Skip to main content

Humanitarian effectiveness through new technology requires standards of control over data, data integrity and data availability – World – ReliefWeb

Statement to High-Level Panel on “Improving Humanitarian Effectiveness Through New Technologies and Innovation: Opportunities and Challenges” United Nations Economic and Social Council – Humanitarian Affairs Segment, 10 June 2020

Check against delivery

Excellencies, Ladies and Gentlemen, Partners and Friends,

Today we have touched on pandemic outbreaks, the political and economic response to them, and how this has accelerated the adoption of new technologies. Some of this is good news for populations affected by violence or armed conflict. Humanitarian organizations have an increased digital footprint with new opportunities to become more efficient and accountable. At the same time, with new digital technologies come risks for the humanitarian sector and the people we aim to protect and serve. As humanitarian organizations increasingly rely on the collection and processing of highly sensitive, personal data, they can become vulnerable to adverse cyber operations that could impact the people that need us most.

Today, looking at emerging digital risks, I will focus on three key dimensions: full control over data, data integrity, and data availability.

First, humanitarian organizations must keep full control over data as a pillar of humanitarian action and limit the access of data to intended users only.

This is an increasing challenge when using biometrics to give people access to humanitarian services. Data collected can include information that could be sought after for use beyond its initial humanitarian objective. This is the case, for instance, when a humanitarian organization is forced to provide data to a government or when a third party gets access to sensitive information through metadata collection. We must ensure that the data collected is used as it was intended – for humanitarian purposes only. This issue is not an add-on. It is a core element to trusted humanitarian action.

The recent International Conference of the Red Cross and Red Crescent Movement has debated that issue last December. It has adopted a resolution on the Restoring of Family Links which contains interesting language to this effect and ensures that data collected is used exclusively for humanitarian purposes.

Second, Humanitarian organizations must ensure the integrity of data.

This again goes back to the issue of trust. The reputation of a humanitarian organization relies on its ability to maintain trust. In the case of a cyber-attack against its data integrity, humanitarian organizations could subsequently be wrongly steered into prioritizing certain affected populations over others, operating in particular areas over others, or otherwise manipulated in ways that could be detrimental to affected populations, or to the neutrality, impartiality, and independence of their action.

Imagine, for a moment, that a database of unaccompanied children is hacked and data on the name of these children’s parents is modified. People come forward pretending to be their parents and because of this hack are properly verified as parents. These children could end up forced into child labor or targeted because of their ethnic origins. We cannot allow this to happen and must address the growing threat of the modification of humanitarian data.

Lastly, on availability: we must ensure timely and reliable access to information and digital services.

Humanitarian organizations like the ICRC are increasingly offering digital services to affected populations. For instance, in the case of the ICRC, we are currently working on a digital humanitarian platform that provides digital services to affected populations. As we provide critical services such as a document vault or information as aid, any cyber operation affecting the availability of these services will have humanitarian consequences.

To mitigate these risks, we need:

1. Stakeholders gathered here to work together on standards that at their core include the three points just addressed: full control over data, data integrity and data availability.

2. A responsible and thoughtful approach to technologies, and not just a race to the most cost-effective technology. Technologies must be deployed based on thorough assessment of their impact and with adequately established safeguards.

To support these efforts, the ICRC and the Brussels Privacy Hub recently launched the second edition of the Handbook on Data Protection in Humanitarian Action. The Handbook provides ways to assess the responsible use of new technologies, conduct risk analysis, and responsibly balance technology opportunities and potential risks. The guide looks at data analytics, blockchain, digital identity, drones, machine learning, cloud computing, artificial intelligence, weaponization of information on social media and more.

3. And finally, we need governments and external third-party stakeholders to guarantee the protection of a digital humanitarian space, coupled with the focus and determination of internal stakeholders to genuinely preserve the independence, impartiality and neutrality of international humanitarian organizations in cyberspace. Without this, international humanitarian organizations will be pushed into accepting solutions that are unsuitable for the work they are mandated to carry out.

Thank you.



from WordPress https://ift.tt/3cS8hPV
via IFTTT

Comments

Popular posts from this blog

Rufus Wainwright to Perform New Album at Livestream Concert – Rolling Stone

Gearing up for the release of his new album Unfollow the Rules, Rufus Wainwright will perform the record in its entirety at a livestream concert on Saturday. The performance will take place in the ballroom at Paramour Mansion in Los Angeles, previously owned by the silent film star Antonio Moreno. Wainwright will perform on acoustic guitar — similar to his recent In My Room  segment — accompanied by piano, guitar and a string section. The livestream will premiere in Germany and France here , later to be available on demand for 90 days. A stream will be available in the U.S. on All Arts ‘ Facebook page, premiering at 2 pm E.T. “The Paramour Session will show a completely different side of Unfollow the Rules ,” Wainwright said in a statement. “Acoustic, stripped back, sparser, but in a Rufus Wainwrightian sense of course. Good songs can survive in many different environments. I want my fans to have an opportunity to hear the music live when the album comes out. The only w...

Future shocks: 17 technology predictions for 2025 – World Economic Forum

We asked our 2020 intake of Technology Pioneers for their views on how technology will change the world in the next five years. From quantum computers and 5G in action to managing cancer chronically, here are their predictions for our near-term future. "lazy", :class=>"", :alt=>""}” use_picture=”true”> Image: Getty Images/iStockphoto 1. AI-optimized manufacturing Paper and pencil tracking, luck, significant global travel and opaque supply chains are part of today’s status quo, resulting in large amounts of wasted energy, materials and time. Accelerated in part by the long-term shutdown of international and regional travel by COVID-19, companies that design and build products will rapidly adopt cloud-based technologies to aggregate, intelligently transform, and contextually present product and process data from manufacturing lines throughout their supply chains. By 2025, this ubiquitous stream of data and the intelligent algorithms ...

Work From Home Opens New Remote Insider Threats – Threatpost

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy . In addition, you will find them in the message confirming the subscription to the newsletter. from WordPress https://ift.tt/2Vbs7zI via IFTTT