Helga Law Journal - 01.01.2021, Page 181

Helga Law Journal - 01.01.2021, Page 181
Helga Law Journal Vol. 1, 2021 186 International Legal Research Group 187 models and with different levels of openness’.342 As a result, private law mechanisms can potentially be invoked in regards to certain domains or servers. However, the nature of occupying a space online is radically different from realspace, methods may range from boycotting the use of an application to spam posting to distributed denial of service attacks (DDoS) and denial of service attacks (DoS). Although the law has firmly established that techniques such as DDoS are criminal under the Computer Misuse Act 1990 (CMA), it must also clarify the line between public and private cyberspaces.343 This will not be uncontroversial, but it is urgently needed – whether petitions or opinions can be removed by website operators will depend on this distinction. On the flip side, there are many technical legal nuances attached to assemblies in the physical world that may no longer be applicable in cyberspace. The facts of Olympic Delivery Authority v Persons Unknown, provides a good opportunity for us to examine these differences. Protesters attempted to obstruct the construction of a site allocated for the 2012 Olympics by blocking lories and establishing a camp. The Olympic Delivery Authority had an exclusive license hence, there was sufficient interest to pursue a private nuisance claim.344 Yet, their counsel also raised a public nuisance point, which Arnold J further discussed. If there is ‘a public right of way’ over a route or a piece of land more generally, any obstruction would constitute a public nuisance.345 Regardless, a short-term injunction was ordered. In the virtual world, it would be much harder to claim a public right over a website or platform because the majority are owned by corporate entities. For public nuisance claims to be available, online public functions would have to be defined and whether the freedom of assembly is exercisable because a website performs certain activities. Although private nuisance claims may appear to be more straightforward, the open nature of the internet blurs the private/public space distinction and the lack of physicality may make injunctions harder or even impossible to enforce – fences cannot be put up and the police cannot be called to the rescue. Out of respect for privacy and to avoid discrimination, there is no screening of users based on one’s identity or intent prior to entering a website. Lessig points out that code seems to be able to express law better than the law itself’ because it defines the terms which cyberspace is offered – similar to ‘bars on a prison’.346 Hence, in practice, a website can require an access code, but this is not a viable option for businesses or operators that profit from advertisements. Moreover, the rise of hacking and specialist software such as Circumventor has shown that code is not impenetrable. Although the CMA may be triggered, if protesters engage in the creation and sending of viruses. However, technology has evolved to a point 342 Andrea Renda, 'Antitrust, Regulation and The Neutrality Trap: A Plea For A Smart, Evidence- Based Internet Policy' (Centre for European Policy Studies 2017), 7. 343 Computer Misuse Act 1990. 344 ibid, [17] (Arnold J). 345 ibid, [19] (Arnold J). 346 Lawrence Lessig, Code (2nd edn, Basic Books 2006), 83. where Internet Protocol addresses (IPs) may be untraceable if virtual private networks (VPNs) are used, which makes it difficult to ensure accountability. Therefore, there are many elements of online protest that the law must consider before it can be said to fully possess the capacity to facilitate digital social movements and protests. 7.4 Conclusion: A Targeted Legal Regime for Online Expression? By extending realspace, laws into the virtual world and adding targeted provisions regarding digital communications into the existing legal structure, it seems that we are trying to make online expression and protest wear a hat that does not fit. A new legal regime built upon a clearer understanding of online expression may be more effective. It may even be time to accept that ICTs have revolutionized human expression and our social interactions. This legal framework should, like social media, be a tapestry that ties together the diverse elements that are unique to the architecture of cyberspace. However, before any radical course of action is embarked upon, the law which governs online expression on a whole should be clarified, in particular, the precise point at which restraints are legitimate. A secure legal foundation for free speech online is an important stepping stone towards regulating the disputed right to digitally protest. Notably, there will be practical issues that must be considered, such as whether website operators can seek injunctions if they discover or are notified of a plan to protest and the availability of damages and how they should be measured. As a result, there are many aspects of online protest that the current UK law must consider, before it can be said to fully possess the capacity of facilitating digital expression, social movements and protests. Finally, this exploration was of a limited scope hence, it is a tapestry that will require further weaving in order to reflect the expansive and ever-changing face of cyberspace. 8 What Role and Responsibilities Do Academic Institutions in Your Country Have Regarding Promoting Freedom of Speech and the Right to Protest Within and Outside Their Campuses? 8.1 Introduction The rights to freedom of speech and freedom of assembly and association provide a ‘foundation for democracy.’347 Together, freedom of speech and the 347 'Free Speech and Protest' (Liberty Human Rights, 2018) <https://www.libertyhumanrights.org.uk/human-rights/free-speech-and-protest> accessed 1 June 2018.
Page 1
Page 2
Page 3
Page 4
Page 5
Page 6
Page 7
Page 8
Page 9
Page 10
Page 11
Page 12
Page 13
Page 14
Page 15
Page 16
Page 17
Page 18
Page 19
Page 20
Page 21
Page 22
Page 23
Page 24
Page 25
Page 26
Page 27
Page 28
Page 29
Page 30
Page 31
Page 32
Page 33
Page 34
Page 35
Page 36
Page 37
Page 38
Page 39
Page 40
Page 41
Page 42
Page 43
Page 44
Page 45
Page 46
Page 47
Page 48
Page 49
Page 50
Page 51
Page 52
Page 53
Page 54
Page 55
Page 56
Page 57
Page 58
Page 59
Page 60
Page 61
Page 62
Page 63
Page 64
Page 65
Page 66
Page 67
Page 68
Page 69
Page 70
Page 71
Page 72
Page 73
Page 74
Page 75
Page 76
Page 77
Page 78
Page 79
Page 80
Page 81
Page 82
Page 83
Page 84
Page 85
Page 86
Page 87
Page 88
Page 89
Page 90
Page 91
Page 92
Page 93
Page 94
Page 95
Page 96
Page 97
Page 98
Page 99
Page 100
Page 101
Page 102
Page 103
Page 104
Page 105
Page 106
Page 107
Page 108
Page 109
Page 110
Page 111
Page 112
Page 113
Page 114
Page 115
Page 116
Page 117
Page 118
Page 119
Page 120
Page 121
Page 122
Page 123
Page 124
Page 125
Page 126
Page 127
Page 128
Page 129
Page 130
Page 131
Page 132
Page 133
Page 134
Page 135
Page 136
Page 137
Page 138
Page 139
Page 140
Page 141
Page 142
Page 143
Page 144
Page 145
Page 146
Page 147
Page 148
Page 149
Page 150
Page 151
Page 152
Page 153
Page 154
Page 155
Page 156
Page 157
Page 158
Page 159
Page 160
Page 161
Page 162
Page 163
Page 164
Page 165
Page 166
Page 167
Page 168
Page 169
Page 170
Page 171
Page 172
Page 173
Page 174
Page 175
Page 176
Page 177
Page 178
Page 179
Page 180
Page 181
Page 182
Page 183
Page 184
Page 185
Page 186
Page 187
Page 188
Page 189
Page 190
Page 191
Page 192
Page 193
Page 194
Page 195
Page 196
Page 197
Page 198
Page 199
Page 200
Page 201
Page 202
Page 203
Page 204
Page 205
Page 206
Page 207
Page 208
Page 209
Page 210
Page 211
Page 212
Page 213
Page 214
Page 215
Page 216
Page 217
Page 218
Page 219
Page 220
Page 221
Page 222
Page 223
Page 224

x

Helga Law Journal

Direct Links

If you want to link to this newspaper/magazine, please use these links:

Link to this newspaper/magazine: Helga Law Journal
https://timarit.is/publication/1677

Link to this issue:

Link to this page:

Link to this article:

Please do not link directly to images or PDFs on Timarit.is as such URLs may change without warning. Please use the URLs provided above for linking to the website.