SlideShare une entreprise Scribd logo
1  sur  32
Advancing Internet Policy in the
Digital Age:
Best Practices
& Lessons Learned
Created by:
Jillian C. York
Electronic Frontier Foundation
Meet your trainer:
Jillian York, Electronic Frontier Foundation
jillian@eff.org
Working definition of Internet governance:
“Internet governance is the development
and application by Governments, the private
sector, and civil society, in their respective
roles, of shared principles, norms, rules,
decision-making procedures, and
programmes that shape the evolution and
use of the Internet.”
Source: WSIS
Internet Governance (IG)
What does IG cover?
• Internet infrastructure and standardisation
• Technical standards (e.g., IP, DNS)
• Safety/integrity (e.g., spam, security)
• Legal issues (e.g., privacy, copyright, cybercrime)
• Economic issues (e.g., taxation)
• Access issues
• Socio-cultural issues (e.g., free expression)
International Governance:
A Brief History
• Late 1960s: US develops DARPA, TCP/IP
• First regulation: Internet Engineering Task
Force (IETF)
• Mid-’90s: “DNS War” as private companies
get involved
• 1998: Establishment of ICANN to regulate
domains
• 2003: First World Summit on the
Information Society (WSIS) in Geneva
A Brief History, continued
• 2005: Second WSIS in Tunis brought
about conflict
• 2006: First Internet Governance Forum
(IGF) promoting multistakeholderism in
Internet governance
• Since 2006: Greater international
developments in IGF, ICANN, other for a
• 2013: “WSIS+10” in February 2013
ICANN:
Internet Corporation for Assigned Names and Numbers
What does it do?
• Coordinates the Internet protocol address
spaces (IPv4 and IPv6)
• Assigns address blocks to regional Internet
registries (e.g., .uk, .eg)
• Manages top-level domain name space (e.g.,
.com, .net)
ICANN, continued
• Non-profit, private org based in the United
States
• Open process of decision-making
IANA:
Internet Assigned Numbers Authority
• Subordinate to ICANN, contracted to the
US Department of Commerce
• In charge of numbers, IP addresses
The UN
• UN involvement: The IGF vs. the ITU
• Internet Governance Forum (IGF):
Multistakeholderism
• International Telecommunication Union
(ITU): Governments
Universal Declaration of Human
Rights
Article 19:
“Everyone has the right to freedom of opinion
and expression; this right includes freedom to
hold opinions without interference and to
seek, receive and impart information and
ideas through any media and regardless of
frontiers.”
International Covenant on Civil and
Political Rights (ICCPR)
Article 19
1. Everyone shall have the right to hold opinions without
interference
2. Everyone shall have the right to freedom of expression; this
right shall include freedom to seek, receive and impart
information and ideas of all kinds, regardless of frontiers,
either orally, in writing or in print, in the form of art, or
through any other media of his choice.
3. The exercise of the rights provided for in paragraph 2 of this
article carries with it special duties and responsibilities. It
may therefore be subject to certain restrictions, but these
shall only be such as are provided by law and are
necessary:
a) For the respect of the rights or reputations of others;
b) For the protection of national security or of public order (ordre
public) or of public health or morals.
Introduction to Content Control
Content Control
What types of content are commonly
controlled online?
• Political speech
• Obscene content
• Social issues, human rights information
• “Hate speech,” blasphemy
• Threats to national security
• Intellectual property
Technical Controls
Technical mechanisms of control:
• IP blocking
• DNS poisoning
• Keyword filtering
• URL blocking
• Deep packet inspection
• Attacks (DDoS, malware)
Content Control: A Global Overview
Source: Reporters Without Borders,
Qatar: Transparency in Censorship
Legal Controls
• Copyright-related restrictions
– Digital Millennium Copyright Act (DMCA)
– International treaties (e.g., ACTA, TPP)
– “Three-strikes” laws (e.g., HADOPI)
• Defamation, Libel, and Lese Majesty
– Criminal (e.g., Thailand)
– Civil (e.g., UK, Turkey)
– Blocking of websites (e.g., India, Palestine)
Legal Controls
• Obscenity, hate speech
– Dozens of countries place restrictions on certain
types of speech
– Some restrictions justified under ICCPR.
• Intermediary liability
– Intermediaries are often held responsible for the
content they host.
– Very few countries provide liability protections for
intermediaries
Regulation by companies
• Private companies have increasing power
over content
• Governments frequently enact pressure on
companies to restrict content or hand over
user data
Regulation by companies, cont‟d
• Companies are subject to laws in the
jurisdictions in which they work
• Privacy and speech laws vary widely by
jurisdiction, presenting challenges for
companies
• 2004: Shi Tao and Yahoo!
The quasi-public sphere: challenges
• Intermediaries have the right to restrict
speech and make their own regulations
• Many companies go beyond the First
Amendment (US) or Article 19 in
regulating speech
Case: No „Palestinian‟ pages
Case: Facebook‟s “real name” policy
Case: No Appeals
• “Unfortunately, we won’t be able to
reactivate your account or respond to your
email directly. This decision is final and
cannot be appealed.”
• Change in 2011: Appeals system
introduced after repeated pressure on
Facebook.
What is being done to protect speech
on private platforms?
• Global Network Initiative
• Who Has Your Back?
• Individual advocacy
Global Network Initiative
• Founded in 2008
• Yahoo!, Google, Microsoft founding
members
• Multistakeholder
• Seeks to safeguard freedom of speech
and privacy against government
restrictions
Other efforts: “Who has your back?”
Day 2:
User Rights & Safety
Domestic Internet Governance
• What are some principles for protecting
user rights?
• How does Palestine compare to the rest of
the world?
Your Security
• Review of risk assessment principles
What program should I use to:
• Email?
• Chat?
• Text message?
• Voice chat?
Your Site‟s Security
• Where should I host my site?
• How can I mirror my site?
• How do I backup my site?
• What else do I need to know?

Contenu connexe

Tendances

An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Jeremy Pesner
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyKenny Huang Ph.D.
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesFreedom House
 
Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problemsTan Tran
 
Internet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in chinaInternet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in china文煜 王
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom House
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...Jeremy Pesner
 

Tendances (20)

An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
Isa12b
Isa12bIsa12b
Isa12b
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunities
 
Polinter11
Polinter11Polinter11
Polinter11
 
Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problems
 
Internet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in chinaInternet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in china
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...
 

Similaire à International internet governance

Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technologyorrenprunckun
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Adam Thierer
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)Berin Szoka
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptAnil Yadav
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfBiproRoy3
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theoriesTobore Oshobe
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
 

Similaire à International internet governance (20)

Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.ppt
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdf
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theories
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 

Plus de Jillian York

Toward an ethical framework for the digital society
Toward an ethical framework for the digital societyToward an ethical framework for the digital society
Toward an ethical framework for the digital societyJillian York
 
Knight oc newnew.org
Knight oc   newnew.orgKnight oc   newnew.org
Knight oc newnew.orgJillian York
 
Encryption is for everyone!
Encryption is for everyone!Encryption is for everyone!
Encryption is for everyone!Jillian York
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalistsJillian York
 
Promises and Perils: The Internet as Contested Space for Social Change
Promises and Perils: The Internet as Contested Space for Social ChangePromises and Perils: The Internet as Contested Space for Social Change
Promises and Perils: The Internet as Contested Space for Social ChangeJillian York
 
Tools of Change: How the Internet Shaped the 'Arab Spring'
Tools of Change: How the Internet Shaped the 'Arab Spring'Tools of Change: How the Internet Shaped the 'Arab Spring'
Tools of Change: How the Internet Shaped the 'Arab Spring'Jillian York
 
OVC 11 - Jillian York Keynote
OVC 11 - Jillian York KeynoteOVC 11 - Jillian York Keynote
OVC 11 - Jillian York KeynoteJillian York
 
re:campaign XI - Jillian C. York
re:campaign XI - Jillian C. Yorkre:campaign XI - Jillian C. York
re:campaign XI - Jillian C. YorkJillian York
 
re:publica XI - Jillian C. York
re:publica XI - Jillian C. Yorkre:publica XI - Jillian C. York
re:publica XI - Jillian C. YorkJillian York
 

Plus de Jillian York (9)

Toward an ethical framework for the digital society
Toward an ethical framework for the digital societyToward an ethical framework for the digital society
Toward an ethical framework for the digital society
 
Knight oc newnew.org
Knight oc   newnew.orgKnight oc   newnew.org
Knight oc newnew.org
 
Encryption is for everyone!
Encryption is for everyone!Encryption is for everyone!
Encryption is for everyone!
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
 
Promises and Perils: The Internet as Contested Space for Social Change
Promises and Perils: The Internet as Contested Space for Social ChangePromises and Perils: The Internet as Contested Space for Social Change
Promises and Perils: The Internet as Contested Space for Social Change
 
Tools of Change: How the Internet Shaped the 'Arab Spring'
Tools of Change: How the Internet Shaped the 'Arab Spring'Tools of Change: How the Internet Shaped the 'Arab Spring'
Tools of Change: How the Internet Shaped the 'Arab Spring'
 
OVC 11 - Jillian York Keynote
OVC 11 - Jillian York KeynoteOVC 11 - Jillian York Keynote
OVC 11 - Jillian York Keynote
 
re:campaign XI - Jillian C. York
re:campaign XI - Jillian C. Yorkre:campaign XI - Jillian C. York
re:campaign XI - Jillian C. York
 
re:publica XI - Jillian C. York
re:publica XI - Jillian C. Yorkre:publica XI - Jillian C. York
re:publica XI - Jillian C. York
 

International internet governance

  • 1. Advancing Internet Policy in the Digital Age: Best Practices & Lessons Learned Created by: Jillian C. York Electronic Frontier Foundation
  • 2. Meet your trainer: Jillian York, Electronic Frontier Foundation jillian@eff.org
  • 3. Working definition of Internet governance: “Internet governance is the development and application by Governments, the private sector, and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.” Source: WSIS
  • 4. Internet Governance (IG) What does IG cover? • Internet infrastructure and standardisation • Technical standards (e.g., IP, DNS) • Safety/integrity (e.g., spam, security) • Legal issues (e.g., privacy, copyright, cybercrime) • Economic issues (e.g., taxation) • Access issues • Socio-cultural issues (e.g., free expression)
  • 5. International Governance: A Brief History • Late 1960s: US develops DARPA, TCP/IP • First regulation: Internet Engineering Task Force (IETF) • Mid-’90s: “DNS War” as private companies get involved • 1998: Establishment of ICANN to regulate domains • 2003: First World Summit on the Information Society (WSIS) in Geneva
  • 6. A Brief History, continued • 2005: Second WSIS in Tunis brought about conflict • 2006: First Internet Governance Forum (IGF) promoting multistakeholderism in Internet governance • Since 2006: Greater international developments in IGF, ICANN, other for a • 2013: “WSIS+10” in February 2013
  • 7. ICANN: Internet Corporation for Assigned Names and Numbers What does it do? • Coordinates the Internet protocol address spaces (IPv4 and IPv6) • Assigns address blocks to regional Internet registries (e.g., .uk, .eg) • Manages top-level domain name space (e.g., .com, .net)
  • 8. ICANN, continued • Non-profit, private org based in the United States • Open process of decision-making
  • 9. IANA: Internet Assigned Numbers Authority • Subordinate to ICANN, contracted to the US Department of Commerce • In charge of numbers, IP addresses
  • 10. The UN • UN involvement: The IGF vs. the ITU • Internet Governance Forum (IGF): Multistakeholderism • International Telecommunication Union (ITU): Governments
  • 11. Universal Declaration of Human Rights Article 19: “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.”
  • 12. International Covenant on Civil and Political Rights (ICCPR) Article 19 1. Everyone shall have the right to hold opinions without interference 2. Everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice. 3. The exercise of the rights provided for in paragraph 2 of this article carries with it special duties and responsibilities. It may therefore be subject to certain restrictions, but these shall only be such as are provided by law and are necessary: a) For the respect of the rights or reputations of others; b) For the protection of national security or of public order (ordre public) or of public health or morals.
  • 14. Content Control What types of content are commonly controlled online? • Political speech • Obscene content • Social issues, human rights information • “Hate speech,” blasphemy • Threats to national security • Intellectual property
  • 15. Technical Controls Technical mechanisms of control: • IP blocking • DNS poisoning • Keyword filtering • URL blocking • Deep packet inspection • Attacks (DDoS, malware)
  • 16. Content Control: A Global Overview Source: Reporters Without Borders,
  • 18. Legal Controls • Copyright-related restrictions – Digital Millennium Copyright Act (DMCA) – International treaties (e.g., ACTA, TPP) – “Three-strikes” laws (e.g., HADOPI) • Defamation, Libel, and Lese Majesty – Criminal (e.g., Thailand) – Civil (e.g., UK, Turkey) – Blocking of websites (e.g., India, Palestine)
  • 19. Legal Controls • Obscenity, hate speech – Dozens of countries place restrictions on certain types of speech – Some restrictions justified under ICCPR. • Intermediary liability – Intermediaries are often held responsible for the content they host. – Very few countries provide liability protections for intermediaries
  • 20. Regulation by companies • Private companies have increasing power over content • Governments frequently enact pressure on companies to restrict content or hand over user data
  • 21. Regulation by companies, cont‟d • Companies are subject to laws in the jurisdictions in which they work • Privacy and speech laws vary widely by jurisdiction, presenting challenges for companies • 2004: Shi Tao and Yahoo!
  • 22. The quasi-public sphere: challenges • Intermediaries have the right to restrict speech and make their own regulations • Many companies go beyond the First Amendment (US) or Article 19 in regulating speech
  • 24. Case: Facebook‟s “real name” policy
  • 25. Case: No Appeals • “Unfortunately, we won’t be able to reactivate your account or respond to your email directly. This decision is final and cannot be appealed.” • Change in 2011: Appeals system introduced after repeated pressure on Facebook.
  • 26. What is being done to protect speech on private platforms? • Global Network Initiative • Who Has Your Back? • Individual advocacy
  • 27. Global Network Initiative • Founded in 2008 • Yahoo!, Google, Microsoft founding members • Multistakeholder • Seeks to safeguard freedom of speech and privacy against government restrictions
  • 28. Other efforts: “Who has your back?”
  • 29. Day 2: User Rights & Safety
  • 30. Domestic Internet Governance • What are some principles for protecting user rights? • How does Palestine compare to the rest of the world?
  • 31. Your Security • Review of risk assessment principles What program should I use to: • Email? • Chat? • Text message? • Voice chat?
  • 32. Your Site‟s Security • Where should I host my site? • How can I mirror my site? • How do I backup my site? • What else do I need to know?