Partners”,
WSJ,
6
November
2007,
http://online.wsj.com/article/SB119427874851482602.html?mod=hpp_us_whats_news
; “Google alliance
may stop wireless firms' gouging of users”, 7 November 2007, MercuryNews, online at
http://origin.mercurynews.com/deantakahashi/ci_7382833?nclick_check=1
.
114
DSTI/ICCP/TISP(2006)2/FINAL, op. cit..
115
R. Foster, 2007, op. cit.
116
E.
Filkin,
Regulatory
Forbearance
in
Operation,
Chair,
ATVOD
http://www.oecd.org/dataoecd/14/47/34985339.pdf
.
117
See Recommendation CM/Rec(2007)11 of the Committee of Ministers to member states on promoting
freedom of expression and information in the new information and communications environment, online at
https://wcd.coe.int/ViewDoc.jsp?id=1188541&Site=CM&BackColorInternet=9999CC&BackColorIntranet
=FFBB55&BackColorLogged=FFAC75
.
118
Such as safe harbour for ISPs, but also notice and takedown procedures for illegal content. See for
example the UK Defamation Act, online at
http://www.opsi.gov.uk/acts.htm
, article 1(3), or articles 12-15
of the EU Electronic Commerce Directive, 2000/31/EC.
119
See for example the EC proposal for an Audiovisual Media Services Directive, which in its article 3(f)
admits
product
placement
for
some
kinds
of
audiovisual
products.
Online
at
http://ec.europa.eu/avpolicy/reg/tvwf/modernisation/proposal_2005/index_en.htm
.
120
EC Green Paper on convergence: Regulatory requirements with regard to the production of European
audiovisual
content,
1999,
online
at:
http://europa.eu.int/ISPO/convergencegp/com(99)108/com(99)108enfinal.html
.
121
See OECD, “Policy considerations for audio-visual content distribution in a multiplatform environment”,
DSTI/ICCP/TISP(2006)3/FINAL, online at
http://www.oecd.org/dataoecd/21/41/37868139.pdf
122
Graham Ingram, AusCert, presentation at the OECD NGN Technical Foresight Forum “NGN Security”,
online at
http://www.oecd.org/document/12/0,2340,en_2649_33703_37392780_1_1_1_1,00.html
(last
accessed April 2007).
123
The concept of security through obscurity is a controversial concept used in the context of computer
security or cryptography. It is based on the idea that the use of secrecy in the development of a technology
can provide security, i.e. although a product may have flaws, those are not known, and are unlikely to be
find out by potential attackers. See Wikipedia, “Security through obscurity”, online at
http://en.wikipedia.org/wiki/Security_through_obscurity
(last accessed April 2007).
124
Except for redundancy. During the OECD Workshop “Social and economic factors shaping the future of
the Internet”, David Clark stated that currently we have a “security lumberyard, rather then a security
architecture”. Several protocols exist for significantly improving communication security but uptake is
very limited and fragmented. See OECD Workshop “Social and economic factors shaping the future of the
Internet” Proceedings, online at
www.oecd.org/sti/ict
.
DSTI/ICCP/CISP(2007)2/FINAL
62
125
See OECD, “The development of policies for the protection of critical information infrastructures (CII)”,
(forthcoming).
126
OECD “Analytical Report on Malicious Software”, DSTI/ICCP/TISP(2004)4/FINAL.
127
G. Galler, European Commission, DG Information Society and Media, Presentation at the ETSI meeting:
“A strategy for a secure Information Society: Dialogue, Partnership and empowerment”, 17 January 2007.
128
The OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of
Dostları ilə paylaş: |