Cybersecurity

Public and private sector entities face a growing challenge in protecting the internet against malicious actors. Cybersecurity requires both governmental and non-governmental solutions, as well public education and strong security through technical standards. Policy processes must be based on the principles of openness, collaboration, and a respect for human rights. Generally, cybersecurity vulnerabilities discovered by the government should be promptly disclosed to the entities that can fix them. Any sharing of internet users’ communications information for cybersecurity purposes should be carefully prescribed, and such information should be used only to enhance the security of data and information systems.

Recent Content

CDT response to the Office of the High Commissioner for Human Rights call for inputs on the relationship between human rights and technical standard-setting processes for new and emerging digital technologies. White document on a grey background.

On the relationship between human rights and technical standard-setting processes for new and emerging digital technologies

Graphic for a report, compiled by CDT and ARTICLE 19, entitled "A Guide to the Internet Engineering Task Force (IETF) for Public Internet Advocates." White text on red, yellow, blue background.

Report – A Guide to the Internet Engineering Task Force (IETF) for Public Interest Advocates

The CDT logo. A white "cdt" alongside "Center for Democracy & Technology" on a light blue background.

Interoperability is Important for Competition, Consumers, & the Economy

The CDT logo. A light and dark grey "cdt" alongside "Center for Democracy & Technology" on a white background.

Dispatch: Internet Governance at the ITU

CDT Comments on Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). White document on a grey background.

CDT Comments on Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA)

The CDT logo. A white "cdt" alongside "Center for Democracy & Technology" on a light blue background.

The Three Top Issues to Address for the Global Cybercrime Treaty

Read More