SlideShare una empresa de Scribd logo
1 de 18
Freedom of Expression on the Internet
Council of Europe Standards
Dr Monica Horten
Visiting Fellow, London School of Economics & Political Science
How do we communicate?
In the 21st
century
Why freedom of expression applies to the Internet
• The free communication of thoughts and opinions is one of most
precious rights because it is a condition for democracy
(France 1789 Declaration of the Rights of Man, Article 11)
• In the modern State, the means of communication, and especially
the development of public online services have an importance in
democratic life and for the expression of ideas and opinions.
• This right of free speech implies the liberty of access to such
services.
(French Constutional Court June 2009)
The Internet, the law & human rights
• Right to freedom of expression enshrined in European
Convention on Human Rights (ECHR)Article 10
• Other important rights :
– Article 11 Right to freedom of assembly and association
– Article 8 Right to a private and family life
– Article 6 Right to due process
– European Court of Human Rights
– Internet is the way we exercise these rights in the 21st century
– Article 10 applies to blogging and social media, email and all forms of online
communications
Right to freedom of expression
•Two-way right to impart and receive information
•Without interference from a public authority
•Applies ‘regardless of frontiers’
•May be balanced against other rights eg property, security
• Any restriction should be prescribed by law, fulfil a legitimate
aim, and be proportionate to that aim
Freedom of access
- Freedom of expression relies on open access to the networks
- Creates opportunities for access to knowledge and creation
- Disconnecting individuals is a restriction
- Public networks should remain accessible at all times
- And an infrastructure that is open
- Enables people to create and build new technologies for communication,
which in turn facilitate new opportunities for free speech.
- anyone can build a new application and attach it to the network, without
needing to ask permission
- network providers should not technically discriminate between applications
• Technological
developments
– Blocking, filtering and
disconnection
– Traffic management practices
fast/slow lanes, deep packet
inspection
– Interception, back doors,
– Traffic analysis, big data
profiling,
Key issues for human rights and the Internet
Blocking
Filtering
ISP scans Internet traffic against database containing a
blocklist of webpages, images or specific content
• Users will be prevented from accessing content on the the
blocklist
Platforms and social media sites scan uploaded content agains
pre-determined criteria
•Files are taken down by the site owner
Risk of over-blocking or taking down of legitimate content
Cross-border issues
• Upstream filtering
• Technical errors such as routing error
• DNS seizures have taken websites off-line worldwide
• Possible implications for cloud services
Freedom from Interference
• Blocking & filtering may interfere with free speech and privacy
rights
• Blocking access to the Internet, or parts of the Internet, for whole
populations or segments of the public can never be justified, including in
the interests of justice, public order or national security.
(Yildirim v Turkey ECtHR 2012)
• Filtering indiscriminately, to all customers, as a preventative measure, for an
unlimited time, would be a disproproportionate interference.
(Scarlet Extended ECJ 2011)
•Take down notices - law enforcement, copyright,
defamation
•Scan and filter - copyright enforcement
•Filter search results - commercial interests
•Backdoors - law enforcement, security services,
copyright enforcement
Freedom of expression, blogs & social media
Essential State guarantees for online media
•Online media should be able to publish without interference
•Editorial independence
•Confidentiality of journalists sources
•May operate without permission from the State
•Not harassed or pressured by State authorities
•Without fear of restrictions imposed by State
•Regulation proactively protects media freedoms
•Applies to social networks, blogs, websites and online
applications
Freedom of expression & due process
• Any measures to restrict the Internet
must include a prior, fair and impartial
hearin (right to due process
•Balance against other rights eg property, security
•Any restriction should be prescribed by law, fulfil a
legitimate aim, and be proportionate to that aim
Two key questions:
• Is the interference with freedom of expression,
necessary and proportionate to other objectives such as
security?
• What is the potential for these powers to be applied in a
disproportionate manner which could lead to a breach
of internet users’ rights? (Source: UK Parliament, Joint Committee on
Human Rights 2010)
Respect for freedom of expression
Dr Monica Horten
Visiting Fellow, London School of Economics & Political Science
Blog: www.iptegrity.comTwitter: @Iptegrity
References:
Council of Europe Guide to Human Rights for Internet Users
http://www.coe.int/en/web/internet-users-rights/guide
Recommendation CM/Rec(2016)5 of the Committee of Ministers to
member States on Internet freedom
https://search.coe.int/cm/Pages/result_details.aspx?
ObjectId=09000016806415fa
---

Más contenido relacionado

La actualidad más candente

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human RightStresemann Stiftung
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
The Digital Millennium Copyright Act
The Digital Millennium Copyright ActThe Digital Millennium Copyright Act
The Digital Millennium Copyright Acttermsfeed
 
Freedom of Speech & Expression
Freedom of Speech & ExpressionFreedom of Speech & Expression
Freedom of Speech & Expressiongcundiff
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
Net Neutrality and the Future of the Internet
Net Neutrality and the Future of the InternetNet Neutrality and the Future of the Internet
Net Neutrality and the Future of the InternetMercatus Center
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 

La actualidad más candente (20)

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human Right
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Defamation on the Internet
Defamation on the InternetDefamation on the Internet
Defamation on the Internet
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Piracy
PiracyPiracy
Piracy
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Fundamental rights in nepal
Fundamental rights in nepalFundamental rights in nepal
Fundamental rights in nepal
 
The Digital Millennium Copyright Act
The Digital Millennium Copyright ActThe Digital Millennium Copyright Act
The Digital Millennium Copyright Act
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Freedom of Speech & Expression
Freedom of Speech & ExpressionFreedom of Speech & Expression
Freedom of Speech & Expression
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Net Neutrality and the Future of the Internet
Net Neutrality and the Future of the InternetNet Neutrality and the Future of the Internet
Net Neutrality and the Future of the Internet
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 

Similar a Freedom of expression on the internet

An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...Internet Society
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesFreedom House
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Terry Flew
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source SoftwareSeaparo Phala
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...beamatinet
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 

Similar a Freedom of expression on the internet (20)

Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunities
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 

Más de moldovaictsummit2016

Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticemoldovaictsummit2016
 
Genericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovaGenericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovamoldovaictsummit2016
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionmoldovaictsummit2016
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms daymoldovaictsummit2016
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlinemoldovaictsummit2016
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativamoldovaictsummit2016
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMmoldovaictsummit2016
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniationmoldovaictsummit2016
 
Large company as another startup alexei gutaga
Large company as another startup alexei gutagaLarge company as another startup alexei gutaga
Large company as another startup alexei gutagamoldovaictsummit2016
 

Más de moldovaictsummit2016 (20)

cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
 
ghidul parintelui responsabil
ghidul parintelui responsabilghidul parintelui responsabil
ghidul parintelui responsabil
 
Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informatice
 
Genericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovaGenericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldova
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare online
 
Xenia Siminciuc
Xenia Siminciuc Xenia Siminciuc
Xenia Siminciuc
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativa
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RM
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniation
 
Greating from ICANN
Greating from ICANNGreating from ICANN
Greating from ICANN
 
EMC avalability
EMC avalability EMC avalability
EMC avalability
 
Cisco safe
Cisco safeCisco safe
Cisco safe
 
EMC
EMCEMC
EMC
 
Cisco byod
Cisco byodCisco byod
Cisco byod
 
emc hyper converged
emc hyper convergedemc hyper converged
emc hyper converged
 
cisco collaboration
cisco collaborationcisco collaboration
cisco collaboration
 
Large company as another startup alexei gutaga
Large company as another startup alexei gutagaLarge company as another startup alexei gutaga
Large company as another startup alexei gutaga
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Freedom of expression on the internet

  • 1. Freedom of Expression on the Internet Council of Europe Standards Dr Monica Horten Visiting Fellow, London School of Economics & Political Science
  • 2. How do we communicate? In the 21st century
  • 3.
  • 4.
  • 5. Why freedom of expression applies to the Internet • The free communication of thoughts and opinions is one of most precious rights because it is a condition for democracy (France 1789 Declaration of the Rights of Man, Article 11) • In the modern State, the means of communication, and especially the development of public online services have an importance in democratic life and for the expression of ideas and opinions. • This right of free speech implies the liberty of access to such services. (French Constutional Court June 2009)
  • 6. The Internet, the law & human rights • Right to freedom of expression enshrined in European Convention on Human Rights (ECHR)Article 10 • Other important rights : – Article 11 Right to freedom of assembly and association – Article 8 Right to a private and family life – Article 6 Right to due process – European Court of Human Rights – Internet is the way we exercise these rights in the 21st century – Article 10 applies to blogging and social media, email and all forms of online communications
  • 7. Right to freedom of expression •Two-way right to impart and receive information •Without interference from a public authority •Applies ‘regardless of frontiers’ •May be balanced against other rights eg property, security • Any restriction should be prescribed by law, fulfil a legitimate aim, and be proportionate to that aim
  • 8. Freedom of access - Freedom of expression relies on open access to the networks - Creates opportunities for access to knowledge and creation - Disconnecting individuals is a restriction - Public networks should remain accessible at all times - And an infrastructure that is open - Enables people to create and build new technologies for communication, which in turn facilitate new opportunities for free speech. - anyone can build a new application and attach it to the network, without needing to ask permission - network providers should not technically discriminate between applications
  • 9. • Technological developments – Blocking, filtering and disconnection – Traffic management practices fast/slow lanes, deep packet inspection – Interception, back doors, – Traffic analysis, big data profiling, Key issues for human rights and the Internet
  • 11. Filtering ISP scans Internet traffic against database containing a blocklist of webpages, images or specific content • Users will be prevented from accessing content on the the blocklist Platforms and social media sites scan uploaded content agains pre-determined criteria •Files are taken down by the site owner Risk of over-blocking or taking down of legitimate content
  • 12. Cross-border issues • Upstream filtering • Technical errors such as routing error • DNS seizures have taken websites off-line worldwide • Possible implications for cloud services
  • 13. Freedom from Interference • Blocking & filtering may interfere with free speech and privacy rights • Blocking access to the Internet, or parts of the Internet, for whole populations or segments of the public can never be justified, including in the interests of justice, public order or national security. (Yildirim v Turkey ECtHR 2012) • Filtering indiscriminately, to all customers, as a preventative measure, for an unlimited time, would be a disproproportionate interference. (Scarlet Extended ECJ 2011)
  • 14. •Take down notices - law enforcement, copyright, defamation •Scan and filter - copyright enforcement •Filter search results - commercial interests •Backdoors - law enforcement, security services, copyright enforcement Freedom of expression, blogs & social media
  • 15. Essential State guarantees for online media •Online media should be able to publish without interference •Editorial independence •Confidentiality of journalists sources •May operate without permission from the State •Not harassed or pressured by State authorities •Without fear of restrictions imposed by State •Regulation proactively protects media freedoms •Applies to social networks, blogs, websites and online applications
  • 16. Freedom of expression & due process • Any measures to restrict the Internet must include a prior, fair and impartial hearin (right to due process •Balance against other rights eg property, security •Any restriction should be prescribed by law, fulfil a legitimate aim, and be proportionate to that aim
  • 17. Two key questions: • Is the interference with freedom of expression, necessary and proportionate to other objectives such as security? • What is the potential for these powers to be applied in a disproportionate manner which could lead to a breach of internet users’ rights? (Source: UK Parliament, Joint Committee on Human Rights 2010) Respect for freedom of expression
  • 18. Dr Monica Horten Visiting Fellow, London School of Economics & Political Science Blog: www.iptegrity.comTwitter: @Iptegrity References: Council of Europe Guide to Human Rights for Internet Users http://www.coe.int/en/web/internet-users-rights/guide Recommendation CM/Rec(2016)5 of the Committee of Ministers to member States on Internet freedom https://search.coe.int/cm/Pages/result_details.aspx? ObjectId=09000016806415fa ---

Notas del editor

  1. <number>
  2. <number> ----
  3. ----
  4. ---