English, PDF, 2,993kb
The OECD has been at the forefront of policy analysis on the digital economy since the start. It has also developed influential guidelines to help governments preserve the open and unified Internet that is needed to support economic growth, while at the same time manage privacy and security risks.
Many devices using small batteries have battery compartments that are easy to open and most people do not know there are safety concerns. Consumers worldwide need to be aware of the serious injuries that small batteries shaped like coins and buttons can cause when swallowed by children.
These guidelines apply to all participants in the new information society and suggest the need for a greater awareness and understanding of security issues, including the need to develop a "culture of security".
English, Excel, 260kb
Amid concern that the openness of the Internet that has been key in stimulating innovation and economic growth is currently eroding, the OECD has adopted a set of shared principles to preserve the fundamental openness of the Internet and its free flow of information.
This guide provides the statistical definitions, classifications and methods to measure and compare the information society across countries. It provides a standard reference for statisticians, analysts and policy-makers in the field.
English, , 339kb
OECD member governments, business groups and technical experts in June 2011 agreed a new framework to promote a more transparent and open Internet.
English, , 764kb
This declaration was adopted at the conclusion of the June 2008 Ministerial meeting on the Future of the Internet Economy, held in Seoul. It contains recommendations on how to further the development of the “Internet economy” through multi-stakeholder co-operation.
English, , 294kb
This Recommendation is designed as a general framework for Member countries to foster wider and more effective use of public sector information and content, and the generation of new uses from it.
English, , 322kb
The disruption or destruction of critical information infrastructures (“CII”) could have serious consequences. This Recommendation is derived from best practices for CII protection identified in an OECD background report comparing policies in seven countries.