Skip to content

Agreement On Cooperation In The Field Of International Information Security

The organization pays particular attention to cybersecurity issues and international standards. In 2009, the CSR Member States reached an agreement on cooperation in the field of international information security. In 2011, four of the CSO member states presented the UN Secretary-General with a proposal for an international code of conduct on information security for consideration at the SESSION of the UN General Assembly. Subsequently, in 2015, the five members of the SCO received a revised version of the code for consideration at the UN General Assembly. The aim of such a code would be to identify the rights and responsibilities of states in the field of information, as proposed by the CSM, and to strengthen their cooperation to address common threats and challenges within the information space. One of the main objectives of the organisation is to promote cooperation between its Member States in areas such as trade and economics, science and technology, culture, education and other fields. 5. CSU Member States are intensifying their joint efforts to create a peaceful, secure, fair and open information space based on the principles of respect for national sovereignty and non-interference in the internal affairs of other countries. They will work together to prevent the use of information and communication technologies to undermine the political, economic and public security and stability of Member States, as well as the universal moral foundations of social life, in order to put an end to the promotion of ideas terrorism, extremism, separatism, radicalism, fascism and chauvinism through the use of the Internet. The establishment of a global information space For the purpose of the interaction between the parties in the implementation of this agreement, the list of the most important concepts and concepts in the field of international information security covered by Schedule 1 of this agreement, of which it is an integral part, is used. 6.

Threats to the safe and stable functioning of natural and/or technological global and national information infrastructures. These measures are aimed at building trust between our states, promoting the security and prosperity of our peoples. They will make a significant contribution to ensuring world peace in the information space. For all countries, including the United States, we are looking to a comprehensive agreement on a political commitment by states to establish a system of non-compliance with tics against each other. In light of the threats under Article 2 of this agreement, the party, its competent representatives and the national competent authorities established in accordance with Article 5 of this agreement cooperate in the area of international information security in the following broad guidelines: The Heads of State of the CSM have also agreed on the procedure for granting membership to the CSM to new States and an updated reference model of a state`s obligations; India and Iran are considered potential members.7 The admission process can take a long time due to political differences between current and potential SCO members.8 According to some sources, India and Pakistan may well become member states at the next SCO summit. , scheduled for 2015 in Ufa, Baschkortostan, Russia.9 15.

Published on