>>> VERSION FRANÇAISE | |
Inter-Parliamentary Union | |
Chemin du Pommier 5, C.P. 330, CH-1218 Le Grand-Saconnex/Geneva, Switzerland |
Resolution adopted by consensus* by the 132nd IPU Assembly
Mindful that information and communication technologies (ICTs) are means of inclusion and development and must not be used by States or non-State actors to violate international law, in particular the provisions and principles of the Charter of the United Nations relating to sovereignty, non-intervention, the sovereign equality of States, the peaceful settlement of disputes and the prohibition of the threat or use of force, Acknowledging the work accomplished by the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, Considering that people's access to cyberspace involves inter alia extensive digital communication via satellites, optical networks and advanced computer programmes, the systematic exchange of information, graphic, audio-visual and computerized data, intelligent tools and equipment, software, advanced operating systems, and the possibility to use them for their own purposes, Acknowledging that improper use of technology can have a harmful impact at national, regional and even global level, and that internationally applicable legal regulatory authorities and instruments must therefore be established with regard to its purpose and use, Convinced that, given the immense socio-economic benefits that cyberspace brings to all citizens around the world, predictability, information security and stability in the cyberdomain are essential, Having considered United Nations General Assembly resolutions 31/72 of 10 December 1976 (on a convention on the prohibition of military or any other hostile use of environmental techniques), 55/63 of 4 December 2000 and 56/121 of 19 December 2001 (on combating the criminal misuse of information technologies), 69/28 of 2 December 2014 (on developments in the field of information and telecommunications in the context of international security) and 57/239 of 20 December 2002 (on the creation of a global culture of cybersecurity), Recognizing the importance of international and regional agreements on cybercrime, transnational organized crime, the exchange of information and administrative assistance, including the 1977 Convention on the Prohibition of Military or Any Other Hostile Use of Environmental Modification Techniques, the 2001 Council of Europe Convention on Cybercrime (Budapest Convention) and its Additional Protocol (concerning the criminalization of acts of a racist and xenophobic nature committed through computer systems), the 2010 Arab Convention on Combating Information Technology Offences and the 2010 Shanghai Cooperation Organization Agreement on Cooperation in the Field of International Information Security; also recognizing the importance of international treaties in preventing cyber warfare, Fully aware that some concepts, definitions and standards of cyberpolicy, especially in cyber warfare and as they relate to international peace and security, are not commonly understood and are still being clarified at the national, regional and international levels, and that international consensus still does not exist in some areas, Welcoming the progress made in international forums towards a common perception of what constitutes acceptable behaviour on the part of States in cyberspace, in particular by the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security and by other bilateral, regional and multilateral initiatives, Acknowledging that certain principles of public international law, including, in particular, those contained in the United Nations Charter, the 1949 Geneva Conventions and their Additional Protocols, the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and the Convention on the Elimination of All Forms of Discrimination against Women, are relevant and applicable to cyberspace and are essential to maintaining peace and international stability and promoting an open, secure and peaceful ICT environment, accessible to women and men alike, Considering that cyberspace is more than the Internet, that the use of hardware, software, data and information systems can have effects beyond networks and IT infrastructure and is considered as a tool of economic growth, and that inequalities, including gender inequalities, exist in the ICT environment, Cognisant of the fact that different areas of cyberpolicy, while distinct, are inextricably linked and may have an impact on international peace and security aspects of cyberspace, and vice versa, Considering that the covert and illegal use, by individuals, organizations and States, of the computer systems of foreign countries to attack third countries is a matter of grave concern because of its potential to spark international conflicts, Also considering that cyberspace has the potential to be exploited as a new dimension of conflict as well as a new operating environment where many, if not most, cyberassets have both civilian and military applications, Aware that cyberspace is not an isolated domain and that destabilizing activities within it may have serious effects on other areas of global social life, trigger other, traditional forms of insecurity or conflict, or start a new type of conflict, and convinced that there is a need for regional and international cooperation against threats resulting from the malicious use of ICTs, Also convinced that States should encourage the private sector and civil society to play an appropriate role to improve the security and use of ICTs, including supply chain security for ICT products and services, Aware that military ICT systems for the deployment and use of force are susceptible to acts of cyber warfare that could lead to third parties intercepting and deploying such systems to cause unauthorized, illegal and destructive use of force, concerned that fully autonomous military systems ("killer robots") are especially vulnerable to such unauthorized deployment, as there is no human validation of final targeting decisions, and especially concerned that the hacking of nuclear weapon command-and-control systems could result in the unauthorized launch and detonation of nuclear weapons and cause unparalleled catastrophes, Noting that the use of ICTs has reshaped the national and international security environment andthat such technologies can be used for malicious purposes and to violate human and civil rights; also noting that, in recent years, the risk of ICTs being used by State and non-State actors alike to commit crimes, including violence against women and girls, and conduct disruptive activities has risen significantly, Bearing in mind the negative impact that the unlawful use of ICTs could have on State infrastructure, national security and economic development, and aware that the only viable means of preventing and dealing with these new challenges, consolidating the positive aspects of ICTs, preventing their potential negative effects, promoting their peaceful and legitimate use and guaranteeing that scientific progress is aimed at maintaining peace and promoting the well-being and development of peoples is joint cooperation between States, which will also prevent cyberspace from becoming a theatre of military operations, Considering that cyber warfare may encompass, but is not necessarily limited to, operations against a computer or a computer system through a data stream as a means and method of warfare that is intended to gather intelligence for the purpose of economic, political or social destabilization or that can reasonably be expected to cause death, injury, destruction or damage during, but not exclusively in, armed conflicts, Aware that cyberdefence and cybercrime control measures complement each other, and noting, in this connection, that the Budapest Convention, the only international treaty on crimes committed via the Internet and other computer networks, is open for accession, including by third countries, Noting that the military use of cyberspace and the impact of specific activities are not yet fully understood; also noting that many cyberactivities may have the effect of destabilizing the security situation, depending on their nature, range, potential consequences and other circumstances, Concerned about the suggestion by military planners that nuclear deterrence be maintained as an option for dealing with the existential threat of a cyberattack, Acknowledging that a lack of strategic State-to-State communications, prompt attribution of responsibility and a limited understanding of allies’ and adversaries’ priorities may lead to miscalculation, misconception and misunderstanding in the cyberdomain, and that it is therefore important to introduce confidence-building measures of a nature to improve transparency, predictability and cooperation between States, Considering that the risk to international peace and security has increased with the development and spread of sophisticated malicious tools and techniques by States and non-State actors, Rejecting States' use of cyberspace as a means of applying economic, restrictive or discriminatory measures against another State, for the purpose of limiting access to information or services, Condemning the use of ICTs in contravention of international law, the goals and principles of the Charter of the United Nations and internationally recognized rules of coexistence between States, Also condemning the use of ICTs by criminal or terrorist groups to communicate, collect information, recruit, organize, plan and coordinate attacks, promote their ideas and actions and solicit funding, and mindful that, in so doing, these groups often exploit the vulnerability of certain social groups, and further condemning the use of cyberspace to destabilize and threaten international peace and security, Noting the need to work for the conclusion of an international Internet convention to prevent the use of the Internet by terrorists or terrorist organizations for illegal activities, in particular to raise funds, enlist members or publish ideas inciting people to violence and hatred, Recalling that acts of sexual violence during times of war or conflict are considered to be war crimes and considering that the broadcast of such acts using ICTs to intimidate, threaten or terrorize citizens, communities or countries and force them into submission, therefore constitutes a crime of cyber warfare, Considering that there is a need to strike a balance between security control of cyberspace and respect for privacy, confidentiality, intellectual property, and e-government and e‑commerce development priorities, Also considering that there is a need to develop national, regional and international levels of practical confidence-building measures in the ICT field, Condemning any intentional misuse of technology, including, but not limited to, State‑sponsored espionage,
|