kurbalija is the founding director of DiploFoundation.
He is a former diplomat with a professional and academic
background in international law, diplomacy, and informa-
tion technology. In 1992, he established the Unit for Infor-
mation Technology and Diplomacy at the Mediterranean
Academy of Diplomatic Studies in Malta. After more than
ten years of training, research, and publishing, in 2002 the
Unit evolved into DiploFoundation.
Since 1994, Dr Kurbalija has been teaching courses on the
impact of ICT/Internet on diplomacy and ICT/Internet gover-
nance. He has lectured at the Mediterranean Academy of Diplomatic Studies in Malta,
the Vienna Diplomatic Academy, the Dutch Institute of International Relations (Cling-
endael), the Graduate Institute of International and Development Studies in Geneva,
the UN Staff College, and the University of Southern California. He conceptualised and
currently directs DiploFoundation’s Internet Governance Capacity Building Pro-
gramme (2005 – 2009). Dr Kurbalija’s main research interests include the development
of an international regime for the Internet, the use of the Internet in diplomacy and
modern negotiations, and the impact of the Internet on modern international rela-
tions.
Dr Kurbalija has published and edited numerous books, articles, and chapters, including:
The Internet Guide for Diplomats, Knowledge and Diplomacy, The Influence of IT on Diplo-
matic Practice, Information Technology and the Diplomatic Services of Developing Coun-
tries, Modern Diplomacy and Language and Diplomacy. With Stefano Baldi and Eduardo
Gelbstein, he co-authored the Information Society Library, a set of eight booklets covering
a wide range of Internet-related developments.
[email protected]
192 Internet Governance
The Commonwealth Internet Governance Forum provides a focal point for stakeholders and us-
ers from the 53 Commonwealth member states to come together to discuss issues relating to Internet
governance. It aims to promote awareness of opportunities and solutions, to share best practice and
to increase participation in regional initiatives and the global IGF.
www.commonwealthigf.org