Framework to Develop Gender-responsive Cybersecurity Policy | IGF 2023 WS #477

11 Oct 2023 07:30h - 08:30h UTC

Event report

Speakers and Moderators

Speakers:
  • David Fairchild, Government, Western European and Others Group (WEOG)
  • Kemly Camacho, Civil Society, Latin American and Caribbean Group (GRULAC)
Moderators:
  • Veronica Ferrari, Global Policy Advocacy Coordinator

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The analysis uncovers several significant points concerning gender equality and cybersecurity policies. One notable issue is the exclusion of women, girls, and individuals of other genders from discussions with the private sector and tech companies. This exclusion leads to a lack of diversity and representation in decision-making processes, potentially resulting in policies that do not adequately address the needs and concerns of all individuals.

Another concerning finding is the resistance to including gender language in the final text of policies. This pushback may arise from factors such as a resistance to change, a lack of understanding of the importance of gender-inclusive language, or intentional efforts to maintain the status quo. This resistance highlights the need for greater awareness and commitment to gender equality in policy-making processes.

On a positive note, the analysis recognizes the essential role of including a gender perspective and intersectionality in cybersecurity policies. By considering the experiences and challenges faced by different genders and intersecting identities, policies can be more comprehensive and effective in addressing cyber threats. This recognition emphasizes the importance of adopting an intersectional approach when developing cybersecurity strategies.

Furthermore, civil society and the United Nations are identified as key actors in ensuring gender-inclusive policies. Their involvement in advocating for and monitoring the implementation of gender equality measures can contribute to creating an environment that values and promotes the rights and representation of all genders.

Another noteworthy insight is the recognition that gender equality is a task that requires collective support, not just from women. It is important for everyone, regardless of gender, to actively contribute to achieving gender equality and dismantling gender-based discrimination and inequality.

Education is highlighted as a crucial tool for combating setbacks in gender equality. By promoting education that emphasizes gender equality principles and human rights, societies can foster greater understanding, empathy, and equal opportunities for all individuals.

However, limitations arise during negotiations, as member states often draw red lines that restrict progress on gender language. This observation suggests that political considerations and differing priorities among states can serve as obstacles to advancing gender equality within policy frameworks.

Additionally, the analysis emphasizes the need for a gender framework for digital transformation and cybersecurity. This framework should account for the specific challenges and vulnerabilities faced by different genders in the digital realm, ensuring that cybersecurity policies and practices are inclusive and responsive to diverse needs.

In conclusion, the analysis brings attention to several key aspects of gender equality and cybersecurity policies. It highlights the need for increased diversity and inclusive decision-making processes, the importance of gender-sensitive language, the role of education in promoting gender equality, and the significance of international cooperation and civil society engagement. These insights can inform policymakers, stakeholders, and advocates working towards gender-inclusive cybersecurity policies and contribute to building a more equitable and secure digital future.

Speaker 1

The analysis underscores the critical need for cybersecurity awareness among citizens and businesses. Policymakers should actively support collaboration between different sectors to effectively address this issue. By fostering cooperation and sharing knowledge, policymakers can enhance cybersecurity practices and protect individuals and organizations from cyber threats.

Furthermore, it is crucial for policymakers to take the lead in creating awareness about cybersecurity among citizens and businesses. They can educate the public about potential risks and promote best practices for safeguarding personal and sensitive data. This proactive approach can contribute to an overall improvement in cybersecurity measures and reduce the likelihood of successful cyber attacks.

The analysis also highlights the importance of respecting human rights within the domain of cybersecurity. Policymakers should integrate human rights as a fundamental principle when formulating cybersecurity policies. It is vital to remember that real people are affected by cyber threats, and their rights and privacy should be protected. By considering human rights, policymakers can strike a balance between ensuring cybersecurity and upholding individual freedoms.

Additionally, the analysis underscores the importance of balancing innovation with securing the digital infrastructure. Many young people are involved in both positive and negative innovations in the cyber domain. Policymakers need to find a middle ground that encourages and supports innovation while ensuring the security of digital infrastructure. This balance is essential for fostering technological advancements while safeguarding against potential vulnerabilities and cyber threats.

The analysis also emphasizes the significance of including vulnerable populations in policy considerations. Often, vulnerable populations are overlooked or ignored when it comes to cybersecurity policies, resulting in their problems being disregarded. By actively including these populations in policy discussions and decision-making processes, policymakers can address their unique needs and challenges. This inclusive approach helps ensure that the concerns and vulnerabilities of all individuals are taken into account in cybersecurity strategies and initiatives.

In conclusion, the analysis highlights the importance of cybersecurity awareness, collaboration, and human rights considerations in policymaking. Policymakers play a vital role in creating awareness, fostering cooperation, and protecting human rights in the realm of cybersecurity. Moreover, finding a balance between innovation and security, as well as actively including vulnerable populations, are instrumental in developing comprehensive and effective cybersecurity policies. By considering these factors, policymakers can enhance cybersecurity practices, promote a safer online environment, and work towards achieving the relevant Sustainable Development Goals.

Veronica Ferrari

Various speakers have emphasized the importance of including a gender perspective in cybersecurity discussions. Gender is not only a technical issue; it involves power relations and encompasses differentiated risks and needs experienced by individuals. The recognition that cyber incidents disproportionately harm specific social groups based on factors such as gender, sexual orientation, race, and religion is growing. There is also evidence that legal cyber frameworks are being exploited to persecute women and LGBTQ individuals.

To promote a gender-inclusive approach to cybersecurity, there have been calls to integrate a gender perspective at national, regional, and international levels. The Association for Progressive Communications (APC) has developed a specific tool/framework to achieve this goal.

Concerns were specifically raised about cyber laws in the Asia-Pacific region, where shrinking civic space and challenges to civil society inputs were highlighted. It was noted that cyber-related laws can be used for censorship and criminalization, with specific issues concerning the Philippines.

Additionally, there was a discussion on the gender perspective of cybercrime legislation and the strategies employed. Jess and her organization have conducted research and advocated for gender perspectives in cyber policy discussions. Veronica Ferrari showed interest in gaining insights into the gender perspective of cybercrime legislation from Jess.

The international dynamics of gender and cybersecurity were also examined. The appearance of gender considerations in multilateral processes on cybersecurity was addressed, with David providing his views on the important factors to consider for a gender perspective at the international level.

In order to link a human-centered approach to existing agendas such as sustainable development and digital economy indicators, recommendations were made within a gender framework. This highlights the importance of aligning cybersecurity with broader goals and keeping a focus on human well-being.

Veronica Ferrari agreed on the significance of continued advocacy, research, and raising awareness about a human-centered approach while rethinking the concept of security. This emphasizes the need to push for gender inclusion in cybersecurity, generate more evidence, and promote a shift in security perceptions.

In conclusion, integrating a gender perspective into cybersecurity discussions is vital. Recognizing and addressing differentiated risks and needs, the disproportionate impact of cyber incidents on different social groups, and the misuse of legal frameworks are crucial steps towards establishing a more inclusive and equitable approach to cybersecurity.

Kemly Camacho

The analysis delves into various aspects of cybersecurity strategies and the involvement of different stakeholders in promoting gender equality. One key point highlighted is the significance of budget allocation in cybersecurity strategies. For instance, the discussion brings up Costa Rica’s cybersecurity strategy, which primarily focuses on reacting to cyber incidents rather than proactive prevention. This indicates that budget allocation plays a crucial role in defining the government’s vision and priorities, including whether gender is prioritised in the strategy.

Another significant aspect discussed is the role of civil society and training in cybersecurity. Sula BatsĂș, an organisation, is mentioned for convening a network of organisations across different fields to advocate for cybersecurity. They also conducted a comprehensive six-month training programme aimed at educating various sectors about the importance of cybersecurity. This evidence underscores the positive impact civil society and training can have in enhancing cybersecurity measures.

A mixed sentiment is observed regarding the private sector-led push to include more women in cybersecurity. While the intention appears to encourage gender equality, there is concern that this push may be driven by the private sector’s need to address resource gaps, rather than a genuine commitment to gender equality. This highlights the importance of ensuring that motivations for gender inclusion are rooted in equality and not solely economic interests.

The analysis also advocates for greater women’s leadership in the IT and cybersecurity sector. It highlights the stagnant percentage of women in the Latin American IT sector, which has remained unchanged for the past 15 years despite investments and efforts. The unique qualities and analytical leadership that women can bring to the sector are recognised as valuable contributions.

Furthermore, the analysis emphasises the need for safe digital spaces, drawing a parallel with the concept of safe neighbourhoods. It suggests that just as people require a safe physical environment, they also need a safe digital space. While the initial idea of integrating women in the IT sector is viewed positively, it is argued that more needs to be done to ensure genuine inclusivity.

Additionally, the analysis draws attention to the violence faced by women in the IT sector, framing it as a form of violence against women. It highlights that the challenges experienced by women in the sector are often not integrated into conversations around violence against women. The existence of extensive research on the difficult conditions faced by women in IT further supports this assertion.

Overall, the analysis sheds light on various dimensions of cybersecurity strategies, the importance of stakeholder involvement, and the need for gender equality. It provides evidence and insights into the factors that influence cybersecurity strategies, the role of civil society and training, private sector motivations, women’s representation in the sector, the need for safe digital spaces, and the recognition of violence against women in the IT field. These findings offer valuable considerations for policymakers, organisations, and individuals seeking to promote cybersecurity and gender equality.

Speaker 2

The cybercrime law in the Philippines has faced significant criticism due to its potential threat to the rights of women and LGBTQ+ individuals. One of the main concerns stems from the broad parameters and nebulous key terms surrounding the provision about cybersex, which is seen as a potentially serious threat to these marginalized groups. Additionally, the law also criminalises cyber libel, further limiting freedom of expression and raising concerns about possible misuse by authorities.

Another issue with the cybercrime law is the imposition of excessive penalties for crimes involving the use of Information and Communication Technologies (ICTs). These penalties may not be proportionate to the offences committed and can lead to unfair and disproportionate punishments.

However, there has been positive development in recent times. The problematic provision regarding cybersex in the cybercrime law has been repealed. This significant change is the result of years of advocacy by women’s rights groups that tirelessly worked towards addressing the flaws in the legislation. The repeal was enacted through a provision under new legislation addressing online sexual abuse and exploitation of children, demonstrating a shift towards a more comprehensive approach to protecting vulnerable individuals online.

The success of repealing the problematic provision highlights the importance of collaboration and building alliances to effect changes in flawed cybersecurity policies. Women’s rights groups, children’s rights groups, and LGBTQ+ groups came together to advocate for the repeal. Their concerted efforts, along with the support of a champion in the Philippine Senate who is open to dialogue with civil society, have been crucial in achieving this positive outcome.

Overall, while the cybercrime law in the Philippines still has its flaws, the recent repeal of the problematic provision about cybersex is a significant step towards addressing concerns about gender and human rights. It underscores the power of advocacy and collaboration in bringing about meaningful changes in policy. The journey, however, does not end here, and continued efforts are needed to ensure that cybersecurity policies align with international standards and protect the rights of all individuals in the digital realm.

David Fairchild

The analysis of David’s remarks sheds light on several important points concerning gender inclusion in cybersecurity and international policy. David underscored the significance of multilateral processes in advancing this cause. He noted that Canada has consistently supported gender issues as a crucial component of their foreign aid policy, reflecting the country’s commitment to promoting gender equality on the global stage. However, David also expressed concerns about the potential negative consequences of overemphasizing gender. He cautioned against an excessive focus on gender, highlighting the strategic disadvantages that can arise from such an approach.

In addition to advocating for multilateral processes, David highlighted the importance of education and understanding in addressing gender issues within technical fields. Specifically, he referenced the International Telecommunications Union, emphasizing the need to ensure that gender equality and understanding are prioritized in highly technical areas, where human rights may not always receive sufficient attention. David further emphasized that gender equality should not be viewed solely as a women’s issue, but rather as an issue that requires the support and involvement of everyone.

The analysis also revealed David’s observations on the ongoing debates and pushbacks surrounding gender language, even within progressive platforms like the UN. He cited an unnamed state’s call to end the integration of gender-related language in UN documents, demonstrating the challenges faced in promoting gender inclusion. Moreover, David noted that some countries or blocs may use gender language as a bargaining chip during negotiations, further complicating the progress towards gender equality.

In conclusion, David’s remarks emphasized the crucial role of multilateral processes in promoting gender inclusion in cybersecurity and international policy. While commending Canada’s ongoing support for gender issues, he warned against the negative effects of overemphasizing gender. David stressed the need for education and understanding regarding gender issues in technical fields, highlighting the International Telecommunications Union as an example. Furthermore, he highlighted the ongoing debates and pushbacks surrounding gender language, underscoring the challenges faced in advancing gender equality. The analysis revealed both positive and negative sentiments expressed by David, reflecting the complexity and ongoing nature of these important issues.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more