U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Internet access as a Human Right CONCEPCION, APPLE KRISHIA ILLESCAS, NIKO PASCUA, MA. CHRISTINE FLOR POLICARPIO, SARAH.
1 Surveillance of cables for civil communication by the National Defence Radio Establishment (FRA) Mark Klamberg, doctoral candidate 5 October 2008.
Fighting corruption in the Italian Public Sector Law November Prof. Fabio Cintioli Scuola Nazionale di Amministrazione.
Human Rights Perspectives on Access to Misoprostol Johanna B. Fine Legal Fellow Center for Reproductive Rights.
Our Digital World Second Edition
LEGAL ISSUES IN SOCIAL MEDIA Presented by: TAL WILLIAMS Partner (02)
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
The Asian Broad Bans: Laws affecting freedom of expression on the Internet.
By Leo Koo and Chris Mendoza AP Government Mr. Lohman Period 4.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 1 Regulating Online Speech.
It is about the website(Named as Reddit.com), which becames the No. 1 Social bookmarking website in the Year of Now many of you must be thinking.
Social Media and Recordkeeping Allegra Huxtable Manager Government Recordkeeping Tasmanian Archive and Heritage Office.
INTERNET and CODE OF CONDUCT
E-Commerce: Regulatory, Ethical, and Social Environments
Freedom of Expression Harun Kotan ITEC317 Harun Kotan ITEC317.
FREEDOM OF EXPRESSION Salanieta Tamanikaiwaimaro (Sala T) - FIJI Controversy Conflict Who determines the balance??? Ethics.
Nicola Lucchi Department of Accounting & Law Jönköping International Business School INTERNET CONTENT GOVERNANCE & HUMAN RIGHTS.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Class 6 Internet Privacy Law Social Media Privacy.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Computer Legislation The need for computer laws Go to Contents.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Social Media Safety Manchester Township Middle School Guidance Department
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
Ethical Issue Computer Ethics. Why do we have to consider computer ethics? The advancements of computer/internet have significant influence on our lives.
Stephanie Muchai ARTICLE 19 KENYA Presentation for: “Bloggers Responsible And Ethical Use Of Online Freedom In The Election Period”
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
A.ABDULLAEV, Director of the Public Fund for Support and Development of Print Media and Information Agencies of Uzbekistan.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Davide M. Parrilli, ICRI 23 September 2008 Management and governance of the Future Internet The Legal Perspective
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
By Ben Smith. What is COICA? What effect it will have on the web? How does it work? How to prevent COICA from passing Summary.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Intellectual Freedom: Internet Censorship By Carolyne Begin, Jessica Gorton, Jaki King, Amber Strangstalien.
Presentation by: Jennifer Collins Roldan Padilla.
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
New Zealand Internet Freedom Index 1 Joy Liddicoat Judge David Harvey Professor Charles Crothers Shawna Finnegan Dr Judy McGregor.
Gaby Orduna Period 1. Public records contain info about individuals, often very sensitive information. Are accessible electronically Courts and government.
Implementation of the Personal Data Protection law of Georgia Giorgi Giorganashvili Head of IT department of the Office of the personal data protection.
The Right To Be Forgotten In 2006, the European Union and Argentina put the concept of the right to be forgotten into practice. This issue started from.
Civil Society: First Step to Democracy in Vietnam.
INVINCIBLESERVICES PROTECTING YOUR PRIVACY, SO YOU DON’T HAVE TO.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Group C: Banter, jokes, freedom of speech and defamation By: Lendina Hykaj Aliyu Aliyu Zia Ahmed Baran Sezgin Timur Aliev Panashe Makanza.
GUIDE TO HUMAN RIGHTS FOR INTERNET USERS Implementation Strategy Concept.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
AFRICA FREEDOM OF EXPRESSION EXCHANGE (AFEX) Workshop
Social Media as Instruments of Control and Consensus Making
Emily Snyder, William Darras, Stephanie Berger
Media Advocacy.
PART III Ethical Issues in Business
Munich Intellectual Property Law Center (MIPLC)
E-Commerce: Regulatory, Ethical, and Social Environments
U.S. Department of Justice
A Gift of Fire Third edition Sara Baase
Securing free and fair European elections
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
Електронско банкарство
A Gift of Fire Third edition Sara Baase
Presentation transcript:

U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression

Protecting the human right to freedom of expression I.V. Restriction of Content on the Internet

Summary Any restriction to the right to freedom of expression must meet the strict criteria under international human rights law.  Chapter IV frames a number of ways in which States are progressively censoring information on line.  We will review control mechanisms which interferes with the right to freedom of expression.

Arbitrary blocking or filtering of content Blocking refers to measures taken to prevent content from reaching an end user. –i.e. YouTube: Turkey, Thailand, and Viet Nam are examples of countries where YouTube is being blocked for access ( countries.htm ).

Arbitrary blocking or filtering of content States’ use of blocking or filtering technologies is frequently in violation of their obligation to guarantee the right to freedom of expression.

Arbitrary blocking or filtering of content  Just in time blocking is used to prevent users from accessing or disseminating information at key political moments such as elections.  Social network platforms such as Twitter and Facebook are blocked.

Criminalization of legitimate expression The types of action taken by States to limit the dissemination of content online not only include measures to prevent information from reaching the end-user, but also direct targeting of those who seek, receive and impart politically sensitive information via the Internet.

Criminalization of legitimate expression Physically silencing criticism or dissent through arbitrary arrests and detention, enforced disappearance, harassment and intimidation is an old phenomenon, and also applies to Internet users

Criminalization of legitimate expression Such actions are often aimed not only to silence legitimate expression, but also to intimi- date a population to push its members towards self- censorship.  There is concern that legitimate expression is being criminalized in violation of existing laws or new laws being created.

Criminalization of legitimate expression One clear example of criminalizing legitimate expression is the imprisonment of bloggers around the world. According to Freedomhouse, Vietnam is listed among the ten more repressive countries for bloggers ( s/File/FotN/Vietnam2011.pdf).

Imposition of intermediary liability Is a distinguished feature of the Internet in the way in which information is transmitted on intermediaries who provide services and platforms to open the doors of communication between third parties either by giving access to, accommodating, or sending and indexing information.

Imposition of intermediary liability Intermediary liability is decreed through privacy and data protection laws. A court in Italy convicted three Google executives for violations of the Italian data protection code by way of the intermediary that permitted a video to be displayed showing cruelty to a disabled teenager through Google video service.

Disconnecting users from Internet access, including on the basis of violations of intellectual property rights law There are states that have initiated measures to cut off access to the internet entirely. There are concerns over the discussions centering around an “on/off” control over internet traffic.

Cyber-attacks Cyber-attacks can cripple or sabotage the functioning of a computer based system and includes hacking into programs or computer networks. Cyber-attacks cause website crashes and as a result these websites are not accessible. Often these attacks occur during political moments.

Inadequate protection of the right to privacy and data protection The internet has technology through which the state and private sectors can monitor and collect data concerning users’ communications and activities on the internet. This is concern to the internet users’ right to privacy.

The internet is a special communications medium and we need promotion and protection of the right to freedom of opinion and expression.