Address: Maison de la Paix, Chemin Eugène-Rigot 2D, 1211 Geneva, Switzerland
Website:
https://www.dcaf.ch/
DCAF is dedicated to improving the security of states and their people within a framework of democratic governance, the rule of law, respect for human rights, and gender equality. Since its founding in 2000, DCAF has contributed to making peace and development more sustainable by assisting partner states, and international actors supporting these states, to improve the governance of their security sector through inclusive and participatory reforms. It creates innovative knowledge products, promotes norms and good practices, provides legal and policy advice and supports capacity‐building of both state and non‐state security sector stakeholders.
Digital activities
Cyberspace and cybersecurity have numerous implications for security provision, management, and oversight, which is why DCAF is engaged in these topics within its work. DCAF has implemented a cycle of policy projects to develop new norms and good practices in cyberspace. At the operational level, cybersecurity governance has become a prominent part of SSR programming.
Digital policy issues
Cybersecurity
Digitalisation and cybersecurity are the challenges of today and tomorrow. They have an overarching impact on the security sector and the role of the security sector and governance reform (SSG/R) in the digital space. In our recent study SSG/R in the digital space: projections into the future policy, we shed light on the complex intersection of digitalisation and security sector governance. It examines how security sector actors have adapted to the digital transition and the emergence of new actors within the security ecosystem. It also provides concrete recommendations on how to navigate the complexities of digital technologies and shape ethical technology use and robust digital governance frameworks.
Capacity development
For newcomers to the field, DCAF offers the introductory series SSR Backgrounders, with a special issue on the impact of digitalisation on good governance in the security sector. It is a first-stop resource to understand the challenges and considerations for best policy and practice.
DCAF implements projects that focus on improving cybersecurity laws and policies, increasing the capacity of cybersecurity actors, and strengthening accountability in cybersecurity. One of our priorities is to strengthen the individual and institutional capacities of national Computer Emergency Response Teams (CERTs). These teams are responsible for effectively and efficiently preventing and responding to attacks on national systems.
We also run the annual Young Faces research and mentoring programme, which helps to develop the next generation of cybersecurity experts in the Western Balkans. Each year, we select around 30 dynamic, forward-thinking young professionals to join the programme that enhances their knowledge of emerging trends in cybersecurity governance.
Research shows that women, girls, and LGBTQ+ people are the most affected by cybersecurity risks. Our publication and podcast series analyses how they have been pushed out of cyberspaces by abuse and discrimination, and what solutions exist to take a human-centred approach that considers everyone’s needs in cybersecurity.
In our Donors’ Talk podcast series, we spoke with DCAF’s Justice Advisor to draw on her 15 years of experience in justice sector reform to look at success stories, challenges, and what needs to be considered when supporting digitalisation projects related to justice reform. In Morocco, DCAF supported the National AntiCorruption Commission with training on the prevention and investigation of cyber-corruption and financial cybercrimes. The government commission digitalised its internal processes, resulting in more effective tracking and response to citizens’ data protection requests
Digital tools
Legislation databases
DCAF’s three legal databases gather policies, laws, and decrees governing the security sectors in the Occupied Palestinian Territory, Libya, and Tunisia. Each database covers the main providers of security and justice, the formal supervision and management institutions, and the legislative and regulatory texts covering and authorising the work of informal control actors (political parties, media, NGOs, etc.).
A resource for legislators, the justice system, academia, and civil society, the databases offer both a current resource and a historical perspective on the evolution of security sector legislation in the respective countries.
Handbook on effective use of social media in cybersecurity awareness-raising campaigns
This handbook provides condensed and easy-to-follow guidance and examples for designing content strategies and the efficient use of social media towards effective public awareness raising on cybersecurity. It shares the do’s and don’ts of social media, and how to have a strategic social media presence to support better cybersecurity.
For more tools and resources on cybersecurity governance and the security sector, visit our website.
The third event in the ‘Policy meets tech’ series will be dedicated to cryptography. It will focus on unpacking cryptographic technology and discussing its policy implications.
The series is organised by Diplo, with the support of the US Permanent Mission to the UN in Geneva, and is dedicated to permanent missions in Geneva. This programme features a series of informative sessions for diplomats in Geneva, with the primary goals of demystifying the intricate realm of digital technologies, comprehending their capabilities and limitations, and delving into their policy implications in a manner that is both practical and pertinent for diplomats. From the intricacies of internet protocols to the intricacies of quantum computing, from cryptography to algorithms, these discussions will provide in-depth insights into the technical underpinnings of these technologies, their real-world applications, and the policy opportunities and challenges they present.
The event is only open to permanent missions in Geneva. For details, please contact Ms Sorina Teleanu, Director of Knoweldge, at geneva@diplomacy.edu.
In this talk, researchers from the Geneva Academy will shed light on the different examples of cyber operations (e.g. Stuxnet, NotPetya, and SolarWinds) allegedly conducted or sponsored by states to explicate their geopolitical effects and challenges to international law. As the importance of ICT grows in the modern world, cyber operations have become an integral part of state and non-state actors’ strategies against other states and actors. Researchers will present their findings as part of the project on disruptive military technologies.
For more information, and to register, please visit the official page.
The International Geneva Welcome Centre (CAGI) and the CyberPeace Institute jointly curated an all-day cyber skills event for NGOs. The uptake of cloud-based technologies and storage of valuable donor and beneficiary data have made NGOs a frequent target of cyberattacks. The reality for NGOs is that they have to safeguard their cybersecurity as much as private businesses do. The event invites local government representatives, cybersecurity experts, and NGOs to partake in testimonial drafting, roundtable discussions, and awareness raising for boosting NGOs’ cyber skills.
For more information, and to register, please visit the official page.
Address: 3 rue de Varembé, 1211 Geneva 20 , Switzerland
Website:
https://www.iec.ch/
Stakeholder group: International and regional organisations
The IEC is the world leader in preparing international standards for all electrical, electronic, and related technologies. A global, not-for-profit membership organisation, the IEC provides a neutral and independent institutional framework to over 170 countries, coordinating the work of more than 20,000 experts. We administer four IECConformity AssessmentSystems, representing the largest working multilateral agreement based on the one-time testing of products globally. The members of each system certify that devices, systems, installations, services, and people perform as required.
IEC International Standards represent a global consensus of state-of-the-art know-how and expertise. Together with conformity assessment, they are foundational for international trade.
IEC Standards incorporate the needs of many stakeholders in every participating country and form the basis for testing and certification. Every member country and all its stakeholders represented through the IEC National Committees has one vote and a say in what goes into an IEC International Standard.
Our work is used to verify the safety, performance, and interoperability of electric and electronic devices and systems such as mobile phones, refrigerators, office and medical equipment, or electricity generation. It also helps accelerate digitisation, artificial intelligence (AI), or virtual reality applications, protects information technology (IT) and critical infrastructure systems from cyberattacks and increases the safety of people and the environment.
Digital activities
The IEC works to ensure that its activities have a global reach in order to meet all the challenges of digital transformation worldwide. The organisation covers an array of digital policy issues.
Digital policy issues
Artificial intelligence and the internet of things
AI applications are driving digital transformation across diverse industries, including energy, healthcare, smart manufacturing, transport, and other strategic sectors that rely on IEC Standards and Conformity Assessment Systems. AI technologies allow insights and analytics that go far beyond the capabilities of legacy analytic systems.
For example, the digital transformation of the grid enables increased automation, making it more efficient and able to integrate fluctuating renewable energy sources seamlessly. IEC Standards pave the way for the use of a variety of digital technologies relating to intelligent energy. They deal with issues such as integrating renewable energies within the electrical network but also increased automatisation.
The IEC’s work in the area of AI takes a three-pronged approach. IEC experts focus on sector-specific needs (vertical standards) and conformity assessment, while the joint IECand International Organization for Standardization (ISO)technical committee on AI, JTC1/SC 42, brings together technology experts, as well as ethicists, lawyers, social scientists, and others to develop generic and foundational standards (horizontal standards).
In addition, IEC Safety Standards are an essential element of the framework for AI applications in power utilities and smart manufacturing. IEC Conformity AssessmentSystems complete the process by ensuring the standards are properly implemented.
SC 42 addresses some concerns about the use and application of AI technologies. For example, data quality standards for ML and analytics are crucial for helping to ensure that applied technologies produce useful insights and eliminate faulty features.
Governance standards in AI and the business process framework for big data analytics address how the technologies can be governed and overseen from a management perspective. International standards in the areas of trustworthiness, ethics, and societal concerns will ensure responsible deployment.
The joint IEC and ISO technical committee also develop foundational standards for the IoT. Among other things, SC 41 standards promote interoperability, as well as architecture and a common vocabulary for the IoT.
Hardware
The IEC develops standards for many of the technologies that support digital transformation. Sensors, cloud, and edge computing are examples.
Advances in data acquisition systems are driving the growth of big data and AI use cases. The IEC prepares standards relating to semiconductor devices, including sensors.
Sensors can be certified under the IEC Quality Assessment System for Electronic Components (IECQ), one of the four IEC Conformity Assessment Systems.
Cloud computing and its technologies have also supported the increase of AI applications. The joint IEC and ISO technical committee prepares standards for cloud computing, including distributed platforms and edge devices, which are close to users and data collection points. The publications cover key requirements relating to data storage and recovery.
Building trust
International Standards play an important role in increasing trust in AI and help support public and private decision-making, not least because they are developed by a broad range of stakeholders. This helps to ensure that the IEC’s work strikes the right balance between the desire to deploy AI and other new technologies rapidly and the need to study their ethical implications.
The IEC has been working with a wide range of international, regional, and national organisations to develop new ways to bring stakeholders together to address the challenges of AI. These include the Swiss Federal Department of Foreign Affairs (FDFA) and the standards development organisations, ISO, and the International Telecommunication Union (ITU).
More than 500 participants followed the AI with Trustconference, in-person and online, to hear different stakeholder perspectives on the interplay between legislation, standards and conformity assessment. They followed use-case sessions on healthcare, sensor technology, and collaborative robots, and heard distinguished experts exchange ideas on how they could interoperate more efficiently to build trust in AI. The conference in Geneva was the first milestone of the AI with Trust initiative.
The IEC is also a founding member of the Open Community for Ethics in Autonomous and Intelligent Systems (OCEANIS). OCEANIS brings together standardisation organisations from around the world to enhance awareness of the role of standards in facilitating innovation and addressing issues related to ethics and values.
The IEC develops cybersecurity standards and conformity assessments for IT and operational technology (OT). One of the biggest challenges today is that cybersecurity is often understood only in terms of IT, which leaves critical infrastructure, such as power utilities, transport systems, manufacturing plants and hospitals, vulnerable to cyberattacks.
Cyberattacks on IT and OT systems often have different consequences. The effects of cyberattacks on IT are generally economical, while cyberattacks on critical infrastructure can impact the environment, damage equipment, or even threaten public health and lives.
When implementing a cybersecurity strategy, it is essential to consider the different priorities of cyber-physical and IT systems. The IEC provides relevant and specific guidance via two of the world’s best-known cybersecurity standards: IEC 62443 for cyber-physical systems and ISO/IEC 27001 for IT systems.
Both take a risk-based approach to cybersecurity, which is based on the concept that it is neither efficient nor sustainable to try to protect all assets in equal measure. Instead, users must identify what is most valuable and requires the greatest protection and identify vulnerabilities.
IT security focuses equally on protecting the confidentiality, integrity, and availability of data – the so-called CIA triad. Confidentiality is of paramount importance and information security management systems, such as the one described in ISO/IEC 27001, are designed to protect sensitive data, such as personally identifiable information (PII), intellectual property (IP), or credit card numbers, for example.
Implementing the information security management system (ISMS) described in ISO/IEC 27001 means embedding information security continuity in business continuity management systems. Organisations are shown how to plan and monitor the use of resources to identify attacks earlier and take steps more quickly to mitigate the initial impact.
IEC 62443 for OT
In cyber-physical systems, where IT and OT converge, the goal is to protect safety, integrity, availability, and confidentiality (SIAC). Industrial control and automation systems (ICAS) run in a loop to check continually that everything is functioning correctly.
The IEC 62443 series was developed because IT cybersecurity measures are not always appropriate for ICAS. ICAS are found in an ever-expanding range of domains and industries, including critical infrastructure, such as energy generation, water management, and the healthcare sector.
ICAS must run continuously to check that each component in an operational system is functioning correctly. Compared to IT systems, they have different performance and availability requirements and equipment lifetime.
Conformity assessment: IECEE
Many organisations are applying for the IEC System of Conformity Assessment Schemes for Electrotechnical Equipment and Components (IECEE) conformity assessment certification to verify that the requirements of IEC 62443 have been met.
IECEE provides a framework for assessments in line with IEC 62443, which specifies requirements for security capabilities, whether technical (security mechanisms) or process (human procedures) related. Successful recipients receive the IECEE industrial cybersecurity capability certificate of conformity.
International standards such as IEC 62443 and ISO/IEC 27001 are based on industry best practices and reached by consensus. Conformity assessment confirms that they have been implemented correctly to ensure a safe and secure digital society.
Address: Campus Biotech Innovation Park, 15 avenue de Sécheron, 1202 Geneva, Switzerland
Website:
https://cyberpeaceinstitute.org/
Stakeholder group: NGOs and associations
The CyberPeace Institute is an independent and neutral non-governmental organisation (NGO) that strives to reduce the frequency, impact, and scale of cyberattacks, to hold actors accountable for the harm they cause, and to assist vulnerable communities.
The institute is a Geneva-based NGO, also working in close collaboration with relevant partners to reduce the harm from cyberattacks on people’s lives worldwide and provide assistance. By analysing cyberattacks, we expose their societal impact and how international laws and norms are being violated, and advance responsible behaviour to enforce cyberpeace.
At the heart of the Institute’s efforts is the recognition that cyberspace is about people. We support providers of essential services to the most vulnerable members of society, ultimately benefitting us all, like NGOs and the healthcare sector. Attacking them can have a devastating impact on beneficiaries and patients, putting their rights and even lives at risk.
To deliver on this mission, we rely on donations and the generosity of individuals, foundations, companies, and other supporters. This support enables us to assist and support vulnerable communities, including NGOs, to enhance their resilience to cyberattacks.
The Institute also provides evidence-based knowledge and fosters awareness of the impact of cyberattacks on people, to give a voice to and empower victims to highlight the harm and impact of cyberattacks. We remind state and non-state actors of the international laws and norms governing responsible behaviour in cyberspace, and advance the rule of law to reduce harm and ensure the respect of the rights of people.
Digital activities
Created in 2019, the Institute assesses the impact of cyberattacks from a human perspective, focusing on the rights of people. We ground our analysis on evidence and the impact on human well-being, telling the story of people, linking it with the technical reality of cyberattacks, and assessing it against the violation of laws. The Institute advocates for an evidence-based, human-centric approach to the analysis of cyberattacks as essential to the process of redress, repair, and/or justice for victims. It works collaboratively in our research, analysis, assistance, mobilisation, and advocacy. We engage with vulnerable communities to understand their needs for cybersecurity support and provide free and trusted cybersecurity assistance to vulnerable communities.
The CyberPeace Institute
assists NGOs and other vulnerable communities to prepare for and recover from cyberattacks.
investigates cyberattacks targeting vulnerable communities, analysing these attacks to provide alerts and support and for accountability.
advocates to advance the rule of law and respect for the rights of people.
anticipates threats to people associated with emerging and disruptive technologies.
Examples of operational activities
Assisting humanitarian and other NGOs with free and trusted cybersecurity support.
Analysing cyberattacks and highlighting their impact on people and how they violate the rule of law.
Documenting violations of international laws and norms and advocating for strengthened legal protection in cyberspace.
Offering expertise and support to states and civil society in relation to responsible behaviour in cyberspace.
Foreseeing and navigating future trends and threats in cyberspace.
Digital policy issues
Critical infrastructure
Cyberattacks against critical infrastructure have been on the rise, from attacks against hospitals and vaccine supply chains to attacks on the energy sector. When such disruptions occur, access to basic services is at risk. It is vital that there is an increase in the capacity and ability to improve resilience to cyberthreats in critical sectors, such as healthcare. The CyberPeace Institute urges stakeholders in diplomatic, policy, operational, and technical areas to increase their capacity and resilience to cyberthreats.
The Institute advocates for capacity building aimed at enabling states to identify and protect national critical infrastructure and to cooperatively safeguard its operation. This includes capacity building, implementation of norms of responsible behaviour, and confidence building measures. In strengthening efforts to protect critical infrastructure, the Institute calls for the sharing of lessons learned between countries to assist those with less capacity and fewer capabilities.
NGOs in civilian-critical sectors, for example water, food, healthcare, energy, finance, and information, need support and expertise to help them strengthen their cybersecurity capabilities. While these NGOs provide critical services to communities and bridge areas not covered by public and private actors, they lack the resources to protect themselves from cybersecurity threats.
Examples of the Institute’s work in this regard:
Calls to governments to take immediate and decisive action to stop all cyberattacks on hospitals and healthcare and medical research facilities, as well as on medical personnel and international public health organisations.
Capacity building is essential for achieving cyber preparedness and resilience across sectors and fields, and activities focus on providing assistance and capacity building to NGOs that might lack technical expertise and resources.
An interactive platform named The CyberPeace Watch to expand the monitoring to other contexts including other situations of armed conflict and to the application of relevant laws and norms. This informs policy and legal processes and developments, the preparedness and protection of critical infrastructure, and cyber capacity building.
Participation in the INFINITY project to transform the traditional idea of criminal investigation and analysis. INFINITY has received funding from the European Union’s Horizon 2020. Its concept is based around four core research and technical innovations that together, will provide a revolutionary approach and convert data into actionable intelligence.
Participation in the UnderServed project, an EU- funded initiative to address the lack of adequate cybersecurity measures for vulnerable sectors, including humanitarian, development, and peace non-governmental organisations (NGO). The primary objective of the project is to establish a comprehensive platform for reporting and analysing cyber threats. This platform is tailor-made for NGOs vulnerable to cyberattacks, which often lack the resources to effectively mitigate such threats.
Network security
NGOs play a critical role in ensuring the delivery of critical services, such as the provision of healthcare, access to food, micro-loans, information, and the protection of human rights.
Malicious actors are already targeting NGOs in an effort to get ransoms and exfiltrate data. Often these NGOs do not have the budget, know-how, or time to effectively secure their infrastructures and develop a robust incident response to manage and overcome sophisticated attacks.
With this in mind, the Institute launched its CyberPeaceBuilders programme in 2021, a unique network of corporate volunteers providing free pre- and post-incident assistance to NGOs supporting vulnerable populations.
This initiative brings support to NGOs in critical sectors at a level that is unequalled in terms of staff, tools, and capabilities. It assists NGOs with cybersecurity whether they work locally or globally, and supports them in crisis-affected areas across the globe.
Capacity development
The Institute believes that meaningful change can occur when a diversity of perspectives, sectors, and industries work together. To address the complex challenges related to ensuring cyberpeace, it works with a wide range of actors at the global level including governments, the private sector, civil society, academia, philanthropies, policymaking institutions, and other organisations. The Institute contributes by providing evidence-led knowledge, emphasising the need to integrate a genuine human-centric approach in both technical and policy-related projects and processes, and by highlighting the civil society perspective to support and amplify existing initiatives.
Training
The CyberPeace Institute is providing comprehensive training for NGOs Boards and Staff, Foundations and Volunteers designed to empower organisations with vital tools for safeguarding their missions.
We recently launched a Cyber School, in partnership with Microsoft, to create a unique, free offer to participate in an 8-week virtual course for everyone who is interested in taking their first step into a new career path.
Interdisciplinary approaches
To contribute to closing the accountability gap in cyberspace, the Institute seeks to advance the role of international law and norms.
It reminds state and non-state actors of the international law and norms governing responsible behaviour in cyberspace, and contributes to advancing the rule of law to reduce harm and ensure the respect of the rights of people.
Contribution to UN processes
In 2021–2022, the Institute contributed to and commented on various UN-led processes (notably the United Nations Group of Governmental Experts on Advancing responsible state behaviour in cyberspace in the context of international security (UN GGE) and the Working Group (WG) on the use of mercenaries as a means of violating human rights and impeding the exercise of the rights of peoples to self-determination).
Since its inception, the Institute has closely followed the work of the UN Open-Ended Working Group (UN OEWG) on developments in the field of information and telecommunications in the context of international security, advocating recognition of the healthcare sector as a critical infrastructure and raising concerns about the lack of commitment towards an actionable and genuine human-centric approach.
In the Open-Ended Working Group on security of and in the use of information and communications technologies 2021–2025 (OEWG II), the Institute set out three key action areas and related recommendations, and is contributing its expertise in relation to the protection of humanitarian and development organisations from cyberattacks.
– The Institute issued a Statement at the Ad Hoc Committee to Elaborate a Comprehensive International Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes (Cybercrime Convention
Moreover, the Institute sought to advance the Cyber Programme of Action (PoA) by offering recommendations concerning the range, organisation, and approaches for stakeholder participation.
Also, the Institute welcomed the call for civil society organisations to contribute to the Global Digital Compact and provided a set of recommendations.
Participation in international initiatives: The Paris Call Working Groups
To operationalise these principles, in November 2020 six working groups were created to work on various issues that relate to them. The Institute co-led WG5 with colleagues from Geopolitics in the Datasphere[Géopolitique de la Datasphère] and The Hague Centre for Strategic Studies (HCSS).
The work of this group led to the Final Report published during the Paris Peace Forum 2021. It presents a methodology to facilitate understanding of how the implementation of normative, legal, operational, and technical measures, or the lack thereof, contribute to stability in cyberspace and ultimately to cyberpeace.
The Institute chaired the session “Unpacking the Cyber Mercenaries’ Phenomenon” at the 6th edition of the Paris Peace Forum.
At the World Economic Forum meeting in Davos, in May 2022, the CyberPeace Institute joined AccessNow, the Office of the High Commissioner for Human Rights (OHCHR), Human Rights Watch (HRW), Amnesty International, the International Trade Union Confederation (ITUC), and Consumers International to call on decision-makers to take action and initiate a moratorium limiting the sale, transfer, and use of abusive spyware until people’s rights are safeguarded under international human rights law.
This is in addition to a call made in 2021, in which the Institute joined more than 100 civil society organisations calling for a global moratorium on the sale and transfer of surveillance technology until rigorous human rights safeguards are adopted to regulate such practices and guarantee that governments and non-state actors don’t abuse these capabilities.
EU Processes
At the Institute, we conduct an evaluation of best practices in implementing EU regulations, focusing on their evolution and development to ensure effective execution. Simultaneously, we analyse EU mechanisms like the EU Cyber Diplomacy Toolbox, aimed at countering malicious cyber activities and bolstering resilience, while providing targeted observations and recommendations.
We provided positions and recommendations on the EU AI Act (unpublished yet).
Digital technology plays an important role in conflict mediation and global peacebuilding. It can extend inclusion, allowing more women or people from marginalised groups to take part in or follow a mediation process. It can make mediation faster and more efficient and can allow mediators to draw on resources from around the world.
However, digital technology brings risks, too. It can increase polarisation, for example, and allow disinformation to spread to more people, more quickly. It can increase vulnerability to malicious actors, spying, and data breaches. These risks can undermine trust in the process.
Mediators work in low-trust, volatile contexts and don’t always have the knowledge to assess the risks posed by digital technology. A new online platform helps to raise awareness of those risks, as well as offering training on how to deal with them. The Digital Risk ManagementE-Learning Platform for Mediators was created in 2021 by the CyberPeace Institute, CMI – Martti Ahtisaari PeaceFoundation, and the UN Department of Political and Peacebuilding Affairs (UNDPPA) Mediation Support Unit.
As part of the integration and engagement with the stakeholder ecosystem in Geneva, the Institute is a member of the Geneva Chamber of Commerce, Industry and Services (CCIG). Various academic collaborations are ongoing through participation in conferences, workshops, and lectures, namely with the Ecole Polytechnique Fédérale de Lausanne Centre for digital trust EPFL (C4DT), the University of Geneva (UNIGE), and the Graduate Institute (IHEID). In 2020, the Institute formed a strategic partnership with the SwissTrust Valley for Digital Transformation and Cybersecurity.
The Institute maintains a website providing alerts, blogs, articles, and publications on key issues related to its mission for cyberpeace, and shares video materials and discussion recordings on YouTube channel.
Address: Chemin des Colombettes 34, 1211 Geneva 20, Switzerland
Website:
https://www.wipo.int/
Stakeholder group: International and regional organisations
WIPO is a UN agency functioning as the global forum for intellectual property (IP) related services (patents, copyright, trademarks, and designs), policy, information, and cooperation. The organisation was established in 1967. It currently has 193 member states and over 200 observers representing non-governmental organisations (NGOs) and intergovernmental organisations. WIPO leads the development of a balanced and effective global IP ecosystem to promote innovation and creativity for a better and more sustainable future.
Frontier technologies including artificial intelligence
WIPO pays particular attention to the interplay between frontier technologies including artificial intelligence (AI) and IP.
The WIPO Conversation on IP and Frontier Technologies provides an open, inclusive forum to engage with and facilitate discussion and knowledge-building among the widest possible set of stakeholders. It leads the global discourse on the impact of frontier technologies on IP, in this fast-moving, complex space. Each year, WIPO usually holds two sessions of the Conversation covering both the uses and applications of frontier technologies to assist IP Offices and IP owners as well as more conceptual policy-based discussions to ensure that the IP systems continue to foster innovation. The five sessions of the WIPO Conversation to date have focused on AI, data, and frontier technologies in IP administration.
WIPO has prepared a paper exploring the (potential) impact of AI on IP policies in areas such as copyright and related rights, patents, trademarks, designs, and overall IP administration. It also maintains an AI and IP strategyclearing house, which collates government instruments (strategies, regulations, etc.) that are relevant to AI, data, and IP.
Cooperating with the International Telecommunication Union (ITU) in the AI for Good initiative
Supporting UNESCO’s work on developing the first global normative instrument on the ethics of AI.
Participating in the work of the Geneva Science and Diplomacy Anticipator (GESDA), and an independent foundation to leverage the anticipative power of science with diplomacy organisations and citizens working in Geneva and around the world.
Alternative dispute resolution and critical internet resources
WIPO’sactivitiesregarding the Domain Name System(DNS) revolve around the protection of trademarks and related rights in the context of domain names. It developed the Uniform Domain-Name Dispute-Resolution Policy (UDRP) with the Internet Corporation for Assigned Names and Numbers (ICANN). Under this policy, WIPO’s Arbitrationand Mediation Center provides dispute resolution services for second-level domain name registrations under generic top-level domains (gTLDs) to which the UDPR applies. The Center also administers disputes under specific policies adopted by some gTLD registries (e.g. .aero, .asia, .travel). In addition, it offers domain name dispute resolution services for over 70 country code top-level domains(ccTLDs). WIPO has developed a ccTLD Program to provide advice to many ccTLD registries on the establishment of dispute resolution procedures. It also contributes to the work carried out within the framework of ICANN in regard to the strengthening of existing trademark rights protection mechanisms or the development of new such mechanisms.
WIPO Online Case Administration Tools, including WIPO eADR (allowing parties in a dispute, mediators, arbitrators, and experts in a WIPO case to securely submit communications electronically into an online docket) and online facilities for meetings and hearings as part of WIPO cases.
Intellectual property rights
Trademarks
WIPO has long been involved in issues related to the protection of trademarks in the context of the DNS. The first phase of the WIPO Internet Domain Name Process, carried out in 1991, explored trademark abuse in second-level domain names, and led to the adoption, by ICANN, of the UDRP. WIPO has also contributed to the development of several trademark rights protection mechanisms applicable to gTLDs (such as legal rights objections, the Trademark Clearinghouse, and the uniform rapid suspension system). The WIPO Arbitration and MediationCenter administers trademark-related dispute resolution cases for several gTLDs and ccTLDs.
Copyright
WIPO is actively contributing to international discussions on the opportunities offered by copyright in the digital environment, especially to developing economies, small and medium enterprises (SMEs) and women entrepreneurs. The organisation administers the InternetTreaties and the Beijing Treaty, which clarify that existing copyright and related rights apply on the internet, and introduce new online rights, while also establishing international norms aimed at preventing unauthorised access to and use of creative works on the internet or other digital networks. The WIPO Accessible Books Consortium furthers the practical implementation of the MarrakeshTreaty to increase the number of books available worldwide in accessible digital formats. WIPO member states are considering topics related to copyright in the digital environment at the multilateral level. WIPO also carries out research and organises seminars and other meetings on aspects concerning challenges and possible solutions for taking advantage of the opportunities offered by copyright and related rights in the digital era.
Given WIPO’s concerns regarding the protection of copyright and related rights on the internet, the organisation is exploring issues related to the roles andresponsibilities of internet intermediaries when it comesto online copyright infringements. The organisation carries out or commissions research and publishes studies on the relationship between copyright and internet intermediaries (such as comparative analyses of national approaches to the liability of Internet intermediaries), and organises events (seminars, workshops, sessions at the World Summit on the Information Society (WSIS) Forum and Internet Governance Forum (IGF) meetings, etc.) aimed at facilitating multistakeholder discussions on the potential liability of internet intermediaries concerning copyright infringements.
Comparative analysis of national approaches of the liability of the internet intermediaries (I and II).
Sustainable development
WIPO is of the view that IP is a critical incentive for innovation and creativity, and, as such, a key to the success of the sustainable development goals (SDGs). The organisation works to enable member states to use the IP system to drive the innovation, competitiveness, and creativity needed to achieve the SDGs. It does so, for instance, through supporting countries in their efforts to build an innovative IP ecosystem, providing legislative advice on updating national IP laws, and supporting judiciary systems in keeping up with technological innovation. WIPO’s contribution to the implementation of the Agenda 2030 is guided by its Development Agenda.
WIPO GREEN – online marketplace for sustainable technologies
COVID-19 Technical Assistance Platform – a one-stop digital platform for technical assistance provided by WIPO, WHO, and WTO on IP, public health, and trade matters related to COVID-19.
Climate change
WIPO’s Global Challenges programme brings together various stakeholders to explore issues related to green technologies and the environment. It hosts WIPO GREEN, a multistakeholder platform aimed to promote innovation and diffusion of green technologies, and it provides analysis of relevant IP issues to facilitate international policy dialogue. The WIPO GREEN platform includes a digital database of green technologies in sectors such as energy, water and transportation. In 2022, WIPO launched the Green Technology Book, a major digital publication to showcase concrete solutions related to climate change adaptation. The report will be fully integrated with the WIPO GREEN database, allowing for continuous additions by technology providers.
WIPO GREEN – online marketplace for sustainable/ green technologies
Digital tools
Here are some examples of the digital tools WIPO uses in relation to its services:
WIPO Online Case Administration Tools, including WIPO eADR (allowing parties in a dispute, mediators, arbitrators, and experts in a WIPO case to securely submit communications electronically into an online docket) and online facilities for meetings and hearings as part of WIPO cases.
WIPO GREEN – online marketplace for sustainable technologies.
WIPO Match– platform that matches seekers of specific IP-related development needs with potential providers offering resources.
WIPO Alert– platform to upload information on entities that infringed copyright at national level.
Electronic Forum– enables the electronic distribution and submission by email of comments concerning preliminary draft working documents and draft reports.
WIPO Connect – enables collective management of copyright and related rights at local and central levels.
ABC Global Book Service – on-line catalogue that allows participating libraries for the blind and organisations serving people who are print disabled to obtain accessible content.
WIPO Knowledge Centre – hosts virtual exhibitions. Recent subjects have included geographical indications, and AI.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
Social media channels
The Institute maintains a website providing alerts, blogs, articles, and publications on key issues related to its mission for cyberpeace, and shares video materials and discussion recordings on YouTube channel.
The latest news and developments are shared via:
Facebook @CyberpeaceInstitute
Instagram @cyberpeaceinst
LinkedIn @cyberpeace-institute
X @CyberpeaceInst
Sign up for the monthly newsletter to receive updates about what’s happening at the Institute, as well as news about cyberpeace.