IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The...

52
1 IFEX Internet Governance Forum (IGF) Guide Version 2.0 Last Updated – November 28, 2016

Transcript of IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The...

Page 1: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

1

IFEXInternetGovernanceForum(IGF)GuideVersion2.0LastUpdated–November28,2016

Page 2: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

2

Introduction..............................................................................................................................3

1.AnintroductiontoInternetGovernance.....................................................................41.1WhatisInternetGovernance?...............................................................................................41.2Howitstartedandkeytechnologies...................................................................................41.3WhorunstheInternet?............................................................................................................6

1.3.1ICANN.........................................................................................................................................................61.3.2IETF..............................................................................................................................................................61.3.3What’sthegovernanceoftheInternetlooklike.........................................................................6

1.4What’sbehindthenotionofInternetGovernance?.......................................................82.0TheInternetGovernanceForum(IGF)......................................................................92.1WhatistheInternetGovernanceForum(IGF).................................................................92.2WhathappensattheIGF..........................................................................................................92.3WherehastheIGFbeenheldto-date?..............................................................................10IGFI—Athens,Greece2006...................................................................................................................10IGFII—RiodeJaneiro,Brazil2007....................................................................................................10IGFIII—Hyderabad,India2008...........................................................................................................10IGFIV—SharmElSheikh,Egypt2009...............................................................................................11IGFV—Vilnius,Lithuania2010............................................................................................................11IGFVI—Nairobi,Kenya2011................................................................................................................11IGFVII—Baku,Azerbaijan2012..........................................................................................................11IGFVIII—Bali,Indonesia2013.............................................................................................................11IGFIX—Istanbul,Turkey,2014............................................................................................................12IGFX—JoãoPessoa,Brazil2015........................................................................................................12

2.4HowistheIGFprogramdeveloped?.................................................................................122.5Keythemesandtopicsatthisyear’sIGF.........................................................................122.6Whatarethedifferenttypesofsessionsthatwilltakeplaceatthisyear’sIGF?13

3.EngagementstrategiesattheIGF...............................................................................163.1TipsforeffectiveparticipationattheIGF.......................................................................16

4.MakingtheMostoftheIGF...........................................................................................174.1SessionsofpossibleinteresttoIFEXmembers.............................................................174.2SocialMedia..............................................................................................................................174.3SideEvents.................................................................................................................................18

4.4 APC Dinner............................................................................................................................................184.5 Online resources used at the IGF...................................................................................19

4.5.1 IGF Website.......................................................................................................................................194.5.2BestBits.................................................................................................................................................194.5.3CivilSocietyInternetGovernanceCaucus(IGC)..................................................................194.5.4InternetRightsandPrinciplesDynamicCoalition..............................................................194.5.5RedLatAm.............................................................................................................................................20

5.Membersofthe2016MAG............................................................................................216.Glossaryofabbreviationsandterms........................................................................25

Glossary of abbreviations and terms................................................................................................25

Page 3: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

3

Introduction

A conference with well over 2,500 persons and 136 sessions running over five days, the Internet Governance Forum (IGF) can be a little overwhelming.

To help you make sense of the meeting, IFEX has put together this guide to help you better understand, navigate and get the most out of this event in Guadalajara.

This guide is organized into six sections, which are as follows:

1. An introduction to Internet Governance 2. The Internet Governance Forum 3. Engagement strategies at the IGF 4. Making the Most of the IGF 5. Members of the MAG 6. Glossary of abbreviations and terms

Page 4: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

4

1.AnintroductiontoInternetGovernance

1.1WhatisInternetGovernance? Internet governance is a broadly used term used to describe how the Internet is managed, run and governed1. The consensus understanding is that the term applies to the coordination of domain names, Internet addresses, technical standards, the development and operation of critical infrastructure, regulation, and legislation. The term Internet governance has evolved since the late 1960’s. Various groups have attempted to develop working definitions. In 2005, a United Nations World Summit, United Nations World Summit on the Information Society (WSIS), was convened to address this issue and the broader issue of how technology could be used for human development. The WSIS Geneva summit in 2005 defined Internet governance as "the development and application of governments, the private sector, and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet."

1.2HowitstartedandkeytechnologiesThe Internet, as we know it today, started as a US governmental project in the late 1960s, that aimed to develop a decentralized, resilient and networked communication infrastructure that could withstand a nuclear attack. The Advanced Research Projects Agency Network (ARPANET) was the first network supported by the Advanced Research Projects Agency (ARPA) in 1969. This precursor of the Internet consisted of four nodes: The University of California, the Stanford Research Institute, the University of California Santa Barbara and The University of Utah. From the beginning, University researchers and software programmers worked together, in a collaborative way, sharing their knowledge and ideas, to define and develop Internet technical standards and protocols. A numbered series of Request for Comments (RFCs) memos documented technical decisions and methods of working as they evolved. RFCs still document the standards and protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development of the TCP/IP Protocol, the DNS system, and the World Wide Web.

1 “Governing the Internet/Introduction to Internet Governance ...", Web. 12 Apr. 2016 <https://en.wikibooks.org/wiki/Governing_the_Internet/Introduction_to_Internet_Governance>

Page 5: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

5

The invention of TCP/IP protocol was the first fundamental invention as it led to an open network: the protocol allows for compatible different systems, using different data transmission techniques to connect to each other. The creation of the Domain Names System (DNS) was the second technological innovation that permitted the rapid growth of the Internet. The DNS provides a universal system of unique identifiers that makes Internet services far more accessible. Invented in 1983 by Jon Postel, the DNS provides for a match a numerical Internet Protocol address and an alphabetic label, the so-called domain name. A domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet. Domain names are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains .com, .net and .org, and the country code top-level domains (ccTLDs), such as .ca, .uk, .br and so on. The servers that manage and control the IP assignments are organized in a hierarchy; that culminates in thirteen root servers2 (ten in U.S. territory, two in Europe, one in Japan) to which all servers in the world refer. Among these servers, the root server A is the authoritative one, able to dominate the others. The Regional Internet Registries (RIR), provide and supervise IP addresses assignment in the different world regional areas3. There are five RIRs: one for the African area, one for the Asian-Pacific network, one for American territory, one for the Latin-American and Caribbean area. In the early 1990s, a third and very significant technical innovation took place that has allowed for the widespread use and explosion of the Internet as we know it today. Tim Berners-Lee, at The European Organization for Nuclear Research (CERN) in Geneva, invented the World Wide Web (WWW). A system of interlinked hypertext documents contained on the Internet. Berners-Lee’s design included the possibility that information could be stored on a computer functioning as a server and could be accessed by software called a browser. With a web browser, users could view web pages that contain text, images, videos, multimedia and navigate between them using hyperlinks. Berners-Lee also contributed to the development of the "HyperText Markup Language" (HTML), the language for formatting documents with the capability for hypertext links that became the primary publishing format for the web.

2 "Root Servers." IANA -. Web. 12 Apr. 2016 <https://www.iana.org/domains/root/servers> 3 "Number Resources." IANA -. Web. 12 Apr. 2016 <https://www.iana.org/numbers>

Page 6: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

6

1.3WhorunstheInternet?

1.3.1ICANNThe Internet Corporation for Assigned Names and Numbers (ICANN) was created on September 1998 as a non-profit corporation based in California to manage Internet names and addresses in a manner that allowed for the development of robust competition and facilitated global participation in Internet management. ICANN oversees the management of the Internet's global Domain Name System, the operation of root name servers, policy development for internationalization of the DNS system, introduction of new generic top-level domains (TLDs), and the Internet Assigned Numbers Authority (IANA). The numbering facilities ICANN manages include the Internet Protocol address and the assignment of address blocks to regional Internet registries.

1.3.2IETF The Internet Engineering Task Force (IETF) is one of the main Internet standards organizations in the world. It is composed of network engineers, designers, developers and researchers. The first official meeting of the IETF was conducted in 1986. It is an open standards organization that deals with Internet standards and cooperates with International standards bodies. It is a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.

1.3.3What’sthegovernanceoftheInternetlooklike ICANN in 2013 produced an excellent illustration to visually represent the key organizations and institutions that govern the internet. It is reproduced below for your information.

Page 7: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

7

Page 8: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

8

1.4What’sbehindthenotionofInternetGovernance4?

One can look at the public policy issues fostered by the Internet in two distinct ways. One can see in them continuations of long-term issues in mass media and telecommunication regulation and technology policy that emerged from the era of nation-states. On the other hand, one can also see how digital convergence and the global nature of the Internet pose new problems in public policy and regulation, and how they challenge old policy paradigms and old institutions. It is best to keep both perspectives in mind.

“Internet governance” used to just mean ICANN-related issues; today, we include under that rubric almost any policy issue related to the Internet, including standardization and resource allocation. The Internet can be and is being used to provide mail, voice telephone service, newspapers, broadcast television, music, libraries, and government services. This unification of the platform for all modes of communication and information – known as “digital convergence” – makes all the policy conflicts and issues that were spread out over old media part of Internet politics today.

Thus, in addition to the need for globally coordinated assignment and allocation of Internet name and address resources, and the dominant position of one government, the United States, in that process, there are: tensions between Internet “haves” and “have-nots;” jurisdictional conflicts among states over control of online expression; battles over the protection of trademarks and copyrighted material online; battles over the openness or proprietary nature of standards; multilingualism in Internet standards; conflicts among industry, users and states over online surveillance and privacy; the need to control trans-border spam and cybercrime; and others.

But it would be wrong to look at these as an unconnected grab bag of “issues.” They reflect a more coherent structure of geopolitical conflict over the growing importance of online interactions in commerce, culture, government and education, and over the distinctly transnational environment fostered by the Internet.

4http://www.institut-gouvernance.org/en/analyse/fiche-analyse-265.html

Page 9: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

9

2.0TheInternetGovernanceForum(IGF)

2.1WhatistheInternetGovernanceForum(IGF)The Internet Governance Forum (IGF) is an annual meeting that takes place to discuss, debate and learn about the latest developments related to Internet governance. It brings together governments, civil society, NGOs, academics, technical experts, private sector companies and international organizations. What is unique about the IGF is that all participants can participate on an equal basis and through an open and inclusive process. The United Nations World Summit on the Information Society (WSIS) in its 2005 summit in Tunis, Tunisia recommended the UN create of the IGF. The United Nations Secretary-General formally established it in July 2006.

2.2WhathappensattheIGFWhat happens at the IGF really depends on your perspective… For NGOs and Civil Society – The annual IGF presents an opportunity to advocate for human rights, especially free expression issues in the host country and the region where the meeting is being held. It also presents an opportunity for networking with like-minded human rights experts from other NGOs, international organizations and supportive governments. For private sector actors, the IGF presents an opportunity to lobby for and promote their policy positions on intellectual property, Internet governance, privacy, and network neutrality. It also presents opportunity to arrange private bilateral meetings with senior government officials from developed and developing countries. Unlike other UN meetings, most private sector companies at the IGF are open and willing to meet with NGOs. Noted US companies such as AT&T, Google, Facebook, Microsoft, Twitter, The Motion Picture Association of America (MPAA), and the Walt Disney Company have a long track record of being open to scheduling meetings with NGOs. For governments, the IGF presents an opportunity to lobby for and promote their country’s positions on national security, privacy, human rights, internet governance and censorship. Most governments send a small number of delegates (usually no more than five) to attend the IGF as well as participate in a variety of closed ministerial meetings, private bilateral meetings, and roundtables with NGOs and private sector companies. Government representatives from Canada, The European Commission, Germany, The Netherlands, Sweden, The United Kingdom, and the United States have a long track record of being open to schedule meetings with NGOs.

Page 10: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

10

For the host country – The IGF presents an opportunity to promote the country’s leadership on ICTs and Internet Governance. Host countries, in most cases play a neutral facilitating role and limit their involvement to chair meetings and promote their country. However, host countries can play a far more forceful role at times and try to control the agenda, limit criticisms of their human rights record and conduct surveillance and targeted attacks against activists. This was the case when the IGF was held in Egypt in 2009, Azerbaijan in 2012, and in Turkey in 2014.

2.3WherehastheIGFbeenheldto-date?

IGFI—Athens,Greece2006The first meeting of the IGF was held in Athens, Greece from 30 October to 2 November 2006. The overall theme for the meeting was: "Internet Governance for Development". The agenda was structured along five broad themes: (i) Openness - Freedom of expression, free flow of information, ideas and knowledge; (ii) Security - Creating trust and confidence through collaboration; (iii) Diversity - Promoting multilingualism and local content; and (iv) Access - Internet connectivity, policy and cost; and (v) Emerging issues, with capacity-building as a cross-cutting priority.

IGFII—RiodeJaneiro,Brazil2007The second meeting of the IGF was held in Rio de Janeiro on 12–15 November 2007. The overall theme for the meeting was: "Internet Governance for Development". The main sessions were organized around five themes: (i) Critical Internet resources; (ii) Access; (iii) Diversity; (iv) Openness, and (v) Security.

IGFIII—Hyderabad,India2008The third meeting of the IGF was held in Hyderabad, India between 3–6 December 2008. The overall theme for the meeting was "Internet for All". The meeting was held in the immediate aftermath of terrorist attacks in Mumbai. The five main sessions were organized around the themes: (i) Reaching the next billion, (ii) Promoting cyber-security and trust, (iii) Managing critical Internet resources, (iv) Emerging issues - the Internet of tomorrow, and (v) Taking stock and the way forward.

Page 11: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

11

IGFIV—SharmElSheikh,Egypt2009Egypt hosted the fourth IGF meeting from 15–18 November 2009 in Sharm El Sheikh. The overall theme for the meeting was: “Internet Governance – Creating Opportunities for all”. The main sessions on the agenda were (i) Managing critical Internet resources; (ii) Security, openness and privacy; (iii) Access and diversity; (iv) Internet governance in light of the WSIS principles; (v) Taking stock and the way forward: the desirability of the continuation of the forum; and (vi) Emerging Issues: impact of social networks.

IGFV—Vilnius,Lithuania2010The fifth IGF meeting was held in Vilnius, Lithuania on 14–17 September 2010. The overall theme for the meeting was "Developing the future together". The meeting was organized around six themes: (i) Internet governance for development, (ii) Emerging issues: cloud computing, (iii) Managing critical Internet resources, (iv) Security, openness, and privacy, (v) Access and diversity, and (vi) Taking stock and the way forward.

IGFVI—Nairobi,Kenya2011The sixth IGF meeting was held in Nairobi, Kenya on 27–30 September 2011, at the United Nations Office (UNON). The overall theme for the meeting was "Internet as a catalyst for change: access, development, freedoms and innovation". The meeting was organized around the traditional six themes: (i) Internet governance for development, (ii) Emerging issues, (iii) Managing critical Internet resources, (iv) Security, openness, and privacy, (v) Access and diversity, and (vi) Taking stock and the way forward.

IGFVII—Baku,Azerbaijan2012The seventh IGF meeting was held in Baku, Azerbaijan on 6–9 November 2012. The overall theme for the meeting was: "Internet Governance for Sustainable Human, Economic and Social Development". The meeting was organized around the traditional six themes: (i) Internet governance for development, (ii) Emerging issues, (iii) Managing critical Internet resources, (iv) Security, openness, and privacy, (v) Access and diversity, and (vi) Taking stock and the way forward.

IGFVIII—Bali,Indonesia2013The eighth IGF meeting was held in Bali, Indonesia from 22 to 25 October 2013. The overarching theme for meeting was: "Building Bridges - Enhancing Multistakeholder Cooperation for Growth and Sustainable Development".

Page 12: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

12

The meeting was organized around six sub-themes: (i) Access and Diversity - Internet as an engine for growth and sustainable development; (ii) Openness - Human rights, freedom of expression and free flow of information on the Internet; (iii) Security - Legal and other frameworks: spam, hacking and cyber-crime; (iv) Enhanced cooperation; (v) Principles of multi-stakeholder cooperation; and (vi) Internet governance principles.

IGFIX—Istanbul,Turkey,2014The ninth IGF meeting was held in Istanbul, Turkey from 2 to 5 September 2014. The overarching theme for the meeting was: "Connecting Continents for Enhanced Multistakeholder Internet Governance" with the following sub-themes: (i) Policies enabling Access; (ii) Content Creation, Dissemination and Use; (iii) Internet as engine for growth & development; (iv) IGF & The Future of the Internet ecosystem; (v) Enhancing Digital Trust; (vi) Internet and Human Right; (vii) Critical Internet Resources; and (viii) Emerging Issues

IGFX—JoãoPessoa,Brazil2015The tenth IGF meeting was held in João Pessoa, Brazil, from 10-13 November 2015.The overarching theme for the meeting was “Evolution of Internet Governance: Empowering Sustainable Development” with the following sub-themes: (i) cybersecurity and trust; (ii) the Internet economy; (iii) inclusiveness and diversity; (iv) openness; (v) enhancing Multistakeholder cooperation; (vi) the Internet and human rights; (vii) critical Internet resources; (viii) and emerging issues.

2.4HowistheIGFprogramdeveloped?The Multistakeholder Advisory Group (MAG)5 provides assistance in the preparations for each upcoming IGF meeting. The MAG meets for two days two to three times each year — in February, May and in the fall (if needed). All the preparatory meetings take place in Geneva or New York and are preceded by a one-day Open Consultations meeting. In April 2016 the IGF secretariat put out a call for reflections on the João Pessoa meeting and recommendations for the IGF 2016 and asked for suggestions and ideas for issues to be discussed in Guadalajara.

2.5Keythemesandtopicsatthisyear’sIGFTaking the inputs, ideas and suggestions into account, the MAG, together with all stakeholders agreed to by consensus the following sub-themes for the 2016 IGF in Guadalajara:

5SeeAppendix5forlistof2016MAGmembers.

Page 13: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

13

• Internet and Sustainable

Development; • Cybersecurity; • Multistakeholder Cooperation; • Youth and Gender Issues; • Human Rights and Freedom of

Expression Online;

• Critical Internet Resources; • Internet Governance Capacity

Building; • Emerging Issues; • Connecting and Enabling the

Next Billion(s)

These sub-themes were then used to issue a call for workshop proposals. Workshop proposals were reviewed and evaluated by the MAG at their July meeting. Based on the topics of the submitted workshop proposals the MAG proposed the overall title of the 2016 IGF meeting be - “Enabling Inclusive and Sustainable Growth”. What does it mean exactly? Well, it means that this year’s focus will be on global Internet policy and governance issues that are being actively discussed at the United Nations, ICANN, and the International Telecommunications Union. Internet governance is the framing being used to organize the discussions. It does not mean that issues and topics related to free expression, privacy, national security and surveillance are not the agenda. In fact quite the contrary, there are many sessions focusing on these issues and others related to human rights taking place at the IGF this year.

2.6Whatarethedifferenttypesofsessionsthatwilltakeplaceatthisyear’sIGF?There are a number of different types of sessions. In the bigger scheme of things, the differences don’t matter that much – an interesting or insightful discussions is just as likely to pop up in the smallest session as the largest, but it may be helpful to know what is what. Pre-Events A number of regional, national, and subject area initiatives

organize meetings the day before the official start of the IGF. Known as “day zero” meetings, these meetings are more information and can be of great interest to those attending the IGF for the first time.

Workshop A 60-90 minute session covering one of the main themes. Broadly it will be an open panel discussion, roundtable or capacity building session on a relatively specific topic.

Page 14: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

14

Dynamic Coalition

These are relatively informal issue-specific coalitions consisting of stakeholders that are interested in the particular issue. Most coalitions allow participation of anyone interested in contributing. Thus, these groups gather not only academics and representatives of governments, but also members of the civil society interested in participating on the debates and engaged in the coalition's works. Current active dynamic coalitions are as follows: • Accessibility and Disability • Accountability • Blockchain Technologies • Child Online Safety • Community Connectivity • Core Internet Values • Freedom of Expression and Freedom of the Media on the

Internet • Gender and Internet Governance • Innovative Approaches to Connecting the Unconnected • Internet and Climate Change • Internet Rights and Principles • Network Neutrality • Platform Responsibility • Public Access in Libraries • the Internet of Things • Youth Coalition on Internet Governance

Best practice forums

The sessions provide a opportunity to discuss what constitutes a "best practice", to share relevant information and experiences and build consensus around best practices that can then be transferred to other situations, and strengthen capacity building activities.

'Flash' sessions

A flash session provides an opportunity for presenters/organizers to evoke/sparkle interest of the participants in specific reports, case studies, best practices, methodologies, tools, etc. that have already been implemented or are in the process of implementation. Participants have an opportunity to ask very specific questions. Flash Sessions will generally be shorter than other types of sessions

Open forums

All major organizations dealing with Internet governance related issues are given a 90-minute time slot, at their

Page 15: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

15

request, to hold an Open Forum in order to present and discuss their activities during the past year and allow for questions and discussion.

Main session

Two-hour sessions covering one of the main themes of the conference A more formal structure sees a panel of experts on stage amid reports from feeder workshops, all pulled together by two moderators.

Newcomers Track

The Newcomers Track aims to help participants attending the IGF annual meeting for the first time, to understanding the IGF processes and to foster the integration of all new-coming stakeholders into the IGF community. Its focus is to make the meeting participant's first IGF experience as productive and welcoming as possible.

Others

The opening and closing sessions/ceremonies and a number of launches and other various meetings organized by regional, national and subject area initiatives.

Page 16: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

16

3.EngagementstrategiesattheIGF

3.1TipsforeffectiveparticipationattheIGFThe IGF is not just an opportunity to learn about the latest developments to digital rights, ICANN and Internet governance, it is also an excellent advocacy and networking opportunity for you to share and advance your organizations work on free expression and human rights. Here are some quick tips to follow: • Use the event to meet new people.

o Do not be shy to speak with strangers on the hotel shuttle, at the conference, at the event gala and anywhere else.

o Do ask for business cards. This gives you the person’s contact details that you can use to send them an email and/or share with colleagues.

o If you have business cards and/or short pamphlets about your work do hand them out.

• Track what Government and Business officials are saying o Try to identify government and business officials from your country

and/or region. o Assess if, at all, they are participating at the event. o If they make a comment on a workshop, assess if their views are

consistent. o If a controversial comment is made, quickly check the online transcript

and see if it is correct. Take a photo and/or screenshot of the transcript in case it gets redacted.

• At workshop sessions, o When asking questions, state your name and affiliation. If you do not

feel comfortable saying your name, just say you are speaking on behalf of Internet users in your country.

o Ask questions of the panelists in a respectful, but forceful way. o Try to raise specific points and cite reports, research or publications

that are related to the workshop theme. o Make sure to check the real-time transcript to make sure your

comments are accurate. If not, ask for the transcript to be corrected.

Page 17: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

17

4.MakingtheMostoftheIGF

4.1SessionsofpossibleinteresttoIFEXmembersThe latest version of the schedule is here: https://igf2016.intgovforum.org/

Review the schedule before travelling and consider which sessions will meet your objectives for participation.

An online scheduling tool has been made available for participants at the IGF. The online tool allows one to view the whole program, see workshop descriptions, and create a personalized selection of sessions to attend. Among the features available on the site is the ability to synchronize your selections to the calendar that you use on your computer and mobile phone.

TIP: As a possible starting point for you to navigate the hundreds of IGF sessions, an IFEX-specific calendar has been created with a list of strategic sessions related to, among other issues - free expression, human rights and Internet governance. The IFEX IGF calendar is attached as a PDF and is also accessible at the following URL: https://igf2016.sched.org/ifex2016

Note: You can sign up to create your own personalised calendar from the main schedule site, here: http://igf2016.intgovforum.org/

Keep in mind that each session will have a real-time transcript, with a URL that is launched when the sessions opens, and the sessions will be archived to the IGF website after the event.

4.2SocialMediaThose attending the IGF use social media websites such as Twitter and Facebook to share news, developments and comments about workshop sessions and host country issues. Hashtags for the event are #igf16 and #igf2016

Page 18: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

18

4.3SideEventsA number of events are organized outside the official IGF program. Some of these are mentioned in the e-mail communication IFEX has sent with this guide. These events are usually informal, focused on human rights and provide an excellent opportunity to network with colleagues and supporters of digital rights- and many take place in the evening. One event that is being organized in parallel to events at the IGF is the Best Bits Joint Civil Society Meeting. This civil society pre-day is being organized to address and discuss the urgent problems of the Internet that do not get the interest they deserve at the IGF. The event will take place on December 4th. For the organizers of this meeting, the most vital problems are censorship and freedom of speech; surveillance and privacy; excessive commercialization and super-monopolies; protective, prohibitionist and conservative governance approaches. If you are interested in attending, please additional details and registration is available at the following website: http://bestbits.net/events/joint-cs-2016/ The event will take place at the following location, Holiday Inn Express Guadalajara Autonoma Av. Patria 999 Jardines Universidad, 45110 Zapopan, Jal. Mexico

4.4 APC Dinner The Association for Progressive Communications (APC) organizes an informal dinner at every IGF. The dinner is a great networking opportunity that brings together participants from civil society, NGOs, and friends of APC from supportive governments and the private sector. The event is usually scheduled Wed or Thursday during the IGF. Venue and directions are usually shared among civil society. It is worthwhile attending.

Page 19: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

19

4.5 Online resources used at the IGF Below is a list of resource websites for participants attending and following the 2016 Internet Governance Forum (IGF).

4.5.1 IGF Website The secretariat of the Internet Governance Forum (IGF) maintains an updated website with details of the 2016 event, including live streams, real-time transcripts and related news. The IGF website can be found at the following URL: http://www.intgovforum.org/

4.5.2BestBitsBest Bits is a civil society network that enables participants to share the "best bits" of their various initiatives on Internet governance and Internet rights, and to provide the opportunity for broaden engagement in those. Mailing list - http://lists.bestbits.net//info/bestbits

4.5.3CivilSocietyInternetGovernanceCaucus(IGC)Website - http://igcaucus.org/ Mailing list - http://lists.igcaucus.org/info/governance

4.5.4InternetRightsandPrinciplesDynamicCoalitionThe Internet Rights and Principles Dynamic Coalition works to uphold human rights on the internet and to root internet governance processes and systems in human rights standards. The dynamic coalition sets out to promote, and provide a space for multi-stakeholder dialogue and collaboration. We also aim to be an umbrella platform for facilitating collaboration on human rights issues in the Internet Governance Forum process. Members of the coalition work individually and in partnership to promote processes and instruments to frame and enforce rights on the Internet. Website - http://internetrightsandprinciples.org/ Mailing list - https://lists.internetrightsandprinciples.org/mailman/listinfo/irp

Page 20: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

20

4.5.5RedLatAmA website and collaborative community that discusses regulation, public policy and local organizations that work on issues related to digital rights in Latin America. Website - https://redlatam.org Mailing list - https://lists.accessnow.org/listinfo/redlatam

Page 21: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

21

5.Membersofthe2016MAGBelow is the list of MAG members for 2016 year, with affiliations, stakeholder groups and served terms including the current one. This list is followed by the list of former IGF Host Countries representatives, as well as by the list of representatives of intergovernmental organizations, that contribute to the MAG's work. Chair • Ms. St. Amour, Lynn (Civil Society, 1 term) Boston, USA – CEO, Internet Matters Honorary Host Country Co-Chair

• Mr. Victor Lagunes Mexico City, Mexico – CIO, Office of the President of Mexico

Members • Ms. Abdulla, Rasha (Civil Society, 1 term)

Cairo, Egypt – Associate Professor at the American University in Cairo • Ms. Andersdotter Amelia (Civil Society, 3 terms)

Orsundsbro, Sweden - Membership, Pirate Party • Ms. Aquino Ribeiro, Renata (Civil Society, 1 term)

Researcher and teacher, E. I. Consulting, Fortaleza, Brazil • Mr. Iliya Bazlyankov (Private Sector, 1 term)

Sofia, Bulgaria – CIO, UNICART • Mr. Bhatia, Virat (Private Sector, 3 terms)

New Delhi, India - Chairman, Federation of Indian Chambers of Commerce and Industry (FICCI) Communication and Digital Economy Committee

• Ms. Bidart, Silvia (Private Sector, 2 terms) Buenos Aires, Argentina - Director General, Federation of ICT Ibero-Latin American Industry National Associations

• Ms. Bou Harb, Zeina (Government, 1 term) Beirut, Lebanon – OGERO Telecom, Ministry of Telecommunications

• Mr. Boukadoum, Mourad (Government, 3 terms) Geneva, Switzerland – Counselor, Permanent Mission of Algeria

• Ms. Caballero, María Victoria Romero (Government, 3 terms) Geneva, Switzerland – First Secretary, Permanent Mission of Mexico

• Ms. Cade, Marilyn (Private Sector, 3 terms) Falls Church, USA – CEO, Strategies mCADE llc

• Mr. Casasbuenas, Julian (Civil Society, 1 term) Bogota, Colombia - Director, Colnodo

• Mr. Cheon, Billy Mooho (Government, 1 term) Seoul, Republic of Korea – General Researcher, Korea Internet & Security Agency

• Mr. Dengate Thrush, Peter (Technical Community, 2 terms) Wellington, New Zealand – Counsel, Barrister

• Mr. Donkor, Wisdom (Government, 1 term) Accra, Ghana – Information Technology Manager, Technical Lead for Ghana Open Data Initiative, National Information Technology Agency

• Ms. Doria, Avri (Civil Society, 2 terms) Providence, USA – Independent Researcher, DBA Technicalities

• Ms. Elanskaya, Yulia (Government, 2 terms) Moscow, Russian Federation - Deputy Director of International Cooperation Department, Ministry of Telecom and Mass Communication

Page 22: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

22

• Mr. Elgamal, Hossam (Private Sector, 3 terms) Cairo, Egypt - Board Member, AfICTA – Africa ICT Alliance

• • Ms. Erramuspe, Alejandra (Government, 1 term) Montevideo, Uruguay – Communications Manager and Head of Internet Governance, Agencia de Gobierno Electrónico y Sociedad de la Información y el Conocimiento

• Mr. Fernández González, Juan Alfonso (Government, 2 terms) Havana, Cuba – Advisor, Ministry of Communications

• Mr. Estrada, Miguel Ignacio (Government, 1 term) Buenos Aires, Argentina – National Director of Internet Policy and Development, Ministry of Moderisation

• Ms. Franz, Liesyl I. (Government, 1 term) Washington, D.C., USA – Senior Policy Advisor in the Office of the Coordinator for Cyber Issues at the Department of State

• Mr. Gjorgjinski, Ljupco Jivan (Government, 3 terms) Skopje, Macedonia – Assistant Director, Cabinet of the Minister of Foreign Affairs of the Republic of Macedonia

• Ms. Ho, Bianca Caroline (Civil Society, 2 terms) Hong Kong, China - NetMission Ambassador, NetMission.Asia

• Ho Chi Ping, Patrick (Technical Community, 1 term) Hong Kong, China - Deputy Chairman and Secretary-General at China Energy Fund Committee

• Ms. Hutchison, Laura (Technical Community, 1 term) Oxford, United Kingdom – Policy Executive at Nominet

• Ms. Jere, Towela (Government, 3 terms) Johannesburg, South Africa - Programmes Manager, NEPAD Planning and Coordinating Agency

• Ms. Kaspar, Lea (Civil Society, 2 terms) Zagreb, Croatia – Programme Lead, Global Partners Digital

• Ms. Kee, Jac sm (Civil Society, 2 terms) Kuala Lumpur, Malaysia - Women's Rights Programme Manager, Association for Progressive Communications

• Mr. Kenyanito, Ephraim Percy (Civil Society, 2 terms) Eldoret, Kenya – Policy Fellow, Access

• Ms. Laksmi, Shita (Civil Society, 2 terms) Jakarta, Indonesia – Programme Manager, HIVOS Regional Office Southeast Asia

• Ms. Lazanski, Dominique (Private Sector, 2 terms) London, United Kingdom – Public Policy Director, GSM Association

• Mr. Lee, Xiaodong (Technical Community, 3 terms) Beijing, China – Chief Executive Officer, China Internet Network Information Center (CNNIC)

• Ms. Mahmutovic, Aida (Civil Society, 2 terms) Sarajevo, Bosnia and Herzegovina – Co-chair, Center for Internet governance

• Mr. Mansoor Ansari, Omar (Private Sector, 1 term) Kabul, Afghanistan – President, TechNation Afghanistan

• Mr. Markovic, Slobodan (Technical Community, 2 terms) Belgrade, Serbia - Advisor for ICT Policy and Internet Community Relations, Serbian National Internet Domain Registry

• Mr. Mazzone, Giacomo (Media, 3 terms) Geneva, Switzerland - Head of Institutional Relations, European Broadcasting Union

• Ms. Miller, Cheryl Ann (Private Sector, 2 terms) Washington, USA – Director of International Public Policy and Regulatory Affairs, Verizon

• Mr. Moisander, Juuso (Government, 2 terms) Sipoo, Finland - Commercial Secretary, Information Society and ICT, Ministry for Foreign Affairs

Page 23: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

23

• • Mr. Mohammed, Muataz (Government, 1 term) Khartoum, Sudan – Head of Monitoring and Response, Sudan Computer and Emergency Response Team

• Mr. Nelson, Michael (Private Sector, 3 terms) Washington DC, USA - Public Policy, CloudFlare, and Adjunct Professor, Internet Studies, Georgetown University

• Ms. Okutani, Izumi (Technical Community, 3 terms) Tokyo, Japan – Policy Liaison, Japan Network Information Center (JPNIC)

• Mr. Olugbile, Segun (Private Sector, 2 terms) Abuja, Nigeria – CEO, Continental Project Affairs Associates

• Mr. Onyango, Douglas (Technical Community, 1 term) Kampala, Uganda – Chief technology officer at Delta IT Solutions

• Mr. Ostrowski, Igor (Government, 2 terms) Warsaw, Poland – Chairman, Polish Digitization Council

• Ms. Paque, Virginia (Civil Society, 2 terms) Maracay, Venezuela – Director Internet Governance Programmes, DiploFoundation

• Mr. Pérez Galindo, Rafael (Government, 1 term) Madrid, Spain – Head of Unit, Directorate for Information Society Services, Ministry of Industry, Energy and Tourism

• Mr. Rhijn van, Arnold (Government, 1 term) The Hague, Netherlands– Senior Policy Advisor/Project Manager, Telecommunications Market Directorate, Ministry of Economic Affairs

• Mr. Sabir, Sumon Ahmed (Technical Community, 1 term) Dhaka, Bangladesh – Chief Strategy Officer at Fiber@Home Limited

• Ms. Sakalova, Marianne (Civil Society, 2 terms) Minsk, Belarus – Consultant on Internet related Policies, Legal Transformations Center

• Mr. Son, Tran Van (Government, 1 term) Geneva, Switzerland – Permanent Mission of Viet Nam

• Ms. Tamanikaiwaimaro, Salanieta(Civil Society, 1 term) Suva, Fiji – President, South Pacific Computer Society

• Ms. Thomas Raynaud, Elizabeth (Private Sector, 1 term) Paris, France - Senior Policy Executive, Digital Economy and Project Director at International Chamber of Commerce (ICC)

• Mr. Valdez, German (Technical Community, 2 terms) Brisbane, Australia – Executive Secretary, Number Resource Organisation

• Mr. Wagner, Flávio (Technical Community, 2 terms) Porto Alegre, Brazil – Board Member, Brazilian Internet Steering Committee (CGI.br)

• • Mr. Wanawit, Akhuputra (Government, 1 term) Bangkok, Thailand – Deputy Executive Director, Electronic Transactions Development Agency, Ministry of Information and Communication Technology

The following former IGF host countries are also invited to attend and contribute to MAG meetings:

• Greece

• Brazil - designated Mr. Igor Resende (Deputy Head of the Information Society Division, on behalf of the Communication Ministry of Brazil) as representative.

• India - designated Mr. Rahul Gosain (Department of Electronics & Information Technology, Government of India) as representative.

• Egypt - designated Ms. Christine Arida (Director of Telecom Services and Planning

Division, National Telecom Regulatory Authority) as representative. • Lithuania

Page 24: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

24

• Kenya - designated Mr. Dennis Chebitwey (Director of Public Communications, Ministry of Information, Communications and Technology of Kenya) as representative.

• Azerbaijan - designated Mr. Nariman Hajiyev (Manager of Project "Modernization of sustainability and efficiency of the ICT infrastructure and services in the Republic of Azerbaijan", Ministry of Communication and Information Technologies) as representative.

• Indonesia - designated Mr. Moedjiono, Sardjoeni (National ICT Council Executive Team Member) as representative.

• Turkey - designated Mr. Ihsan Durdu (Advisor to the Minister, Ministry of Transport and Communications) as representative.

Representatives of intergovernmental organizations (IGOs) and European Commission:

• Council of Europe - Mr. Lee Hibbard, Coordinator for Internet Governance and Information Society

• European Commission - Ms. Cristina Monti, International Relations Officer, Directorate-General for Communications Networks, Content and Technology

• International Telecommunication Union (ITU) - Ms. Despoina Sareidaki, Policy Analyst

• UN Conference on Trade and Development (UNCTAD)

• UN Economic Commission for Africa (UNECA) - Mr. Makane Faye, Chief, Knowledge Services Section, Public Information and Knowledge Management Division

• UN Educational, Scientific and Cultural Organization (UNESCO) - Mr. Cédric Wachholz, Programme Specialist, Communication and Information Sector, Knowledge Societies Division

• World Intellectual Property Organization (WIPO) - Mr. Victor Owade, External Relations Division

Page 25: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

25

6.Glossaryofabbreviationsandterms6

Glossary of abbreviations and terms7 0-10 0-day A 0-day or zero-day threat is an attack that exploits a previously unknown vulnerability in a computer application, one that developers have not had time to address and patch. It is called a "zero-day" because the programmer has had zero days to fix the flaw (in other words, a patch is not available). Once a patch is available, it is no longer a "zero-day exploit." It is common for individuals or companies who discover zero-day attacks to sell them to government agencies for use in cyber warfare. A AfriNIC— The African Network Information Center

AfriNIC is a Regional Internet Registry (RIR) and is a non-profit membership organization responsible for the administration and registration of Internet Protocol (IP) addresses in the Africa region. ALAC — At-Large Advisory Committee

ICANN 's At-Large Advisory Committee ( ALAC ) is responsible for considering and providing advice on the activities of the ICANN , as they relate to the interests of individual Internet users (the "At-Large" community).

Algorithm

An algorithm is a procedure or formula for solving a problem, based on conducting a sequence of specified actions. A computer program can be viewed as an elaborate algorithm. In mathematics and computer science, an algorithm usually means a small procedure that solves a recurrent problem.

There is a widespread belief that software and algorithms that rely on data are objective. But software is not free of human influence. Algorithms are written and maintained by people, and machine learning algorithms adjust what they do based on people’s behavior. As a result, say

6Thisglossaryhasbeenputtogetherfromavarietyofsources.Theyincludethefollowing:

• http://globalinfoandtelecom.org/book/additional-materials/acronyms-glossary-and-key-terms/• https://www.icann.org/resources/pages/glossary-2014-02-03-en• http://www.nominet.org.uk/glossary

7Thisglossaryhasbeenputtogetherfromavarietyofsources.Theyincludethefollowing:

• http://globalinfoandtelecom.org/book/additional-materials/acronyms-glossary-and-key-terms/• https://www.icann.org/resources/pages/glossary-2014-02-03-en• http://www.nominet.org.uk/glossary

Page 26: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

26

researchers in computer science, ethics and law, algorithms can reinforce human prejudices.

APCERT — Asia-Pacific Computer Emergency Response Team

APCERT is a coalition for the forum of CSIRTs (Computer Security Incident Response Teams) from economies across the Asia Pacific region.

Artificial Intelligence An area of computer science that deals with giving machines the ability to seem like they have human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

Association for Progressive Communications (APC)

The Association for Progressive Communications (APC) is a global network of civil society organizations whose mission is to empower and support organizations, social movements and individuals in and through the use of information and communication technologies to build strategic communities and initiatives for the purpose of making meaningful contributions to equitable human development, social justice, participatory political processes and environmental sustainability.

APEC — Asia-Pacific Economic Community (or Cooperation)

APEC is a forum for 21 Pacific Rim countries or regions (styled ‘member economies’) to discuss the regional economy, cooperation, trade, and investment.

APNIC — The Asia Pacific Network Information Centre

APNIC is a Regional Internet Registry (RIR) and is a non-profit membership organization responsible for the administration and registration of Internet Protocol (IP) addresses in the Asia-Pacific region, including Japan, Korea, China, and Australia.

ARIN — American Registry for Internet Numbers

ARIN is a Regional Internet Registry (RIR) and is a non-profit membership organization established for the purpose of the administration and registration of Internet number resources — including Internet Protocol (IP) addresses and Autonomous System Numbers — in Canada, the many Caribbean and North Atlantic islands, and the United States. ARIN also develops consensus-based policies and facilitates the advancement of the Internet through information and educational outreach.

ARPA — Advanced Research Projects Agency (see DARPA)

ARPANET A large wide area network created in the 1960s by the U.S. Department of Defense Advanced Research Projects Agency (ARPA, renamed DARPA in the 1970s) for the free exchange of information between universities and research organizations, although the military also used this network for communications. In the 1980s, MILNET, a separate network, was spun off from

Page 27: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

27

ARPANET for use by the military. ARPANET was the network from which the Internet evolved. See also Internet, MILNET. ASO — Address Supporting Organization

The ASO advises the ICANN Board of Directors on policy issues relating to the allocation and management of Internet Protocol ( IP ) addresses.

Autonomous System ("AS") Numbers

Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet. ICANN coordinates AS numbers as part of the IANA functions. AS numbers are assigned in blocks by the Internet Assigned Numbers Authority (IANA) to regional Internet registries (RIRs). The appropriate RIR then assigns AS numbers to entities within its designated area from the block allocated by the IANA. Entities wishing to receive an ASN must complete the application process of their local RIR and be approved before being assigned an ASN. Current IANA ASN assignments to RIRs can be found on the IANA website. B Backbone

The Internet backbone may be defined by the principal data routes between large, strategically interconnected computer networks and core routers on the Internet. These data routes are hosted by commercial, government, academic and other high-capacity network centers, the Internet exchange points and network access points, that exchange Internet traffic between the countries, continents and across the oceans. Internet service providers, often Tier 1 networks, participate in Internet backbone traffic by privately negotiated interconnection agreements, primarily governed by the principle of settlement-free peering.

Backdoor

A means of gaining access to a program or system by bypassing its security controls. Programmers often build back doors into systems under development so that they can fix bugs. If the back door becomes known to anyone other than the programmer, or if it is not removed before the software is released, it becomes a security risk. Bandwidth

Bandwidth describes the maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a particular connection in a given amount of time. For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps, (125 megabytes per second)

Big Data

Page 28: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

28

Big data is an evolving term that describes any voluminous amount of structured, semi-structured and unstructured data that has the potential to be mined for information. Big data is often characterized by 3Vs: the extreme volume of data, the wide variety of data types and the velocity at which the data must be processed. Although big data doesn't equate to any specific volume of data, the term is often used to describe terabytes, petabytes and even exabytes of data captured over time. The importance of big data doesn’t revolve around the size of the data, but what is done with it. Once can take data from any source and analyze it to find answers that enable 1) cost reductions, 2) time reductions, 3) new product development and optimized offerings, and 4) smart decision making. Birds of a Feather session An informal discussion group where the attendees group together based on a shared interest and carry out discussions without any pre-planned agenda. The acronym is used by the Internet Engineering Task Force (IETF) to denote initial meetings of members interested in a particular issue. Broadband

Broadband Internet access, often shortened to "broadband Internet" or just "broadband", is a high data-transmission rate Internet connection.

C Cache

A cache is a block of memory for temporary storage of data likely to be used again. A web browser uses a cache to store the pages and URLs of websites you visit on your computer's hard drive, as accessing your hard disk is much faster than again downloading this date to your computer. ccTLD — Country Code Top Level Domain

Two letter domains, such as .ca (Canada), .uk (United Kingdom), and .de (Germany) (for example), are called country-code top-level domains (ccTLDs) and correspond to a country, territory, or other geographic location. The rules and policies for registering domain names in the ccTLDs vary significantly and ccTLD registries limit the use of the ccTLD to citizens of the corresponding country.

CEDAW - Convention on the Elimination of all Forms of Discrimination Against Women

The Convention on the Elimination of all Forms of Discrimination Against Women (CEDAW) is an international treaty adopted in 1979 by the United Nations General Assembly. Described as an international bill of rights for women, it was instituted on 3 September 1981 and has been ratified by 189 states.

CERT — Computer emergency response team

Page 29: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

29

Computer emergency response teams (CERT) are expert groups that handle computer security incidents. Alternative names for such groups include computer emergency readiness team and computer security incident response team (CSIRT). The history of CERTs is linked to the existence of malware, especially computer worms, and viruses.

Censorship

The action of preventing material that a party considers objectionable from circulating within a system of communication over which that party has some power. Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet. It may be carried out by governments or by private organizations at the behest of the government, regulators, or on their initiative. Chatham House Rule

The Chatham House Rule is a system for holding debates and discussion panels on controversial issues, named after the headquarters of the Royal Institute of International Affairs (situated in St. James's Square, London), also known as Chatham House, where the rule originated in June 1927.

At a meeting held under the Chatham House Rule, anyone who comes to the meeting is free to use information from the discussion but is not allowed to reveal who made any comment. It is designed to increase the openness of discussion.

Cloud Computing Cloud computing is a general term for the delivery of hosted services over the internet. Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. It goes back to the days of flowcharts and presentations that would represent the gigantic server-farm infrastructure of the Internet as nothing but a puffy, white cumulus cloud, accepting connections and doling out information as it floats.

CoE - Council of Europe

The Council of Europe is an international organization promoting co-operation between all countries of Europe in the areas of legal standards, human rights, democratic development, the rule of law and cultural co-operation. It was founded in 1949, has 47 member states and is an entirely separate body from the European Union (EU). Unlike the EU, the Council of Europe cannot make binding laws. The best-known bodies of the Council of Europe are the European Court of Human Rights, which enforces the European Convention on Human Rights. The Council of Europe's work has resulted in standards, charters, and conventions to facilitate cooperation between European countries. Communications protocol A set of rules or standards designed to enable computers to connect with one another and to exchange information with as little error as possible. The protocol accepted for standardizing overall network communications is a seven-layer set of hardware and software guidelines known as the OSI (Open Systems Interconnection) model. See also ISO/OSI model.

Consensus

Page 30: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

30

Consensus decision making is a process used by groups seeking to generate widespread levels of participation and agreement. There are variations among different groups regarding the degree of agreement necessary to finalize a group decision. A consensus is a form of decision-making employed by various Internet governance related entities such as IETF and ICANN. The method to establish whether one has reached consensus differs from full consensus - when no one in the group speaks against the recommendation in its last readings, to partial consensus - a position where only a small minority disagrees, but most agree. Cookie

A piece of information sent by a Web server to a user's browser. (A Web server is the computer that "hosts" a Web site, and responds to requests from a user's browser.) Cookies may include information such as login or registration identification, user preferences, online "shopping cart" information, etc. The browser saves the information and sends it back to the Web server whenever the browser returns to the Web site. The Web server may use the cookie to customize the display it sends to the user, or it may keep track of the different pages within the site that the user accesses. Browsers may be configured to alert the user when a cookie is being sent, or to refuse to accept cookies. Some sites, however, cannot be accessed unless the browser accepts cookies.

Creative Commons

Creative Commons is a non-profit devoted to expanding the range of creative works available for others to build upon legally and to share. The organization has released several copyright-licenses known as Creative Commons (CC) licenses free of charge to the public. These licenses allow creators to communicate which rights they reserve, and which rights they waive for the benefit of recipients or other creators.

CRPD - Convention on the Rights of Persons with Disabilities

The Convention on the Rights of Persons with Disabilities (CRPD) is an international treaty adopted in 2006. It is the first human rights treaty of the 21st century and one of the fastest growing treaties in history.

The Convention follows decades of work by the United Nations and the global disability community to change attitudes, perceptions and approaches to persons with disabilities. The Convention signifies a shift away from a ‘medical model’ approach of disability toward a ‘social model’ approach. This shift moves away from viewing persons with disabilities as “objects” of charity and toward “subjects” with rights who are capable of making decisions for their lives based on free and informed consent and being active members of society.

The CRPD is a human rights instrument with an explicit social development dimension. The Convention adopts a broad categorization of persons with disabilities and reaffirms that all persons with all types of disabilities must enjoy all human rights and fundamental freedoms. It clarifies and qualifies how all categories of rights apply to persons with disabilities and identifies areas where adaptation have to be made for persons with disabilities to effectively exercise their rights and areas where their rights have been violated, and where protection of rights must be reinforced.

Critical Infrastructure

Systems and assets, whether physical or virtual, so vital a government that the incapacity or destruction of such systems and assets would have a debilitating impact on cybersecurity,

Page 31: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

31

national economic security, national public health or safety, or any combination of those matters.

Cryptography Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

Cyber security Cyber security is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. One of the most problematic elements of cybersecurity is the quickly and continuously evolving nature of security risks. Cyberspace

This term is often used to refer to objects and identities that exist largely within the communication network itself, so that a web site, for example, might be metaphorically said to "exist in cyberspace."

Cybersquatting

The practice of registering a third party's intellectual property (or similarly spelled variants) as a domain name with the sole intention of approaching them with an offer to sell it to them sometimes at an inflated price. Some cybersquatters can attempt to coerce the individual or company into buying the name by posting inappropriate material on the website.

Cyber warfare

This term is often used to describe politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare.

D DARPA — Defense Advance Research Projects Agency

The Defense Advanced Research Projects Agency (DARPA) is an agency of the U.S. Department of Defense responsible for the development of emerging technologies for use by the military.

DARPA was created in 1958 as the Advanced Research Projects Agency (ARPA) by President Dwight D. Eisenhower. Its purpose was to formulate and execute research and development projects to expand the frontiers of technology and science, with the aim to reach beyond immediate military requirements. The administration was responding to the Soviet launching of Sputnik 1 in 1957, and DARPA's mission was to ensure U.S. military technology would be more sophisticated than that of the nation's potential enemies.

The name of the organization changed several times from its founding name ARPA: DARPA (March 1972), ARPA (February 1993), and DARPA (March 1996).

DARPA is independent of other military research and development and reports directly to senior Department of Defense management. DARPA funded projects have provided significant technologies that influenced many non-military fields, such as computer networking and graphical

Page 32: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

32

user interfaces in information technology.

Data analytics Data analytics is the process of collecting, organizing and analyzing large sets of data (called big data) to discover patterns and other useful information. Big data analytics can help organizations to better understand the information contained within the data and will also help identify the data that is most important to the business and future business decisions. Analysts working with big data basically want the knowledge that comes from analyzing the data. To analyze large volume of data, big data analytics is typically performed using specialized software tools and applications for predictive analytics, data mining, text mining, forecasting and data optimization. Collectively these processes are separate but highly integrated functions of high-performance analytics. Using big data tools and software enables an organization to process extremely large volumes of data that an organization has collected to determine which data is relevant and can be analyzed to drive better business decisions in the future. Data retention Data retention, also called records retention, is the continued storage of an organization's data for compliance or business reasons.

An organization may retain data for several different reasons. One reason is to comply with government regulations. Another is to provide the organization with the ability to recover critical data in the event of a site-wide data loss, such as a fire or flood. Minimum records retention requirements regulations vary, but typically they range from three years to permanent.

Data Retention Directive

The Data Retention Directive, more formally "Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC" was a Directive issued by the European Union and related to telecommunications data retention.

According to the directive, member states required the storage of telecommunications data for a minimum of 6 months and at most 24 months. Under the directive the police and security agencies would have the able to request access to details such as IP address and time of use of every email, phone call and text message sent or received. A permission to access the information would be granted only by a court order. On 8 April 2014, the Court of Justice of the European Union declared the Directive invalid in response to a case brought by Digital Rights Ireland against the Irish authorities and others.

DHS — Department of Homeland Security

The United States Department of Homeland Security (DHS) is a federal agency designed to protect the United States against threats. Its wide-ranging duties include aviation security, border control, emergency response and cyber security.

Digital Divide

Page 33: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

33

The gap between those people with effective access to digital and information technology and those without. It includes the imbalances in physical access to technology as well as the imbalances in resources and skills needed to participate in a digital world. It is the unequal access by some members of the society to information and communication technology, and the unequal acquisition of related skills. Groups often discussed in the context of a digital divide include gender, income, race and location. The term global digital divided refers to differences in technology access between countries.

Digital Literacy Digital literacy is the knowledge, skills, and behaviors used in a broad range of digital devices such as smartphones, tablets, laptops and desktop PCs, all of which are seen as network rather than computing devices. Digital literacy initially focused on digital skills and stand-alone computers, but the focus has moved from stand-alone to network devices. Digital literacy is distinct from computer literacy and digital skills. Computer literacy preceded digital literacy, and refers to knowledge and skills in using traditional computers (such as desktop PCs and laptops) with a focus on practical skills in using software application packages. Digital skills is more contemporary term but is limited to practical abilities in using digital devices (such as laptops and smartphones).

DiploFoundation (or Diplo)

Diplo is a non-profit organization based in Malta, with offices in Geneva and Belgrade. Diplo's mission is to strengthen the meaningful participation of all stakeholders in diplomacy, international relations, and policy areas such as Internet governance and climate change. It aims to increase the power of small and developing states to influence their futures and development; enhance international accountability and inclusive; increase the legitimacy of international policy making, and improve global governance and international policy development.

DMCA — Digital Millennium Copyright Act

The DMCA is a 1998 United States copyright law that extended the reach of copyright while limiting the liability of the providers of on-line services for copyright infringement by their users. The DMCA criminalizes production and dissemination of technology, devices, or services intended to circumvent measures (DRM) that control access to copyrighted works. It also criminalizes the act of circumventing an access control and heightens penalties for copyright infringement on the Internet. DNS — Domain Name System

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. Most prominently, it translates easily memorized domain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide. The Domain Name System is an essential component of the functionality of the Internet.

An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. Unlike a directory, the DNS can be quickly updated, allowing a service's location on the network to change without affecting the end users, who continue to use the same hostname.

Domain Name Resolvers

Scattered across the Internet are thousands of computers – called "Domain Name Resolvers" or

Page 34: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

34

just plain "resolvers" – that routinely cache the information they receive from queries to the root servers. These resolvers are located strategically with Internet Service Providers (ISPs) or institutional networks. They are used to respond to a user's request to resolve a domain name – that is, to find the corresponding IP address.

DNSSEC — Domain Name System Security Extensions

DNSSEC are a set of protocols that add a layer of security to the domain name system (DNS) lookup and exchange processes, which have become integral in accessing websites through the Internet. While DNSSEC cannot protect how data is distributed or who can access it, the extensions can authenticate the origin of data sent from a DNS server, verify the integrity of data and authenticate nonexistent DNS data..

Domain Name

A domain name is an identification string that defines a realm of administrative autonomy, authority or control within the Internet. Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name registered in the DNS is a domain name. Domain names can also be thought of as a location where certain information or activities can be found.

Domain names are used in various networking contexts and application-specific naming and addressing purposes. In general, a domain name represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server computer hosting a web site, or the web site itself or any other service communicated via the Internet.

DRM — Digital Rights Management

DRM is a generic term that refers to access control technologies used by hardware manufacturers, publishers, and copyright holders to limit usage of digital media or devices. The term is used to describe technologies, which make the unauthorized use of media or devices technically formidable. It can also refer to restrictions associated with specific instances of digital works or devices.

Domain Name Resolvers

Scattered across the Internet are thousands of computers – called " Domain Name Resolvers" or just plain "resolvers" – that routinely cache the information they receive from queries to the root servers. These resolvers are located strategically with Internet Service Providers (ISPs) or institutional networks. They are used to respond to a user's request to resolve a domain name – that is, to find the corresponding IP address.

E Encryption Encryption is a process to encode the contents of a message so as to hide it from outsiders and protect the confidentiality of messages. That is, it is a process of converting data in plain text into a seems-to-be meaningless data stream (called ciphertext) using an algorithm (called cipher) and keys. The reverse process of converting ciphertext back into plaintext is called decryption.

Page 35: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

35

ENISA — European Union Agency for Network and Information Security The European Network and Information Security Agency (ENISA) is a European Union (EU) agency dedicated to preventing and addressing network security and information security problems. ENISA also assists the European Commission in updating and developing European Community Agency legislation in the field of Network and Information Security. ETNO — European Telecommunications Networks Operators Association ETNO is the business association of Europe’s telecommunications network operators. EU — European Union

The European Union (EU) is a politico-economic union of 28 member states that are primarily located in Europe. The EU operates through a system of supranational independent institutions and intergovernmental negotiated decisions by the member states. Institutions of the EU include the European Commission, the Council of the European Union, the European Council, the Court of Justice of the European Union, the European Central Bank, the Court of Auditors, and the European Parliament.

The European Commission

The European Commission (EC) is the executive body of the European Union responsible for proposing legislation, implementing decisions, upholding the Union's treaties and day-to-day running of the EU.

F FCC — Federal Communications Commission

The FCC is a US government agency established by the Communications Act of 1934 that regulates all non-Federal Government use of the radio spectrum (including radio and television broadcasting), all interstate telecommunications (wire, satellite, and cable), and all international communications that originate or terminate in the United States. Fraud — Also known as Internet Fraud Internet fraud (also known as an online scam) is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them; for example, by stealing personal information, which can even lead to identity theft. A very common form of Internet fraud is the distribution of rogue security software. Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. Research suggests that online scams can happen through social engineering and social influence. It can occur in chat rooms, social media, email, message boards, or on websites.

Page 36: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

36

FOC — Freedom Online Coalition

The Freedom Online Coalition is an intergovernmental coalition committed to advancing Internet freedom – free expression, association, assembly, and privacy online – worldwide. In its founding document, the “Hague Declaration”, the FOC declared that the same rights apply online as well as offline. Since its inception in 2011 in The Hague, the Netherlands, the coalition has grown from 15 to 23 member countries.

G GAC — Governmental Advisory Committee

The GAC is an advisory committee comprising appointed representatives of national governments, multinational governmental organizations and treaty organizations, and distinct economies. Its function is to advise the ICANN Board on matters of concern to governments. As an advisory committee, the GAC has no legal authority to act for ICANN, but will report its findings and recommendations to the ICANN Board.

GATS — General Agreement on Trade in Services

The GATS is a 1995 WTO treaty that emerged from Uruguay Round trade negotiations. GATS extended the multilateral trading system to the service sector. All members of the WTO are signatories to the GATS. The fundamental WTO principle of most favored nation treatment applies to GATS.

GGE - The UN Group of Governmental Experts

In 2011, the UN General Assembly asked for the creation of a GGE, to address the issues related to the applicability of international law to cyberspace, state sovereignty over ICT infrastructure within their territory, and the need for a balance between protecting ICT security and respecting human rights and fundamental freedoms.

In 2013, the GGE issued a landmark report, which set out high-level cyber norms that states should follow. Namely, the 2013 report said that UN member states should:

• abide by international law, in particular the UN Charter, when operating in cyberspace; • honor the norm of state responsibility for cyberattacks emanating from their territory; • work to develop confidence building measures to reduce the risk of conflict by increasing

the predictability of state actions; and • engage in capacity building efforts to assist developing countries build the required skills

to protect their networks and citizens.

The current GGE has 20 members. They are: Antigua and Barbuda, Belarus, Brazil, China, Colombia, Egypt, Estonia, France, Germany, Ghana, Israel, Japan, Kenya, Malaysia, Mexico, Pakistan, Russia, Spain, the United Kingdom and the United States. Brazil is the group’s chair.

GDP — Gross domestic product

GDP is one measure of a country’s national income and output. GDP is the total market value of all final goods and services produced within the country in a specified period. It is also considered the sum of a value added at every stage of production of all final goods and services produced within a country in a given period.

Page 37: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

37

GNSO — Generic Names Supporting Organization

The GNSO is the successor to the responsibilities of the Domain Name Supporting Organization ( DNSO ; see below) that relate to the generic top-level domains. The GNSO is the body of six constituencies, as follows: The Commercial and Business constituency, the gTLD Registry constituency, the ISP constituency, the non-commercial constituency, the registrar's constituency, and the IP constituency.

Governance

The decisions that define expectations grant power or verify performance. It consists either of a separate process or a specific part of management or leadership processes. Sometimes people set up a government to administer these processes and systems.

GSM — Global System for Mobile Communication

GSM is a popular standard for mobile phones. Its ubiquity made international roaming common between mobile phone operators, enabling subscribers to use phones in many parts of the world. GSM is a second-generation (2G) cell phone system that made it easier to build data communications into the system. gTLD — Generic Top Level Domain

A generic top-level domain (gTLD) is one of the categories of top-level domains (TLDs) maintained by the Internet Assigned Numbers Authority (IANA) for use in the Domain Name System of the Internet. It is visible to Internet users as the suffix at the end of a domain name. The core group of generic top-level domains consists of the com, info, net, and org domains H HDI — Human Development Index

The Human Development Index (HDI) is a statistical tool developed by the United Nations to measure and rank countries' levels of social and economic development based on four criteria: Life expectancy at birth, mean years of schooling, expected years of schooling and gross national income per capita. The HDI makes it possible to track changes in development levels over time and to compare development levels in different countries.

HTML — HyperText Markup Language

HTML is the predominant markup language for Web pages. It provides a means to describe the structure of text-based information in a document and to supplement that text with interactive forms, embedded images, and other objects. HTML 2.0, defined by the Internet Engineering Task Force (IETF), includes features of HTML common to all Web browsers as of 1995 and was the first version of HTML widely used on the World Wide Web. Future HTML development is carried out by the World Wide Web Consortium (W3C). HTTP

Page 38: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

38

Acronym for Hypertext Transfer Protocol. The client/server protocol used to access information on the World Wide Web. HTTPS Acronym for the secure version of the Hypertext Transfer Protocol.

I IANA — Internet Assigned Numbers Authority

The IANA is the authority originally responsible for the oversight of IP address allocation, the coordination of the assignment of protocol parameters provided for in Internet technical standards, and the management of the DNS, including the delegation of top-level domains and oversight of the root name server system. Under ICANN, the IANA continues to distribute addresses to the Regional Internet Registries, coordinate with the IETF and others to assign protocol parameters, and oversee the operation of the DNS. IANA Transition Since 1998, ICANN has performed that work under the a (no fee) contract from the National Telecommunications and Infrastructure Commission (NTIA), part of United States government Department of Commerce, and the NTIA have had a very minor role in day to day operation (essentially signing off on root zone changes, something they have never not done). This contract required regular renewal, and meant that the US government was able, through that necessary renewal process, to exercise a great deal of oversight over IANA, and more broadly ICANN, operation. On Oct 1, 2016 the IANA contract with NTIA expired. As a result, the IANA role is now performed by ICANN without US government approval, the US government has no role in root zone changes, and the oversight of IANA is now performed by representatives of the Internet community. Exactly how this Internet community oversight is performed has been discussed over the last couple of years by hundreds of representatives of the global Internet community, including all the major organizations that interact with IANA directly, and many representatives of ordinary Internet users and other interested people. Its been an open, transparent, and very thorough process. This now means IANA (and ICANN) is now responsible largely to the broader Internet multi-stakeholder community, a community that anyone (and any organisation) can choose to become involved in. ICC — International Chamber of Commerce

The International Chamber of Commerce is the largest business organization in the world. It includes hundreds of thousands of member companies in over 180 countries.

ICANN — The Internet Corporation for Assigned Names and Numbers

The Internet Corporation for Assigned Names and Numbers ( ICANN ) is a US based, internationally organized, non-profit corporation that has responsibility for Internet Protocol ( IP )

Page 39: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

39

address space allocation, protocol identifier assignment, generic ( gTLD ) and country code ( ccTLD ) Top-Level Domain name system management, and root server system management functions. Originally, the Internet Assigned Numbers Authority ( IANA ) and other entities performed these services under U.S. Government contract. ICANN now performs the IANA function. As a private-public partnership, ICANN is dedicated to preserving the operational stability of the Internet; to promoting competition; to achieving broad representation of global Internet communities; and to developing policy appropriate to its mission through bottom-up, consensus-based processes.

ICT — Information and Communication Technology

ICT is an umbrella term that includes all technologies for the manipulation and communication of information. ICT is sometimes used in preference to Information Technology (IT), particularly in the education and government communities. In the common usage, it is often assumed that ICT is synonymous, but ICT is broader. ICT encompasses any medium to record information and technology for broadcasting information. It includes the broad range of computing hardware, the rapidly developing personal hardware market comprising mobile phones, personal devices, MP3 players, and more. Technologies such as broadcasting and mobile wireless telecommunications are explicitly included under ICT. IDNs — Internationalized Domain Names

IDNs are domain names that include characters used in the local representation of languages that are not written with the twenty-six letters of the basic Latin alphabet "a-z". An IDN can contain Latin letters with diacritical marks, as required by many European languages, or may consist of characters from non-Latin scripts such as Arabic or Chinese. Many languages also use other types of digits than the European "0-9". The basic Latin alphabet together with the European-Arabic digits are, for the purpose of domain names, termed "ASCII characters" (ASCII = American Standard Code for Information Interchange). These are also included in the broader range of "Unicode characters" that provides the basis for IDNs.

IETF — Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular, the standards that comprise the Internet protocol suite (TCP/IP). It is an open standards organization, with no formal membership or membership requirements. All participants are volunteers. The IETF started out as an activity supported by the US federal government, but since 1993, it has operated as a standards development function under the auspices of the Internet Society, an international membership-based non-profit organization.

IGF — Internet Governance Forum

The IGF is a multi-stakeholder forum for policy dialogue on issues of Internet governance. The UN Secretary-General established the IGF in July 2006. It first convened in October/November 2006.

IM — Instant messaging

IM is a technology (along with chat) that creates the possibility of real-time text-based communication between two or more participants over the Internet or some form of internal

Page 40: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

40

network/intranet.

Intellectual property

A legal field that refers to creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, patents, and trademarks. Under intellectual property law, the holder of one of these abstract properties has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered.

Interconnection

The physical linking of a carrier’s network with equipment or facilities not belonging to that network. The term may refer to a connection between a carrier’s facilities and the equipment belonging to its customer, or to a connection between two or more carriers.

Intermediary Liability8 An internet intermediary is an entity which provides services that enable people to use the internet. There are many different kinds of internet intermediaries which fall into two broad categories: “conduits” and “hosts”. “Conduits” are technical providers of internet access or transmission services. Conduits do not interfere with the content they are transmitting other than for automatic, intermediate or transient storage needed for transmission. “Hosts” are providers of content services – for instance, online platforms and storage services.

Some examples of internet intermediaries, in no particular order, include:

• Network operators – mobile network operators, metropolitan or countrywide network operators, internet exchanges.

• Network infrastructure providers that create and maintain networks for network operators, e.g. Cisco, Huawei, and Ericsson.

• Internet access providers (IAPs) – companies that provide access to the internet like AT&T (US), Level 3, and also, on a smaller scale, internet cafes, cybercafes and Wi-Fi hotspot providers.

• Internet service providers (ISPs) – companies that provide internet services such as, for example, email providers. Many IAPs, as well as network operators, are also ISPs and the term is often used interchangeably.

• Hosting providers – companies that provide online hosting and storage services. • Social networks – including Facebook, Twitter, LinkedIn, and user-generated content

(UGC) platforms (e.g. blogging platforms, video-sharing sites, and picture-sharing sites). • Search engines and aggregators, e.g. Google, Bing, Slashdot, Digg, etc. • Internet cafes/cybercafes • Comments sections on blogs or websites.

Internet

A global computer network consisting of interconnected networks using standardized communication protocols. The World Wide Web is accessible via the Internet. Internet Governance

8Taken from Comninos, A. (2012). The liability of internet intermediaries in Nigeria, Kenya, South Africa and Uganda: An Uncertain Terrain. Johannesburg: APC, p. 5.

Page 41: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

41

Internet governance is the development and application of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet. Internet governance should not be confused with E-Governance, which refers to governments' use of technology to carry out their governing duties. Internet Governance Ecosystem An interconnected system characterized by a web of relationships among the many institutions, organizations and communities that have roles affecting the operation and use of the Internet. These relationships reflect and recognize responsibilities, roles and dependencies among the various players. Internet Protocol (IP) The communications protocol underlying the Internet, IP allows networks of devices to communicate over a variety of physical links. Each device or service on the Internet has at least one IP address that uniquely identifies it from other devices or services on the Internet. An IP address is the numerical address and DNS naming uses user-friendly names to locate the devices and services. Internet of Things (IoT) The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention. There is, however, no single, universal definition. Projections for the impact of IoT on the Internet and economy are impressive, with some anticipating as many as 100 billion connected IoT devices and a global economic impact of more than $11 trillion by 2025. The Internet of Things is redefining the debate about privacy issues, as many implementations can dramatically change the ways personal data is collected, analyzed, used, and protected. For example, IoT amplifies concerns about the potential for increased surveillance and tracking, difficulty in being able to opt out of certain data collection, and the strength of aggregating IoT data streams to paint detailed digital portraits of users. Internet Society (ISOC) The Internet Society an international organization for global cooperation and coordination for the Internet and its internetworking technologies and applications. Its principal purpose is to maintain and extend the development and availability of the Internet and its associated technologies and applications - both as an end in itself, and as a means of enabling organizations, professions, and individuals worldwide to more effectively collaborate, cooperate, and innovate in their respective fields and interests.

Page 42: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

42

Interoperability

A property referring to the ability of diverse systems and organizations to work together (inter-operate). In telecommunications, the ability of systems, units, or forces to provide services to and accept services from other systems, units, or forces and to use the services exchanged to enable them to operate effectively together.

Intranet

A private network only for internal use that you would not find on the public Internet.

IP — Internet Protocol

The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.

IP Address

An IP address is a binary number that uniquely identifies computers and other devices on a network.

Two IP addressing standards are in use today. The IPv4 standard is most familiar to people and supported everywhere on the Internet, but the newer IPv6 standard is gradually replacing it. IPv4 addresses consist of four bytes (32 bits), while IPv6 addresses are 16 bytes (128 bits).

IPR — Intellectual Property Rights

IPR is a legal field related to creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. Under intellectual property law, the holder of one of these abstract properties has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered.

IBSA — India, Brazil and South Africa

IBSA is an intergovernmental forum which brings together India, Brazil and South Africa. Cooperation in IBSA is on three fronts: first, as a forum for consultation and coordination on global and regional political issues; second, trilateral collaboration on concrete areas/projects; and third, assisting other developing countries by taking up projects in the latter through IBSA Fund.

ISO — International Organization for Standards

ISO is an international-standard-setting body composed of representatives from various national standards organizations. ISO promulgates worldwide proprietary industrial and commercial standards.

ISP — Internet Service Provider

Page 43: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

43

An ISP is a company, which provides access to the Internet to organizations and/or individuals. Access services provided by ISPs may include web hosting, email, VoIP (voice over IP ), and support for many other applications.

ITRs — International Telecommunications Regulations

International Telecommunication Regulations (ITRs) is a treaty that was developed at the 1988 World Administrative Telegraph and Telephone Conference (WATTC-88). The ITRs are intended to facilitate “global interconnection and interoperability” of telecommunications traffic across national borders. The ITRs determine how international telecommunications services operate across borders. The treaty is under the authority of the International Telecommunication Union (ITU). It represents some of the oldest regulations of their kind in existence.

ITU — International Telecommunication Union

The ITU was founded as the International Telegraph Union in 1865, its main tasks include standardization, allocation of the radio spectrum, and organizing interconnection arrangements between different countries to allow international phone calls. It is one of the specialized agencies of the United Nations.

IXPs — Internet exchange points

An IXP is a physical infrastructure through which Internet service providers (ISPs) exchange Internet traffic between their networks (autonomous systems). IXPs reduce the portion of an ISP's traffic which must be delivered via their upstream transit providers, thereby reducing the average per-bit delivery cost of their service. Furthermore, the increased number of paths learned through the IXP improves routing efficiency and fault-tolerance.

L LACNIC — Latin American and Caribbean Internet Addresses Registry

LACNIC is a Regional Internet Registry ( RIR ) for Latin America and the Caribbean.

LDCs — Least Developed Countries

A least developed country (LDC) is a country that, according to the United Nations, exhibits the lowest indicators of socioeconomic development, with the lowest Human Development Index ratings of all countries in the world.

Their low level of socio-economic development is characterized by weak human and institutional capacities, low and unequally distributed income and scarcity of domestic financial resources. They often suffer from governance crisis, political instability and, in some cases, internal and external conflicts. Their largely agrarian economies are affected by a vicious cycle of low productivity and low investment.

LEA — Law Enforcement Agency

A law enforcement agency (LEA) is any agency which enforces the law. This may be a special, local, or state police, federal agencies such as the Royal Canadian Mounted Police (RCMP), or Federal Bureau of Investigation (FBI). It could also refer to a national police force such as the Serious Organized Crime Agency. Also, it can be used to describe an international organization such as Europol or Interpol.

Page 44: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

44

LTE — Long Term Evolution

LTE is the 3G standardization work begun by the 3rd Generation Partnership Project in late 2004. The goal is to define a set of high-level requirements for mobile communications systems to compete with other emerging cellular broadband technologies, particularly WiMAX.

M Malware Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware includes computer viruses, worms, Trojan horses, ransom ware, spyware, adware, scareware, and other malicious programs.

MILNET — Military Network

The MILNET, also called the Military Network or Military Net, was part of the ARPANET, which was the original name of the Internet. It was used for unclassified United States Department of Defense (DoD) traffic.

Multilateral

Involving or participated in by two or more nations or parties

Multistakeholder Approach

The Multistakeholder Approach is an organizational framework or structure for governance and policymaking which aims to bring together all stakeholders to collaborate and participate in the dialogue, decision-making and implementation of solutions to identified problems or goals.

Multi-stakeholder process

Multi-stakeholder processes are "processes that aim to bring together all major stakeholders in a new form of decision-finding (and possibly decision-making) on a particular issue. Ideally, they are based on recognizing the importance of achieving equity and accountability in communication between stakeholders, involving equitable representation of different stakeholder groups and their views. They are based on democratic principles of transparency and participation, and aim to develop partnerships and strengthened networks between stakeholders. MSPs cover a wide spectrum of structures and levels of engagement. They can comprise of dialogue (in the sense of exchange towards mutual understanding), or grow into processes of consensus-building, decision-making and implementation. The exact nature of any MSP will depend on the issue, the participants, the time-frame, available resources, and other variables. N NAT - Network Address Translation

Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device. The technique was originally used for ease of rerouting traffic in IP networks without readdressing every host. It has become a popular and essential tool in conserving global address space allocations in face of IPv4 address exhaustion by sharing one Internet-routable IP address of a NAT gateway for an entire private network.

Page 45: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

45

NAT serves two main purposes:

• Provides a type of firewall by hiding internal IP addresses. • Enables one to use more internal IP addresses. Since they're used internally only, there's

no possibility of conflict with other IP addresses.

Netmundial Principles

The Netmundial meeting, which took place in Sao Paolo, Brazil on 23-24 April 2014, was the first Multistakeholder-designed event to focus on the future of Internet governance. Netmundial identified a set of common principles and important values that contribute to an inclusive, Multistakeholder, effective, legitimate, and evolving Internet governance framework, and recognized that the Internet is a global resource which should be managed in the public interest.

Network Infrastructure

The underlying structure of a computer network, including hardware, functional layers, interfaces, and protocols, used to establish communication and ensure the reliable transfer of information.

Network Neutrality

Net neutrality -- also known as "open internet" and "network neutrality" -- is a concept that asserts all data packets on the internet should be impartially delivered to consumers regardless of their content, destination, source or cost of service. The net neutrality principle holds that wired and wireless internet service is a utility like gas, water, electricity and landline phone service that should be available to everyone and subject to government regulation. The term came from "Network Neutrality, Broadband Discrimination," a paper written by Columbia Law School professor Tim Wu in 2003.

NGO — Non-governmental organization

An NGO is a legally constituted organization created by private organizations or people with no participation or representation of any government. In the cases in which NGOs are funded totally or partially by governments, the NGO maintains its non-governmental status insofar as it excludes government representatives from membership in the organization.

NTIA - The National Telecommunications and Information Administration (NTIA)

The U.S. Department of Commerce National Telecommunications and Information Administration (NTIA) is the Executive Branch agency that is principally responsible for advising the President on telecommunications and information policy issues. NTIA maintains a contract with ICANN for the technical coordination of the Internet's domain name and addressing system. O OECD — Organization for Economic Co-operation and Development

The Organization for Economic Cooperation and Development (OECD) is a group of 30 member countries that discuss and develop economic and social policy. OECD countries are democratic countries that support free market economies.

Open Source

A development methodology, which offers practical accessibility to a product’s source goods and

Page 46: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

46

knowledge. Open source is one possible design approach. Others see open source as a critical strategic element of their operations. Open source gained popularity with the rise of the Internet, which provided access to diverse production models, communication paths, and interactive communities.

OS — Operating System

OS is the software component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources of the computer. The operating system acts as a host for applications that are run on the machine.

P Peering

Peering is a voluntary interconnection of administratively separate Internet networks for the purpose of exchanging traffic between the customers of each network. The pure definition of peering is settlement-free or “sender keeps all,” meaning that neither party pays the other for the exchanged traffic, instead, each derives revenue from its own customers. Peering requires physical interconnection of the networks, an exchange of routing information and is often accompanied by peering agreements of varying formality, from “handshake” to thick contracts.

Peer-to-peer (or P2P)

P2P networks are typically used for connecting nodes via largely ad hoc connections. P2P allows diverse connectivity between participants in a network rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application.

Phishing

Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials. Social engineering schemes use spoofed emails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers.

Privacy

Privacy by Design

This principle means that privacy and data protection are embedded throughout the entire life cycle of technologies, from the early design stage to their deployment, use and ultimate disposal.

R Registrar

Domain names ending with .aero, .biz, .com, .coop, .info, .museum, .name, .net, .org, and .pro can be registered through many different companies (known as "registrars") that compete with one another.

Page 47: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

47

The registrar you choose will ask you to provide various contact and technical information that makes up the registration. The registrar will then keep records of the contact information and submit the technical information to a central directory known as the "registry." This registry provides other computers on the Internet the information necessary to send you e-mail or to find your web site.

Registrant

The 'legal entity' that registered a specific domain name. They hold the right to use that domain name for a specified period of time, bound by terms and conditions of domain name registration set by the registrar.

Registry

The " Registry " is the authoritative, master database of all domain names registered in each Top Level Domain. The registry operator keeps the master database and also generates the "zone file" which allows computers to route Internet traffic to and from top-level domains anywhere in the world. Internet users don't interact directly with the registry operator; users can register names in TLDs including .biz, .com, .info, .net, .name, .org by using an ICANN -Accredited Registrar .

RFCs — Request for comments

A Request for Comments (RFC) is a publication of the Internet Engineering Task Force (IETF) and the Internet Society, the principal technical development and standards-setting bodies for the Internet.

An RFC is authored by engineers and computer scientists in the form of a memorandum describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems. It is submitted either for peer review or simply to convey new concepts, information, or (occasionally) engineering humor. The IETF adopts some of the proposals published as RFCs as Internet standards.

RFIDs — Radio frequency identification devices

RFIDs are small devices, also known as “tags” that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. It relies on storing and remotely retrieving data using radio frequency tags or transponders.

Right to be Forgotten

The right to be forgotten, is intended to cope with privacy risks online by empowering individuals to control their own identity (and information) in the online environment. Thus, if an individual no longer wants his or her personal data to be processed or stored by a controller (e.g. Facebook) and if there is no legitimate reason for keeping it, the data should be removed from their system.

In her 2012 article published by the American Bar Association, professor Jasmine McNealy, describes the right to be forgotten as follows:

"the "right to be forgotten," (is) an amorphous privilege that would allow individuals more control over their personal information, particularly that information collected and connected with new technology.”

Page 48: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

48

According to Professor Bert-Jaap Koops, the right to be forgotten takes three forms: the right to have information deleted after a certain time, the right to have a "clean slate," and the right to be connected only to present information. The first conception of the right reflects the idea that an individual should have the opportunity to require individuals and organizations in possession of information about them to erase it.

In Google v. Spain, the European Court of Justice ruled in 2014 that the European citizens have a right to request that commercial search firms, such as Google, that gather personal information for profit should remove links to private information when asked, provided the information is no longer relevant. The Court did not say newspapers should remove articles. The Court found that the fundamental right to privacy is greater than the economic interest of the commercial firm and, in some circumstances, the public interest in access to Information.

RIPE and RIPE NCC — Réseaux IP Européens

RIPE is an open and voluntary organization, which consists of European Internet service providers. The RIPE NCC acts as the Regional Internet Registry ( RIR ) for Europe and surrounding areas, performs coordination activities for the organizations participating in RIPE , and allocates blocks of IP address space to its Local Internet Registries (LIRs), which then assign the addresses to end-users.

RIR — Regional Internet Registry

These not-for-profit organizations are responsible for distributing IP addresses on a regional level to Internet service providers and local registries. There are currently five RIRs: AfriNIC , APNIC , ARIN , LACNIC and RIPE NCC.

Risk

A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence.

Risk Management

The process of identifying, assessing, and responding to risk.

Root Servers

The root servers contain the IP addresses of all the TLD registries – both the global registries such as .com, .org, etc. and the 244 country-specific registries such as .fr (France), .cn (China), etc. This is critical information. If the information is not 100% correct or if it is ambiguous, it might not be possible to locate a key registry on the Internet. In DNS parlance, the information must be unique and authentic.

S SDGs - Sustainable Development Goals.

Page 49: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

49

SMS — Short Message Service

SMS is a communications protocol allowing the interchange of short text messages between mobile telephone devices. The SMS technology has facilitated the development and growth of text messaging. SMS is so closely associated with text messaging and that in many countries it is used as a synonym for a text message or the act of sending a text message, even when a different protocol is being used.

Social Engineering

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

The term "social engineering" as an act of psychological manipulation is also associated with the social sciences, but its usage has caught on among computer and information security professionals

Spam

Spam is junk email sent on the Internet to a large number of recipients. Some email clients or servers have spam filters, which try to delete or move the spam messages.

Spear phishing

Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.

This is how it works: An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware. These emails often use clever tactics to get victims' attention.

Many times, government-sponsored hackers and hacktivists are behind these attacks. Cybercriminals do the same with the intention to resell confidential data to governments and private companies. These cybercriminals employ individually designed approaches and social engineering techniques to effectively personalize messages and websites. As a result, even high-ranking targets within organizations, like top executives, can find themselves opening emails they thought were safe. That slip-up enables cybercriminals to steal the data they need in order to attack their networks.

Traditional security often doesn't stop these attacks because they are so cleverly customized. As a result, they're becoming more difficult to detect. One mistake can have serious. With stolen data, fraudsters can reveal commercially sensitive information, manipulate stock prices or commit various acts of espionage. In addition, spear phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.

SSAC — Security and Stability Advisory Committee

Page 50: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

50

SSAC is an advisory committee of ICANN focused on the security and stability of the Internet's naming and address allocation systems. Their charter includes a focus on risk analysis and auditing. SSAC consists of approximately 20 technical experts from industry and academia as well as operators of Internet root servers, registrars, and TLD registries.

Standard

A technical standard is an established norm or requirement. It is usually a formal document that establishes uniform engineering or technical criteria, methods, processes and practices. A technical standard may be developed privately or unilaterally by a corporation, regulatory body, or military. Standards can be developed by groups such as trade unions, and trade associations.

Stakeholders

A stakeholder has been defined as any individual or group affected by the actions of the organization. Stakeholders in Internet governance include Country Code top level domain name registries; generic top-level domain registries and registrars; regional internet registries who manage the regional distribution of Internet number resources including IP address and Autonomous System Numbers; the thirteen root name server operators; commercial interests - including those representing large and small businesses, intellectual property interests and providers of internet and other communications services; non-commercial interests – including non-commercial users and not-for-profit organizations; governmental interests – including national governments, multi-national governmental organizations and treaty organizations, and distinct economies; technical experts from industry and academia; and representatives of Internet users worldwide.

T

TCP/IP — Transmission Control Protocol (TCP) and the Internet Protocol (IP) (also known as The Internet Protocol Suite)

TCP/IP and IP are the two early two networking protocols used for the Internet and other similar networks. TCP/IP, like many protocol suites, may be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted. The TCP/IP model consists of four layers. From lowest to highest, these are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.

Tier 1 network

A tier 1 network is a network that can reach every other network on the Internet without purchasing IP transit or paying settlements.

TLD — Top-level Domain

TLDs are the names at the top of the DNS naming hierarchy. They appear in domain names as the string of letters following the last (rightmost) ".", such as "net" in "www.example.net". The administrator for a TLD controls what second-level names are recognized in that TLD . The

Page 51: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

51

administrators of the "root domain" or "root zone" control what TLDs are recognized by the DNS . Commonly used TLDs include .com, .net, .edu, .jp, .de, etc.

Transition – See IANA Transition.

U UN Special Rapporteur

A Special Rapporteur is a title given to individuals working on behalf of various regional and international organizations who bear specific mandates to investigate, monitor and recommend solutions to specific human rights problems. There currently exist: Special Rapporteurs of the United Nations.

UDRP — Uniform Dispute Resolution Policy

The Uniform Domain-Name Dispute-Resolution Policy (UDRP) is a process established by the Internet Corporation for Assigned Names and Numbers (ICANN) for the resolution of disputes regarding the registration of internet domain names. The UDRP policy currently applies to all .biz, .com, .info, .name, .net, and .org top-level domains, and some country code top-level domains. W W3C — World Wide Web Consortium

The W3C is an international industry consortium founded in October 1994 to develop common protocols that promote the evolution of the World Wide Web and ensure its interoperability. Services provided by the Consortium include: a repository of information about the World Wide Web for developers and users; reference code implementations to embody and promote standards; and various prototype and sample applications to demonstrate use of new technology.

WCIT — World Conference on International Telecommunications

The World Conference on International Telecommunications, or WCIT, is a treaty conference that renegotiates the International Telecommunications Regulations (ITRs), an international treaty that defines general principles for the provision of international telephony and telecommunications.

WEF — World Economic Forum

The World Economic Forum is an independent international organization committed to improving the state of the world by engaging business, political, academic, and other leaders of society to shape global, regional, and industry agendas. The forum is best known for its annual winter meeting in Davos, Switzerland. The meeting brings together some 2,500 top business leaders, international political leaders, selected intellectuals, and journalists to discuss the most pressing issues facing the world, including health and the environment. WGIG — Working Group on Internet Governance

The Working Group on Internet Governance (WGIG) was a United Nations multi-stakeholder

Page 52: IFEX Internet Governance Forum (IGF) Guide Version 2€¦ · protocols of today's Internet. The Internet that we have and enjoy today could not be possible without the development

52

Working group initiated after the 2003 World Summit on the Information Society (WSIS) first phase Summit in Geneva failed to agree on the future of Internet governance. The main activity of the WGIG was to deal with the following issues: (1) Develop a working definition of Internet Governance; (2) Identify the public policy issues that are relevant to Internet Governance; (3) Develop a common understanding of the respective roles and responsibilities of governments, existing international organizations and other forums as well as the private sector and civil society from both developing and developed countries.

WHOIS

WHOIS (pronounced "who is"; not an acronym) is an Internet protocol that is used to query databases to obtain information about the registration of a domain name (or IP address). WHOIS services are typically used to identify domain holders for business purposes and to identify parties who are able to correct technical problems associated with the registered domain.

WIPO — World Intellectual Property Organization

WIPO is an intergovernmental organization based in Geneva, Switzerland responsible for the promotion of the protection of intellectual rights throughout the world. It is one of the 16 specialized agencies of the United Nations system of organizations.

WSIS — World Summit on Information Society

WSIS was a two-part UN-sponsored conference about information, communication and the information society that took place in 2003 in Geneva and in 2005 in Tunis. Its advocates aimed to bridge the “global digital divide” separating rich countries from poor countries by spreading access to the Internet in the developing world. One of the outcomes of the WSIS was the Internet Governance Forum (IGF), which is a yearly forum to discuss Internet related policy issues.

WTO — World Trade Organization

The WTO is an international organization designed to supervise and liberalize international trade. The WTO came into being on 1 January 1, 1995, and is the successor to the GATT. The WTO deals with the rules of trade between most nations; it is responsible for negotiating and implementing new trade agreements, and is in charge of policing member countries’ adherence to WTO agreements. The WTO has 153 members, which represents more than 95% of total world trade.

WWW — World Wide Web

The WWW is a system of interlinked hypertext documents accessed via the Internet. Web browsers are used to view Web pages that may contain text, images, videos, and other multimedia and navigate between them using hyperlinks. The World Wide Web was created in 1989 by Sir Tim Berners-Lee and released in 1992.