SlideShare una empresa de Scribd logo
1 de 11
Constitutions and tussles in cyberspace Dr Ian Brown Oxford Internet Institute  University of Oxford
Overview ,[object Object],[object Object],[object Object],[object Object]
Government privacy tussles ,[object Object],[object Object],[object Object]
Govt censorship tussles ,[object Object],[object Object],[object Object],[object Object],[object Object],Flickr user racoles (2007)
Key constitutional protections Reaffirming their profound belief in those fundamental freedoms which are the foundation of justice and peace in the world: … §8 Everyone has the right to respect for his private and family life, his home and his correspondence  §9  Everyone has the right to freedom of thought, conscience and religion §10 Everyone has the right to freedom of expression  §11 Everyone has the right to freedom of peaceful assembly and to freedom of association with others (ECHR, 1950) extending the ground of public confidence in the Government, will best insure the beneficent ends of its institution… I: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble IV: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated (US Bill of Rights, 1791)
Constitutional enforcers ,[object Object],[object Object]
When constitutions fail ,[object Object],[object Object]
Designing for privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],Ade Rowbotham (2005)
Protecting free speech ,[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Principles on Freedom of Expression and Copyright in the Digital Age
Principles on Freedom of  Expression and Copyright  in the Digital AgePrinciples on Freedom of  Expression and Copyright  in the Digital Age
Principles on Freedom of Expression and Copyright in the Digital Age
Karlos Svoboda
 
A violation of copyright law through photocopying in
A violation of copyright law through photocopying inA violation of copyright law through photocopying in
A violation of copyright law through photocopying in
Alexander Decker
 
Laws & acts relating to the media industry
Laws & acts relating to the media industryLaws & acts relating to the media industry
Laws & acts relating to the media industry
Adam Grundy
 
Ecrea3c Deligianni Elsa Paper
Ecrea3c Deligianni Elsa PaperEcrea3c Deligianni Elsa Paper
Ecrea3c Deligianni Elsa Paper
imec.archive
 

La actualidad más candente (18)

Principles on Freedom of Expression and Copyright in the Digital Age
Principles on Freedom of  Expression and Copyright  in the Digital AgePrinciples on Freedom of  Expression and Copyright  in the Digital Age
Principles on Freedom of Expression and Copyright in the Digital Age
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
Privacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian lawPrivacy implications of using drones under current Australian law
Privacy implications of using drones under current Australian law
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet
 
festus and ishola
festus and isholafestus and ishola
festus and ishola
 
A violation of copyright law through photocopying in
A violation of copyright law through photocopying inA violation of copyright law through photocopying in
A violation of copyright law through photocopying in
 
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
 
Isa12b
Isa12bIsa12b
Isa12b
 
Copyrigt In S.A
Copyrigt In S.ACopyrigt In S.A
Copyrigt In S.A
 
Task 7
Task 7Task 7
Task 7
 
Digital rights and copyright
Digital rights and copyrightDigital rights and copyright
Digital rights and copyright
 
From Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsFrom Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back Doors
 
Laws & acts relating to the media industry
Laws & acts relating to the media industryLaws & acts relating to the media industry
Laws & acts relating to the media industry
 
Ecrea3c Deligianni Elsa Paper
Ecrea3c Deligianni Elsa PaperEcrea3c Deligianni Elsa Paper
Ecrea3c Deligianni Elsa Paper
 
Content.time.place.vagueness.sp16
Content.time.place.vagueness.sp16Content.time.place.vagueness.sp16
Content.time.place.vagueness.sp16
 
ρ2ρ c comons εν
ρ2ρ c comons ενρ2ρ c comons εν
ρ2ρ c comons εν
 
Freedom of Information
Freedom of InformationFreedom of Information
Freedom of Information
 

Similar a Constitutions and tussles in cyberspace

Westby the role of science and technology as empowerment
Westby the role of science and technology as empowermentWestby the role of science and technology as empowerment
Westby the role of science and technology as empowerment
Dr Lendy Spires
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
Dr Lendy Spires
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
Dr Lendy Spires
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
toltonkendal
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
chris293
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...
https://writeessayuk.com/
 

Similar a Constitutions and tussles in cyberspace (19)

The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Westby the role of science and technology as empowerment
Westby the role of science and technology as empowermentWestby the role of science and technology as empowerment
Westby the role of science and technology as empowerment
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
BigBrother
BigBrotherBigBrother
BigBrother
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
PIAFinalPaper
PIAFinalPaperPIAFinalPaper
PIAFinalPaper
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
 
Danger of Surveillance in Context of the Novel "1984".pptx
 Danger of Surveillance in Context of the Novel "1984".pptx Danger of Surveillance in Context of the Novel "1984".pptx
Danger of Surveillance in Context of the Novel "1984".pptx
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Freedom of access to information and privacy
Freedom of access to information and privacyFreedom of access to information and privacy
Freedom of access to information and privacy
 

Más de blogzilla

Más de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Constitutions and tussles in cyberspace

  • 1. Constitutions and tussles in cyberspace Dr Ian Brown Oxford Internet Institute University of Oxford
  • 2.
  • 3.
  • 4.
  • 5. Key constitutional protections Reaffirming their profound belief in those fundamental freedoms which are the foundation of justice and peace in the world: … §8 Everyone has the right to respect for his private and family life, his home and his correspondence §9 Everyone has the right to freedom of thought, conscience and religion §10 Everyone has the right to freedom of expression §11 Everyone has the right to freedom of peaceful assembly and to freedom of association with others (ECHR, 1950) extending the ground of public confidence in the Government, will best insure the beneficent ends of its institution… I: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble IV: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated (US Bill of Rights, 1791)
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.