SlideShare a Scribd company logo
1 of 18
Freedom of Expression on the Internet
Council of Europe Standards
Dr Monica Horten
Visiting Fellow, London School of Economics & Political Science
How do we communicate?
In the 21st
century
Why freedom of expression applies to the Internet
• The free communication of thoughts and opinions is one of most
precious rights because it is a condition for democracy
(France 1789 Declaration of the Rights of Man, Article 11)
• In the modern State, the means of communication, and especially
the development of public online services have an importance in
democratic life and for the expression of ideas and opinions.
• This right of free speech implies the liberty of access to such
services.
(French Constutional Court June 2009)
The Internet, the law & human rights
• Right to freedom of expression enshrined in European
Convention on Human Rights (ECHR)Article 10
• Other important rights :
– Article 11 Right to freedom of assembly and association
– Article 8 Right to a private and family life
– Article 6 Right to due process
– European Court of Human Rights
– Internet is the way we exercise these rights in the 21st century
– Article 10 applies to blogging and social media, email and all forms of online
communications
Right to freedom of expression
•Two-way right to impart and receive information
•Without interference from a public authority
•Applies ‘regardless of frontiers’
•May be balanced against other rights eg property, security
• Any restriction should be prescribed by law, fulfil a legitimate
aim, and be proportionate to that aim
Freedom of access
- Freedom of expression relies on open access to the networks
- Creates opportunities for access to knowledge and creation
- Disconnecting individuals is a restriction
- Public networks should remain accessible at all times
- And an infrastructure that is open
- Enables people to create and build new technologies for communication,
which in turn facilitate new opportunities for free speech.
- anyone can build a new application and attach it to the network, without
needing to ask permission
- network providers should not technically discriminate between applications
• Technological
developments
– Blocking, filtering and
disconnection
– Traffic management practices
fast/slow lanes, deep packet
inspection
– Interception, back doors,
– Traffic analysis, big data
profiling,
Key issues for human rights and the Internet
Blocking
Filtering
ISP scans Internet traffic against database containing a
blocklist of webpages, images or specific content
• Users will be prevented from accessing content on the the
blocklist
Platforms and social media sites scan uploaded content agains
pre-determined criteria
•Files are taken down by the site owner
Risk of over-blocking or taking down of legitimate content
Cross-border issues
• Upstream filtering
• Technical errors such as routing error
• DNS seizures have taken websites off-line worldwide
• Possible implications for cloud services
Freedom from Interference
• Blocking & filtering may interfere with free speech and privacy
rights
• Blocking access to the Internet, or parts of the Internet, for whole
populations or segments of the public can never be justified, including in
the interests of justice, public order or national security.
(Yildirim v Turkey ECtHR 2012)
• Filtering indiscriminately, to all customers, as a preventative measure, for an
unlimited time, would be a disproproportionate interference.
(Scarlet Extended ECJ 2011)
•Take down notices - law enforcement, copyright,
defamation
•Scan and filter - copyright enforcement
•Filter search results - commercial interests
•Backdoors - law enforcement, security services,
copyright enforcement
Freedom of expression, blogs & social media
Essential State guarantees for online media
•Online media should be able to publish without interference
•Editorial independence
•Confidentiality of journalists sources
•May operate without permission from the State
•Not harassed or pressured by State authorities
•Without fear of restrictions imposed by State
•Regulation proactively protects media freedoms
•Applies to social networks, blogs, websites and online
applications
Freedom of expression & due process
• Any measures to restrict the Internet
must include a prior, fair and impartial
hearin (right to due process
•Balance against other rights eg property, security
•Any restriction should be prescribed by law, fulfil a
legitimate aim, and be proportionate to that aim
Two key questions:
• Is the interference with freedom of expression,
necessary and proportionate to other objectives such as
security?
• What is the potential for these powers to be applied in a
disproportionate manner which could lead to a breach
of internet users’ rights? (Source: UK Parliament, Joint Committee on
Human Rights 2010)
Respect for freedom of expression
Dr Monica Horten
Visiting Fellow, London School of Economics & Political Science
Blog: www.iptegrity.comTwitter: @Iptegrity
References:
Council of Europe Guide to Human Rights for Internet Users
http://www.coe.int/en/web/internet-users-rights/guide
Recommendation CM/Rec(2016)5 of the Committee of Ministers to
member States on Internet freedom
https://search.coe.int/cm/Pages/result_details.aspx?
ObjectId=09000016806415fa
---

More Related Content

What's hot

Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internetno0orcom
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human RightStresemann Stiftung
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Overview of Death Penalty
Overview of Death Penalty Overview of Death Penalty
Overview of Death Penalty Shantanu Basu
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanShahzaib Mahesar
 
Presentation on the European Court of Human Rights
Presentation on the European Court of Human RightsPresentation on the European Court of Human Rights
Presentation on the European Court of Human RightsJo No
 
Lasten ja nuorten somemaailma ja pelit
Lasten ja nuorten somemaailma ja pelitLasten ja nuorten somemaailma ja pelit
Lasten ja nuorten somemaailma ja pelitHarto Pönkä
 
Net Neutrality
Net NeutralityNet Neutrality
Net NeutralitySourav Dey
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
 
Refugee Rights and Problems
Refugee Rights and ProblemsRefugee Rights and Problems
Refugee Rights and ProblemsNilendra Kumar
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.noeliaiiiiii
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Week 4: Terrorism and human rights
Week 4: Terrorism and human rightsWeek 4: Terrorism and human rights
Week 4: Terrorism and human rightskamila_fraser
 

What's hot (20)

Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internet
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human Right
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Defamation
DefamationDefamation
Defamation
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Overview of Death Penalty
Overview of Death Penalty Overview of Death Penalty
Overview of Death Penalty
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Presentation on the European Court of Human Rights
Presentation on the European Court of Human RightsPresentation on the European Court of Human Rights
Presentation on the European Court of Human Rights
 
Lasten ja nuorten somemaailma ja pelit
Lasten ja nuorten somemaailma ja pelitLasten ja nuorten somemaailma ja pelit
Lasten ja nuorten somemaailma ja pelit
 
Net Neutrality
Net NeutralityNet Neutrality
Net Neutrality
 
Contempt of court
Contempt of courtContempt of court
Contempt of court
 
Eu Immigration
Eu ImmigrationEu Immigration
Eu Immigration
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
 
Refugee Rights and Problems
Refugee Rights and ProblemsRefugee Rights and Problems
Refugee Rights and Problems
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Week 4: Terrorism and human rights
Week 4: Terrorism and human rightsWeek 4: Terrorism and human rights
Week 4: Terrorism and human rights
 
Fundamental rights in nepal
Fundamental rights in nepalFundamental rights in nepal
Fundamental rights in nepal
 

Similar to Freedom of expression on the internet

An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...Internet Society
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesFreedom House
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Terry Flew
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source SoftwareSeaparo Phala
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...beamatinet
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 

Similar to Freedom of expression on the internet (20)

Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
Policies impacting the Internet in Europe - An ISOC European Regional Bureau...
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunities
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 

More from moldovaictsummit2016

Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticemoldovaictsummit2016
 
Genericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovaGenericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovamoldovaictsummit2016
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionmoldovaictsummit2016
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms daymoldovaictsummit2016
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlinemoldovaictsummit2016
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativamoldovaictsummit2016
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMmoldovaictsummit2016
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniationmoldovaictsummit2016
 
Large company as another startup alexei gutaga
Large company as another startup alexei gutagaLarge company as another startup alexei gutaga
Large company as another startup alexei gutagamoldovaictsummit2016
 

More from moldovaictsummit2016 (20)

cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
 
ghidul parintelui responsabil
ghidul parintelui responsabilghidul parintelui responsabil
ghidul parintelui responsabil
 
Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informatice
 
Genericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldovaGenericul şi specificul crimelor cibernetice în republica moldova
Genericul şi specificul crimelor cibernetice în republica moldova
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare online
 
Xenia Siminciuc
Xenia Siminciuc Xenia Siminciuc
Xenia Siminciuc
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativa
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RM
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniation
 
Greating from ICANN
Greating from ICANNGreating from ICANN
Greating from ICANN
 
EMC avalability
EMC avalability EMC avalability
EMC avalability
 
Cisco safe
Cisco safeCisco safe
Cisco safe
 
EMC
EMCEMC
EMC
 
Cisco byod
Cisco byodCisco byod
Cisco byod
 
emc hyper converged
emc hyper convergedemc hyper converged
emc hyper converged
 
cisco collaboration
cisco collaborationcisco collaboration
cisco collaboration
 
Large company as another startup alexei gutaga
Large company as another startup alexei gutagaLarge company as another startup alexei gutaga
Large company as another startup alexei gutaga
 

Recently uploaded

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

Freedom of expression on the internet

  • 1. Freedom of Expression on the Internet Council of Europe Standards Dr Monica Horten Visiting Fellow, London School of Economics & Political Science
  • 2. How do we communicate? In the 21st century
  • 3.
  • 4.
  • 5. Why freedom of expression applies to the Internet • The free communication of thoughts and opinions is one of most precious rights because it is a condition for democracy (France 1789 Declaration of the Rights of Man, Article 11) • In the modern State, the means of communication, and especially the development of public online services have an importance in democratic life and for the expression of ideas and opinions. • This right of free speech implies the liberty of access to such services. (French Constutional Court June 2009)
  • 6. The Internet, the law & human rights • Right to freedom of expression enshrined in European Convention on Human Rights (ECHR)Article 10 • Other important rights : – Article 11 Right to freedom of assembly and association – Article 8 Right to a private and family life – Article 6 Right to due process – European Court of Human Rights – Internet is the way we exercise these rights in the 21st century – Article 10 applies to blogging and social media, email and all forms of online communications
  • 7. Right to freedom of expression •Two-way right to impart and receive information •Without interference from a public authority •Applies ‘regardless of frontiers’ •May be balanced against other rights eg property, security • Any restriction should be prescribed by law, fulfil a legitimate aim, and be proportionate to that aim
  • 8. Freedom of access - Freedom of expression relies on open access to the networks - Creates opportunities for access to knowledge and creation - Disconnecting individuals is a restriction - Public networks should remain accessible at all times - And an infrastructure that is open - Enables people to create and build new technologies for communication, which in turn facilitate new opportunities for free speech. - anyone can build a new application and attach it to the network, without needing to ask permission - network providers should not technically discriminate between applications
  • 9. • Technological developments – Blocking, filtering and disconnection – Traffic management practices fast/slow lanes, deep packet inspection – Interception, back doors, – Traffic analysis, big data profiling, Key issues for human rights and the Internet
  • 11. Filtering ISP scans Internet traffic against database containing a blocklist of webpages, images or specific content • Users will be prevented from accessing content on the the blocklist Platforms and social media sites scan uploaded content agains pre-determined criteria •Files are taken down by the site owner Risk of over-blocking or taking down of legitimate content
  • 12. Cross-border issues • Upstream filtering • Technical errors such as routing error • DNS seizures have taken websites off-line worldwide • Possible implications for cloud services
  • 13. Freedom from Interference • Blocking & filtering may interfere with free speech and privacy rights • Blocking access to the Internet, or parts of the Internet, for whole populations or segments of the public can never be justified, including in the interests of justice, public order or national security. (Yildirim v Turkey ECtHR 2012) • Filtering indiscriminately, to all customers, as a preventative measure, for an unlimited time, would be a disproproportionate interference. (Scarlet Extended ECJ 2011)
  • 14. •Take down notices - law enforcement, copyright, defamation •Scan and filter - copyright enforcement •Filter search results - commercial interests •Backdoors - law enforcement, security services, copyright enforcement Freedom of expression, blogs & social media
  • 15. Essential State guarantees for online media •Online media should be able to publish without interference •Editorial independence •Confidentiality of journalists sources •May operate without permission from the State •Not harassed or pressured by State authorities •Without fear of restrictions imposed by State •Regulation proactively protects media freedoms •Applies to social networks, blogs, websites and online applications
  • 16. Freedom of expression & due process • Any measures to restrict the Internet must include a prior, fair and impartial hearin (right to due process •Balance against other rights eg property, security •Any restriction should be prescribed by law, fulfil a legitimate aim, and be proportionate to that aim
  • 17. Two key questions: • Is the interference with freedom of expression, necessary and proportionate to other objectives such as security? • What is the potential for these powers to be applied in a disproportionate manner which could lead to a breach of internet users’ rights? (Source: UK Parliament, Joint Committee on Human Rights 2010) Respect for freedom of expression
  • 18. Dr Monica Horten Visiting Fellow, London School of Economics & Political Science Blog: www.iptegrity.comTwitter: @Iptegrity References: Council of Europe Guide to Human Rights for Internet Users http://www.coe.int/en/web/internet-users-rights/guide Recommendation CM/Rec(2016)5 of the Committee of Ministers to member States on Internet freedom https://search.coe.int/cm/Pages/result_details.aspx? ObjectId=09000016806415fa ---

Editor's Notes

  1. <number>
  2. <number> ----
  3. ----
  4. ---