SlideShare une entreprise Scribd logo
1  sur  5
Analyze and critique each of these with regards to your own agenda




                                     Universality:


Due to the nature of the Internet, an effective piece of legislation would have to be

universal- meaning that it is not aimed at repressive governments- but at repressive

practices. In this instance, repressive practices are defined as violation of Human

Rights principals committed by these international companies.




                                  Warning of Risks:


There needs to be an inclusion of a clause mandates the issuance of warnings when a

company is bound to share data with one or a number of governments and/or a third

party. Therefore, giving the user the knowledge of the risks and furthermore the

ability to make an informed decision.
Analyze and critique each of these with regards to your own agenda




                        Prohibition of Voluntary Censorship:


Legislation of this sort will be drafted under the understanding that companies do

not operate in countries with repressive governments with the intent of becoming

censors or facilitators of governmental persecution based on online activity. Certain

companies have been accused of such practices- such as Yahoo! providing user data

to the Chinese government. Such actions are taken by companies in order to get on

the “good side” of certain governments through anticipating what kind of content

they might be asked to censor based on past instances. The role of legislation here

would be to prohibit individual companies from taking steps towards voluntary

censorship. Furthermore, international companies operating within a foreign country

should not be allowed to comply without a court order. This is, fortunately, perfectly

aligned with many repressive governments claims that they are interested in

enforcing the “rule of law” on Internet activity.
User Notification when the Companies are forced to censor


Following the issuance of a court order, companies are forced to censor content. In

this case, an adequate legislation would require the informing of users, of who and

why censorship is taking place. Furthermore, companies should provide should

provide the possibility of an appeal where users challenge the censorship they are

facing anonymously and securely.




        Analyze and critique each of these with regards to your own agenda




                     No User Data in Repressive Jurisdictions:


Companies should be legally bound to refrain from hosting personally identifying

user data in courts that are known to have a lack of tolerance for individuals’ active

expression of political, social or religious views online. This enables companies to

avoid having to comply with governments’ request to provide information that would

enable the persecution of internet users that use it the World Wide Web as an outlet

for expression.




                                 Full Documentation:


Companies are called upon to maintain written documentation of the requests made

on behalf of governments requesting for the censorship of terms and web addresses
and this written documentation should specify which of these requests were

accepted and acted upon and those that were rejected. Moreover, this

documentation should indicate the purpose for which any of said requests were met

and in accordance to what law has this taken place. This documentation should be

fully accessible by the public of any one state




        Analyze and critique each of these with regards to your own agenda




                     Fines and Victims’ Right to Compensation:


In any case should a company violate the laws that regulate the operation of internet

companies within countries known for their repressive approach to internet activism,

victims or their family members should be granted the right to pursue compensation

as well as the ability to seek legal remedies within courts whose jurisdiction they are

subject to.
Global


Legislation should not be confined to specific territories or nations but rather, should

apply to all nations with companies operating within their territories in order to up

hold the highest standards of freedom of expression in attempts to effectively tackle

the global issue of political censorship.

Contenu connexe

Tendances

Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitutionmerlyna
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Anthony Rapa
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviewsaleenia23
 
SENATOR Sherrod Brown (Internet Stalking Law)
SENATOR Sherrod Brown (Internet Stalking Law)SENATOR Sherrod Brown (Internet Stalking Law)
SENATOR Sherrod Brown (Internet Stalking Law)VogelDenise
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summaryBridget Butler
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IIRyan K. Hew
 
Bahrain Internet Filtering
Bahrain Internet FilteringBahrain Internet Filtering
Bahrain Internet FilteringMichael Seim
 
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...Matthijs Van Bergen
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
Cop critic a solution to police violence against unarmed men
Cop critic   a solution to police violence against unarmed menCop critic   a solution to police violence against unarmed men
Cop critic a solution to police violence against unarmed menVictor Holman
 
Cop critic bringing transparency to law enforcement
Cop critic   bringing transparency to law enforcementCop critic   bringing transparency to law enforcement
Cop critic bringing transparency to law enforcementVictor Holman
 
Launch, license, let a solution to end police violence
Launch, license, let   a solution to end police violenceLaunch, license, let   a solution to end police violence
Launch, license, let a solution to end police violenceVictor Holman
 

Tendances (20)

SESTA Backgrounder Pt 2
SESTA Backgrounder Pt 2SESTA Backgrounder Pt 2
SESTA Backgrounder Pt 2
 
Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitution
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
SENATOR Sherrod Brown (Internet Stalking Law)
SENATOR Sherrod Brown (Internet Stalking Law)SENATOR Sherrod Brown (Internet Stalking Law)
SENATOR Sherrod Brown (Internet Stalking Law)
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summary
 
Freedom on the net 2018
Freedom on the net 2018Freedom on the net 2018
Freedom on the net 2018
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Jordan
JordanJordan
Jordan
 
The Power of Identity
The Power of IdentityThe Power of Identity
The Power of Identity
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part II
 
Bahrain Internet Filtering
Bahrain Internet FilteringBahrain Internet Filtering
Bahrain Internet Filtering
 
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
Cop critic a solution to police violence against unarmed men
Cop critic   a solution to police violence against unarmed menCop critic   a solution to police violence against unarmed men
Cop critic a solution to police violence against unarmed men
 
Cop critic bringing transparency to law enforcement
Cop critic   bringing transparency to law enforcementCop critic   bringing transparency to law enforcement
Cop critic bringing transparency to law enforcement
 
Launch, license, let a solution to end police violence
Launch, license, let   a solution to end police violenceLaunch, license, let   a solution to end police violence
Launch, license, let a solution to end police violence
 

En vedette

ABUSOS EN LA EJECUCION HIPOTECARIA
 ABUSOS EN LA EJECUCION HIPOTECARIA ABUSOS EN LA EJECUCION HIPOTECARIA
ABUSOS EN LA EJECUCION HIPOTECARIAJgalonso68
 
Sesión práctica redes sociales I - foment del treball 2012
Sesión práctica redes sociales I - foment del treball 2012Sesión práctica redes sociales I - foment del treball 2012
Sesión práctica redes sociales I - foment del treball 2012Vincent Chavy
 
PROYECTO CENTENARIO
PROYECTO CENTENARIOPROYECTO CENTENARIO
PROYECTO CENTENARIODaniel Soria
 
Stjue 15 01-2013, c-416-10, krizan y otros v.slovenska.
Stjue 15 01-2013, c-416-10, krizan y otros v.slovenska.Stjue 15 01-2013, c-416-10, krizan y otros v.slovenska.
Stjue 15 01-2013, c-416-10, krizan y otros v.slovenska.Guillermo Ruiz Zapatero
 
ENTERATE
ENTERATEENTERATE
ENTERATEdiana
 
Chun doo hwan betaalt resterende 160 miljoen dollar
Chun doo hwan betaalt resterende 160 miljoen dollarChun doo hwan betaalt resterende 160 miljoen dollar
Chun doo hwan betaalt resterende 160 miljoen dollarPeterMachielse
 
La deficiencia de la banda ancha protocolo
La deficiencia de la banda ancha protocoloLa deficiencia de la banda ancha protocolo
La deficiencia de la banda ancha protocoloElias Vite
 
Semiconductores - Telesup
Semiconductores - TelesupSemiconductores - Telesup
Semiconductores - TelesupDaniel Chirinos
 
Documento1
Documento1Documento1
Documento1sony_e
 
CU3CM60-ARREOLA R LESLY-COMPUTO EN LA NUBE
CU3CM60-ARREOLA R LESLY-COMPUTO EN LA NUBECU3CM60-ARREOLA R LESLY-COMPUTO EN LA NUBE
CU3CM60-ARREOLA R LESLY-COMPUTO EN LA NUBElslyar
 
Informe de Tablets
Informe de TabletsInforme de Tablets
Informe de Tabletslovesasha
 
Virtualizacion con Software Libre en el camino hacia la nube
Virtualizacion con Software Libre en el camino hacia la nubeVirtualizacion con Software Libre en el camino hacia la nube
Virtualizacion con Software Libre en el camino hacia la nubeRodolfo Pilas
 
Evaluacion VMWare
Evaluacion VMWareEvaluacion VMWare
Evaluacion VMWareITSanchez
 

En vedette (20)

ABUSOS EN LA EJECUCION HIPOTECARIA
 ABUSOS EN LA EJECUCION HIPOTECARIA ABUSOS EN LA EJECUCION HIPOTECARIA
ABUSOS EN LA EJECUCION HIPOTECARIA
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Real madrid
Real madridReal madrid
Real madrid
 
Sesión práctica redes sociales I - foment del treball 2012
Sesión práctica redes sociales I - foment del treball 2012Sesión práctica redes sociales I - foment del treball 2012
Sesión práctica redes sociales I - foment del treball 2012
 
PROYECTO CENTENARIO
PROYECTO CENTENARIOPROYECTO CENTENARIO
PROYECTO CENTENARIO
 
Stjue 15 01-2013, c-416-10, krizan y otros v.slovenska.
Stjue 15 01-2013, c-416-10, krizan y otros v.slovenska.Stjue 15 01-2013, c-416-10, krizan y otros v.slovenska.
Stjue 15 01-2013, c-416-10, krizan y otros v.slovenska.
 
Curso
CursoCurso
Curso
 
ENTERATE
ENTERATEENTERATE
ENTERATE
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Chun doo hwan betaalt resterende 160 miljoen dollar
Chun doo hwan betaalt resterende 160 miljoen dollarChun doo hwan betaalt resterende 160 miljoen dollar
Chun doo hwan betaalt resterende 160 miljoen dollar
 
La deficiencia de la banda ancha protocolo
La deficiencia de la banda ancha protocoloLa deficiencia de la banda ancha protocolo
La deficiencia de la banda ancha protocolo
 
Semiconductores - Telesup
Semiconductores - TelesupSemiconductores - Telesup
Semiconductores - Telesup
 
Documento1
Documento1Documento1
Documento1
 
Redes sociales
Redes socialesRedes sociales
Redes sociales
 
CU3CM60-ARREOLA R LESLY-COMPUTO EN LA NUBE
CU3CM60-ARREOLA R LESLY-COMPUTO EN LA NUBECU3CM60-ARREOLA R LESLY-COMPUTO EN LA NUBE
CU3CM60-ARREOLA R LESLY-COMPUTO EN LA NUBE
 
Informe de Tablets
Informe de TabletsInforme de Tablets
Informe de Tablets
 
Virtualizacion con Software Libre en el camino hacia la nube
Virtualizacion con Software Libre en el camino hacia la nubeVirtualizacion con Software Libre en el camino hacia la nube
Virtualizacion con Software Libre en el camino hacia la nube
 
Evaluacion VMWare
Evaluacion VMWareEvaluacion VMWare
Evaluacion VMWare
 
Telefónica y el Sector de las Telecomunicaciones
Telefónica y el Sector de las TelecomunicacionesTelefónica y el Sector de las Telecomunicaciones
Telefónica y el Sector de las Telecomunicaciones
 
Webquest
WebquestWebquest
Webquest
 

Similaire à Legislation Exercise

Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...Larry Catá Backer
 
Censorship and Regulation of the Internet
Censorship and Regulation of the InternetCensorship and Regulation of the Internet
Censorship and Regulation of the InternetEllieWeedon
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
2019 Youth ResearchEdge Competition Winners
2019 Youth ResearchEdge Competition Winners2019 Youth ResearchEdge Competition Winners
2019 Youth ResearchEdge Competition WinnersOECD Governance
 
Dr haluk f gursel, keeping tax supported officials around the globe accountable
Dr haluk f gursel, keeping tax supported officials around the globe accountableDr haluk f gursel, keeping tax supported officials around the globe accountable
Dr haluk f gursel, keeping tax supported officials around the globe accountableHaluk Ferden Gursel
 
Dr haluk f gursel, keeping tax supported officials around the globe accountable
Dr haluk f gursel, keeping tax supported officials around the globe accountableDr haluk f gursel, keeping tax supported officials around the globe accountable
Dr haluk f gursel, keeping tax supported officials around the globe accountableHaluk Ferden Gursel
 
Background TLG has explained to the GC owners that it is vital to u
Background TLG has explained to the GC owners that it is vital to uBackground TLG has explained to the GC owners that it is vital to u
Background TLG has explained to the GC owners that it is vital to ucameroncourtney45
 
Protecting Market Share 11.20.14 REVISED
Protecting Market Share 11.20.14 REVISEDProtecting Market Share 11.20.14 REVISED
Protecting Market Share 11.20.14 REVISEDPatrick Fox
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxEdFeranil
 
Charting a Way Forward Online Content Regulation
Charting a Way Forward Online Content RegulationCharting a Way Forward Online Content Regulation
Charting a Way Forward Online Content Regulationrun_frictionless
 
Time to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisisTime to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisismrleiser
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxouldparis
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rightsarchiejones4
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketinggaurav jain
 
WLJ_ATR_2202_Commentary_Nelson
WLJ_ATR_2202_Commentary_NelsonWLJ_ATR_2202_Commentary_Nelson
WLJ_ATR_2202_Commentary_NelsonJames (Jim) Nelson
 
WP-UNCLAIMDEABEN14MAR16
WP-UNCLAIMDEABEN14MAR16WP-UNCLAIMDEABEN14MAR16
WP-UNCLAIMDEABEN14MAR16Ann Bloomquist
 

Similaire à Legislation Exercise (20)

W vir presentationppt4-2012
W vir presentationppt4-2012W vir presentationppt4-2012
W vir presentationppt4-2012
 
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
 
Censorship and Regulation of the Internet
Censorship and Regulation of the InternetCensorship and Regulation of the Internet
Censorship and Regulation of the Internet
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
2019 Youth ResearchEdge Competition Winners
2019 Youth ResearchEdge Competition Winners2019 Youth ResearchEdge Competition Winners
2019 Youth ResearchEdge Competition Winners
 
Dr haluk f gursel, keeping tax supported officials around the globe accountable
Dr haluk f gursel, keeping tax supported officials around the globe accountableDr haluk f gursel, keeping tax supported officials around the globe accountable
Dr haluk f gursel, keeping tax supported officials around the globe accountable
 
Dr haluk f gursel, keeping tax supported officials around the globe accountable
Dr haluk f gursel, keeping tax supported officials around the globe accountableDr haluk f gursel, keeping tax supported officials around the globe accountable
Dr haluk f gursel, keeping tax supported officials around the globe accountable
 
Background TLG has explained to the GC owners that it is vital to u
Background TLG has explained to the GC owners that it is vital to uBackground TLG has explained to the GC owners that it is vital to u
Background TLG has explained to the GC owners that it is vital to u
 
Protecting Market Share 11.20.14 REVISED
Protecting Market Share 11.20.14 REVISEDProtecting Market Share 11.20.14 REVISED
Protecting Market Share 11.20.14 REVISED
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
Charting a Way Forward Online Content Regulation
Charting a Way Forward Online Content RegulationCharting a Way Forward Online Content Regulation
Charting a Way Forward Online Content Regulation
 
Time to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisisTime to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisis
 
Adequate Procedures CLEAN
Adequate Procedures CLEANAdequate Procedures CLEAN
Adequate Procedures CLEAN
 
Watch Your Step on the Internet!
Watch Your Step on the Internet! Watch Your Step on the Internet!
Watch Your Step on the Internet!
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
WLJ_ATR_2202_Commentary_Nelson
WLJ_ATR_2202_Commentary_NelsonWLJ_ATR_2202_Commentary_Nelson
WLJ_ATR_2202_Commentary_Nelson
 
Terrorism
TerrorismTerrorism
Terrorism
 
WP-UNCLAIMDEABEN14MAR16
WP-UNCLAIMDEABEN14MAR16WP-UNCLAIMDEABEN14MAR16
WP-UNCLAIMDEABEN14MAR16
 

Plus de CIMUN 2010: HRC (9)

Councils and plan reqs
Councils and plan reqsCouncils and plan reqs
Councils and plan reqs
 
HRC/Res/B/1
HRC/Res/B/1HRC/Res/B/1
HRC/Res/B/1
 
HRC/Res/B/1
HRC/Res/B/1HRC/Res/B/1
HRC/Res/B/1
 
1
11
1
 
HRC Res A 1
HRC Res A 1HRC Res A 1
HRC Res A 1
 
Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
 
Foreing Policy Draft 1
Foreing Policy Draft 1Foreing Policy Draft 1
Foreing Policy Draft 1
 
Sample+Resolution
Sample+ResolutionSample+Resolution
Sample+Resolution
 
Conventions
ConventionsConventions
Conventions
 

Dernier

57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendFabwelt
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 

Dernier (8)

57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming Trend
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 

Legislation Exercise

  • 1. Analyze and critique each of these with regards to your own agenda Universality: Due to the nature of the Internet, an effective piece of legislation would have to be universal- meaning that it is not aimed at repressive governments- but at repressive practices. In this instance, repressive practices are defined as violation of Human Rights principals committed by these international companies. Warning of Risks: There needs to be an inclusion of a clause mandates the issuance of warnings when a company is bound to share data with one or a number of governments and/or a third party. Therefore, giving the user the knowledge of the risks and furthermore the ability to make an informed decision.
  • 2. Analyze and critique each of these with regards to your own agenda Prohibition of Voluntary Censorship: Legislation of this sort will be drafted under the understanding that companies do not operate in countries with repressive governments with the intent of becoming censors or facilitators of governmental persecution based on online activity. Certain companies have been accused of such practices- such as Yahoo! providing user data to the Chinese government. Such actions are taken by companies in order to get on the “good side” of certain governments through anticipating what kind of content they might be asked to censor based on past instances. The role of legislation here would be to prohibit individual companies from taking steps towards voluntary censorship. Furthermore, international companies operating within a foreign country should not be allowed to comply without a court order. This is, fortunately, perfectly aligned with many repressive governments claims that they are interested in enforcing the “rule of law” on Internet activity.
  • 3. User Notification when the Companies are forced to censor Following the issuance of a court order, companies are forced to censor content. In this case, an adequate legislation would require the informing of users, of who and why censorship is taking place. Furthermore, companies should provide should provide the possibility of an appeal where users challenge the censorship they are facing anonymously and securely. Analyze and critique each of these with regards to your own agenda No User Data in Repressive Jurisdictions: Companies should be legally bound to refrain from hosting personally identifying user data in courts that are known to have a lack of tolerance for individuals’ active expression of political, social or religious views online. This enables companies to avoid having to comply with governments’ request to provide information that would enable the persecution of internet users that use it the World Wide Web as an outlet for expression. Full Documentation: Companies are called upon to maintain written documentation of the requests made on behalf of governments requesting for the censorship of terms and web addresses
  • 4. and this written documentation should specify which of these requests were accepted and acted upon and those that were rejected. Moreover, this documentation should indicate the purpose for which any of said requests were met and in accordance to what law has this taken place. This documentation should be fully accessible by the public of any one state Analyze and critique each of these with regards to your own agenda Fines and Victims’ Right to Compensation: In any case should a company violate the laws that regulate the operation of internet companies within countries known for their repressive approach to internet activism, victims or their family members should be granted the right to pursue compensation as well as the ability to seek legal remedies within courts whose jurisdiction they are subject to.
  • 5. Global Legislation should not be confined to specific territories or nations but rather, should apply to all nations with companies operating within their territories in order to up hold the highest standards of freedom of expression in attempts to effectively tackle the global issue of political censorship.