Helga Law Journal - 01.01.2021, Page 180

Helga Law Journal - 01.01.2021, Page 180
Helga Law Journal Vol. 1, 2021 184 International Legal Research Group 185 in sending it is that it should . . . cause distress or anxiety to the recipient or to any other person to whom he intends that it or its content or nature should be communicated.333 This addition was a breakthrough because it helped prevent the law from being rendered irrelevant in the Internet era. It ‘puts together a low-level harm, merely causing distress and anxiety, with an intention to cause such harm, and thus it does not provide a criminal sanction for inadvertent innocuous behaviour’.334 Furthermore, aside from providing the sole route to charge an accused of one-off online acts, unlike the PHA, it does not require a cause of action, which allows it to avoid the technical difficulties that may stem from attempts to prosecute offences that fall in between an online and offline state. However, it fails to capture the intricacy of online social interactions because the nature of the stipulated act does not capture the harassment methods that can be used on social networking sites. Examples of such include repeated friend requests, “gift” requests and so forth. A more serious consequence of the narrow mens rea and actus rea of the MCA is that the law becomes even more foreseeable and out of reach as the PHA confusingly suffers from the opposite problem: its mens rea and actus rea are too wide.335 It has been suggested by Geach and Haramlambous that the wide s.2 actus reus of the PHA should be integrated with the narrow mens rea of the MCA, in order to enable ‘for a low-level form of harm to be caused such as distress or irritation, as this outcome would need to be intentionally caused, which would then justify imposing a criminal sanction for such conduct.336 Compared to real life, it is more legally obscure where the boundaries of expression lie in the virtual world. This is largely due to the novel ways of communication available in the virtual world. For example, the ability to post videos on a platform such as YouTube. The CA 2003 has attempted to cover these developments by adding two offences under s. 127 to specifically tackle harassment conducted using electronic communication tools. Both offences emphasize a public electronic communications network, making them narrow in nature. According to Lord Bingham, s. 127 does not seek ‘to protect people against receipt of unsolicited messages which they may find seriously objectionable’, rather it serves to ‘prohibit the use of a service provided and funded by the public for the benefit of the public for the transmission of communications which contravene the basic standards of our society’.337 Indeed, these offences have great potential to protect the individuals from online harassment but the application is ultimately confined to public networks. This excludes harassment which occurs using a private network such as workplace bullying in the form of instant messaging. Overall the legal regime has failed to 333 Malicious Communications Act 1988, s 1 (1). 334 Geach and Haralambous (n 9), 243. 335 ibid. 336 Geach and Haralambous (n 9), 252. 337 Geach and Haralambous (n 9), 252. establish clear confines and transparency in their regulation of cyberspace communications. Not only is the degree to which individuals are protected from harassment and ‘offensive’ communications dubious, but also the requisite standards used to judge such speech are also too broad. As a result, the law hinders cyberspace from fostering meaningful exchanges and from acting as a platform for individuals to peacefully protest. Digital social movements cannot be accommodated because of these uncertainties and the awkward silence regarding the precise point at which expression can trigger the law may deter unpopular or minority opinions. 7.3 The Second Thread: Contrasting Physical and Online Protests Despite laws that now target digital communications, there are no specifics regarding online protest. However, in practice, the public vs private space debate has manifested into a frequent obstacle for many protests. Recent developments have blurred the distinction further. Enright and Bhandar have observed that private law mechanisms are being increasingly used to counter student protests at universities.338 Yet, universities have traditionally been considered as quasi-public because despite being 'intrinsically private corporations’, they ‘serve at universal public function’, which in the past had a ‘priority’ over their ‘corporate make- up’.339 Similarly, in Appleby v UK (2003), a protest at a privately-owned shopping mall was refused by the owners. The organizers applied to the European Court of Human Rights claiming (ECtHR), arguing that the UK failed to uphold their obligations to ensure Articles 10 and 11 of the ECHR. In the end, the Court found that the owners’ private property rights trumped the state’s obligations.340 Unfortunately, it seems that a balance has yet to be struck in regards to protest – private law mechanisms provides a simple but undeniable counter-position. Notably, this issue also extends into cyberspace, however, because of the structure of online communities, it may be harder to uphold the right to peaceful assembly and free association. The internet is, in essence, an open network and it is being increasingly seen as a public good. Audibert and Murray explain that this is because of the indispensable role that it now plays in our daily lives and its democratic function in upholding Article 10.341 Yet, not every user subscribes to this principled approach and the architecture of the Web is far more complicated nowadays. It has evolved into ‘a patchwork of multi-sided platforms operating with different 338 Lucy Finchett-Maddock, 'The Right To Protest Is Under Threat From Several Different Directions' <http://www.democraticaudit.com/2014/04/23/eternal-vigilance-is-required-to- protect-the-right-to-protest/> accessed 25 June 2018. 339 ibid. 340 Appleby v UK [2003] ECHR 222, [2003] All ER (D) 39. 341 Audibert, Lucie C. and Murray, Andrew D. (2016) A principled approach to network neutrality. SCRIPTED, 13 (2). pp. 118-143.
Page 1
Page 2
Page 3
Page 4
Page 5
Page 6
Page 7
Page 8
Page 9
Page 10
Page 11
Page 12
Page 13
Page 14
Page 15
Page 16
Page 17
Page 18
Page 19
Page 20
Page 21
Page 22
Page 23
Page 24
Page 25
Page 26
Page 27
Page 28
Page 29
Page 30
Page 31
Page 32
Page 33
Page 34
Page 35
Page 36
Page 37
Page 38
Page 39
Page 40
Page 41
Page 42
Page 43
Page 44
Page 45
Page 46
Page 47
Page 48
Page 49
Page 50
Page 51
Page 52
Page 53
Page 54
Page 55
Page 56
Page 57
Page 58
Page 59
Page 60
Page 61
Page 62
Page 63
Page 64
Page 65
Page 66
Page 67
Page 68
Page 69
Page 70
Page 71
Page 72
Page 73
Page 74
Page 75
Page 76
Page 77
Page 78
Page 79
Page 80
Page 81
Page 82
Page 83
Page 84
Page 85
Page 86
Page 87
Page 88
Page 89
Page 90
Page 91
Page 92
Page 93
Page 94
Page 95
Page 96
Page 97
Page 98
Page 99
Page 100
Page 101
Page 102
Page 103
Page 104
Page 105
Page 106
Page 107
Page 108
Page 109
Page 110
Page 111
Page 112
Page 113
Page 114
Page 115
Page 116
Page 117
Page 118
Page 119
Page 120
Page 121
Page 122
Page 123
Page 124
Page 125
Page 126
Page 127
Page 128
Page 129
Page 130
Page 131
Page 132
Page 133
Page 134
Page 135
Page 136
Page 137
Page 138
Page 139
Page 140
Page 141
Page 142
Page 143
Page 144
Page 145
Page 146
Page 147
Page 148
Page 149
Page 150
Page 151
Page 152
Page 153
Page 154
Page 155
Page 156
Page 157
Page 158
Page 159
Page 160
Page 161
Page 162
Page 163
Page 164
Page 165
Page 166
Page 167
Page 168
Page 169
Page 170
Page 171
Page 172
Page 173
Page 174
Page 175
Page 176
Page 177
Page 178
Page 179
Page 180
Page 181
Page 182
Page 183
Page 184
Page 185
Page 186
Page 187
Page 188
Page 189
Page 190
Page 191
Page 192
Page 193
Page 194
Page 195
Page 196
Page 197
Page 198
Page 199
Page 200
Page 201
Page 202
Page 203
Page 204
Page 205
Page 206
Page 207
Page 208
Page 209
Page 210
Page 211
Page 212
Page 213
Page 214
Page 215
Page 216
Page 217
Page 218
Page 219
Page 220
Page 221
Page 222
Page 223
Page 224

x

Helga Law Journal

Direct Links

If you want to link to this newspaper/magazine, please use these links:

Link to this newspaper/magazine: Helga Law Journal
https://timarit.is/publication/1677

Link to this issue:

Link to this page:

Link to this article:

Please do not link directly to images or PDFs on Timarit.is as such URLs may change without warning. Please use the URLs provided above for linking to the website.