Committed to connecting the world


ITU-AICTO Regional Workshop on “Policy Advocacy on Data Privacy & CyberSecurity”, Tunis – Tunisia, 5-6 December 2016

The use of cloud computing is rapidly evolving in many Arab & African countries due to its cost-efficiency and flexibility. This technology holds the potential to eliminate the requirements for the setup of expensive computing infrastructure for IT-based solutions and plications. However, this rapid growing of the cloud computing market motivated malicious users to revise their attack techniques to cope with the specific features of the cloud infrastructure. Especially, attacks on data privacy are becoming a crucial issue since resource sharing is a pillar of the cloud model.

Henceforth, many of the Arab &African countries need to take the lead in formulating national and regional regulatory policy, frameworks and legal measures addressing cybersecurity, as these may not yet fully balance data privacy against providing the means by which governments can address cybercrime and cyber threats in general. While establishing such a balance is a challenging task for all governments, it is an action that builds confidence and security in the use of the Internet and its various applications, and one that enables socio-economic development in the modern age. The extremely rapid deployment of big data technologies, cloud services, and the Internet of Things as well as the constant and dynamic evolution of cyber threats make this task all the more urgent and critically important.

The traditional discussion on the balance between individual liberties and security remains actual. As cyberspace is borderless, this balance requires decisions on common policies, security strategies and coherent legal frameworks at the regional level, as well as possibly actions to achieve a coordinated and coherent implementation of these.

This workshop aims at providing advocacy on the policies, challenges and objectives of cloud services privacy, data protection and security, as well as possible actions for regional actions and their expected impacts.

This workshop engages key leaders of cybersecurity Programs to help share experiences, challenges, and ideas, and to contribute to the process of formulation the appropriate policies and frameworks and knowledge sharing on cloud services and IOT security challenges throughout the region.


  • Share the latest issues and best practices regarding the legislations and regulations in place to address the issues related to data privacy.
  • Encourage formulation of national and regional regulatory and technical policies and frameworks and legal measures to ensure data privacy and combat the different forms of cyberthreats in the Arab region, thereby ensuring optimal and secure use of the Internet and its various applications and building confidence in the Internet
  • Discuss potential concerns on implementation and success factors.