Helga Law Journal - 01.01.2021, Side 179

Helga Law Journal - 01.01.2021, Side 179
Helga Law Journal Vol. 1, 2021 184 International Legal Research Group 185 in sending it is that it should . . . cause distress or anxiety to the recipient or to any other person to whom he intends that it or its content or nature should be communicated.333 This addition was a breakthrough because it helped prevent the law from being rendered irrelevant in the Internet era. It ‘puts together a low-level harm, merely causing distress and anxiety, with an intention to cause such harm, and thus it does not provide a criminal sanction for inadvertent innocuous behaviour’.334 Furthermore, aside from providing the sole route to charge an accused of one-off online acts, unlike the PHA, it does not require a cause of action, which allows it to avoid the technical difficulties that may stem from attempts to prosecute offences that fall in between an online and offline state. However, it fails to capture the intricacy of online social interactions because the nature of the stipulated act does not capture the harassment methods that can be used on social networking sites. Examples of such include repeated friend requests, “gift” requests and so forth. A more serious consequence of the narrow mens rea and actus rea of the MCA is that the law becomes even more foreseeable and out of reach as the PHA confusingly suffers from the opposite problem: its mens rea and actus rea are too wide.335 It has been suggested by Geach and Haramlambous that the wide s.2 actus reus of the PHA should be integrated with the narrow mens rea of the MCA, in order to enable ‘for a low-level form of harm to be caused such as distress or irritation, as this outcome would need to be intentionally caused, which would then justify imposing a criminal sanction for such conduct.336 Compared to real life, it is more legally obscure where the boundaries of expression lie in the virtual world. This is largely due to the novel ways of communication available in the virtual world. For example, the ability to post videos on a platform such as YouTube. The CA 2003 has attempted to cover these developments by adding two offences under s. 127 to specifically tackle harassment conducted using electronic communication tools. Both offences emphasize a public electronic communications network, making them narrow in nature. According to Lord Bingham, s. 127 does not seek ‘to protect people against receipt of unsolicited messages which they may find seriously objectionable’, rather it serves to ‘prohibit the use of a service provided and funded by the public for the benefit of the public for the transmission of communications which contravene the basic standards of our society’.337 Indeed, these offences have great potential to protect the individuals from online harassment but the application is ultimately confined to public networks. This excludes harassment which occurs using a private network such as workplace bullying in the form of instant messaging. Overall the legal regime has failed to 333 Malicious Communications Act 1988, s 1 (1). 334 Geach and Haralambous (n 9), 243. 335 ibid. 336 Geach and Haralambous (n 9), 252. 337 Geach and Haralambous (n 9), 252. establish clear confines and transparency in their regulation of cyberspace communications. Not only is the degree to which individuals are protected from harassment and ‘offensive’ communications dubious, but also the requisite standards used to judge such speech are also too broad. As a result, the law hinders cyberspace from fostering meaningful exchanges and from acting as a platform for individuals to peacefully protest. Digital social movements cannot be accommodated because of these uncertainties and the awkward silence regarding the precise point at which expression can trigger the law may deter unpopular or minority opinions. 7.3 The Second Thread: Contrasting Physical and Online Protests Despite laws that now target digital communications, there are no specifics regarding online protest. However, in practice, the public vs private space debate has manifested into a frequent obstacle for many protests. Recent developments have blurred the distinction further. Enright and Bhandar have observed that private law mechanisms are being increasingly used to counter student protests at universities.338 Yet, universities have traditionally been considered as quasi-public because despite being 'intrinsically private corporations’, they ‘serve at universal public function’, which in the past had a ‘priority’ over their ‘corporate make- up’.339 Similarly, in Appleby v UK (2003), a protest at a privately-owned shopping mall was refused by the owners. The organizers applied to the European Court of Human Rights claiming (ECtHR), arguing that the UK failed to uphold their obligations to ensure Articles 10 and 11 of the ECHR. In the end, the Court found that the owners’ private property rights trumped the state’s obligations.340 Unfortunately, it seems that a balance has yet to be struck in regards to protest – private law mechanisms provides a simple but undeniable counter-position. Notably, this issue also extends into cyberspace, however, because of the structure of online communities, it may be harder to uphold the right to peaceful assembly and free association. The internet is, in essence, an open network and it is being increasingly seen as a public good. Audibert and Murray explain that this is because of the indispensable role that it now plays in our daily lives and its democratic function in upholding Article 10.341 Yet, not every user subscribes to this principled approach and the architecture of the Web is far more complicated nowadays. It has evolved into ‘a patchwork of multi-sided platforms operating with different 338 Lucy Finchett-Maddock, 'The Right To Protest Is Under Threat From Several Different Directions' <http://www.democraticaudit.com/2014/04/23/eternal-vigilance-is-required-to- protect-the-right-to-protest/> accessed 25 June 2018. 339 ibid. 340 Appleby v UK [2003] ECHR 222, [2003] All ER (D) 39. 341 Audibert, Lucie C. and Murray, Andrew D. (2016) A principled approach to network neutrality. SCRIPTED, 13 (2). pp. 118-143.
Side 1
Side 2
Side 3
Side 4
Side 5
Side 6
Side 7
Side 8
Side 9
Side 10
Side 11
Side 12
Side 13
Side 14
Side 15
Side 16
Side 17
Side 18
Side 19
Side 20
Side 21
Side 22
Side 23
Side 24
Side 25
Side 26
Side 27
Side 28
Side 29
Side 30
Side 31
Side 32
Side 33
Side 34
Side 35
Side 36
Side 37
Side 38
Side 39
Side 40
Side 41
Side 42
Side 43
Side 44
Side 45
Side 46
Side 47
Side 48
Side 49
Side 50
Side 51
Side 52
Side 53
Side 54
Side 55
Side 56
Side 57
Side 58
Side 59
Side 60
Side 61
Side 62
Side 63
Side 64
Side 65
Side 66
Side 67
Side 68
Side 69
Side 70
Side 71
Side 72
Side 73
Side 74
Side 75
Side 76
Side 77
Side 78
Side 79
Side 80
Side 81
Side 82
Side 83
Side 84
Side 85
Side 86
Side 87
Side 88
Side 89
Side 90
Side 91
Side 92
Side 93
Side 94
Side 95
Side 96
Side 97
Side 98
Side 99
Side 100
Side 101
Side 102
Side 103
Side 104
Side 105
Side 106
Side 107
Side 108
Side 109
Side 110
Side 111
Side 112
Side 113
Side 114
Side 115
Side 116
Side 117
Side 118
Side 119
Side 120
Side 121
Side 122
Side 123
Side 124
Side 125
Side 126
Side 127
Side 128
Side 129
Side 130
Side 131
Side 132
Side 133
Side 134
Side 135
Side 136
Side 137
Side 138
Side 139
Side 140
Side 141
Side 142
Side 143
Side 144
Side 145
Side 146
Side 147
Side 148
Side 149
Side 150
Side 151
Side 152
Side 153
Side 154
Side 155
Side 156
Side 157
Side 158
Side 159
Side 160
Side 161
Side 162
Side 163
Side 164
Side 165
Side 166
Side 167
Side 168
Side 169
Side 170
Side 171
Side 172
Side 173
Side 174
Side 175
Side 176
Side 177
Side 178
Side 179
Side 180
Side 181
Side 182
Side 183
Side 184
Side 185
Side 186
Side 187
Side 188
Side 189
Side 190
Side 191
Side 192
Side 193
Side 194
Side 195
Side 196
Side 197
Side 198
Side 199
Side 200
Side 201
Side 202
Side 203
Side 204
Side 205
Side 206
Side 207
Side 208
Side 209
Side 210
Side 211
Side 212
Side 213
Side 214
Side 215
Side 216
Side 217
Side 218
Side 219
Side 220
Side 221
Side 222
Side 223
Side 224

x

Helga Law Journal

Direkte link

Hvis du vil linke til denne avis/magasin, skal du bruge disse links:

Link til denne avis/magasin: Helga Law Journal
https://timarit.is/publication/1677

Link til dette eksemplar:

Link til denne side:

Link til denne artikel:

Venligst ikke link direkte til billeder eller PDfs på Timarit.is, da sådanne webadresser kan ændres uden advarsel. Brug venligst de angivne webadresser for at linke til sitet.