SlideShare une entreprise Scribd logo
1  sur  3
A. Elaborate on the idea of the Rule of Law in Cyberspace as a means and way to
cyber security. Describe and assess what the Rule of Law, based on human rights
norms and standards, means offline and whether that can be transferred online.
The Rule of Law means that the government in all its actions is bound by the rules fixed and
announced beforehand (F. Hayek, The Road to Serfdom). Conformity to the rule of law
means that the human dignity is being respected. The point is the answer to the following
question: Does cyber space respects (and how) human dignity?
Cyber security means the collection of tools, policies, security concepts, security safeguards,
guidelines, training, best practices, assurance and technologies that can be used to protect
the cyber environment and organization and user’ s assets. (ITU, Definition of Cyber security,
ITV-TX.1205).
The general security objectives contain the entities of Integrity, Availability and
Confidentiality. The basic pillar of democracy is the inviolable integrity of the individual.
Human integrity extends beyond the physical body. In their thoughts and in their personal
environments and communications all humans have the right to remain unobserved.
(www. the guardian. com/world/2013/dec/10/international-bill-digital-rights-petition-text)
State or enterprise surveillance through cyber space is violating the private sphere of the
humans. Furthermore, surveillance is being used to predict and form our behavior while it is
violating the human right of self-definition and self-expression.
The right of liberty for each human is contained in a synthesis of democratic rights that has
been formed the last two centuries after the struggle of the European Enligthment. To
maintain their validity, our democratic rights must apply in virtual as in the real, physical
sphere. The regulation of cyber space addresses themes such the significance and
legitimacy of physical, geographically defined, borders and territorial sovereignty (the Failure
of the Rule of Law in Cyber space, H. Brian Holland, 2005).
There are two questions to answer: A) what are the borders of internet? B) What is the role
of a state, a national stakeholder regulator?
Concerning the imposition of traditional rules and regulations on the internet we should
think first of all the cyber space characteristics: Separateness and Self regulation. Internet
has no territorial borders. So, there is no connection between borders and sovereignty’s
characteristics like power and legitimacy. Internet‘s architecture is decentralized.
Nevertheless, the existence of self-regulation might overcome the problems because
territorially-based regimes lack the authority and legitimacy to regulate outside their
physical borders.
With the emergence of an online environment traditional regulator powers have attempted
to impose their norms and regulations constructing a new legal regime. This regime may
claim the right to regulate the online activity of persons within its physical territory, and
even impose these norms to its citizens when they are abroad.
In my opinion we should seek the solution of this problem at the level of the entity of the
end-user. End users are citizens, corporations, even States. End users obtain a specific
identity, a substantia inside the digital world.
B. What legal and political instruments are needed to achieve the protection and
realization of human rights in cyberspace?
Human rights must be protected and enforced towards the protection of the end user,
regarding the physical or legal personality that is engaged in cyber space. So, courts and
international organizations do have the legitimacy to impose rules on cyber space regarding
the personality of the citizen or organization.
1. European Union has made a lot of steps towards this kind of regulation. According to
the Chapter of Fundamental Rights of the EU (Official Journal of the EU, 18/12/2000
C364/1), Article 1 [Human dignity is inviolable. It must be respected and protected],
Article 6 [Everyone has the right to liberty and security of person] and Article 8
[Everyone has the right to the protection of personal data concerning him or her] is
referring in depth to the correlation between the human rights and the condition of
their protection in cyber space.
2. States have a strong interest in the framework of the security inside cyber space.
Clapper, the director of USA ‘ s National Intelligence, told the USA Senate that there
are 3 areas where USA are most vulnerable to a cyber attack: Electrical grid,
Financial Institutions and Government Services. We can see that there are a lot of
areas which are at stake regarding Government cyber security.
3. Civil society organizations could promote an understanding and construct bridges
between stake holders.
We should notice that there are few differences between normal, traditional governance
and electronic governance. Electronic governance tends to be more transparent and
accessible. Availability is strongly connected to electronic governance because there is more
interaction with the users while citizens are allowed to contribute by making suggestions.
Traditional government’s disadvantages like difficulty in direct communication, bureaucracy,
corruption remain as great institutional obstacles for the implementation of electronic
democracy inside cyber space. Talking about the implementation of the Rule of Law inside
cyber space we should think of the participation of many stake holders, such as NGOs, the
private sector and state-owned firms and academia. We should also think of the
legitimating entities that are engaged in the whole process such as the stake holder’s
attitudes towards the States’ acts and regulations (ACTA, NSA).
This means the promotion of partnership between public sector and private sector and the
strengthening of the legal framework and transparency that enforces the accountability of
the process of the regulation inside cyber space.
Rule of law equals to the respect of the Human Dignity. In order to keep a balance between
upholding human rights principles and providing security and safety at the same time, we
should construct a precise regulation framework that protects citizens as users of the
internet and public stakeholders.
The protection of the human rights inside the cyber space requires the engagement of
different stake holders. The protection of human liberty is the hard core of the whole
process. The bet is on the balance between the state and the man.
Photios N. Zygoulis
Ph. D Candidate (Business Process Reengineering)
University of Athens
2014 March
fotiszygoulis@gmail.com

Contenu connexe

Tendances

Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailandgcanavati
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Regional working group on governance November 2015
Regional working group on governance November 2015Regional working group on governance November 2015
Regional working group on governance November 2015Tess Newton Cain @CainTess
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanSVS College
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...International Islamic University Malaysia
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshMd. Mehedi Al Hasan Rakib
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetVincy
 
A2-Internet regulation Slides
A2-Internet regulation SlidesA2-Internet regulation Slides
A2-Internet regulation Slidesyiranzheng
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIABenedict Ishabakaki
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber lawshreya sanghvi
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 

Tendances (18)

Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in Zambia
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailand
 
Isa12b
Isa12bIsa12b
Isa12b
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Regional working group on governance November 2015
Regional working group on governance November 2015Regional working group on governance November 2015
Regional working group on governance November 2015
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
A2-Internet regulation Slides
A2-Internet regulation SlidesA2-Internet regulation Slides
A2-Internet regulation Slides
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 

En vedette

The continuity of the greek government to l as despite changes in political l...
The continuity of the greek government to l as despite changes in political l...The continuity of the greek government to l as despite changes in political l...
The continuity of the greek government to l as despite changes in political l...FOTIOS ZYGOULIS
 
Transparency and Open Public Data on Greek Local Authorities. Why we are goin...
Transparency and Open Public Data on Greek Local Authorities. Why we are goin...Transparency and Open Public Data on Greek Local Authorities. Why we are goin...
Transparency and Open Public Data on Greek Local Authorities. Why we are goin...FOTIOS ZYGOULIS
 
απονομή δικαιοσύνης και ηλεκτρονική διακυβέρνηση αντίγραφο
απονομή δικαιοσύνης και ηλεκτρονική διακυβέρνηση   αντίγραφοαπονομή δικαιοσύνης και ηλεκτρονική διακυβέρνηση   αντίγραφο
απονομή δικαιοσύνης και ηλεκτρονική διακυβέρνηση αντίγραφοFOTIOS ZYGOULIS
 
το δημοψήφισμα και η αποποίηση της πολιτικής ευθύνης (2)
το δημοψήφισμα και η αποποίηση της πολιτικής ευθύνης (2)το δημοψήφισμα και η αποποίηση της πολιτικής ευθύνης (2)
το δημοψήφισμα και η αποποίηση της πολιτικής ευθύνης (2)FOTIOS ZYGOULIS
 
Balkan States and the EU Enlargement 2013
Balkan States and the EU Enlargement 2013Balkan States and the EU Enlargement 2013
Balkan States and the EU Enlargement 2013FOTIOS ZYGOULIS
 
το αιτημα τησ ειρηνευσησ και το κοινωνικο συμβολαιο συστασησ τησ κυριαρχιασ σ...
το αιτημα τησ ειρηνευσησ και το κοινωνικο συμβολαιο συστασησ τησ κυριαρχιασ σ...το αιτημα τησ ειρηνευσησ και το κοινωνικο συμβολαιο συστασησ τησ κυριαρχιασ σ...
το αιτημα τησ ειρηνευσησ και το κοινωνικο συμβολαιο συστασησ τησ κυριαρχιασ σ...FOTIOS ZYGOULIS
 
η εξομολόγηση ενός χρυσαυγίτη
η εξομολόγηση ενός χρυσαυγίτηη εξομολόγηση ενός χρυσαυγίτη
η εξομολόγηση ενός χρυσαυγίτηFOTIOS ZYGOULIS
 
ανοικτή κοινωνία και ανοικτή διακυβέρνηση
ανοικτή κοινωνία και ανοικτή διακυβέρνησηανοικτή κοινωνία και ανοικτή διακυβέρνηση
ανοικτή κοινωνία και ανοικτή διακυβέρνησηFOTIOS ZYGOULIS
 
Greek municipalities and citizens platforms
Greek municipalities and citizens platformsGreek municipalities and citizens platforms
Greek municipalities and citizens platformsFOTIOS ZYGOULIS
 
η οικοδομηση του συγκεντρωτικου κρατουσ στη γαλλια
η οικοδομηση του συγκεντρωτικου κρατουσ στη γαλλια η οικοδομηση του συγκεντρωτικου κρατουσ στη γαλλια
η οικοδομηση του συγκεντρωτικου κρατουσ στη γαλλια FOTIOS ZYGOULIS
 
Open data census in 10 greek cities open goernment data in greek municipalit...
Open data census in 10 greek cities  open goernment data in greek municipalit...Open data census in 10 greek cities  open goernment data in greek municipalit...
Open data census in 10 greek cities open goernment data in greek municipalit...FOTIOS ZYGOULIS
 
τελικό Diplomatikis 8
τελικό Diplomatikis  8 τελικό Diplomatikis  8
τελικό Diplomatikis 8 FOTIOS ZYGOULIS
 
03 ths 29112016_δημοσ_νεου ηρακλειου
03 ths 29112016_δημοσ_νεου ηρακλειου03 ths 29112016_δημοσ_νεου ηρακλειου
03 ths 29112016_δημοσ_νεου ηρακλειουFOTIOS ZYGOULIS
 
παρουσίαση δήμος ηρακλείου αττικής 3 smart cities conference 2015
παρουσίαση δήμος ηρακλείου αττικής 3 smart cities conference 2015παρουσίαση δήμος ηρακλείου αττικής 3 smart cities conference 2015
παρουσίαση δήμος ηρακλείου αττικής 3 smart cities conference 2015FOTIOS ZYGOULIS
 

En vedette (18)

The continuity of the greek government to l as despite changes in political l...
The continuity of the greek government to l as despite changes in political l...The continuity of the greek government to l as despite changes in political l...
The continuity of the greek government to l as despite changes in political l...
 
Transparency and Open Public Data on Greek Local Authorities. Why we are goin...
Transparency and Open Public Data on Greek Local Authorities. Why we are goin...Transparency and Open Public Data on Greek Local Authorities. Why we are goin...
Transparency and Open Public Data on Greek Local Authorities. Why we are goin...
 
απονομή δικαιοσύνης και ηλεκτρονική διακυβέρνηση αντίγραφο
απονομή δικαιοσύνης και ηλεκτρονική διακυβέρνηση   αντίγραφοαπονομή δικαιοσύνης και ηλεκτρονική διακυβέρνηση   αντίγραφο
απονομή δικαιοσύνης και ηλεκτρονική διακυβέρνηση αντίγραφο
 
το δημοψήφισμα και η αποποίηση της πολιτικής ευθύνης (2)
το δημοψήφισμα και η αποποίηση της πολιτικής ευθύνης (2)το δημοψήφισμα και η αποποίηση της πολιτικής ευθύνης (2)
το δημοψήφισμα και η αποποίηση της πολιτικής ευθύνης (2)
 
Balkan States and the EU Enlargement 2013
Balkan States and the EU Enlargement 2013Balkan States and the EU Enlargement 2013
Balkan States and the EU Enlargement 2013
 
το αιτημα τησ ειρηνευσησ και το κοινωνικο συμβολαιο συστασησ τησ κυριαρχιασ σ...
το αιτημα τησ ειρηνευσησ και το κοινωνικο συμβολαιο συστασησ τησ κυριαρχιασ σ...το αιτημα τησ ειρηνευσησ και το κοινωνικο συμβολαιο συστασησ τησ κυριαρχιασ σ...
το αιτημα τησ ειρηνευσησ και το κοινωνικο συμβολαιο συστασησ τησ κυριαρχιασ σ...
 
η εξομολόγηση ενός χρυσαυγίτη
η εξομολόγηση ενός χρυσαυγίτηη εξομολόγηση ενός χρυσαυγίτη
η εξομολόγηση ενός χρυσαυγίτη
 
ανοικτή κοινωνία και ανοικτή διακυβέρνηση
ανοικτή κοινωνία και ανοικτή διακυβέρνησηανοικτή κοινωνία και ανοικτή διακυβέρνηση
ανοικτή κοινωνία και ανοικτή διακυβέρνηση
 
Greek municipalities and citizens platforms
Greek municipalities and citizens platformsGreek municipalities and citizens platforms
Greek municipalities and citizens platforms
 
έγγραφο1
έγγραφο1έγγραφο1
έγγραφο1
 
η οικοδομηση του συγκεντρωτικου κρατουσ στη γαλλια
η οικοδομηση του συγκεντρωτικου κρατουσ στη γαλλια η οικοδομηση του συγκεντρωτικου κρατουσ στη γαλλια
η οικοδομηση του συγκεντρωτικου κρατουσ στη γαλλια
 
Open data census in 10 greek cities open goernment data in greek municipalit...
Open data census in 10 greek cities  open goernment data in greek municipalit...Open data census in 10 greek cities  open goernment data in greek municipalit...
Open data census in 10 greek cities open goernment data in greek municipalit...
 
Immigration policies
Immigration policiesImmigration policies
Immigration policies
 
τελικό Diplomatikis 8
τελικό Diplomatikis  8 τελικό Diplomatikis  8
τελικό Diplomatikis 8
 
ΦΟΥΚΩ
ΦΟΥΚΩΦΟΥΚΩ
ΦΟΥΚΩ
 
Administrative elite
Administrative  eliteAdministrative  elite
Administrative elite
 
03 ths 29112016_δημοσ_νεου ηρακλειου
03 ths 29112016_δημοσ_νεου ηρακλειου03 ths 29112016_δημοσ_νεου ηρακλειου
03 ths 29112016_δημοσ_νεου ηρακλειου
 
παρουσίαση δήμος ηρακλείου αττικής 3 smart cities conference 2015
παρουσίαση δήμος ηρακλείου αττικής 3 smart cities conference 2015παρουσίαση δήμος ηρακλείου αττικής 3 smart cities conference 2015
παρουσίαση δήμος ηρακλείου αττικής 3 smart cities conference 2015
 

Similaire à Rule of law in cyberspace as a means and way to cybersecurity

Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...Samuel Barros
 
legality of TECHNOLOGY usage in legal system
legality of  TECHNOLOGY usage in legal systemlegality of  TECHNOLOGY usage in legal system
legality of TECHNOLOGY usage in legal systemSonalSardessai2
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Luca De Biase
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethicssyed ahmed
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Adam Thierer
 
A human rights approach to the mobile network
A human rights approach to the mobile networkA human rights approach to the mobile network
A human rights approach to the mobile networkDr Lendy Spires
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEeraser Juan José Calderón
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese InternetAnders Pedersen
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Chris Marsden
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...https://writeessayuk.com/
 
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docxRunning head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docxtodd271
 
Net neutrality, citizenship and discrimination
Net neutrality, citizenship and discriminationNet neutrality, citizenship and discrimination
Net neutrality, citizenship and discriminationblogzilla
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age - Mark - Fullbright
 

Similaire à Rule of law in cyberspace as a means and way to cybersecurity (20)

Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
 
legality of TECHNOLOGY usage in legal system
legality of  TECHNOLOGY usage in legal systemlegality of  TECHNOLOGY usage in legal system
legality of TECHNOLOGY usage in legal system
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
 
A human rights approach to the mobile network
A human rights approach to the mobile networkA human rights approach to the mobile network
A human rights approach to the mobile network
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...
 
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docxRunning head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
Running head ETHICS AND ENCRYPTION BACKDOORS1ETHICS AND ENC.docx
 
Net neutrality, citizenship and discrimination
Net neutrality, citizenship and discriminationNet neutrality, citizenship and discrimination
Net neutrality, citizenship and discrimination
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 

Plus de FOTIOS ZYGOULIS

Ο ΕΣΩΤΕΡΙΚΟΣ ΕΛΕΓΧΟΣ ΣΤΟΥΣ ΔΗΜΟΥΣ { ΝΑΞΟΣ}.pptx
Ο ΕΣΩΤΕΡΙΚΟΣ ΕΛΕΓΧΟΣ ΣΤΟΥΣ ΔΗΜΟΥΣ { ΝΑΞΟΣ}.pptxΟ ΕΣΩΤΕΡΙΚΟΣ ΕΛΕΓΧΟΣ ΣΤΟΥΣ ΔΗΜΟΥΣ { ΝΑΞΟΣ}.pptx
Ο ΕΣΩΤΕΡΙΚΟΣ ΕΛΕΓΧΟΣ ΣΤΟΥΣ ΔΗΜΟΥΣ { ΝΑΞΟΣ}.pptxFOTIOS ZYGOULIS
 
The implementation of gdpr in greece (1)
The implementation of gdpr in greece (1)The implementation of gdpr in greece (1)
The implementation of gdpr in greece (1)FOTIOS ZYGOULIS
 
Review your cv critique top cv
Review your cv critique   top cvReview your cv critique   top cv
Review your cv critique top cvFOTIOS ZYGOULIS
 
η υλοποίηση εργων στους οτα την περίοδο 2014 2020
η υλοποίηση εργων στους οτα την περίοδο 2014 2020η υλοποίηση εργων στους οτα την περίοδο 2014 2020
η υλοποίηση εργων στους οτα την περίοδο 2014 2020FOTIOS ZYGOULIS
 
ο ρόλος της θρησκείας στη νεωτερικότητα
ο ρόλος της θρησκείας στη νεωτερικότηταο ρόλος της θρησκείας στη νεωτερικότητα
ο ρόλος της θρησκείας στη νεωτερικότηταFOTIOS ZYGOULIS
 
τα επιχειρησιακά σχέδια των δήμων
τα επιχειρησιακά σχέδια των δήμωντα επιχειρησιακά σχέδια των δήμων
τα επιχειρησιακά σχέδια των δήμωνFOTIOS ZYGOULIS
 
η δημοσιονομική κρίση στην ελλάδα και οι επιπτώσεις στο ανθρώπινο δυναμικό το...
η δημοσιονομική κρίση στην ελλάδα και οι επιπτώσεις στο ανθρώπινο δυναμικό το...η δημοσιονομική κρίση στην ελλάδα και οι επιπτώσεις στο ανθρώπινο δυναμικό το...
η δημοσιονομική κρίση στην ελλάδα και οι επιπτώσεις στο ανθρώπινο δυναμικό το...FOTIOS ZYGOULIS
 
e-GOV at the Municipality of Iraklio Attikis Greece
e-GOV at the Municipality of Iraklio Attikis Greecee-GOV at the Municipality of Iraklio Attikis Greece
e-GOV at the Municipality of Iraklio Attikis GreeceFOTIOS ZYGOULIS
 
η ρητορικη επαναπεριγραφη και η αντικειμενικοτητα στον Max weber (1)
η ρητορικη επαναπεριγραφη και η αντικειμενικοτητα στον Max weber (1)η ρητορικη επαναπεριγραφη και η αντικειμενικοτητα στον Max weber (1)
η ρητορικη επαναπεριγραφη και η αντικειμενικοτητα στον Max weber (1)FOTIOS ZYGOULIS
 
E democracy and open data info sphere in greece.pps (2)
E democracy and open data info sphere in greece.pps (2)E democracy and open data info sphere in greece.pps (2)
E democracy and open data info sphere in greece.pps (2)FOTIOS ZYGOULIS
 
λογγινος και καινη διαθηκη
λογγινος  και καινη διαθηκηλογγινος  και καινη διαθηκη
λογγινος και καινη διαθηκηFOTIOS ZYGOULIS
 
πανεπιστημιο αθηνων (εργασια μοντερνα τεχνη)
πανεπιστημιο αθηνων (εργασια μοντερνα τεχνη)πανεπιστημιο αθηνων (εργασια μοντερνα τεχνη)
πανεπιστημιο αθηνων (εργασια μοντερνα τεχνη)FOTIOS ZYGOULIS
 
Social Enterprises in Greece
Social Enterprises in GreeceSocial Enterprises in Greece
Social Enterprises in GreeceFOTIOS ZYGOULIS
 
University and Global Competency
University and Global CompetencyUniversity and Global Competency
University and Global CompetencyFOTIOS ZYGOULIS
 
υπόδειγμα αναφοράς εργασίας ανασχεδιασμου διοικητικης διαδικασιας
υπόδειγμα αναφοράς εργασίας ανασχεδιασμου διοικητικης διαδικασιαςυπόδειγμα αναφοράς εργασίας ανασχεδιασμου διοικητικης διαδικασιας
υπόδειγμα αναφοράς εργασίας ανασχεδιασμου διοικητικης διαδικασιαςFOTIOS ZYGOULIS
 

Plus de FOTIOS ZYGOULIS (19)

Ο ΕΣΩΤΕΡΙΚΟΣ ΕΛΕΓΧΟΣ ΣΤΟΥΣ ΔΗΜΟΥΣ { ΝΑΞΟΣ}.pptx
Ο ΕΣΩΤΕΡΙΚΟΣ ΕΛΕΓΧΟΣ ΣΤΟΥΣ ΔΗΜΟΥΣ { ΝΑΞΟΣ}.pptxΟ ΕΣΩΤΕΡΙΚΟΣ ΕΛΕΓΧΟΣ ΣΤΟΥΣ ΔΗΜΟΥΣ { ΝΑΞΟΣ}.pptx
Ο ΕΣΩΤΕΡΙΚΟΣ ΕΛΕΓΧΟΣ ΣΤΟΥΣ ΔΗΜΟΥΣ { ΝΑΞΟΣ}.pptx
 
The implementation of gdpr in greece (1)
The implementation of gdpr in greece (1)The implementation of gdpr in greece (1)
The implementation of gdpr in greece (1)
 
Review your cv critique top cv
Review your cv critique   top cvReview your cv critique   top cv
Review your cv critique top cv
 
Semantics
SemanticsSemantics
Semantics
 
Cv zygoulis
Cv zygoulisCv zygoulis
Cv zygoulis
 
παρουσίασηSim
παρουσίασηSimπαρουσίασηSim
παρουσίασηSim
 
η υλοποίηση εργων στους οτα την περίοδο 2014 2020
η υλοποίηση εργων στους οτα την περίοδο 2014 2020η υλοποίηση εργων στους οτα την περίοδο 2014 2020
η υλοποίηση εργων στους οτα την περίοδο 2014 2020
 
ο ρόλος της θρησκείας στη νεωτερικότητα
ο ρόλος της θρησκείας στη νεωτερικότηταο ρόλος της θρησκείας στη νεωτερικότητα
ο ρόλος της θρησκείας στη νεωτερικότητα
 
τα επιχειρησιακά σχέδια των δήμων
τα επιχειρησιακά σχέδια των δήμωντα επιχειρησιακά σχέδια των δήμων
τα επιχειρησιακά σχέδια των δήμων
 
η δημοσιονομική κρίση στην ελλάδα και οι επιπτώσεις στο ανθρώπινο δυναμικό το...
η δημοσιονομική κρίση στην ελλάδα και οι επιπτώσεις στο ανθρώπινο δυναμικό το...η δημοσιονομική κρίση στην ελλάδα και οι επιπτώσεις στο ανθρώπινο δυναμικό το...
η δημοσιονομική κρίση στην ελλάδα και οι επιπτώσεις στο ανθρώπινο δυναμικό το...
 
e-GOV at the Municipality of Iraklio Attikis Greece
e-GOV at the Municipality of Iraklio Attikis Greecee-GOV at the Municipality of Iraklio Attikis Greece
e-GOV at the Municipality of Iraklio Attikis Greece
 
η ρητορικη επαναπεριγραφη και η αντικειμενικοτητα στον Max weber (1)
η ρητορικη επαναπεριγραφη και η αντικειμενικοτητα στον Max weber (1)η ρητορικη επαναπεριγραφη και η αντικειμενικοτητα στον Max weber (1)
η ρητορικη επαναπεριγραφη και η αντικειμενικοτητα στον Max weber (1)
 
E democracy and open data info sphere in greece.pps (2)
E democracy and open data info sphere in greece.pps (2)E democracy and open data info sphere in greece.pps (2)
E democracy and open data info sphere in greece.pps (2)
 
λογγινος και καινη διαθηκη
λογγινος  και καινη διαθηκηλογγινος  και καινη διαθηκη
λογγινος και καινη διαθηκη
 
πανεπιστημιο αθηνων (εργασια μοντερνα τεχνη)
πανεπιστημιο αθηνων (εργασια μοντερνα τεχνη)πανεπιστημιο αθηνων (εργασια μοντερνα τεχνη)
πανεπιστημιο αθηνων (εργασια μοντερνα τεχνη)
 
Social Enterprises in Greece
Social Enterprises in GreeceSocial Enterprises in Greece
Social Enterprises in Greece
 
Knowledge economy
Knowledge economyKnowledge economy
Knowledge economy
 
University and Global Competency
University and Global CompetencyUniversity and Global Competency
University and Global Competency
 
υπόδειγμα αναφοράς εργασίας ανασχεδιασμου διοικητικης διαδικασιας
υπόδειγμα αναφοράς εργασίας ανασχεδιασμου διοικητικης διαδικασιαςυπόδειγμα αναφοράς εργασίας ανασχεδιασμου διοικητικης διαδικασιας
υπόδειγμα αναφοράς εργασίας ανασχεδιασμου διοικητικης διαδικασιας
 

Dernier

29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkobhavenpr
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhbhavenpr
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Tableget joys
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)Delhi Call girls
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Developmentnarsireddynannuri1
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 

Dernier (20)

29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 

Rule of law in cyberspace as a means and way to cybersecurity

  • 1. A. Elaborate on the idea of the Rule of Law in Cyberspace as a means and way to cyber security. Describe and assess what the Rule of Law, based on human rights norms and standards, means offline and whether that can be transferred online. The Rule of Law means that the government in all its actions is bound by the rules fixed and announced beforehand (F. Hayek, The Road to Serfdom). Conformity to the rule of law means that the human dignity is being respected. The point is the answer to the following question: Does cyber space respects (and how) human dignity? Cyber security means the collection of tools, policies, security concepts, security safeguards, guidelines, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’ s assets. (ITU, Definition of Cyber security, ITV-TX.1205). The general security objectives contain the entities of Integrity, Availability and Confidentiality. The basic pillar of democracy is the inviolable integrity of the individual. Human integrity extends beyond the physical body. In their thoughts and in their personal environments and communications all humans have the right to remain unobserved. (www. the guardian. com/world/2013/dec/10/international-bill-digital-rights-petition-text) State or enterprise surveillance through cyber space is violating the private sphere of the humans. Furthermore, surveillance is being used to predict and form our behavior while it is violating the human right of self-definition and self-expression. The right of liberty for each human is contained in a synthesis of democratic rights that has been formed the last two centuries after the struggle of the European Enligthment. To maintain their validity, our democratic rights must apply in virtual as in the real, physical sphere. The regulation of cyber space addresses themes such the significance and legitimacy of physical, geographically defined, borders and territorial sovereignty (the Failure of the Rule of Law in Cyber space, H. Brian Holland, 2005). There are two questions to answer: A) what are the borders of internet? B) What is the role of a state, a national stakeholder regulator? Concerning the imposition of traditional rules and regulations on the internet we should think first of all the cyber space characteristics: Separateness and Self regulation. Internet has no territorial borders. So, there is no connection between borders and sovereignty’s characteristics like power and legitimacy. Internet‘s architecture is decentralized. Nevertheless, the existence of self-regulation might overcome the problems because territorially-based regimes lack the authority and legitimacy to regulate outside their physical borders. With the emergence of an online environment traditional regulator powers have attempted to impose their norms and regulations constructing a new legal regime. This regime may claim the right to regulate the online activity of persons within its physical territory, and even impose these norms to its citizens when they are abroad.
  • 2. In my opinion we should seek the solution of this problem at the level of the entity of the end-user. End users are citizens, corporations, even States. End users obtain a specific identity, a substantia inside the digital world. B. What legal and political instruments are needed to achieve the protection and realization of human rights in cyberspace? Human rights must be protected and enforced towards the protection of the end user, regarding the physical or legal personality that is engaged in cyber space. So, courts and international organizations do have the legitimacy to impose rules on cyber space regarding the personality of the citizen or organization. 1. European Union has made a lot of steps towards this kind of regulation. According to the Chapter of Fundamental Rights of the EU (Official Journal of the EU, 18/12/2000 C364/1), Article 1 [Human dignity is inviolable. It must be respected and protected], Article 6 [Everyone has the right to liberty and security of person] and Article 8 [Everyone has the right to the protection of personal data concerning him or her] is referring in depth to the correlation between the human rights and the condition of their protection in cyber space. 2. States have a strong interest in the framework of the security inside cyber space. Clapper, the director of USA ‘ s National Intelligence, told the USA Senate that there are 3 areas where USA are most vulnerable to a cyber attack: Electrical grid, Financial Institutions and Government Services. We can see that there are a lot of areas which are at stake regarding Government cyber security. 3. Civil society organizations could promote an understanding and construct bridges between stake holders. We should notice that there are few differences between normal, traditional governance and electronic governance. Electronic governance tends to be more transparent and accessible. Availability is strongly connected to electronic governance because there is more interaction with the users while citizens are allowed to contribute by making suggestions. Traditional government’s disadvantages like difficulty in direct communication, bureaucracy, corruption remain as great institutional obstacles for the implementation of electronic democracy inside cyber space. Talking about the implementation of the Rule of Law inside cyber space we should think of the participation of many stake holders, such as NGOs, the private sector and state-owned firms and academia. We should also think of the legitimating entities that are engaged in the whole process such as the stake holder’s attitudes towards the States’ acts and regulations (ACTA, NSA). This means the promotion of partnership between public sector and private sector and the strengthening of the legal framework and transparency that enforces the accountability of the process of the regulation inside cyber space. Rule of law equals to the respect of the Human Dignity. In order to keep a balance between upholding human rights principles and providing security and safety at the same time, we
  • 3. should construct a precise regulation framework that protects citizens as users of the internet and public stakeholders. The protection of the human rights inside the cyber space requires the engagement of different stake holders. The protection of human liberty is the hard core of the whole process. The bet is on the balance between the state and the man. Photios N. Zygoulis Ph. D Candidate (Business Process Reengineering) University of Athens 2014 March fotiszygoulis@gmail.com