SlideShare une entreprise Scribd logo
1  sur  33
On-Line Speech Harms
Using Legal Process
Judge David Harvey
@djhdcj
Blog:www.theitcountreyjustice.wordpress.com
• The environment – paradigmatic change
• Dealing with on-line speech harms –
strategy
• Dealing with on-line speech harms -
practice
Mark Prensky
Digital Immigrants
Digital Natives
It’s all about how we process
information
Digital Technologies give meaning to
McLuhan’s comment:
The medium is
the message
The impact of the digital communications
technologies – a convergence of
everything that has gone before - lies in
the way in which it redefines the use of
information and the way we access it,
process it, use it, respond to it and our
expectations of it and its availability.
The Properties of Digital
Technologies
• Persistence
• Continuing disruptive
change
• Dynamic information
• Delinearisation of
information
• Dissociative enablement
• Permissionless innovation
• Availability
• Participation
• Searchability
• Retrievability
The information expectations of Digital
Natives have been shaped and moulded by
these qualities.
Their uses and expectations of what
happens in the on-line world are quite
different to those of their parents
(digital immigrants) or those of my
generation (digital aliens).
Thus any solution must be premised upon
an understanding of the technology and
the way that it shapes behaviours and
values underlying those behaviours
The solution must also recognise another
McLuhan aphorism
Any Solution Must Recognise
The time factor – in “internet time”
information moves faster than it does in
the real world
Information is dynamic and spreads
“virally”
“Dissociative enablement” means that
people are going to behave differently
when operating from the apparent
anonymity of a private room or space and
from behind a computer screen
Any remedy is going to be partial – given
that information on the internet is going
to remain in some shape or form (the
quality of persistence or “the document
that does not die”)
Normal civil and political rights including a
robust recognition of freedom of speech
and expression and that the internet is
neutral.
Restrictions on a free and open internet
must be minimal.
Dual Approach
The Offence
The Communications Tribunal
The Offence
Causing harm by means of a communciations device
(a) grossly offensive; or
(b) of an indecent, obscene, or menacing character; or
(c) knowingly false.
Intention aspects.
Victim must have seen the communication – gossip is
not enough
Relevant factors to be taken into account
The Communications Tribunal
Addresses some of the Internet-specific
issues
a) it has a limited jurisdiction
b) it has limited and specific remedies
c) it deals with content and not criminality
d) it operates “on the papers”
e) it is a remedy of last resort after a filtering
process has been carried out by the Approved
Agency
• In exercising its functions, the tribunal
must have regard to the importance of
freedom of expression.
• Transparency is ensured in that the
Tribunal must publish its decisions and the
reasons for them.
• Communications principles
Matters to be Taken into
Account
(a) the content of the communication, its offensive nature,
and the level of harm caused by it:
(b) the purpose of the communicator in communicating it:
(c) the occasion, context, and subject-matter of the
communication:
(d) the extent to which the communication has spread beyond
the original communicator and recipient:
(e) the age and vulnerability of the complainant:
(f) the truth or falsity of the statement:
(g) the extent to which the communication is of public
interest:
(h) the conduct of the defendant, including any attempt by
the defendant to minimise the harm caused:
(i) the conduct of the complainant, including the extent to
which that conduct has contributed to the harm suffered.
Orders
(a) A take down order:
(b) A future non-publication order
(c) Prohibition against encourage others to
behave similarly
(d) a declaration that a communication breaches a
communication principle:
(e) correcting a factually incorrect statement
(f) right of reply:
(g) an apology:
(h) author identification.
These orders are a significant intrusion
upon freedom of expression
State of the Play
• The report has been received by the Minister.
• She has indicated that the recommendation for a
Communications Tribunal will not be adopted.
• The proposed jurisdiction of the Communications
Tribunal will be assumed by the District Court
• Matters to be Considered:
– a) lack of specialist expertise in the field of digital
communications law
– b) potential procedural delays
– c) variation or possible lack of consistency in the
application of principles and the types of orders that
may be made
The Big Picture
Because politics amounts to an
intergenerational contract between one
generation and the next, politicians should
feel entrusted with the conservation of
the past for future generations.
Edmund Burke
But should digital immigrants tell digital
natives how to live their lives in the
digital environment?

Contenu connexe

En vedette

E discovery in the apac region
E discovery in the apac regionE discovery in the apac region
E discovery in the apac regionDavid Harvey
 
Reasonable and Proportional Discovery in the Digital Paradigm: The Role of La...
Reasonable and Proportional Discovery in the Digital Paradigm: The Role of La...Reasonable and Proportional Discovery in the Digital Paradigm: The Role of La...
Reasonable and Proportional Discovery in the Digital Paradigm: The Role of La...David Harvey
 
13 teclc keynote address
13 teclc   keynote address13 teclc   keynote address
13 teclc keynote addressDavid Harvey
 
Judging E-Discovery Disputes
Judging E-Discovery DisputesJudging E-Discovery Disputes
Judging E-Discovery DisputesDavid Harvey
 
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital ParadigmThe Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital ParadigmDavid Harvey
 
Avoiding e discovery disputes
Avoiding e discovery disputesAvoiding e discovery disputes
Avoiding e discovery disputesDavid Harvey
 

En vedette (6)

E discovery in the apac region
E discovery in the apac regionE discovery in the apac region
E discovery in the apac region
 
Reasonable and Proportional Discovery in the Digital Paradigm: The Role of La...
Reasonable and Proportional Discovery in the Digital Paradigm: The Role of La...Reasonable and Proportional Discovery in the Digital Paradigm: The Role of La...
Reasonable and Proportional Discovery in the Digital Paradigm: The Role of La...
 
13 teclc keynote address
13 teclc   keynote address13 teclc   keynote address
13 teclc keynote address
 
Judging E-Discovery Disputes
Judging E-Discovery DisputesJudging E-Discovery Disputes
Judging E-Discovery Disputes
 
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital ParadigmThe Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
 
Avoiding e discovery disputes
Avoiding e discovery disputesAvoiding e discovery disputes
Avoiding e discovery disputes
 

Similaire à On line speech harms- melbourne

Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.pptHODCSEKncet
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project DIPRC2019
 
Digital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van DijkDigital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van DijkXanat V. Meza
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
LIDA 102 Digital Citizenship.pptx
LIDA 102 Digital Citizenship.pptxLIDA 102 Digital Citizenship.pptx
LIDA 102 Digital Citizenship.pptxMagdalene Posakei
 
Media and Information Literacy-Types of Media
Media and Information Literacy-Types of MediaMedia and Information Literacy-Types of Media
Media and Information Literacy-Types of MediaLaniePangilinan2
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfVincent Mwando
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptxKenneth James Alamillo
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeleejhayacosido
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeJhouBautista
 

Similaire à On line speech harms- melbourne (20)

Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project
 
ETECH_G2.pdf
ETECH_G2.pdfETECH_G2.pdf
ETECH_G2.pdf
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
Digital divide
Digital divideDigital divide
Digital divide
 
Digital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van DijkDigital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van Dijk
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Digital Divide.pptx
Digital Divide.pptxDigital Divide.pptx
Digital Divide.pptx
 
Chris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptxChris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptx
 
Mobile Media Privacy
Mobile Media PrivacyMobile Media Privacy
Mobile Media Privacy
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
LIDA 102 Digital Citizenship.pptx
LIDA 102 Digital Citizenship.pptxLIDA 102 Digital Citizenship.pptx
LIDA 102 Digital Citizenship.pptx
 
Ethics sneapa 2016 10 15_16
Ethics sneapa 2016 10 15_16Ethics sneapa 2016 10 15_16
Ethics sneapa 2016 10 15_16
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Media and Information Literacy-Types of Media
Media and Information Literacy-Types of MediaMedia and Information Literacy-Types of Media
Media and Information Literacy-Types of Media
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx9-ictasplatformforchange-180206004734.pptx
9-ictasplatformforchange-180206004734.pptx
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

On line speech harms- melbourne

  • 1. On-Line Speech Harms Using Legal Process Judge David Harvey @djhdcj Blog:www.theitcountreyjustice.wordpress.com
  • 2. • The environment – paradigmatic change • Dealing with on-line speech harms – strategy • Dealing with on-line speech harms - practice
  • 6.
  • 7. It’s all about how we process information
  • 8.
  • 9. Digital Technologies give meaning to McLuhan’s comment:
  • 10. The medium is the message
  • 11. The impact of the digital communications technologies – a convergence of everything that has gone before - lies in the way in which it redefines the use of information and the way we access it, process it, use it, respond to it and our expectations of it and its availability.
  • 12. The Properties of Digital Technologies • Persistence • Continuing disruptive change • Dynamic information • Delinearisation of information • Dissociative enablement • Permissionless innovation • Availability • Participation • Searchability • Retrievability
  • 13. The information expectations of Digital Natives have been shaped and moulded by these qualities.
  • 14. Their uses and expectations of what happens in the on-line world are quite different to those of their parents (digital immigrants) or those of my generation (digital aliens).
  • 15. Thus any solution must be premised upon an understanding of the technology and the way that it shapes behaviours and values underlying those behaviours
  • 16. The solution must also recognise another McLuhan aphorism
  • 17.
  • 18. Any Solution Must Recognise
  • 19. The time factor – in “internet time” information moves faster than it does in the real world
  • 20. Information is dynamic and spreads “virally”
  • 21. “Dissociative enablement” means that people are going to behave differently when operating from the apparent anonymity of a private room or space and from behind a computer screen
  • 22. Any remedy is going to be partial – given that information on the internet is going to remain in some shape or form (the quality of persistence or “the document that does not die”)
  • 23. Normal civil and political rights including a robust recognition of freedom of speech and expression and that the internet is neutral. Restrictions on a free and open internet must be minimal.
  • 24. Dual Approach The Offence The Communications Tribunal
  • 25. The Offence Causing harm by means of a communciations device (a) grossly offensive; or (b) of an indecent, obscene, or menacing character; or (c) knowingly false. Intention aspects. Victim must have seen the communication – gossip is not enough Relevant factors to be taken into account
  • 26. The Communications Tribunal Addresses some of the Internet-specific issues a) it has a limited jurisdiction b) it has limited and specific remedies c) it deals with content and not criminality d) it operates “on the papers” e) it is a remedy of last resort after a filtering process has been carried out by the Approved Agency
  • 27. • In exercising its functions, the tribunal must have regard to the importance of freedom of expression. • Transparency is ensured in that the Tribunal must publish its decisions and the reasons for them. • Communications principles
  • 28. Matters to be Taken into Account (a) the content of the communication, its offensive nature, and the level of harm caused by it: (b) the purpose of the communicator in communicating it: (c) the occasion, context, and subject-matter of the communication: (d) the extent to which the communication has spread beyond the original communicator and recipient: (e) the age and vulnerability of the complainant: (f) the truth or falsity of the statement: (g) the extent to which the communication is of public interest: (h) the conduct of the defendant, including any attempt by the defendant to minimise the harm caused: (i) the conduct of the complainant, including the extent to which that conduct has contributed to the harm suffered.
  • 29. Orders (a) A take down order: (b) A future non-publication order (c) Prohibition against encourage others to behave similarly (d) a declaration that a communication breaches a communication principle: (e) correcting a factually incorrect statement (f) right of reply: (g) an apology: (h) author identification.
  • 30. These orders are a significant intrusion upon freedom of expression
  • 31. State of the Play • The report has been received by the Minister. • She has indicated that the recommendation for a Communications Tribunal will not be adopted. • The proposed jurisdiction of the Communications Tribunal will be assumed by the District Court • Matters to be Considered: – a) lack of specialist expertise in the field of digital communications law – b) potential procedural delays – c) variation or possible lack of consistency in the application of principles and the types of orders that may be made
  • 32. The Big Picture Because politics amounts to an intergenerational contract between one generation and the next, politicians should feel entrusted with the conservation of the past for future generations. Edmund Burke
  • 33. But should digital immigrants tell digital natives how to live their lives in the digital environment?