Helga Law Journal - 01.01.2021, Side 182

Helga Law Journal - 01.01.2021, Side 182
Helga Law Journal Vol. 1, 2021 186 International Legal Research Group 187 models and with different levels of openness’.342 As a result, private law mechanisms can potentially be invoked in regards to certain domains or servers. However, the nature of occupying a space online is radically different from realspace, methods may range from boycotting the use of an application to spam posting to distributed denial of service attacks (DDoS) and denial of service attacks (DoS). Although the law has firmly established that techniques such as DDoS are criminal under the Computer Misuse Act 1990 (CMA), it must also clarify the line between public and private cyberspaces.343 This will not be uncontroversial, but it is urgently needed – whether petitions or opinions can be removed by website operators will depend on this distinction. On the flip side, there are many technical legal nuances attached to assemblies in the physical world that may no longer be applicable in cyberspace. The facts of Olympic Delivery Authority v Persons Unknown, provides a good opportunity for us to examine these differences. Protesters attempted to obstruct the construction of a site allocated for the 2012 Olympics by blocking lories and establishing a camp. The Olympic Delivery Authority had an exclusive license hence, there was sufficient interest to pursue a private nuisance claim.344 Yet, their counsel also raised a public nuisance point, which Arnold J further discussed. If there is ‘a public right of way’ over a route or a piece of land more generally, any obstruction would constitute a public nuisance.345 Regardless, a short-term injunction was ordered. In the virtual world, it would be much harder to claim a public right over a website or platform because the majority are owned by corporate entities. For public nuisance claims to be available, online public functions would have to be defined and whether the freedom of assembly is exercisable because a website performs certain activities. Although private nuisance claims may appear to be more straightforward, the open nature of the internet blurs the private/public space distinction and the lack of physicality may make injunctions harder or even impossible to enforce – fences cannot be put up and the police cannot be called to the rescue. Out of respect for privacy and to avoid discrimination, there is no screening of users based on one’s identity or intent prior to entering a website. Lessig points out that code seems to be able to express law better than the law itself’ because it defines the terms which cyberspace is offered – similar to ‘bars on a prison’.346 Hence, in practice, a website can require an access code, but this is not a viable option for businesses or operators that profit from advertisements. Moreover, the rise of hacking and specialist software such as Circumventor has shown that code is not impenetrable. Although the CMA may be triggered, if protesters engage in the creation and sending of viruses. However, technology has evolved to a point 342 Andrea Renda, 'Antitrust, Regulation and The Neutrality Trap: A Plea For A Smart, Evidence- Based Internet Policy' (Centre for European Policy Studies 2017), 7. 343 Computer Misuse Act 1990. 344 ibid, [17] (Arnold J). 345 ibid, [19] (Arnold J). 346 Lawrence Lessig, Code (2nd edn, Basic Books 2006), 83. where Internet Protocol addresses (IPs) may be untraceable if virtual private networks (VPNs) are used, which makes it difficult to ensure accountability. Therefore, there are many elements of online protest that the law must consider before it can be said to fully possess the capacity to facilitate digital social movements and protests. 7.4 Conclusion: A Targeted Legal Regime for Online Expression? By extending realspace, laws into the virtual world and adding targeted provisions regarding digital communications into the existing legal structure, it seems that we are trying to make online expression and protest wear a hat that does not fit. A new legal regime built upon a clearer understanding of online expression may be more effective. It may even be time to accept that ICTs have revolutionized human expression and our social interactions. This legal framework should, like social media, be a tapestry that ties together the diverse elements that are unique to the architecture of cyberspace. However, before any radical course of action is embarked upon, the law which governs online expression on a whole should be clarified, in particular, the precise point at which restraints are legitimate. A secure legal foundation for free speech online is an important stepping stone towards regulating the disputed right to digitally protest. Notably, there will be practical issues that must be considered, such as whether website operators can seek injunctions if they discover or are notified of a plan to protest and the availability of damages and how they should be measured. As a result, there are many aspects of online protest that the current UK law must consider, before it can be said to fully possess the capacity of facilitating digital expression, social movements and protests. Finally, this exploration was of a limited scope hence, it is a tapestry that will require further weaving in order to reflect the expansive and ever-changing face of cyberspace. 8 What Role and Responsibilities Do Academic Institutions in Your Country Have Regarding Promoting Freedom of Speech and the Right to Protest Within and Outside Their Campuses? 8.1 Introduction The rights to freedom of speech and freedom of assembly and association provide a ‘foundation for democracy.’347 Together, freedom of speech and the 347 'Free Speech and Protest' (Liberty Human Rights, 2018) <https://www.libertyhumanrights.org.uk/human-rights/free-speech-and-protest> accessed 1 June 2018.
Side 1
Side 2
Side 3
Side 4
Side 5
Side 6
Side 7
Side 8
Side 9
Side 10
Side 11
Side 12
Side 13
Side 14
Side 15
Side 16
Side 17
Side 18
Side 19
Side 20
Side 21
Side 22
Side 23
Side 24
Side 25
Side 26
Side 27
Side 28
Side 29
Side 30
Side 31
Side 32
Side 33
Side 34
Side 35
Side 36
Side 37
Side 38
Side 39
Side 40
Side 41
Side 42
Side 43
Side 44
Side 45
Side 46
Side 47
Side 48
Side 49
Side 50
Side 51
Side 52
Side 53
Side 54
Side 55
Side 56
Side 57
Side 58
Side 59
Side 60
Side 61
Side 62
Side 63
Side 64
Side 65
Side 66
Side 67
Side 68
Side 69
Side 70
Side 71
Side 72
Side 73
Side 74
Side 75
Side 76
Side 77
Side 78
Side 79
Side 80
Side 81
Side 82
Side 83
Side 84
Side 85
Side 86
Side 87
Side 88
Side 89
Side 90
Side 91
Side 92
Side 93
Side 94
Side 95
Side 96
Side 97
Side 98
Side 99
Side 100
Side 101
Side 102
Side 103
Side 104
Side 105
Side 106
Side 107
Side 108
Side 109
Side 110
Side 111
Side 112
Side 113
Side 114
Side 115
Side 116
Side 117
Side 118
Side 119
Side 120
Side 121
Side 122
Side 123
Side 124
Side 125
Side 126
Side 127
Side 128
Side 129
Side 130
Side 131
Side 132
Side 133
Side 134
Side 135
Side 136
Side 137
Side 138
Side 139
Side 140
Side 141
Side 142
Side 143
Side 144
Side 145
Side 146
Side 147
Side 148
Side 149
Side 150
Side 151
Side 152
Side 153
Side 154
Side 155
Side 156
Side 157
Side 158
Side 159
Side 160
Side 161
Side 162
Side 163
Side 164
Side 165
Side 166
Side 167
Side 168
Side 169
Side 170
Side 171
Side 172
Side 173
Side 174
Side 175
Side 176
Side 177
Side 178
Side 179
Side 180
Side 181
Side 182
Side 183
Side 184
Side 185
Side 186
Side 187
Side 188
Side 189
Side 190
Side 191
Side 192
Side 193
Side 194
Side 195
Side 196
Side 197
Side 198
Side 199
Side 200
Side 201
Side 202
Side 203
Side 204
Side 205
Side 206
Side 207
Side 208
Side 209
Side 210
Side 211
Side 212
Side 213
Side 214
Side 215
Side 216
Side 217
Side 218
Side 219
Side 220
Side 221
Side 222
Side 223
Side 224

x

Helga Law Journal

Direkte link

Hvis du vil linke til denne avis/magasin, skal du bruge disse links:

Link til denne avis/magasin: Helga Law Journal
https://timarit.is/publication/1677

Link til dette eksemplar:

Link til denne side:

Link til denne artikel:

Venligst ikke link direkte til billeder eller PDfs på Timarit.is, da sådanne webadresser kan ændres uden advarsel. Brug venligst de angivne webadresser for at linke til sitet.