Project Documents

The Clean IT dialogue resulted in a problem analysis of terrorist use of the Internet, a set of nine general principles that determine conditions for any action taken to reduce terrorist use of the Internet and a list of best practices. As Clean IT is not set up as a binding form of cooperation, any future implementation can only be voluntary and according to existing laws and regulations.

The final Clean IT document (pdf) was published on January 21, 2013.

The best practices in the Clean IT report do not raise immediate human right concerns at this stage. In future, however, much depends on how the Best Practices are interpreted, how they are implemented in practice, and how they relate to other practices. The University of Tilburg  was asked to scan for possible threats to human rights that might occur by future implementation of the best practices. The researchers conclude that some best practices should be accompanied by clear procedures and guarantees, yet that others do raise significant questions.The report can be downloaded here. The projectteam recommends reading this report before any future implementation,


Documents from others: Terrorist use of the Internet

Please find below a list of public papers, reports and articles about the terrorist use of the Internet. These papers are not produced by the Clean IT project and do not reflect the opinions of the participants.


Documents about the project

The project outline, which describes the project goals. A more compact version can be downloaded as a factsheet.

Progress reports:

Application of the project and communications with the European Commission (names of the people involved are blacked out):

The letter that our Minister of Security and Justice sent to his colleagues to invite them to become a supporting government partner for the Clean IT project.

WordPress Appliance - Powered by TurnKey Linux