SlideShare a Scribd company logo
Freedom of Expression on the Internet
Council of Europe Standards
Dr Monica Horten
Visiting Fellow, London School of Economics & Political Science
How do we communicate?
In the 21st
century
Why freedom of expression applies to the Internet
• The free communication of thoughts and opinions is one of most
precious rights because it is a condition for democracy
(France 1789 Declaration of the Rights of Man, Article 11)
• In the modern State, the means of communication, and especially
the development of public online services have an importance in
democratic life and for the expression of ideas and opinions.
• This right of free speech implies the liberty of access to such
services.
(French Constutional Court June 2009)
The Internet, the law & human rights
• Right to freedom of expression enshrined in European
Convention on Human Rights (ECHR)Article 10
• Other important rights :
– Article 11 Right to freedom of assembly and association
– Article 8 Right to a private and family life
– Article 6 Right to due process
– European Court of Human Rights
– Internet is the way we exercise these rights in the 21st century
– Article 10 applies to blogging and social media, email and all forms of online
communications
Right to freedom of expression
•Two-way right to impart and receive information
•Without interference from a public authority
•Applies ‘regardless of frontiers’
•May be balanced against other rights eg property, security
• Any restriction should be prescribed by law, fulfil a legitimate
aim, and be proportionate to that aim
Freedom of access
- Freedom of expression relies on open access to the networks
- Creates opportunities for access to knowledge and creation
- Disconnecting individuals is a restriction
- Public networks should remain accessible at all times
- And an infrastructure that is open
- Enables people to create and build new technologies for communication,
which in turn facilitate new opportunities for free speech.
- anyone can build a new application and attach it to the network, without
needing to ask permission
- network providers should not technically discriminate between applications
• Technological
developments
– Blocking, filtering and
disconnection
– Traffic management practices
fast/slow lanes, deep packet
inspection
– Interception, back doors,
– Traffic analysis, big data
profiling,
Key issues for human rights and the Internet
Blocking
Filtering
ISP scans Internet traffic against database containing a
blocklist of webpages, images or specific content
• Users will be prevented from accessing content on the the
blocklist
Platforms and social media sites scan uploaded content agains
pre-determined criteria
•Files are taken down by the site owner
Risk of over-blocking or taking down of legitimate content
Cross-border issues
• Upstream filtering
• Technical errors such as routing error
• DNS seizures have taken websites off-line worldwide
• Possible implications for cloud services
Freedom from Interference
• Blocking & filtering may interfere with free speech and privacy
rights
• Blocking access to the Internet, or parts of the Internet, for whole
populations or segments of the public can never be justified, including in
the interests of justice, public order or national security.
(Yildirim v Turkey ECtHR 2012)
• Filtering indiscriminately, to all customers, as a preventative measure, for an
unlimited time, would be a disproproportionate interference.
(Scarlet Extended ECJ 2011)
•Take down notices - law enforcement, copyright,
defamation
•Scan and filter - copyright enforcement
•Filter search results - commercial interests
•Backdoors - law enforcement, security services,
copyright enforcement
Freedom of expression, blogs & social media
Essential State guarantees for online media
•Online media should be able to publish without interference
•Editorial independence
•Confidentiality of journalists sources
•May operate without permission from the State
•Not harassed or pressured by State authorities
•Without fear of restrictions imposed by State
•Regulation proactively protects media freedoms
•Applies to social networks, blogs, websites and online
applications
Freedom of expression & due process
• Any measures to restrict the Internet
must include a prior, fair and impartial
hearin (right to due process
•Balance against other rights eg property, security
•Any restriction should be prescribed by law, fulfil a
legitimate aim, and be proportionate to that aim
Two key questions:
• Is the interference with freedom of expression,
necessary and proportionate to other objectives such as
security?
• What is the potential for these powers to be applied in a
disproportionate manner which could lead to a breach
of internet users’ rights? (Source: UK Parliament, Joint Committee on
Human Rights 2010)
Respect for freedom of expression
Dr Monica Horten
Visiting Fellow, London School of Economics & Political Science
Blog: www.iptegrity.comTwitter: @Iptegrity
References:
Council of Europe Guide to Human Rights for Internet Users
http://www.coe.int/en/web/internet-users-rights/guide
Recommendation CM/Rec(2016)5 of the Committee of Ministers to
member States on Internet freedom
https://search.coe.int/cm/Pages/result_details.aspx?
ObjectId=09000016806415fa
---

More Related Content

What's hot

Right to Information in Pakistan
Right to Information in PakistanRight to Information in Pakistan
Right to Information in Pakistan
Muhammad Rawaha Saleem
 
IPR – An Overview, Copyright Issues in Cyberspace
IPR – An Overview, Copyright Issues in Cyberspace IPR – An Overview, Copyright Issues in Cyberspace
IPR – An Overview, Copyright Issues in Cyberspace
Dr. Prashant Vats
 
Freedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitutionFreedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitution
Bangladesh University of Professionals
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
moldovaictsummit2016
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
Uc Man
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
Upekha Vandebona
 
Article 19 the constitution of india
Article 19   the constitution of indiaArticle 19   the constitution of india
Article 19 the constitution of india
Gaurav Patel
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
Tushar Rajput
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
Mark Jhon Oxillo
 
Article 19
Article 19Article 19
Article 19
Shivani Sharma
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Nature and scope of protection of copyright
Nature and scope of protection of copyrightNature and scope of protection of copyright
Nature and scope of protection of copyright
Vikash Kumar
 
Basic of Administrative law
 Basic of Administrative law Basic of Administrative law
Basic of Administrative law
Keshav Choudhary
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
julianykanen
 
Obscenity and Indecency
Obscenity and IndecencyObscenity and Indecency
Obscenity and IndecencyMiriam Smith
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
Upekha Vandebona
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 

What's hot (20)

Right to Information in Pakistan
Right to Information in PakistanRight to Information in Pakistan
Right to Information in Pakistan
 
IPR – An Overview, Copyright Issues in Cyberspace
IPR – An Overview, Copyright Issues in Cyberspace IPR – An Overview, Copyright Issues in Cyberspace
IPR – An Overview, Copyright Issues in Cyberspace
 
Freedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitutionFreedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitution
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Article 19 the constitution of india
Article 19   the constitution of indiaArticle 19   the constitution of india
Article 19 the constitution of india
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Article 19
Article 19Article 19
Article 19
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Nature and scope of protection of copyright
Nature and scope of protection of copyrightNature and scope of protection of copyright
Nature and scope of protection of copyright
 
Basic of Administrative law
 Basic of Administrative law Basic of Administrative law
Basic of Administrative law
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Obscenity and Indecency
Obscenity and IndecencyObscenity and Indecency
Obscenity and Indecency
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 

Similar to Freedom of expression on the internet

4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
Katy Kate
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
Dibussi Tande
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Internet Society
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
Luca De Biase
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
CRO Cyber Rights Organization
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunities
Freedom House
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
MuhammadAbdullah311866
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
Wendy Qi
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015
Terry Flew
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
Seaparo Phala
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
beamatinet
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 

Similar to Freedom of expression on the internet (20)

Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunities
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 

More from moldovaictsummit2016

cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
moldovaictsummit2016
 
ghidul parintelui responsabil
ghidul parintelui responsabilghidul parintelui responsabil
ghidul parintelui responsabil
moldovaictsummit2016
 
Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informatice
moldovaictsummit2016
 
Genericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovaGenericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldova
moldovaictsummit2016
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
moldovaictsummit2016
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
moldovaictsummit2016
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
moldovaictsummit2016
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare online
moldovaictsummit2016
 
Xenia Siminciuc
Xenia Siminciuc Xenia Siminciuc
Xenia Siminciuc
moldovaictsummit2016
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativa
moldovaictsummit2016
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RM
moldovaictsummit2016
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniation
moldovaictsummit2016
 
Greating from ICANN
Greating from ICANNGreating from ICANN
Greating from ICANN
moldovaictsummit2016
 
EMC avalability
EMC avalability EMC avalability
EMC avalability
moldovaictsummit2016
 
Cisco safe
Cisco safeCisco safe
EMC
EMCEMC
Cisco byod
Cisco byodCisco byod
emc hyper converged
emc hyper convergedemc hyper converged
emc hyper converged
moldovaictsummit2016
 
cisco collaboration
cisco collaborationcisco collaboration
cisco collaboration
moldovaictsummit2016
 
Large company as another startup alexei gutaga
Large company as another startup alexei gutagaLarge company as another startup alexei gutaga
Large company as another startup alexei gutaga
moldovaictsummit2016
 

More from moldovaictsummit2016 (20)

cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
 
ghidul parintelui responsabil
ghidul parintelui responsabilghidul parintelui responsabil
ghidul parintelui responsabil
 
Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informatice
 
Genericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovaGenericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldova
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare online
 
Xenia Siminciuc
Xenia Siminciuc Xenia Siminciuc
Xenia Siminciuc
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativa
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RM
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniation
 
Greating from ICANN
Greating from ICANNGreating from ICANN
Greating from ICANN
 
EMC avalability
EMC avalability EMC avalability
EMC avalability
 
Cisco safe
Cisco safeCisco safe
Cisco safe
 
EMC
EMCEMC
EMC
 
Cisco byod
Cisco byodCisco byod
Cisco byod
 
emc hyper converged
emc hyper convergedemc hyper converged
emc hyper converged
 
cisco collaboration
cisco collaborationcisco collaboration
cisco collaboration
 
Large company as another startup alexei gutaga
Large company as another startup alexei gutagaLarge company as another startup alexei gutaga
Large company as another startup alexei gutaga
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Freedom of expression on the internet

  • 1. Freedom of Expression on the Internet Council of Europe Standards Dr Monica Horten Visiting Fellow, London School of Economics & Political Science
  • 2. How do we communicate? In the 21st century
  • 3.
  • 4.
  • 5. Why freedom of expression applies to the Internet • The free communication of thoughts and opinions is one of most precious rights because it is a condition for democracy (France 1789 Declaration of the Rights of Man, Article 11) • In the modern State, the means of communication, and especially the development of public online services have an importance in democratic life and for the expression of ideas and opinions. • This right of free speech implies the liberty of access to such services. (French Constutional Court June 2009)
  • 6. The Internet, the law & human rights • Right to freedom of expression enshrined in European Convention on Human Rights (ECHR)Article 10 • Other important rights : – Article 11 Right to freedom of assembly and association – Article 8 Right to a private and family life – Article 6 Right to due process – European Court of Human Rights – Internet is the way we exercise these rights in the 21st century – Article 10 applies to blogging and social media, email and all forms of online communications
  • 7. Right to freedom of expression •Two-way right to impart and receive information •Without interference from a public authority •Applies ‘regardless of frontiers’ •May be balanced against other rights eg property, security • Any restriction should be prescribed by law, fulfil a legitimate aim, and be proportionate to that aim
  • 8. Freedom of access - Freedom of expression relies on open access to the networks - Creates opportunities for access to knowledge and creation - Disconnecting individuals is a restriction - Public networks should remain accessible at all times - And an infrastructure that is open - Enables people to create and build new technologies for communication, which in turn facilitate new opportunities for free speech. - anyone can build a new application and attach it to the network, without needing to ask permission - network providers should not technically discriminate between applications
  • 9. • Technological developments – Blocking, filtering and disconnection – Traffic management practices fast/slow lanes, deep packet inspection – Interception, back doors, – Traffic analysis, big data profiling, Key issues for human rights and the Internet
  • 11. Filtering ISP scans Internet traffic against database containing a blocklist of webpages, images or specific content • Users will be prevented from accessing content on the the blocklist Platforms and social media sites scan uploaded content agains pre-determined criteria •Files are taken down by the site owner Risk of over-blocking or taking down of legitimate content
  • 12. Cross-border issues • Upstream filtering • Technical errors such as routing error • DNS seizures have taken websites off-line worldwide • Possible implications for cloud services
  • 13. Freedom from Interference • Blocking & filtering may interfere with free speech and privacy rights • Blocking access to the Internet, or parts of the Internet, for whole populations or segments of the public can never be justified, including in the interests of justice, public order or national security. (Yildirim v Turkey ECtHR 2012) • Filtering indiscriminately, to all customers, as a preventative measure, for an unlimited time, would be a disproproportionate interference. (Scarlet Extended ECJ 2011)
  • 14. •Take down notices - law enforcement, copyright, defamation •Scan and filter - copyright enforcement •Filter search results - commercial interests •Backdoors - law enforcement, security services, copyright enforcement Freedom of expression, blogs & social media
  • 15. Essential State guarantees for online media •Online media should be able to publish without interference •Editorial independence •Confidentiality of journalists sources •May operate without permission from the State •Not harassed or pressured by State authorities •Without fear of restrictions imposed by State •Regulation proactively protects media freedoms •Applies to social networks, blogs, websites and online applications
  • 16. Freedom of expression & due process • Any measures to restrict the Internet must include a prior, fair and impartial hearin (right to due process •Balance against other rights eg property, security •Any restriction should be prescribed by law, fulfil a legitimate aim, and be proportionate to that aim
  • 17. Two key questions: • Is the interference with freedom of expression, necessary and proportionate to other objectives such as security? • What is the potential for these powers to be applied in a disproportionate manner which could lead to a breach of internet users’ rights? (Source: UK Parliament, Joint Committee on Human Rights 2010) Respect for freedom of expression
  • 18. Dr Monica Horten Visiting Fellow, London School of Economics & Political Science Blog: www.iptegrity.comTwitter: @Iptegrity References: Council of Europe Guide to Human Rights for Internet Users http://www.coe.int/en/web/internet-users-rights/guide Recommendation CM/Rec(2016)5 of the Committee of Ministers to member States on Internet freedom https://search.coe.int/cm/Pages/result_details.aspx? ObjectId=09000016806415fa ---

Editor's Notes

  1. <number>
  2. <number> ----
  3. ----
  4. ---