SlideShare uma empresa Scribd logo
1 de 12
Digital Freedoms in
  International Law
    Dr. Ian Brown and Prof. Douwe Korff
Sources of law
 International Covenant on Civil and Political Rights
  (1966) §17 and §19 and their interpretation by the UN
  Human Rights Committee, UN High Commissioner for
  Human Rights, and UN Special Rapporteurs (on Freedom
  of Opinion and Expression; on the promotion and
  protection of human rights and fundamental freedoms
  while countering terrorism; on human rights and
  transnational corporations)

 Wassenaar Arrangement on Export Controls for
  Conventional Arms and Dual-Use Goods and Technologies
  (established 1996)
ICCPR signatories




            Data: UN High Commissioner for Human Rights; Graphic: WikiMedia
UN HCHR Fact Sheet No. 32
“Terrorism clearly has a very real and direct impact on human
rights, with devastating consequences for the enjoyment of the
right to life, liberty and physical integrity of victims. In
addition to these individual costs, terrorism can destabilize
Governments, undermine civil society, jeopardize peace and
security, and threaten social and economic development. All of
these also have a real impact on the enjoyment of human
rights.
“Security of the individual is a basic human right and the
protection of individuals is, accordingly, a fundamental
obligation of Government. States therefore have an obligation
to ensure the human rights of their nationals and others by
taking positive measures to protect them against the threat of
terrorist acts and bringing the perpetrators of such acts to
justice.”
Restrictions on rights must:
1.   Be based on “law” – on published, clear and specific legal rules, the
     application of which is reasonably foreseeable;

2.   Serve a legitimate aim in a democratic society – including law
     enforcement and protection of national security. Such limitations
     should not be abused for other ends, such as to protect a government
     from embarrassment or exposure of wrongdoing;

3.   Be “necessary” and “proportionate” to that aim, and not impair the
     essence of the right;

4.   Not involve discrimination based on
     race, colour, sex, language, religion, political or other
     opinion, national or social origin, nationality, property, birth or other
     status;

5.   Not confer excessive discretion on the relevant authorities;

6.   Be subject to effective (judicial) safeguards and remedies.
Special circumstances
 Restrictions “in time of war or other public emergency
  threatening the life of the nation … to the extent strictly
  required by the exigencies of the situation”
   may “not involve discrimination solely on the ground of
    race, colour, sex, language, religion or social origin”
   must be “officially proclaimed” and notified to other parties

 in relation to terrorism (hostage taking, killings or serious
  physical violence undertaken for the purpose of provoking a
  state of terror or of compelling state action) and other
  serious breaches of public order
   “clear safeguards [for] the rights of political opposition
    parties, trade unions or human rights defenders” (UN HCHR)
   “terrorism does not trigger emergency powers” (UN SR)
UN Guiding Principles on
Business and Human Rights
 “The framework comprises three core principles: the
  state duty to protect against human rights abuses by
  third parties, including business; the corporate
  responsibility to respect human rights; and the need for
  more effective access to remedies.”
 Companies faced with state demands that violate
  human rights have a duty to refuse to do so where they
  can, minimise the extent of any such cooperation, and
  help victims of any enforced cooperation
 GNI Principles and Implementation Guidelines already
  go a long way to operationalising the Guiding Principles
Recommendations
 Greater sharing of knowledge on legal systems and
  experiences – to aid market entry and exit decisions, and
  assessments of legally binding requests for connection
  terminations, user data, and blocking
 Mechanisms for limiting use of products and services for
  serious human rights violations (contracts, dispute
  resolution, diplomatic support, technical measures)
 Careful planning of user data storage, requirement for legally
  binding requests, and renewed focus on (streamlined and
  speedier) MLATs for remote access, with backing in domestic
  law and contracts
 More transparency (states and companies), with aggregated
  reporting of user data access and blocking
Export controls
 Heavy criticism of exports to repressive regimes of
  equipment for mass Internet surveillance and censorship

 Many of these tools are “dual use”, with legitimate law
  enforcement, network management and security
  purposes

 US and EU sanctions on Iran and Syria already include
  technology bans, with additional recent steps by US on
  Syria to target those that “create or operate systems
  used to monitor, track, and target citizens for
  killing, torture, or other grave abuses”
Difficulties
 States’ abilities “to control effectively the export of the
  goods” – bureaucratic constraints on legitimate sales
  that may be ineffective against bad actors?

 “yet to see a workable definition based solely on the
  tools’ capabilities or other attributes that won't either
  be too narrow or so broad that they undermine the
  people we're trying to help.”

 Wide international availability of equipment (including
  second-hand)
Wassenaar Arrangement




            Data: Wassenaar Arrangement Secretariat; Graphic: WikiMedia
Recommendations
 States should extend purposes of international arms
  control regimes to include protection of human
  rights, and consider including technologies that have
  primary or significant potential uses for human rights
  violations in “dual use” export control regimes
 The Wassenaar Arrangement is an obvious
  candidate, but for these purposes could be better
  targeted with formal multi-stakeholder involvement
 Some export controls could be abolished, or better
  mechanisms found to enable provision of tools to
  democracy activists in sanctioned regimes

Mais conteúdo relacionado

Mais procurados

Rti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaRti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaMohammad Ismail
 
Immigrants in Detention
Immigrants in DetentionImmigrants in Detention
Immigrants in Detentioncmyoon
 
ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)JAMAL JUMA
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacyblogzilla
 
Systemic Analysis of the Levels of Protection Guaranteed in Regional Human Ri...
Systemic Analysis of the Levels of Protection Guaranteed in Regional Human Ri...Systemic Analysis of the Levels of Protection Guaranteed in Regional Human Ri...
Systemic Analysis of the Levels of Protection Guaranteed in Regional Human Ri...ijtsrd
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Week 3: Responses to terrorism
Week 3: Responses to terrorismWeek 3: Responses to terrorism
Week 3: Responses to terrorismkamila_fraser
 
Bortoletti, corruption and sunshine laws, commissione europea, ipa zagabria ...
Bortoletti,  corruption and sunshine laws, commissione europea, ipa zagabria ...Bortoletti,  corruption and sunshine laws, commissione europea, ipa zagabria ...
Bortoletti, corruption and sunshine laws, commissione europea, ipa zagabria ...Maurizio Bortoletti
 
Journalism in jordan: Developments in press freedom since the Arab Spring
Journalism in jordan: Developments in press freedom since the Arab SpringJournalism in jordan: Developments in press freedom since the Arab Spring
Journalism in jordan: Developments in press freedom since the Arab SpringMatt J. Duffy
 
What are human rights? (2002)
What are human rights? (2002)What are human rights? (2002)
What are human rights? (2002)John Lubbock
 
Impunity report -Legal aspects study
Impunity report -Legal aspects studyImpunity report -Legal aspects study
Impunity report -Legal aspects studyHadrian Cawthorne
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Despite Arab uprisings, press freedom still elusive
Despite Arab uprisings, press freedom still elusiveDespite Arab uprisings, press freedom still elusive
Despite Arab uprisings, press freedom still elusiveMatt J. Duffy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
General Overview of the Violence Against Persons (Prohibition) Act 2015
General Overview of the Violence Against Persons (Prohibition) Act 2015General Overview of the Violence Against Persons (Prohibition) Act 2015
General Overview of the Violence Against Persons (Prohibition) Act 2015Vincent Dania
 
The patriot act
The patriot actThe patriot act
The patriot actpalita Px
 
Developing A Strong Border and Immigration Policy
Developing A Strong Border and Immigration PolicyDeveloping A Strong Border and Immigration Policy
Developing A Strong Border and Immigration PolicyThe Heritage Foundation
 

Mais procurados (20)

Rti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & mediaRti resoucebook for cs os workers & media
Rti resoucebook for cs os workers & media
 
Immigrants in Detention
Immigrants in DetentionImmigrants in Detention
Immigrants in Detention
 
ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 
Systemic Analysis of the Levels of Protection Guaranteed in Regional Human Ri...
Systemic Analysis of the Levels of Protection Guaranteed in Regional Human Ri...Systemic Analysis of the Levels of Protection Guaranteed in Regional Human Ri...
Systemic Analysis of the Levels of Protection Guaranteed in Regional Human Ri...
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Right to information act 2005
Right to information act 2005Right to information act 2005
Right to information act 2005
 
Week 3: Responses to terrorism
Week 3: Responses to terrorismWeek 3: Responses to terrorism
Week 3: Responses to terrorism
 
Bortoletti, corruption and sunshine laws, commissione europea, ipa zagabria ...
Bortoletti,  corruption and sunshine laws, commissione europea, ipa zagabria ...Bortoletti,  corruption and sunshine laws, commissione europea, ipa zagabria ...
Bortoletti, corruption and sunshine laws, commissione europea, ipa zagabria ...
 
Journalism in jordan: Developments in press freedom since the Arab Spring
Journalism in jordan: Developments in press freedom since the Arab SpringJournalism in jordan: Developments in press freedom since the Arab Spring
Journalism in jordan: Developments in press freedom since the Arab Spring
 
What are human rights? (2002)
What are human rights? (2002)What are human rights? (2002)
What are human rights? (2002)
 
Impunity report -Legal aspects study
Impunity report -Legal aspects studyImpunity report -Legal aspects study
Impunity report -Legal aspects study
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Despite Arab uprisings, press freedom still elusive
Despite Arab uprisings, press freedom still elusiveDespite Arab uprisings, press freedom still elusive
Despite Arab uprisings, press freedom still elusive
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
The patriot act
The patriot act The patriot act
The patriot act
 
Const law
Const lawConst law
Const law
 
General Overview of the Violence Against Persons (Prohibition) Act 2015
General Overview of the Violence Against Persons (Prohibition) Act 2015General Overview of the Violence Against Persons (Prohibition) Act 2015
General Overview of the Violence Against Persons (Prohibition) Act 2015
 
The patriot act
The patriot actThe patriot act
The patriot act
 
Developing A Strong Border and Immigration Policy
Developing A Strong Border and Immigration PolicyDeveloping A Strong Border and Immigration Policy
Developing A Strong Border and Immigration Policy
 

Semelhante a Digital freedoms in international law

Introduction to Civil and Political Rights Slides for the Foundation Course o...
Introduction to Civil and Political Rights Slides for the Foundation Course o...Introduction to Civil and Political Rights Slides for the Foundation Course o...
Introduction to Civil and Political Rights Slides for the Foundation Course o...ASHUTOSHKUMARPANDEY40
 
Human Rights Defenders Under Threat: A Shrinking Space For Civil Society
Human Rights Defenders Under Threat: A Shrinking Space For Civil SocietyHuman Rights Defenders Under Threat: A Shrinking Space For Civil Society
Human Rights Defenders Under Threat: A Shrinking Space For Civil SocietyAmnesty India
 
Hrd briefing 12 may
Hrd briefing 12 mayHrd briefing 12 may
Hrd briefing 12 mayAmnestyIndia
 
Week 4: Terrorism and human rights
Week 4: Terrorism and human rightsWeek 4: Terrorism and human rights
Week 4: Terrorism and human rightskamila_fraser
 
PRESS RELEASE: Mass Twitter Rally To Kick-Off "National Twitter Rally" on Mon...
PRESS RELEASE: Mass Twitter Rally To Kick-Off "National Twitter Rally" on Mon...PRESS RELEASE: Mass Twitter Rally To Kick-Off "National Twitter Rally" on Mon...
PRESS RELEASE: Mass Twitter Rally To Kick-Off "National Twitter Rally" on Mon...Pixel Prose Media, LLC
 
Sources of Human Rights in Islam and Western
Sources of Human Rights in Islam and WesternSources of Human Rights in Islam and Western
Sources of Human Rights in Islam and WesternEHSAN KHAN
 
Reduce Terrorism Might Infringe.docx
Reduce Terrorism Might Infringe.docxReduce Terrorism Might Infringe.docx
Reduce Terrorism Might Infringe.docxbkbk37
 
MNCs Human rights and the future of the international project
MNCs Human rights and the future of the international project MNCs Human rights and the future of the international project
MNCs Human rights and the future of the international project IlonaThornburg83
 
Terrorism and Human Rights
Terrorism and Human RightsTerrorism and Human Rights
Terrorism and Human RightsCecilia Polizzi
 
Office of the High Commissioner for Human Rights
Office of the High Commissioner for Human RightsOffice of the High Commissioner for Human Rights
Office of the High Commissioner for Human RightsFiach OBroin-Molloy
 
1. In what way do INGOs and NGOs (Global Civil Society) participate .docx
1. In what way do INGOs and NGOs (Global Civil Society) participate .docx1. In what way do INGOs and NGOs (Global Civil Society) participate .docx
1. In what way do INGOs and NGOs (Global Civil Society) participate .docxblondellchancy
 
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docxChapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docxtiffanyd4
 
Arab media regulations: Identifying restraints on freedom of the press in law...
Arab media regulations: Identifying restraints on freedom of the press in law...Arab media regulations: Identifying restraints on freedom of the press in law...
Arab media regulations: Identifying restraints on freedom of the press in law...Matt J. Duffy
 
Breaking the law! peterson final
Breaking the law!    peterson finalBreaking the law!    peterson final
Breaking the law! peterson finaljpeterson2058
 

Semelhante a Digital freedoms in international law (20)

Introduction to Civil and Political Rights Slides for the Foundation Course o...
Introduction to Civil and Political Rights Slides for the Foundation Course o...Introduction to Civil and Political Rights Slides for the Foundation Course o...
Introduction to Civil and Political Rights Slides for the Foundation Course o...
 
Civil and Political Rights.pdf
Civil and Political Rights.pdfCivil and Political Rights.pdf
Civil and Political Rights.pdf
 
The Problem of ISIS
The Problem of ISISThe Problem of ISIS
The Problem of ISIS
 
57 58
57 5857 58
57 58
 
Human Rights Defenders Under Threat: A Shrinking Space For Civil Society
Human Rights Defenders Under Threat: A Shrinking Space For Civil SocietyHuman Rights Defenders Under Threat: A Shrinking Space For Civil Society
Human Rights Defenders Under Threat: A Shrinking Space For Civil Society
 
Hrd briefing 12 may
Hrd briefing 12 mayHrd briefing 12 may
Hrd briefing 12 may
 
Chapter 2: ICCPR Chapter
Chapter 2: ICCPR Chapter Chapter 2: ICCPR Chapter
Chapter 2: ICCPR Chapter
 
Week 4: Terrorism and human rights
Week 4: Terrorism and human rightsWeek 4: Terrorism and human rights
Week 4: Terrorism and human rights
 
PRESS RELEASE: Mass Twitter Rally To Kick-Off "National Twitter Rally" on Mon...
PRESS RELEASE: Mass Twitter Rally To Kick-Off "National Twitter Rally" on Mon...PRESS RELEASE: Mass Twitter Rally To Kick-Off "National Twitter Rally" on Mon...
PRESS RELEASE: Mass Twitter Rally To Kick-Off "National Twitter Rally" on Mon...
 
Sources of Human Rights in Islam and Western
Sources of Human Rights in Islam and WesternSources of Human Rights in Islam and Western
Sources of Human Rights in Islam and Western
 
Reduce Terrorism Might Infringe.docx
Reduce Terrorism Might Infringe.docxReduce Terrorism Might Infringe.docx
Reduce Terrorism Might Infringe.docx
 
MNCs Human rights and the future of the international project
MNCs Human rights and the future of the international project MNCs Human rights and the future of the international project
MNCs Human rights and the future of the international project
 
Terrorism and Human Rights
Terrorism and Human RightsTerrorism and Human Rights
Terrorism and Human Rights
 
Office of the High Commissioner for Human Rights
Office of the High Commissioner for Human RightsOffice of the High Commissioner for Human Rights
Office of the High Commissioner for Human Rights
 
1. In what way do INGOs and NGOs (Global Civil Society) participate .docx
1. In what way do INGOs and NGOs (Global Civil Society) participate .docx1. In what way do INGOs and NGOs (Global Civil Society) participate .docx
1. In what way do INGOs and NGOs (Global Civil Society) participate .docx
 
Presentation 9.pdf
Presentation 9.pdfPresentation 9.pdf
Presentation 9.pdf
 
Laws on mass media
Laws on mass mediaLaws on mass media
Laws on mass media
 
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docxChapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
 
Arab media regulations: Identifying restraints on freedom of the press in law...
Arab media regulations: Identifying restraints on freedom of the press in law...Arab media regulations: Identifying restraints on freedom of the press in law...
Arab media regulations: Identifying restraints on freedom of the press in law...
 
Breaking the law! peterson final
Breaking the law!    peterson finalBreaking the law!    peterson final
Breaking the law! peterson final
 

Mais de blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloudblogzilla
 

Mais de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Digital freedoms in international law

  • 1. Digital Freedoms in International Law Dr. Ian Brown and Prof. Douwe Korff
  • 2. Sources of law  International Covenant on Civil and Political Rights (1966) §17 and §19 and their interpretation by the UN Human Rights Committee, UN High Commissioner for Human Rights, and UN Special Rapporteurs (on Freedom of Opinion and Expression; on the promotion and protection of human rights and fundamental freedoms while countering terrorism; on human rights and transnational corporations)  Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies (established 1996)
  • 3. ICCPR signatories Data: UN High Commissioner for Human Rights; Graphic: WikiMedia
  • 4. UN HCHR Fact Sheet No. 32 “Terrorism clearly has a very real and direct impact on human rights, with devastating consequences for the enjoyment of the right to life, liberty and physical integrity of victims. In addition to these individual costs, terrorism can destabilize Governments, undermine civil society, jeopardize peace and security, and threaten social and economic development. All of these also have a real impact on the enjoyment of human rights. “Security of the individual is a basic human right and the protection of individuals is, accordingly, a fundamental obligation of Government. States therefore have an obligation to ensure the human rights of their nationals and others by taking positive measures to protect them against the threat of terrorist acts and bringing the perpetrators of such acts to justice.”
  • 5. Restrictions on rights must: 1. Be based on “law” – on published, clear and specific legal rules, the application of which is reasonably foreseeable; 2. Serve a legitimate aim in a democratic society – including law enforcement and protection of national security. Such limitations should not be abused for other ends, such as to protect a government from embarrassment or exposure of wrongdoing; 3. Be “necessary” and “proportionate” to that aim, and not impair the essence of the right; 4. Not involve discrimination based on race, colour, sex, language, religion, political or other opinion, national or social origin, nationality, property, birth or other status; 5. Not confer excessive discretion on the relevant authorities; 6. Be subject to effective (judicial) safeguards and remedies.
  • 6. Special circumstances  Restrictions “in time of war or other public emergency threatening the life of the nation … to the extent strictly required by the exigencies of the situation”  may “not involve discrimination solely on the ground of race, colour, sex, language, religion or social origin”  must be “officially proclaimed” and notified to other parties  in relation to terrorism (hostage taking, killings or serious physical violence undertaken for the purpose of provoking a state of terror or of compelling state action) and other serious breaches of public order  “clear safeguards [for] the rights of political opposition parties, trade unions or human rights defenders” (UN HCHR)  “terrorism does not trigger emergency powers” (UN SR)
  • 7. UN Guiding Principles on Business and Human Rights  “The framework comprises three core principles: the state duty to protect against human rights abuses by third parties, including business; the corporate responsibility to respect human rights; and the need for more effective access to remedies.”  Companies faced with state demands that violate human rights have a duty to refuse to do so where they can, minimise the extent of any such cooperation, and help victims of any enforced cooperation  GNI Principles and Implementation Guidelines already go a long way to operationalising the Guiding Principles
  • 8. Recommendations  Greater sharing of knowledge on legal systems and experiences – to aid market entry and exit decisions, and assessments of legally binding requests for connection terminations, user data, and blocking  Mechanisms for limiting use of products and services for serious human rights violations (contracts, dispute resolution, diplomatic support, technical measures)  Careful planning of user data storage, requirement for legally binding requests, and renewed focus on (streamlined and speedier) MLATs for remote access, with backing in domestic law and contracts  More transparency (states and companies), with aggregated reporting of user data access and blocking
  • 9. Export controls  Heavy criticism of exports to repressive regimes of equipment for mass Internet surveillance and censorship  Many of these tools are “dual use”, with legitimate law enforcement, network management and security purposes  US and EU sanctions on Iran and Syria already include technology bans, with additional recent steps by US on Syria to target those that “create or operate systems used to monitor, track, and target citizens for killing, torture, or other grave abuses”
  • 10. Difficulties  States’ abilities “to control effectively the export of the goods” – bureaucratic constraints on legitimate sales that may be ineffective against bad actors?  “yet to see a workable definition based solely on the tools’ capabilities or other attributes that won't either be too narrow or so broad that they undermine the people we're trying to help.”  Wide international availability of equipment (including second-hand)
  • 11. Wassenaar Arrangement Data: Wassenaar Arrangement Secretariat; Graphic: WikiMedia
  • 12. Recommendations  States should extend purposes of international arms control regimes to include protection of human rights, and consider including technologies that have primary or significant potential uses for human rights violations in “dual use” export control regimes  The Wassenaar Arrangement is an obvious candidate, but for these purposes could be better targeted with formal multi-stakeholder involvement  Some export controls could be abolished, or better mechanisms found to enable provision of tools to democracy activists in sanctioned regimes

Notas do Editor

  1. Methodology
  2. Compliance
  3. Martin Scheinin’s definition of terrorism