Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

CODE: ***SAMPLE WORKING PAPER – 2002 NMUN***COMMITTEE: Economic and

Sociacl Plenary
TOPIC: Combating organized cybercrime.

Sponsors: Argentina, Colombia, Philippines, Mexico


Signatories: Morocco, UAE

1. Commission on Crime Prevention and Criminal Justice-CCPJC.


2.
3. Reminding the plenary that cybercrime has cost $8 trillion USD globally in 2023,
4.
5. Condemning the abuse of ICTs and related technologies to attack critical civilian
infrastructures,
6.
7. Acknowledging the potential of ICTs to bolster cybersecurity and promote
disarmament,
8.
9. Reminding the committee that cybercrimes are a transnational issue,
10.
11. Recognizing the increasing threat of the spread of misinformation and
disinformation on COVID-19,
12.

13. Bearing in mind the disparities in cybersecurity technology and personnel among
war-torn and developing states,

14. Recognizing the need for a voluntary fund to provide developing states access to
improved technology to combat cyberattacks,
15.
16. 1. Deplores the fact that many people across the world are at risk for due to
cyberattacks;
17.
18. 2. Further encourages the mainstreaming of a human rights perspective in
cybersecurity by reforming the Open-Ended Working Group, including:
19.
(a) Reforming the OEWG to promote broad stakeholder involvement to
promote decision-making based on lived experiences;
(b) Adopting a similar framework to the UN Ad Hoc Committee on
Cybercrime to promote stakeholder involvement at all levels of
decision-making;
(c) Encouraging cyberattacks on critical civilian infrastructures to be
treated as violations of human rights;

20. 3. Urges the creation of a report by UNESCO to determine what


21. regions need educational assistance and how more developed States
22. and international organizations may assist:
23.
24. 4. Supports a voluntary treaty banning State actor cyberattacks.
25.
26. 5. Stresses the importance of international cooperation to establish secure
information transfers:
27. (a) Implementing encryption technology and algorithms to safeguard
communications;
(b) Encouraging the creation of digital safety campaigns to spread
awareness of the threat of cybercriminals and schemes;
(c) Creating training programs for digital users to provide knowledge on
how to detect rudimentary websites, files, and other click-to-open
attachments;
28. 6. Recommends that a voluntary fund is established that provides developing
States with access to cybersecurity technology.

You might also like