Idea of a Multi-stakeholder Approach to Govern Online Freedom of Expression
Computer-mediated communication enables information to move quickly across various boundaries, shifts control of online content to everyone's fingertips, and distributes messages that are vulnerable to bias and distortion. Communication, of course, plays a key role in human rights with regard to freedom of expression and opinion in the democratic ecosystem. But this freedom is not absolute. It can be limited in order to protect the rights of others or to respond to threats to public order and safety. Restrictions thus need to be formulated and implemented constitutionally while governance must be transparent and accountable. This presentation will focus on offering ideas for realizing such governance with a multi-stakeholder approach.
is the co-founder of ICT Watch, an Indonesian CSO whose goal is to lay the foundations for the safe and responsible use of the internet through its national campaign initiative Internet Sehat. In 2012, he was awarded the Ashoka Fellowship for his focus on freedom of expression online, cyber activism, and citizen journalism. In addition to his engagement in ICT Watch, Donny is one of the founders of the Southeast Asia Freedom of Expression Network (SAFENet) and the Indonesian Internet Governance Forum. He now is serving as Expert Staff to the Indonesian Minister of Communication and Information Technology (MCIT) for Digital Literacy and Internet Governance and still teaches from time to time at leading universities in Indonesia.
Throughout the years, Donny has traveled extensively to various parts of Indonesia to share ideas and experiences with numerous information activists, communities and the general public about digital literacy and online privacy.
Training
Red - Yellow - Green: A Practical Guideline for Mobile Security and Data Protection
Basic knowledge about protecting privacy in the internet.
Applications and platforms we use in the internet often collect significantly more data than we would expect in view of the offered services. Because email communication lacks end-to-end encryption, it is one of the least secure communication methods. A lot of black sheep and bad guys in the internet are just waiting to take advantage of the weaknesses in our data protection settings and browsing habits.
How can we protect ourselves? How do certain settings effect the visibility of our data in the web?
The workshop provides a step-by-step introduction to privacy and security settings on devices, structured as follows: Red: Password mechanism, antivirus / anti-malware and two-step verification. Yellow: VPN, mobile apps privacy setting, encryption tools. Green: Anonymizer, secure (video) chat and personal firew