SlideShare uma empresa Scribd logo
1 de 11
Constitutions and tussles in cyberspace Dr Ian Brown Oxford Internet Institute  University of Oxford
Overview ,[object Object],[object Object],[object Object],[object Object]
Government privacy tussles ,[object Object],[object Object],[object Object]
Govt censorship tussles ,[object Object],[object Object],[object Object],[object Object],[object Object],Flickr user racoles (2007)
Key constitutional protections Reaffirming their profound belief in those fundamental freedoms which are the foundation of justice and peace in the world: … §8 Everyone has the right to respect for his private and family life, his home and his correspondence  §9  Everyone has the right to freedom of thought, conscience and religion §10 Everyone has the right to freedom of expression  §11 Everyone has the right to freedom of peaceful assembly and to freedom of association with others (ECHR, 1950) extending the ground of public confidence in the Government, will best insure the beneficent ends of its institution… I: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble IV: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated (US Bill of Rights, 1791)
Constitutional enforcers ,[object Object],[object Object]
When constitutions fail ,[object Object],[object Object]
Designing for privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],Ade Rowbotham (2005)
Protecting free speech ,[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Principles on Freedom of Expression and Copyright in the Digital Age
Principles on Freedom of  Expression and Copyright  in the Digital AgePrinciples on Freedom of  Expression and Copyright  in the Digital Age
Principles on Freedom of Expression and Copyright in the Digital AgeKarlos Svoboda
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI CenturyJyrki Kasvi
 
Privacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian lawPrivacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian lawARDC
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacytolshinoda
 
IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet Emily Allbon
 
A violation of copyright law through photocopying in
A violation of copyright law through photocopying inA violation of copyright law through photocopying in
A violation of copyright law through photocopying inAlexander Decker
 
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Shreedeep Rayamajhi
 
Digital rights and copyright
Digital rights and copyrightDigital rights and copyright
Digital rights and copyrightzabej
 
From Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsFrom Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsJack Pringle
 
Laws & acts relating to the media industry
Laws & acts relating to the media industryLaws & acts relating to the media industry
Laws & acts relating to the media industryAdam Grundy
 
Ecrea3c Deligianni Elsa Paper
Ecrea3c Deligianni Elsa PaperEcrea3c Deligianni Elsa Paper
Ecrea3c Deligianni Elsa Paperimec.archive
 
Content.time.place.vagueness.sp16
Content.time.place.vagueness.sp16Content.time.place.vagueness.sp16
Content.time.place.vagueness.sp16Michael Park
 
Freedom of Information
Freedom of InformationFreedom of Information
Freedom of Informationamypollock1
 

Mais procurados (18)

Principles on Freedom of Expression and Copyright in the Digital Age
Principles on Freedom of  Expression and Copyright  in the Digital AgePrinciples on Freedom of  Expression and Copyright  in the Digital Age
Principles on Freedom of Expression and Copyright in the Digital Age
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
Privacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian lawPrivacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian law
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet
 
festus and ishola
festus and isholafestus and ishola
festus and ishola
 
A violation of copyright law through photocopying in
A violation of copyright law through photocopying inA violation of copyright law through photocopying in
A violation of copyright law through photocopying in
 
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
 
Isa12b
Isa12bIsa12b
Isa12b
 
Copyrigt In S.A
Copyrigt In S.ACopyrigt In S.A
Copyrigt In S.A
 
Task 7
Task 7Task 7
Task 7
 
Digital rights and copyright
Digital rights and copyrightDigital rights and copyright
Digital rights and copyright
 
From Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsFrom Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back Doors
 
Laws & acts relating to the media industry
Laws & acts relating to the media industryLaws & acts relating to the media industry
Laws & acts relating to the media industry
 
Ecrea3c Deligianni Elsa Paper
Ecrea3c Deligianni Elsa PaperEcrea3c Deligianni Elsa Paper
Ecrea3c Deligianni Elsa Paper
 
Content.time.place.vagueness.sp16
Content.time.place.vagueness.sp16Content.time.place.vagueness.sp16
Content.time.place.vagueness.sp16
 
ρ2ρ c comons εν
ρ2ρ c comons ενρ2ρ c comons εν
ρ2ρ c comons εν
 
Freedom of Information
Freedom of InformationFreedom of Information
Freedom of Information
 

Semelhante a Constitutions and tussles in cyberspace

The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Westby the role of science and technology as empowerment
Westby the role of science and technology as empowermentWestby the role of science and technology as empowerment
Westby the role of science and technology as empowermentDr Lendy Spires
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateDr Lendy Spires
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateDr Lendy Spires
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessmentblogzilla
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxchris293
 
Danger of Surveillance in Context of the Novel "1984".pptx
 Danger of Surveillance in Context of the Novel "1984".pptx Danger of Surveillance in Context of the Novel "1984".pptx
Danger of Surveillance in Context of the Novel "1984".pptxDrashtiJoshi21
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...https://writeessayuk.com/
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...blogzilla
 
Freedom of access to information and privacy
Freedom of access to information and privacyFreedom of access to information and privacy
Freedom of access to information and privacyUET Peshawar pakistan
 

Semelhante a Constitutions and tussles in cyberspace (19)

The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Westby the role of science and technology as empowerment
Westby the role of science and technology as empowermentWestby the role of science and technology as empowerment
Westby the role of science and technology as empowerment
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
BigBrother
BigBrotherBigBrother
BigBrother
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
PIAFinalPaper
PIAFinalPaperPIAFinalPaper
PIAFinalPaper
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
 
Danger of Surveillance in Context of the Novel "1984".pptx
 Danger of Surveillance in Context of the Novel "1984".pptx Danger of Surveillance in Context of the Novel "1984".pptx
Danger of Surveillance in Context of the Novel "1984".pptx
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Freedom of access to information and privacy
Freedom of access to information and privacyFreedom of access to information and privacy
Freedom of access to information and privacy
 

Mais de blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 

Mais de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Constitutions and tussles in cyberspace

  • 1. Constitutions and tussles in cyberspace Dr Ian Brown Oxford Internet Institute University of Oxford
  • 2.
  • 3.
  • 4.
  • 5. Key constitutional protections Reaffirming their profound belief in those fundamental freedoms which are the foundation of justice and peace in the world: … §8 Everyone has the right to respect for his private and family life, his home and his correspondence §9 Everyone has the right to freedom of thought, conscience and religion §10 Everyone has the right to freedom of expression §11 Everyone has the right to freedom of peaceful assembly and to freedom of association with others (ECHR, 1950) extending the ground of public confidence in the Government, will best insure the beneficent ends of its institution… I: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble IV: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated (US Bill of Rights, 1791)
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.