DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
10:00 | |||||
10:15 | |||||
10:30 | |||||
10:45 | |||||
11:00 | DiploHackDuring the whole day, the DiploHack Room is the place to discuss concrete solutions to real world policy problems concerning cybersecurity. | Online freedom: The role of internet intermediairiesTo protect online freedom, Internet intermediaries like search engine, ISPs (Internet-service providers) and social media play a crucial role. It remains a challenge to explore: What are gaps and challenges of legal frame frameworks, and good practices and initiatives related to Intermediaries?
This session is led by Xianhong Hu of UNESCO | Secure and private communication, how to do thatThis session is led by Hans de Raad | Access to informationWhat is needed to be done in order to take full advantage of the Internet infrastructure in order for people to have real access to the information they need for their own development? | |
11:15 | |||||
11:30 | |||||
11:45 | How to build digital safety for journalism?As increasing digital threats emerged particularly to journalists and media actors on Internet, UNESCO wants to trigger discussion on the challenges: What are major digital threats to journalists on Internet? What are initiatives and policy recommendations to address digital safety?
This session is led by Xianhong Hu of UNESCO | ||||
12:00 | |||||
12:15 | |||||
12:30 | I hate Cyber - #Ditchcyber anyone?Led by André Koot | ||||
12:45 | |||||
13:00 | |||||
13:15 | |||||
13:30 | |||||
13:45 | |||||
14:00 | |||||
14:15 | |||||
14:30 | |||||
14:45 | DiploHackDuring the whole day, the DiploHack Room is the place to discuss concrete solutions to real world policy problems concerning cybersecurity. | How restrictions on encryption chill freedom of expressionThe global debate is raging over encryption in the digital sphere. Some governments have claimed that technologies that enable users to communicate securely and protect their private information, like encryption, pose threats to national security. Others believe such policies restrict privacy and chill speech, limiting online freedom. What policies have been proposed to require encryption vulnerabilities? What are local and global impacts?
This session is led by Access Now | Privacy cafe: Online security for everyoneThis session is led by Xander Bouwman | Digital safety for whistleblowers (Publeaks)In 2013, The Publeaks Foundation and a large number of Dutch media outlets launched, a website for people to leak documents to the media securely and anonymously. Since then, a number projects have been launched based on the Publeaks Method: AfriLeaks, WildLeaks, Sourcesure and MexicoLeaks. How do these platforms work? What methods, software and hardware is used? What digital skills are needed from the journalists?
This session is led by Menso Heus van Free Press Unlimited en Mieke van Heesewijk van Publeaks | |
15:00 | |||||
15:15 | |||||
15:30 | Trafficking hold upTrafficking is modern day slavery and a severe human rights violation as well as a complex transnational crime. What are the patterns of online recruitment of victims of trafficking? And how can we reclaim digital tools for protection, investigation, prosecution and awareness raising?
This session is a hold up with Dutch human rights ambassador Kees van Baar. | Transparency reporting: A way for a better internet?Led by Deniz @ Access | Effective civil society participation in global cybersecurity debatesThis session is led by Aditi Gupta and Charles Bradley, Global Partners Digital. | ||
15:45 | |||||
16:00 | |||||
16:15 | Copyright vs innovationIn discussions about security versus privacy we often see that they are considered to be opposites, but also two sides of the same coin. Interestingly the same can be said about copyright protection versus innovation. What will happen in a digital world without copyright protection? Can copyright on internet content be replaced by something else? Or should we abandon it?
This session is led by Mathieu Paapst of the University of Groningen and Open State Foundation | Federation and distribution for privacy - Diaspora*Led by André Koot | In the ideal worldLed by Wouter Moraal | ||
16:30 | |||||
16:45 | |||||
17:00 | |||||
17:15 | |||||
17:30 | |||||
17:45 | |||||
18:00 | |||||
18:15 | |||||
18:30 | |||||
18:45 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
10:00 | |||||
10:15 | |||||
10:30 | |||||
10:45 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
13:15 | |||||
13:30 | |||||
13:45 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
17:00 | |||||
17:15 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
17:30 | |||||
17:45 | |||||
18:00 | |||||
18:15 | |||||
18:30 | |||||
18:45 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
11:00 | DiploHackDuring the whole day, the DiploHack Room is the place to discuss concrete solutions to real world policy problems concerning cybersecurity. | ||||
11:15 | |||||
11:30 | |||||
11:45 | |||||
12:00 | |||||
12:15 | |||||
12:30 | |||||
12:45 | |||||
13:00 | |||||
13:15 | |||||
13:30 | |||||
13:45 | |||||
14:00 | |||||
14:15 | |||||
14:30 | |||||
14:45 | DiploHackDuring the whole day, the DiploHack Room is the place to discuss concrete solutions to real world policy problems concerning cybersecurity. | ||||
15:00 | |||||
15:15 | |||||
15:30 | |||||
15:45 | |||||
16:00 | |||||
16:15 | |||||
16:30 | |||||
16:45 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
11:00 | Online freedom: The role of internet intermediairiesTo protect online freedom, Internet intermediaries like search engine, ISPs (Internet-service providers) and social media play a crucial role. It remains a challenge to explore: What are gaps and challenges of legal frame frameworks, and good practices and initiatives related to Intermediaries?
This session is led by Xianhong Hu of UNESCO | ||||
11:15 | |||||
11:30 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
11:00 | Secure and private communication, how to do thatThis session is led by Hans de Raad | ||||
11:15 | |||||
11:30 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
11:00 | Access to informationWhat is needed to be done in order to take full advantage of the Internet infrastructure in order for people to have real access to the information they need for their own development? | ||||
11:15 | |||||
11:30 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
11:45 | |||||
12:00 | |||||
12:15 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
11:45 | |||||
12:00 | |||||
12:15 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
11:45 | How to build digital safety for journalism?As increasing digital threats emerged particularly to journalists and media actors on Internet, UNESCO wants to trigger discussion on the challenges: What are major digital threats to journalists on Internet? What are initiatives and policy recommendations to address digital safety?
This session is led by Xianhong Hu of UNESCO | ||||
12:00 | |||||
12:15 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
12:30 | |||||
12:45 | |||||
13:00 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
12:30 | I hate Cyber - #Ditchcyber anyone?Led by André Koot | ||||
12:45 | |||||
13:00 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
12:30 | |||||
12:45 | |||||
13:00 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
14:00 | |||||
14:15 | |||||
14:30 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
14:45 | How restrictions on encryption chill freedom of expressionThe global debate is raging over encryption in the digital sphere. Some governments have claimed that technologies that enable users to communicate securely and protect their private information, like encryption, pose threats to national security. Others believe such policies restrict privacy and chill speech, limiting online freedom. What policies have been proposed to require encryption vulnerabilities? What are local and global impacts?
This session is led by Access Now | ||||
15:00 | |||||
15:15 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
14:45 | Privacy cafe: Online security for everyoneThis session is led by Xander Bouwman | ||||
15:00 | |||||
15:15 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
14:45 | Digital safety for whistleblowers (Publeaks)In 2013, The Publeaks Foundation and a large number of Dutch media outlets launched, a website for people to leak documents to the media securely and anonymously. Since then, a number projects have been launched based on the Publeaks Method: AfriLeaks, WildLeaks, Sourcesure and MexicoLeaks. How do these platforms work? What methods, software and hardware is used? What digital skills are needed from the journalists?
This session is led by Menso Heus van Free Press Unlimited en Mieke van Heesewijk van Publeaks | ||||
15:00 | |||||
15:15 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
15:30 | Trafficking hold upTrafficking is modern day slavery and a severe human rights violation as well as a complex transnational crime. What are the patterns of online recruitment of victims of trafficking? And how can we reclaim digital tools for protection, investigation, prosecution and awareness raising?
This session is a hold up with Dutch human rights ambassador Kees van Baar. | ||||
15:45 | |||||
16:00 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
15:30 | Transparency reporting: A way for a better internet?Led by Deniz @ Access | ||||
15:45 | |||||
16:00 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
15:30 | Effective civil society participation in global cybersecurity debatesThis session is led by Aditi Gupta and Charles Bradley, Global Partners Digital. | ||||
15:45 | |||||
16:00 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
16:15 | Copyright vs innovationIn discussions about security versus privacy we often see that they are considered to be opposites, but also two sides of the same coin. Interestingly the same can be said about copyright protection versus innovation. What will happen in a digital world without copyright protection? Can copyright on internet content be replaced by something else? Or should we abandon it?
This session is led by Mathieu Paapst of the University of Groningen and Open State Foundation | ||||
16:30 | |||||
16:45 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
16:15 | Federation and distribution for privacy - Diaspora*Led by André Koot | ||||
16:30 | |||||
16:45 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
16:15 | In the ideal worldLed by Wouter Moraal | ||||
16:30 | |||||
16:45 |
DiploHack Room | Room 1 | Room 2 | Room 3 | Extra Room | |
---|---|---|---|---|---|
15:30 | |||||
15:45 | |||||
16:00 |