The document discusses concerns about provisions in the Trans-Pacific Partnership Agreement regarding internet intermediary liability and restrictions on the free flow of online information. It notes that while free flow of information has economic benefits, it is also linked to complex issues of privacy, political considerations, and human rights that may not be best addressed in closed-door trade negotiations. The document advocates for balancing free expression with privacy protections, and ensuring any international framework respects sovereign countries' privacy laws and principles of informed consent.
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
Whether legal jurisdiction is able to check cyber-crime where there are no territorial borders and even where the criminal does not have any physical presence in the forum
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
In todays world every 2nd company must have suffered some form of Cyber Crime at some point of time. Should it be ignored or should it be dealt with Iron Hands. Is there anything a company can or must do to prevent this? Yes, where there are problems, there are solutions and our IT Act give you such solutions. What is required is awareness and this presentation is just an attempt to sensitize todays corporates to arise to this issue and deal with it effectively.
Internet Jurisdiction: Who controls the Internet?CubReporters.org
This presentation examines the legal conflicts that can arise due to the Internet being borderless and different countries having different laws. Possible solutions are offered.
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
Whether legal jurisdiction is able to check cyber-crime where there are no territorial borders and even where the criminal does not have any physical presence in the forum
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
In todays world every 2nd company must have suffered some form of Cyber Crime at some point of time. Should it be ignored or should it be dealt with Iron Hands. Is there anything a company can or must do to prevent this? Yes, where there are problems, there are solutions and our IT Act give you such solutions. What is required is awareness and this presentation is just an attempt to sensitize todays corporates to arise to this issue and deal with it effectively.
Internet Jurisdiction: Who controls the Internet?CubReporters.org
This presentation examines the legal conflicts that can arise due to the Internet being borderless and different countries having different laws. Possible solutions are offered.
O X Workshop NPT, esse ano, traz para discussão e aprofundamento o seguinte tema:.”Recursos Educacionais Abertos educam?” Este é um evento realizado anualmente, promovido pelo NPT – Research Group. Este evento já está na sua décima edição.
O X Workshop ocorrerá no dia 8 de Novembro, na Sala da Congregação da FEA-USP (em São Paulo) e está programado para 150 participantes, entre alunos de graduação, pós-graduação e profissionais da área.
O objetivo do evento é enriquecer a formação dos profissionais da área, através de palestras e discussões. Para tanto, contaremos com a presença de renomados profissionais, convidados de diversos institutos e universidades do estado de São Paulo e do Brasil. Este evento é destinado a estudantes e profissionais da área que buscam atualização e excelência na área e demais interessados.
A realização do X Workshop tem como objetivo a participação e incentivo a eventos científicos na área tecnológica e educacional.
Detalhes em http://workshop.npt.com.br.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
Net Neutrality Capacity Building SeminarExcel Asama
Promoting Net Neutrality through multi stakeholder capacity building and dialogue is project aimed at contributing to the construction of neutral networks and freedom of expression in Cameroon through training, awareness creation and multi stakeholder discussions.
Project funded by the Web We Want Campaign.
Website: www.netnogcm.net
This presentation is about how Internet can serve as a medium of dispute Resolution for various commercial and contractual disputes. Delivered at a CIAC conference in India by Cyberlaw expert, Karnika Seth it describes various ODR models available on Internet in India and other countries and discusses steps required to be adopted for its implementation in India .
Time to slow down? Measured respondes to the fake news crisismrleiser
A copy of my slides from the annual law and technlogy conference BILETA (British, Irish, Law, Education, and Technology Association) From 2018 in Aberdeen, Scotland
A Civil Rights Based Internet: From Brazil to the World
In a bold move, Brazil has given to the world a example - it passed into law the civil framework for the internet called Marco Civil. What are the lessons learned? Can we extract core values and languages from the Marco Civil that should be present in every legislation coming up in the next decade? Is Marco Civil a model to be followed? What is the importance of this mark to the region? What are the "ifs"? Join Brazilian and Latin Americans in this discussion.
Organizers: Carolina Rossini (Public Knowledge), Laura Tresca (Article 19) and Paz Peña (Derechos Digitales)
Sif14 How Trade Agreements Mess Up with Internet Freedoms Carolina Rossini
How Trade Agreements Mess Up with Internet Freedom
Time and time again, abusive copyright provisions have been successfully reproduced to multiple trade agreements. These binding instruments are expanding to cover core topics that traditionally were part of the broader internet governance sphere. The impact of these provisions on human rights and Internet are disastrous, but so few are paying attention. Forum shopping and policy laundering are happening at alarming rates as unpopular policies that would likely fail in national public forums are being cycled through non-transparent international negotiations that do not have the same standards of democratic oversight. Clear examples are the Trans Pacific Partnership Agreement, Korea-US trade agreement, the Canadian-EU Trade Agreement (CETA) and the Transatlantic Partnership. But the list goes on.
In a world of policy laundry and forum shopping, this panel aims to identify the challenges ahead for public interest organizations and build a strategy, created through dialogue, on how we should deal with the issues that will arise from these agreements.
Speakers will provide perspectives from different countries, but will foster debate on what could be core coordination and strategy efforts
1. Freedom of Expression, Indirect
Censorship & Liability for Internet
Intermediaries
Trans-Pacific Partnership Agreement
Leesburg, VA
09 September, 2012
Carolina Rossini
Director for International Intellectual Property
Electronic Frontier Foundation
3. Platforms and conduits for expression, A2K,
association, and commerce
ISPs Web hosts Search engines
Any website that
enables user
commentary
Registrars
DNS providers Cloud computing CDNs
Registries
Payment
intermediarie
s
4. TPP article 16.3 mandates a system of ISP liability that pushes a
framework beyond ACTA and possibly the spirit of the DMCA,
since it opens the doors for:
•Three-strikes policies and laws that require Internet intermediaries
to terminate their users’ Internet access on repeat allegations of
copyright infringement
•Requirements for Internet intermediaries to filter all Internet
communications for potentially copyright-infringing material
•ISP obligations to block access to websites that allegedly infringe
or facilitate copyright infringement
•Efforts to force intermediaries to disclose the identities of their
customers to IP rightsholders on an allegation of copyright
infringement.
8. Policies to Enhance Freedom of Expression
“Everyone has the right to freedom of opinion and
expression; this right includes freedom to hold
opinions without interference and to seek, receive and
impart information and ideas through any media and
regardless of frontiers.”
Article 19 of the Universal Declaration of Human
Rights
9. Policies to Enhance Freedom of Expression
To allow people to hold opinions without interference,
and to seek, receive and impart information, it is critical
to have the policy infrastructure that does not
impose liability on internet intermediaries for user
actions
10. Policies to Enhance Freedom of Expression
Role of Internet intermediaries:
• Facilitate communication
• Protect freedom of expression
• Provide avenues for democratic
participation
11. Policies to Enhance Freedom of Expression
• U.S has two primary internet liability protection laws
o Section 512 of the Digital Millennium Copyright Act
Protects ISPs against copyright claims
Notice and takedown without judicial review
o Section 230 of the Communications Decency Act
• Protects ISPs against state laws and most federal laws
12. Policies to Enhance Freedom of Expression
• Section 512 of the Digital Millennium Copyright Act
– Result of political process, balancing interests of the
copyright industry with the telecommunications industry
– Requires ISP to register with the Copyright Office to receive
protection
– Copyright holders can send notice to ISP to demand a
takedown
– ISP must remove for 10 to 14 days
– Content restored if user counter-notices -- unless copyright
holder files a lawsuit.
13. Policies to Enhance Freedom of Expression
• Section 512 has had unintended consequences
– While it has procedural safeguards, it has resulted in the
removal of significant amount of non-infringing material
– Allows for short-term censorship, without any judicial input
• Campaign videos
• Media criticism
• Personal non-commercial videos
– Many smaller sites fail to register with Copyright Office and
lose advantages
14. Policies to Enhance Freedom of Expression
• Economics of intermediaries are dependent on
scale.
• Benefit for an individual post is trivial
• Cost to have an employee assess the legality of
speech exceeds the profit from hosting that speech.
15. Policies to Enhance Freedom of Expression
• To maximize information availability, allow posting
without ex ante review
• User generated content websites cannot function
with delay (e.g.OER)
• Liability rules should allow services to edit and
moderate content without taking on liability
• Filtering is ineffective
– Network level filtering impacts privacy
16. Policies to Enhance Freedom of Expression
• Ex post review requires due process
• Notice and takedown risks creating censorship
regime
– Even short downtime impacts freedom of expression
• Most appropriate role is forwarding notices of alleged
infringement and then allowing the judicial system to
work
– This include protecting the privacy of posters
17. Policies to Enhance Freedom of Expression
• Heavy regulation can vastly
increase costs beyond the
ability of startups.
• Even if large companies have
technical and financial
capacity to take some
actions, small startups do not
18. Policies to Enhance Freedom of Expression
• To keep the pace of innovation, policy needs to
reduce costs for startups
• For jurisdictions who are trying to develop and
grow an online industry, policy structure is even
more important.
19. Privacy and Anonymity
• Due process for anonymous speech is critical for
freedom of expression
• Forced "identification and fear of reprisal might deter
perfectly peaceful discussions of public matters of
importance”
• “Anonymity is a shield from the tyranny of the
majority,” that “exemplifies the purpose” of freedom of
expression: “to protect unpopular individuals from
retaliation...at the hand of an intolerant society.”
20. Privacy and Anonymity
• Why is anonymity important?
• Wide variety of reasons
– Criticism of political figures, corporations, bureaucrats
– Stigma or embarrassment
• Opposition parties, victims of violence, AIDS sufferers,
survivors of abuse can use Internet to share sensitive and
personal information anonymously without fear of
embarrassment or harm
21. “On the Internet, nobody knows you’re a dog”
Peter Steiner, On the Internet, No One Knows You’re a Dog, The New Yorker, (Vol.69, no. 20) (July 5, 1993)
22. Privacy and Anonymity
• Internet intermediaries do know who’s a dog
• When a user posts content, third parties may want
to sue the use
• To sue the user, plaintiff must first identify the user
• Due process should protect identify users
• ISPs best practice is to provide notice to users, and
give time to allow for court review
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34. • The economic benefits of unimpeded
information flows are undeniable, and
emerging innovative cloud-based
platforms necessarily operate in
numerous jurisdictions at once,
meaning the free flow of information is a
necessary condition for their ongoing
existence.
36. 1. while free flow of information is good, we should
not sacrifice privacy.
2. intellectual property should not be a barrier for
free flow of information, balancing privacy and
free flow is for another forum and another day.
37. The Trans-Pacific Partnership agreement seeks to
adopt a general prohibition on restrictions to the
free flow of online information, raising several
questions regarding the role of trade agreements.
While the free flow of information has undeniable
economic and trade benefits, it is also inextricably
linked with complex social and political
considerations that might not be best resolved in
secretive, exclusive closed door trade negotiations.
38. Forum shopping
• The total number of new data privacy laws
globally, viewed by decade, shows that their
growth is accelerating, not merely expanding
linearly: 8 (1970s), 13 (1980s), 21 (1990s), 35
(2000s) and 12 (2 years of the 2010s), giving the
total of 89. [3]
• Is TPP the right place for this discussions???
39. • Privacy is a fundamental human right, and is central to the
maintenance of democratic societies. It is essential to human
dignity and it reinforces other rights, such as freedom of
expression and association, and is recognized under
international human rights law.(1)
• Activities that are contrary to the right to privacy, including the
surveillance by public authorities of personal communications,
can only be justified where they are necessary for a legitimate
aim, strictly proportionate, and prescribed by law.(2)
40. • Interesting framework:
Chile FTA with Australia and Colombia,
which requires countries to provide some
level of protection. (A "shall language" not
a "may language")
41. Which level? 3 acceptable frameworks:
"comparable safeguards” (UN Language) U.N. Doc. A/44/49
(1989)
"equivalent level of protection" (OECD language)
“adequate level of protection" (EU language).
However, in all cases the language must be an "at least"
not the "up-to” and "at least according to OECD principles".
42. Conclusions
• countries should not use trade agreements to
challenge privacy laws as trade barriers
• we need to make clear about what type of information
we are discussing when discussing “free-flow”, which
historically is related to cross-personal-data flow
• and if we want the language to go beyond cross-
data-flow and actually deal with freedom of
expression, the e-commerce chapter is a limited
venue for that
43. Conclusion
• In the 15th century, Gutenberg’s printing press formed
the initial basis for the knowledge-based economy
• As we enter the 21st Century we have the opportunity
to realize the full benefits of this knowledge economy
by adopting a legal framework supports and enables
the tools necessary for free expression, privacy and
innovation.