SlideShare a Scribd company logo
By Ghazala A Ajami
Internet Governance
An Inspiration by International Law
The Question of the Internet-Does it Assume Intervention in Society and State?

GLOBALIZED ACCESS OF
INFORMATION
Introduction
   Internet is a critical trans-boundary information
    resource that should be governed and protected like
    other common critical resources.
   Various risks may follow the internet infrastructure.
    These vary from technicalities to interstate disputes.
   Until this date, in an interstate context, there are no
    enforceable rights of internet access although we see
    initiatives to setting guidelines for internet governance.
Governance & Internet Filtering
   The WGIG Report and other documents
    produced in the WSIS/WGIG process are a solid
    basis for reflection on the main issues of
    Internet governance. The Tunis WSIS
    Declaration provides the necessary policy
    endorsement of the overall process and a
    possible basis for soft law status vs. real law of
    some agreed solutions.
Inspired by International Law
   Some internet governing principles were derived from
    the text on “Responsibility of States for Internationally
    Wrongful Acts” (2001) adopted by the International
    Law Commission.
   Article 2 – Elements of an internationally wrongful act
    of a State
   Article 31 – Reparation
   Article 49 – Object and limits of countermeasures
Who Filters? Public vs. Private
 Location, Quantity, and Manner of the filtering
  vary greatly
 Private parties are often centrally involved in
  Internet filtering
 filtering may occur through a completely private
  transaction or with some government
  involvement in some fashion
Law, Regulation, and Policy of Current
    Filtering Regimes
 The two components of a typical country’s
  filtering regime are a (1) justification for
  blocking certain material, and (2)a set of laws
  that enable filtering.
 Countries usually justify the laws that enable
  filtering by invoking one of two broad themes:
a. Upholding Community Standards
b. Ensuring National Security
Upholding Community Standards
   One of Singapore’s “main concerns” with the Internet is the ease of
    access to pornography by minors.
   South Korea banned content dealing with euthanasia and
    hacking, and, in a move that attracted widespread media
    attention, ordered local ISPs to block access to video footage of the
    gruesome beheading of a Korean hostage in Iraq.
   Legislation in India blocks sites that “appeal to the prurient interest,”
   Australian law prohibits sites that include “information about crime or
    drug use.”
   Egypt bans Internet content on “taboo issues” such as criticism of its
    president
   Uzbekistan prohibits accessing materials critical of the country’s
    president or based on religious extremism.
Ensuring National Security

   In China, protecting national security includes banning speech
    that could threaten “national unity.”
    Burma, Egypt, and Malaysia forbid any content that criticizes
    the ruling party.
    Liberia has blocked Web sites that contain “anti-Liberian
    material,”
   Zimbabwe excludes foreign sites that publish anything “likely to
    cause alarm or despondency”
Laws that Enable Filtering
   Countries vary in the laws, regulations, and policies
    they enact to implement filtering regimes. Some states
    employ regulation specific to the Internet. Countries
    use laws of general applicability to restrict Internet
    content. Foremost among these are intellectual
    property laws
Legal Problems of Internet Filtering


   Civil Liberties: Speech, Press, Privacy, Religion, and
    Association.
   Jurisdiction
   Internet Governance
   International Law
   Telecommunications Law
   Other Kinds of “Law”
Can jus cogens be applied to the Internet?


   Jus cogens could be applied in such situations
    when the Internet is used for promotion or
    organization of prohibited acts, such as
    piracy, slavery, and genocide.
Are There Any Effective Legal Limitations on
a State’s Ability to Filter?
   Each state maintains independent control over the
    nature and extent of Internet access of its citizens.
    There are no meaningful external legal checks on a
    country’s ability to filter the Internet access of its
    citizens, as there are no international treaties or
    declarations safeguarding a free and open Internet.
    Currently, the United Nations takes no stance on the
    Internet, though proposals have been put forth to
    bring Internet governance under its jurisdiction.
HOT DEBATE
                      Wikileaks
GENEVA, Dec 9 (Reuters) - U.N. High Commissioner for Human Rights Navi Pillay

   "The case raises complex human rights questions about balancing the
    freedom of information, the right of the people to know, and the need to
    protect national security or public order," … "This balancing act is a difficult
    one."

More Related Content

What's hot

Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
M S Siddiqui
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
Nilima Tariq
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
Md.Azizul hakim Anik
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
Md. Mehedi Al Hasan Rakib
 
Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in Zambia
Francesca Kabaso
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
Rabita Rejwana
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
moldovaictsummit2016
 
Navigating Indonesia's Information Highway
Navigating Indonesia's Information HighwayNavigating Indonesia's Information Highway
Navigating Indonesia's Information Highway
ICT Watch
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
Geritt Contillo
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
Uc Man
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
Yasmin AbdelAziz
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
blogzilla
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
FOTIOS ZYGOULIS
 
Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015
Mariya Badeva-Bright
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international law
blogzilla
 
cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
moldovaictsummit2016
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
moldovaictsummit2016
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
Commonwealth Telecommunications Organisation
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
CP-Union
 

What's hot (20)

Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in Zambia
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Navigating Indonesia's Information Highway
Navigating Indonesia's Information HighwayNavigating Indonesia's Information Highway
Navigating Indonesia's Information Highway
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
 
Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015Presentation at IFLA Congress in Cape Town on 18 August 2015
Presentation at IFLA Congress in Cape Town on 18 August 2015
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international law
 
cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 

Similar to Internet governance

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
Roxanne St Ives
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paper
Monica Chan
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
Emily Võ
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
Ronak Karanpuria
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
Erhan Boduk
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
University of Sydney
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
Russ Dutcher, CBRM,CORM,CDPS
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
Russ Dutcher, CBRM,CORM,CDPS
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
Wendy Qi
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
rmackinnon
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
Andrew Davies
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
IRJET Journal
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
linda gichohi
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 
International internet governance
International internet governanceInternational internet governance
International internet governance
Jillian York
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 

Similar to Internet governance (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paper
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 

Internet governance

  • 1. By Ghazala A Ajami Internet Governance An Inspiration by International Law
  • 2. The Question of the Internet-Does it Assume Intervention in Society and State? GLOBALIZED ACCESS OF INFORMATION
  • 3. Introduction  Internet is a critical trans-boundary information resource that should be governed and protected like other common critical resources.  Various risks may follow the internet infrastructure. These vary from technicalities to interstate disputes.  Until this date, in an interstate context, there are no enforceable rights of internet access although we see initiatives to setting guidelines for internet governance.
  • 4. Governance & Internet Filtering  The WGIG Report and other documents produced in the WSIS/WGIG process are a solid basis for reflection on the main issues of Internet governance. The Tunis WSIS Declaration provides the necessary policy endorsement of the overall process and a possible basis for soft law status vs. real law of some agreed solutions.
  • 5. Inspired by International Law  Some internet governing principles were derived from the text on “Responsibility of States for Internationally Wrongful Acts” (2001) adopted by the International Law Commission.  Article 2 – Elements of an internationally wrongful act of a State  Article 31 – Reparation  Article 49 – Object and limits of countermeasures
  • 6. Who Filters? Public vs. Private  Location, Quantity, and Manner of the filtering vary greatly  Private parties are often centrally involved in Internet filtering  filtering may occur through a completely private transaction or with some government involvement in some fashion
  • 7. Law, Regulation, and Policy of Current Filtering Regimes  The two components of a typical country’s filtering regime are a (1) justification for blocking certain material, and (2)a set of laws that enable filtering.  Countries usually justify the laws that enable filtering by invoking one of two broad themes: a. Upholding Community Standards b. Ensuring National Security
  • 8. Upholding Community Standards  One of Singapore’s “main concerns” with the Internet is the ease of access to pornography by minors.  South Korea banned content dealing with euthanasia and hacking, and, in a move that attracted widespread media attention, ordered local ISPs to block access to video footage of the gruesome beheading of a Korean hostage in Iraq.  Legislation in India blocks sites that “appeal to the prurient interest,”  Australian law prohibits sites that include “information about crime or drug use.”  Egypt bans Internet content on “taboo issues” such as criticism of its president  Uzbekistan prohibits accessing materials critical of the country’s president or based on religious extremism.
  • 9. Ensuring National Security  In China, protecting national security includes banning speech that could threaten “national unity.”  Burma, Egypt, and Malaysia forbid any content that criticizes the ruling party.  Liberia has blocked Web sites that contain “anti-Liberian material,”  Zimbabwe excludes foreign sites that publish anything “likely to cause alarm or despondency”
  • 10. Laws that Enable Filtering  Countries vary in the laws, regulations, and policies they enact to implement filtering regimes. Some states employ regulation specific to the Internet. Countries use laws of general applicability to restrict Internet content. Foremost among these are intellectual property laws
  • 11. Legal Problems of Internet Filtering  Civil Liberties: Speech, Press, Privacy, Religion, and Association.  Jurisdiction  Internet Governance  International Law  Telecommunications Law  Other Kinds of “Law”
  • 12. Can jus cogens be applied to the Internet?  Jus cogens could be applied in such situations when the Internet is used for promotion or organization of prohibited acts, such as piracy, slavery, and genocide.
  • 13. Are There Any Effective Legal Limitations on a State’s Ability to Filter?  Each state maintains independent control over the nature and extent of Internet access of its citizens. There are no meaningful external legal checks on a country’s ability to filter the Internet access of its citizens, as there are no international treaties or declarations safeguarding a free and open Internet. Currently, the United Nations takes no stance on the Internet, though proposals have been put forth to bring Internet governance under its jurisdiction.
  • 14. HOT DEBATE Wikileaks GENEVA, Dec 9 (Reuters) - U.N. High Commissioner for Human Rights Navi Pillay  "The case raises complex human rights questions about balancing the freedom of information, the right of the people to know, and the need to protect national security or public order," … "This balancing act is a difficult one."

Editor's Notes

  1. Policies and mechanisms for Internet governance have been topics of debate between many with different opinions for how and indeed whether the Internet should facilitate free communication of ideas and information. Most countries censor Internet content in some fashion, typically by limiting the Web sites their citizens can view.
  2. Now what we deal with are the implications and policy making of Internet filtering.
  3. Internet is a critical trans-boundary information resource that should be governed and protected like other common critical resources. It is a global information infrastructure tool that should be protected in order to ensure security, stability, and the protection of Human rights in a country.Various risks may follow the internet infrastructure. These vary from technicalities to interstate disputes.Until this date, in an interstate context, there are no enforceable rights of internet access although we see initiatives to setting guidelines for internet governance.
  4. Article 2 – Elements of an internationally wrongful act ofa StateThere is an internationally wrongful act of a State whenconduct consisting of an action or omission:(a) Is attributable to the State under international law; and(b) Constitutes a breach of an international obligation ofthe State. (Article 2)Article 31 – Reparation1. The responsible State is under an obligation to make fullreparation for the injury caused by the internationallywrongful act.2. Injury includes any damage, whether material ormoral, caused by the internationally wrongful act of aState.Article 49 – Object and limits of countermeasures1. An injured State may only take countermeasuresagainst a State which is responsible for an internationallywrongful act in order to induce that State to comply withits obligations under part two.2. Countermeasures are limited to the non-performancefor the time being of international obligations of the Statetaking the measures towards the responsible State.3. Countermeasures shall, as far as possible, be taken insuch a way as to permit the resumption of performance ofthe obligations in question.
  5. Example 1: the world’s most popular search engine, Google, during 2001. There were requests from the French and German governments, to localize Google search engines in those states, at http://www.google.fr/ and http://www.google.de/ respectively, removed certain “pro-Nazi” or racist sites from search results. While the French and German governments did not explicitly block access to those websites, their removal from Google hides them from most users, thus manipulating Google into a quasi-filter for both governments. Example 2: Kingdom of Saudi Arabia uses Secure Computing’s Smart Filter software to block access to content, such as pornography, that it feels is inappropriate.