SlideShare a Scribd company logo
1 of 10
Human rights and Internet
      regulation

                  Dr Ian Brown
             Oxford Internet Institute
              University of Oxford
The revolution will be tweeted?
Key constitutional protections
Reaffirming their profound belief    extending the ground of public
in those fundamental freedoms        confidence in the Government,
which are the foundation of          will best insure the beneficent
justice and peace in the world:      ends of its institution…
…
§8 Everyone has the right to         I: Congress shall make no law
respect for his private and family
life, his home and his               respecting an establishment of
correspondence                       religion, or prohibiting the free
                                     exercise thereof; or abridging the
§9 Everyone has the right to         freedom of speech, or of the
freedom of thought, conscience       press; or the right of the people
and religion                         peaceably to assemble
§10 Everyone has the right to        IV: The right of the people to be
freedom of expression                secure in their persons, houses,
                                     papers, and effects, against
§11 Everyone has the right to        unreasonable searches and
freedom of peaceful assembly         seizures, shall not be violated
and to freedom of association        (US Bill of Rights, 1791)
with others (ECHR, 1950)
Protecting free speech
 US Communications
   Decency Act of 1996; Child
   Online Protection Act of
   1998
 UK Internet Watch
   Foundation and CleanFeed
 Australia trying to block
   access to sites “unsuitable
   for children” and “unsuitable
   for adults”
 Great Firewall of China
 Disconnecting Burma
                                   Flickr user racoles (2007)
Libel tourism
 London has become the international venue of choice
  for defamation cases (Abrams, 2009)
 “The practice of libel tourism…is now an international
  scandal. It shames Britain and makes a mockery of the
  idea that Britain is a protector of core democratic
  freedoms.” –Dennis McShane MP
 Laws “served to discourage critical media reporting on
  matters of serious public interest, adversely affecting
  the ability of scholars and journalists to publish their
  work” –UN Human Rights Committee
Protecting privacy
 Privacy critical for freedom of
  expression, conscience and
  association

 If data can be collected about
  individuals, there will be
  government pressure to store,
  enhance and access that
  information

 E.g. PATRIOT Act National
  Security Letters, NSA activities
  within the US, EU data retention
  directive, National DNA Database
Promoting accountability
 “Publicity is justly commended as
  a remedy for social and industrial
  diseases. Sunlight is said to be
  the best of disinfectants; electric
  light the most efficient
  policeman.” –Justice Louis
  Brandeis (1913)
 Duck islands and moat cleaning
 Surveillance v sousveillance
Protecting young people
 “Sexual predation in all its forms…is an abhorrent crime…
  cases typically involved post-pubescent youth who were
  aware that they were meeting an adult male for the purpose
  of engaging in sexual activity”
 “Bullying and harassment…are the most frequent threats
  that minors face”
 “Unwanted exposure to pornography does occur online, but
  those most likely to be exposed are those seeking it out,
  such as older male minors.”
 “Those…most at risk often engage in risky behaviors and
  have difficulties in other parts of their lives.”


               Palfrey, Sacco, boyd & DeBonis (2009) pp.4—5
Conclusions
 Privacy and freedom of expression, conscience and association
   are core, mutually interdependent human rights

 Governments play a key role in promoting these values:
    By legislating their protection
    By avoiding legislation and technological mandates that facilitate
      surveillance and censorship

 Free speech and information are critical for ensuring government
   accountability

 Young people can best be protected online by strategies designed
   around detailed understanding of threats and their own needs
References
R. Deibert, J. Palfrey, R. Rohozinski, J. Zittrain (eds.) Access Denied: The
   Practice and Policy of Global Internet Filtering, MIT Press, 2008.
I. Brown. Internet filtering — be careful what you ask for. In Kirca, S and
    Hanson, L. (eds.) Freedom and Prejudice: Approaches to Media and
    Culture, Bahcesehir University Press, 2008 pp.74—91.
J. Palfrey, D. Sacco, d. boyd, L. DeBonis. Enhancing Child Safety and Online
    Technologies, Final Report of the Internet Safety Technical Task Force,
    Harvard University, 2009.
I. Brown. Regulation of Converged Communications Surveillance. In B. Goold
    and D. Neyland (eds.) New Directions in Privacy and Surveillance, Willan,
    2009 pp.39—73.
F. Abrams, Through the looking glass. Index on Censorship, 1, 2009.

More Related Content

What's hot

Freedom of expression and public interest in media
Freedom of expression and public interest in mediaFreedom of expression and public interest in media
Freedom of expression and public interest in mediaIrena Držanič
 
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)EmmanuelGillet
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.noeliaiiiiii
 
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Shreedeep Rayamajhi
 
Freedom Of Expression
Freedom Of ExpressionFreedom Of Expression
Freedom Of ExpressionMegan O'Flynn
 
Limitations of press freedom
Limitations of press freedomLimitations of press freedom
Limitations of press freedomJulianne Cortez
 
Freedom of Expression
Freedom of Expression Freedom of Expression
Freedom of Expression Nav Kaur
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI CenturyJyrki Kasvi
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Legal controls and freedom of expression
Legal controls and freedom of expression Legal controls and freedom of expression
Legal controls and freedom of expression Dr. Aitza Haddad Nuñez
 
Freedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expressionFreedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expressionMartin Hirst
 

What's hot (17)

Freedom of expression and public interest in media
Freedom of expression and public interest in mediaFreedom of expression and public interest in media
Freedom of expression and public interest in media
 
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.
 
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
 
Freedom of Expression, Media and Journalism under the European Human Rights S...
Freedom of Expression, Media and Journalism under the European Human Rights S...Freedom of Expression, Media and Journalism under the European Human Rights S...
Freedom of Expression, Media and Journalism under the European Human Rights S...
 
Online freedom of expression
Online freedom of expressionOnline freedom of expression
Online freedom of expression
 
Freedom Of Expression
Freedom Of ExpressionFreedom Of Expression
Freedom Of Expression
 
Limitations of press freedom
Limitations of press freedomLimitations of press freedom
Limitations of press freedom
 
Freedom of Expression
Freedom of Expression Freedom of Expression
Freedom of Expression
 
What is public in the digital age?
What is public in the digital age?What is public in the digital age?
What is public in the digital age?
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Legal controls and freedom of expression
Legal controls and freedom of expression Legal controls and freedom of expression
Legal controls and freedom of expression
 
Freedom of Speech
Freedom of SpeechFreedom of Speech
Freedom of Speech
 
Freedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expressionFreedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expression
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
blind to threats
blind to threatsblind to threats
blind to threats
 

Similar to Human Rights And Internet Regulation

Westby the role of science and technology as empowerment
Westby the role of science and technology as empowermentWestby the role of science and technology as empowerment
Westby the role of science and technology as empowermentDr Lendy Spires
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateDr Lendy Spires
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 
Mac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lectureMac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lectureRob Jewitt
 
Freedom of access to information and privacy
Freedom of access to information and privacyFreedom of access to information and privacy
Freedom of access to information and privacyUET Peshawar pakistan
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextInfo_Studies_Aberystwyth
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 

Similar to Human Rights And Internet Regulation (13)

Westby the role of science and technology as empowerment
Westby the role of science and technology as empowermentWestby the role of science and technology as empowerment
Westby the role of science and technology as empowerment
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
Human rights
Human rightsHuman rights
Human rights
 
Final work
Final workFinal work
Final work
 
Mac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lectureMac201 spies and whistleblowers lecture
Mac201 spies and whistleblowers lecture
 
Freedom of access to information and privacy
Freedom of access to information and privacyFreedom of access to information and privacy
Freedom of access to information and privacy
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
15.03.2015 (1)
15.03.2015 (1)15.03.2015 (1)
15.03.2015 (1)
 
12.pptx
12.pptx12.pptx
12.pptx
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
PIAFinalPaper
PIAFinalPaperPIAFinalPaper
PIAFinalPaper
 

More from blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Human Rights And Internet Regulation

  • 1. Human rights and Internet regulation Dr Ian Brown Oxford Internet Institute University of Oxford
  • 2. The revolution will be tweeted?
  • 3. Key constitutional protections Reaffirming their profound belief extending the ground of public in those fundamental freedoms confidence in the Government, which are the foundation of will best insure the beneficent justice and peace in the world: ends of its institution… … §8 Everyone has the right to I: Congress shall make no law respect for his private and family life, his home and his respecting an establishment of correspondence religion, or prohibiting the free exercise thereof; or abridging the §9 Everyone has the right to freedom of speech, or of the freedom of thought, conscience press; or the right of the people and religion peaceably to assemble §10 Everyone has the right to IV: The right of the people to be freedom of expression secure in their persons, houses, papers, and effects, against §11 Everyone has the right to unreasonable searches and freedom of peaceful assembly seizures, shall not be violated and to freedom of association (US Bill of Rights, 1791) with others (ECHR, 1950)
  • 4. Protecting free speech  US Communications Decency Act of 1996; Child Online Protection Act of 1998  UK Internet Watch Foundation and CleanFeed  Australia trying to block access to sites “unsuitable for children” and “unsuitable for adults”  Great Firewall of China  Disconnecting Burma Flickr user racoles (2007)
  • 5. Libel tourism  London has become the international venue of choice for defamation cases (Abrams, 2009)  “The practice of libel tourism…is now an international scandal. It shames Britain and makes a mockery of the idea that Britain is a protector of core democratic freedoms.” –Dennis McShane MP  Laws “served to discourage critical media reporting on matters of serious public interest, adversely affecting the ability of scholars and journalists to publish their work” –UN Human Rights Committee
  • 6. Protecting privacy  Privacy critical for freedom of expression, conscience and association  If data can be collected about individuals, there will be government pressure to store, enhance and access that information  E.g. PATRIOT Act National Security Letters, NSA activities within the US, EU data retention directive, National DNA Database
  • 7. Promoting accountability  “Publicity is justly commended as a remedy for social and industrial diseases. Sunlight is said to be the best of disinfectants; electric light the most efficient policeman.” –Justice Louis Brandeis (1913)  Duck islands and moat cleaning  Surveillance v sousveillance
  • 8. Protecting young people  “Sexual predation in all its forms…is an abhorrent crime… cases typically involved post-pubescent youth who were aware that they were meeting an adult male for the purpose of engaging in sexual activity”  “Bullying and harassment…are the most frequent threats that minors face”  “Unwanted exposure to pornography does occur online, but those most likely to be exposed are those seeking it out, such as older male minors.”  “Those…most at risk often engage in risky behaviors and have difficulties in other parts of their lives.” Palfrey, Sacco, boyd & DeBonis (2009) pp.4—5
  • 9. Conclusions  Privacy and freedom of expression, conscience and association are core, mutually interdependent human rights  Governments play a key role in promoting these values:  By legislating their protection  By avoiding legislation and technological mandates that facilitate surveillance and censorship  Free speech and information are critical for ensuring government accountability  Young people can best be protected online by strategies designed around detailed understanding of threats and their own needs
  • 10. References R. Deibert, J. Palfrey, R. Rohozinski, J. Zittrain (eds.) Access Denied: The Practice and Policy of Global Internet Filtering, MIT Press, 2008. I. Brown. Internet filtering — be careful what you ask for. In Kirca, S and Hanson, L. (eds.) Freedom and Prejudice: Approaches to Media and Culture, Bahcesehir University Press, 2008 pp.74—91. J. Palfrey, D. Sacco, d. boyd, L. DeBonis. Enhancing Child Safety and Online Technologies, Final Report of the Internet Safety Technical Task Force, Harvard University, 2009. I. Brown. Regulation of Converged Communications Surveillance. In B. Goold and D. Neyland (eds.) New Directions in Privacy and Surveillance, Willan, 2009 pp.39—73. F. Abrams, Through the looking glass. Index on Censorship, 1, 2009.