African priorities for the Global Digital Compact

16:00–17:30 EAT / 15:00–16:30 CEST / 13:00-14:30 UTC

In 2022 the idea of a Global Digital Compact was floated by the UN with the intention of developing shared principles for a secure digital future – a future in which the power of digital technology was fully harnessed to accelerate the achievement of SDGs and where the risks and harms of the technology were effectively mitigated. The objectives of the GDC broadly  addressed the right of every human to have access to sustainable information (through a digital public good) through an affordable Internet, and to enjoy effective protection from the risks of existing and emerging technologies and their applications. Subsequently the African Union developed an African Digital Compact. It had 10 pillars broadly covering 4 themes:

  1. Aim: Affordable connectivity for all Africans,
  2. Implementation: Development of the necessary Governance and Partnership framework, Infrastructure, and Digital skills.
  3. Development and application: SDG applications, innovation, digital economy, public goods and services, Artificial intelligence.
  4. Safeguards: Cybersecurity, data protection, digital rights and privacy.

As the AU recognised, Africa has special needs related to digital transformation. Some countries are forging ahead with rapid digital adoption led by a tech-savvy, youthful population. However, ground-breaking innovations have been slow to penetrate other parts of the continent due to policy, implementation and communication issues. At the same time emerging technologies such as generative AI, IoT and robotics are already making a mark on the continent with all the attendant opportunities and risks. The webinar brought together African experts from technology, development, diplomacy and policy domains to discuss which digital compact issues must be urgently prioritised in order to keep Africa on course in a rapidly changing world.

Related actors:

Related people: Nnenna Nwakanma, Moctar Yedaly, Margaret Nyambura Ndung’u

Gaming and Africa’s Youth: Opportunities, Challenges, and future Pathways

16:00–17:30 EAT / 14:00–15:30 CEST / 13:00-14:30 UTC

Background and Rationale

The largest and fastest-growing youth population in the world, African youth,  faces a severe unemployment crisis, with millions of young people unable to find sustainable livelihoods. At the same time, the continent’s digital revolution has given rise to a vibrant gaming culture that cuts across geography, class, and language.

While gaming is often seen as mere entertainment, it has emerged globally as a powerful creative industry and one of the largest economic sectors —producing jobs, exports, and innovation. Africa’s youth are not only eager consumers of games but also potential creators, entrepreneurs, and competitors in this dynamic field.

The question is: Can Africa transform its youth gaming culture into a productive, ethical, and inclusive economic force?

Objectives

The webinar will  explore gaming as an industry and as an educational and development tool which is expected to rise as a continental  opportunity.  Despite its potential, gaming has inherent risks and ethical concerns and therefore needs governance and regulation.

Expected Outcomes

Recommendations for ethical and responsible gaming practices in Africa.

Related actors:

Related people:

High-Level Briefing and Workshop on Cyber Diplomacy for ECOWAS Permanent Representatives Committee 

About the event

On 20 May 2025, Diplo delivered a briefing and workshop on cyber diplomacy for the ECOWAS Permanent Representatives Committee and the ECOWAS Commission Management Representatives. Organised by the ECOWAS Commission in partnership with the German Federal Foreign Office, the event aimed to enhance the understanding of ECOWAS Ambassadors about the current cybersecurity landscape, the significance of cyber diplomacy, and the framework for responsible state behaviour in cyberspace.

Specific objectives included:


AI Agent on Digital Africa 

This AI agent is trained to help unpack issues related to (a) digital policy and governance in Africa, (b) global processes and mechanisms, and (c) the interplay between them.


Key takeaways


Resources

1. Diplo resources to assist diplomats unpack the world of cyber and digital diplomacy

2. Insights: Contributions of ECOWAS member states to OEWG discussions

Below is a summary of the key issues raised by ECOWAS countries, as reflected in their last contribution to an OEWG session. The summary is built around the main debate topics:

Benin

Threats: N/A

Norms: Questioned the effectiveness of voluntary, non-binding norms.

International law: Concerned about applying the concept of “force” from international law to the cyber domain, and believes that the concept should be redefined.

Capacity building: N/A

CBMs: Need to be implemented in full transparency and in a nondiscriminatory manner so that human rights are respected.

RID: N/A

Ghana

Threats: Highlighted quantum computing as a threat; To counter threats: a multistakeholder approach, regional and international cooperation, and investments in capacity building. 

Norms, rules and principles: Important to implement existing ones, but it is equally crucial to further develop them, given the rapid advancement in technology and the increasing complexity of cyber threats.

International law: International humanitarian law (IHL) applies in cyberspace, Human rights must be upheld online; Necessary to preserve critical services to populations; Further constructive discussions are needed about due diligence

Capacity building: Capacity building efforts need to be sustainable, demand-driven, inclusive, and tailored to the specific needs of each nation; Capacity building should be integrated into national cyber strategies, knowledge sharing platforms should be established;  peer learning and mentorship programs encouraged; Support for the UN Voluntary Fund to support capacity building in ICT – the Fund must prioritise countries with limited resources and its governance structure must be transparent; Support for the Global ICT security cooperation and capacity building portal as a one-stop shop for best practices, training materials, technical guidance, knowledge sharing and collaboration.

CBMs: Encourages the mainstreaming of the globally agreed CBMs into national cybersecurity policies; There is a need need for increased capacity building to effectively operationalise these CBMs; A standardised template is needed for incident reporting.

Regular institutional dialogue: The future mechanism should fully inherit the mandate of the existing OEWG; Support for the participation of relevant stakeholders in the mechanism; The mechanism should have three thematic groups suggested by the African group (1. Threats, 2. International law and norms, 3. Capacity building) and the role of thematic groups should be clarified, A review conference should be held every four years.

Côte d’Ivoire

Threats: Understanding the complexity of security challenges and their changes is crucial; Noted it would like to see more attention paid to means of preventing cyberattacks on critical infrastructure.

Norms, rules and principles: The need for their implementation and their gradual development is paramount; However, capacity building is needed to enhance common understanding of these norms and build capacities, resources and technical means; The voluntary checklist of practical actions for the implementation of the voluntary norms is essential to identify states’ needs and priorities.

International law: International law, including the UN Charter, applies to cyberspace; International humanitarian law applies to cyberspace, human rights must be upheld online; States need to uphold their due diligence duties; Peaceful settlement of disputes should be invested in.

Capacity building: Support for the UN Voluntary Fund to support capacity building in ICT and the Fund should give priority to activities such as the elaboration of national strategies, laws and regulations, ICT incident response and management, the protection of critical infrastructure and also the training and improvement of local expertise; Support for the Global ICT security cooperation and capacity building portal, a catalog of capacity building opportunities to serve as a voluntary self-assessment tool should be included, as well as a monthly overview of capacity building activities.

Confidence-building measures (CBMs): Expressed support for the Points of Contact (POCs) Directory and called for its operalisationRegular institutional dialogue: Supports the broadest possible participation of stakeholders in the future mechanism.

Nigeria

Threats: Highlighted threats like misinformation, disinformation, and election interference; State-led multistakeholder approach to address threats is needed; Stressed CERT-to-CERT cooperation, which would include regular vulnerability assessments and penetration testing; Capacity development for cybersec personnel in developing countries is needed.

Norms, rules and principles: The principle of responsible state behavior and a non-exhaustive list of norms in guiding cybersecurity should be upheld to consolidate transparency among states.

International law: The guiding principles of international law should be applicable to cyberspace; Territorial sovereignty of all member states is applicable in cyberspace; Due diligence is crucial in investigating the source of malicious cyber activities and it would prevent escalation of conflicts. 

Capacity building: Capacity building should be specific and tailored to the peculiarities of recipients; Technical gaps could be bridged through workshops on best practices and scenario-based discussions; Capacity building should foster local technological innovation to promote sustainability and reduce reliance on external support; Support for the UN Voluntary Fund to support capacity building in ICT.

Confidence-building measures (CBMs): Translating CBMs into concrete actions that are implemented by all states is neededRegular institutional dialogue: N/A

Senegal

Threats: N/A

Norms, rules and principles:  N/A

International law: International humanitarian law (IHL) applies to cyber operations in the context of armed conflict, particularly its principles of military necessity and humanity, distinction, proportionality and precaution; Rules of IHL must be respected even when conducting cyber operations that would not qualify as an ‘attack’; The definition of a cyberattack in the sense of IHL needs to be clarified.

Capacity building: A multi-partite approach taking into account developing countries and a better understanding of their needs in terms of capacity building is necessary; developing positions on cyber attacks that target national infrastructure must be supported.

Confidence-building measures (CBMs): N/ARegular institutional dialogue: Non-state stakeholders should participate as they did until now (voice not a vote principle); The mechanism should have three thematic groups suggested by the African group (1. Threats, 2. International law and norms, 3. Capacity building).

Sierra Leone

Threats: N/A

Norms, rules and principles: N/A

International law:  N/A

Capacity building: Building cyber-resilience in harnessing ICT infrastructure through partnership and cooperation at all levels will benefit the least developed countries.

Confidence-building measures (CBMs):  N/A

Regular institutional dialogue: Priorities for the future mechanism should be: advancing adherence to agreed norms, adherence to international laws fostering CBMs, and promoting capacity-building initiatives.

Togo

Togo didn’t address any of the six issues of the OEWG’s mandate, but took the floor to express support for the OEWG and share national experiences.