Human rights in cyberspace

35
Human rights in cyberspace Kritika Singh chauhan [Amity law school ,Delhi(ip university)] Email address: [email protected]

Transcript of Human rights in cyberspace

Human rights in

cyberspaceKritika Singh chauhan

[Amity law school ,Delhi(ip university)]

Email address: [email protected]

Human rights in cyberspace

Abstract

"All I can say right now is the US government is not going to be

able to cover this up by jailing or murdering me. Truth is

coming, and it cannot be stopped.” statement by Edward snowden in

los angles times, June 2013 .Last year revelations about the

surveillance programs of U.S by snowden shocked the world and

stirred our minds with the question ,how safe are we? It’s not

only a question to our privacy but to our human rights in

cyberspace .Following to the revelation and consequent reaction

of all the states it is quite disturbing to see that we are

subjected to the subordination of state surveillance which goes

to the extent of infringing our basic human rights of privacy and

freedom of expression, for which we have struggled a long way.

Modern surveillance technologies and arrangements that enable

States to intrude into an individual’s private life threaten to

blur the divide between the private and the public spheres. They

facilitate invasive and arbitrary monitoring of individuals, who

may not be able to even know that they have been subjected to

such surveillance. It was only in 2011, UN rapporteur Frank La

Human rights in cyberspace

Rue presented the report concerning to the increased surveillance

as a threat to human rights in cyberspace. This unsettled concept

of human rights oppresses netizens. This paper discusses the

scope of human rights in cyberspace since we have rights offline

but we are still faraway to justify them in cyberspace.

This paper discusses the following issues, first how the basic

human rights realized in cyberspace? And the interrelation and

limitation to privacy and freedom of expression based on the OECD

principles. Second it discusses the international human rights

regime and third it endeavors into the concept of universality

vis-a-vis the concept of borders and territorial sovereignty in

cyberspace.

Author: kritika Singh chauhan ,a student of BALLB(H)-1styear,

Amity law school Delhi.

INTRODUCTION

As we move forward on the ladder of development we are each time

discover a new dimension. A new world where sometimes our

traditional laws fails to provide answers to all questions. Today

what challenges our laws and existing fundamental rights is the

Human rights in cyberspace

new identity of a person in cyberspace. As a result of

information and computing technology, it is possible to plug

oneself into an alternative reality to have fun and meet others

without actually being physically present. Virtual worlds are

rapidly becoming the matrix of human life but at the same time

they offer an ideal surface for committing different kind of

violations to our liberty and dignity. It is absolutely essential

to theoretically analyze the reach of human rights protection in

cyberspace, especially in the context of virtual worlds.1 This

paper basically gives theoretical insight into the humanitarian

law and how various general human rights theories can be used to

realize the existing rights in cyberspace.

Cyberspace

Cyberspace is a part of a greater reality than we already knows,

it is beyond our physical borders and our physical

environment.2cyberspace is understood as a global, non‐physical,

conceptual space, which includes physical and technical

components, i.e., the internet, the ‘global public memory’

contained on publicly accessible websites, as well as all

entities and individuals connected to the internet. Cyberspace

1 Pekka Kijanen, ‘New Generation for Human Rights in Cyberspace’(2008)(1)< humanrights.ee/wp-content/uploads/2012/01/Kijanen_research.pdf >ascessed on 27may20142 Michael Froomkin ,’toward a critical theory of cyberspace’(2003)(116)HLR< http://personal.law.miami.edu/~froomkin/discourse/ils.pdf> accessed on 17 February 2014

Human rights in cyberspace

has political, economic, social and cultural aspects going far

beyond the notion of a pure means of information transfer.3

Different positions in cyberspace

The growing conflict in cyberspace due to absence of national

territory in cyberspace which makes governance more difficult and

thus has given rise to many different views regarding the rules

that should govern cyberspace.

Cyber-libertarian view

There are visionaries such as John Perry Barlow who holds view

that cyberspace is a totally new and alien territory where

conventional rules do not apply and so there should be no

governance. But this view has its own implication and a seed of

destruction in itself since, if more people are likely to use

cyberspace then this would give rise to public and private policy

making since there can be case of cybercrimes affecting public at

large.

Strict regime view

Another strata in the cyberspace is of those people who want

strict regime for activities in cyberspace. They want to control

pornographers ,neo Nazis ,copyright pirates or anybody who holds

politically subversive aspirations.

Self regulation view 3 Dr Katharina Ziolkowski,’Confidence Building Measures for Cyberspace – LegalImplications’(2013)CCDOE< www.ccdcoe.org/docs/CBMs.pdf> accessed on 17 February

Human rights in cyberspace

Then there are cyberspace citizens who feel that they can best

police themselves and who discuss among themselves a variety of

forms of self regulation ranging from Parent Control software to

Cyber Angels, Codes of Conduct and Netiquette.

The specific question of concern here is, whether the current

international human rights regime can provide us with meaningful

moral and legal guidance for the solution of conflict in laws in

cyberspace.

1. HOW THE BASIC HUMAN RIGHTS REALIZED IN CYBERSPACE?

Human rights are rights inherent to all human beings whatever our

nationality, place of residence, sex, national or ethnic origin,

color, religion, language or any other status; we are all equally

entitled to our human rights without discrimination .

The former Oxford Professor of Moral Philosophy James Griffin

defines human rights as those aspects of our lives that are

critical to our capacity to choose and to pursue our conception

of a worthwhile life.4 These aspects can be expressed in terms of

a certain set of capabilities granted to the individual by

society as a matter of justice. Amyarta Sen 5and Martha

Nussbaum6 have pursued this idea in terms of what they call "the

capabilities approach" to social justice.

4  Griffin, J. On Human Rights. Oxford University Press, 2008.5 Sen, A.K., Ed. ‘Commodities and Capabilities. Oxford University Press’(1985)6 Nussbaum, M.C. Frontiers of Justice: Disability, Nationality, and Species Membership. Belknap, Harvard, 2006.

Human rights in cyberspace

Relevance of human rights in cyberspace

The first issue that emerges concern, is the observation that

the human rights regime is firmly embedded in modernist,

Enlightenment thought that seems to collide with the view that

cyberspace is "a manifestation of the postmodern world"7 . Human

rights is a concept embedded in modern world and cyberspace is a

concept of post modern world and this is the most cited theory

that many critics give for cyberspace and its distant connection

with human rights .

Characteristic of the modern world are the physical categories,

such as location, gender, ethnicity, appearance, from which

cyberspace seems to liberate us.but even though human right

regime is a concept of modern world but still these human rights

can be realized in the cyberspace and this can be proved by

various theories given below :

Change and modernization theory

In order to conceptualize human rights in cyberspace we need to

see the larger change that has occurred in the society so that

human rights can be realized to protect the rights of the cyber

citizens.

1. Change theory

Rick davies , a well known evaluation specialist , defines a

theory of change simply as , “the description of a sequence of

7Brian D. Loader. ,‘the governance of cyberspace: politics, technology andglobal restructuring’(1997)HLJT(11)(2)<http://jolt.law.harvard.edu/articles/pdf/v11/11HarvJLTech535.pdf> accessed on17february 2014

Human rights in cyberspace

events that is expected to lead to particular desired

outcome.”8patricia rogers , another well known evaluation expert

defines it , that , “every programme is packed with beliefs,

assumptions and hypothesis about how change happens- about the

way human work ,or organizations ,or political systems ,or eco-

systems.theory of change is about articulating these many

underlying assumptions about how change will happen in a

programme.

Change theory basically gives us the changing pattern in the

society and we articulate these assumptions and see for a major

change ,say the increased number of internet users indicate that

we are likely to come to a positive state of that program and in

order to increase the positive effect we need to safeguard the

basic human rights so that this positive aspect could increase .

2. Modernization theory

The principal assumptions of modernization theory as understood

are firstly that modernization is a total social process

associated with (or subsuming)economic development in terms of

preconditions, concomitants, and consequences of the latter;

second that this process constitutes a “universal

pattern”.9stephenson defines modernization as ‘the concept which

is related to the transformation of culture and personality in so

far as it is influenced by culture , rather than of some aspect8 Rick Davies, April 2012: Blog post on the criteria for assessing the evaluability of a theory of change<http://mandenews.blogspot.co.uk/2012/04/criteria-for-assessing-evaluablity-of.html>asccesed on 17 february 2014.9 Daniel lerner,1967,’comparitive analysis of processes of modernization ‘91967) Horace miner (ed.)pp 21

Human rights in cyberspace

of social organization or of human ecology’.10 now since for the

overall development the society requires to develop its basic

aspects i.e., technology, communication, literacy,

entrepreneurship and since internet in today’s world forms the

base for all these activities it is need of today to have full

access to internet in order to modernize and so we require to

safeguard our basic human rights so to ensure such development.

Baudrillard post modernity concept

Baudrillard intrudes into the concept of internet and virtualty,

In order to realize the concept of internet in post modern

world .Internet both as a technological artifact and as a popular

image, provides a site for exploring “the world”, and the

position of such systems of totality in postmodernity.perhaps

more so than any other contemporary theorist, baudrillard

provides a provocative heading for” navigating “this hyper real

terrain. Although he has not addressed worldwide networking and

internet in the specific in his writing, his comments on

telemetric, along with his more general critiques of modernity,

provide an interesting means for exploring the metaphrocity of

internet. Of particular interest in this baudrillardian

theoretical insight are the geographical metaphors for internet-

the topological framework beneath the “information superhighway”

10john b. stephenson,1968,'is everyone going modern ? a critique and a suggestion for measuring modernization ,american journal of sociology vol.74,no.3

Human rights in cyberspace

that allows for travel, distance, and speed in a metaphorical

world. “cyberspace” no longer strictly refers to the fictional

“matrix” in William Gibson novel,neuromancer;11it. has now

entered into common speech on and off the ‘net as a shorthand for

this conception of computer networks as a cybernetic space from

baudrillaedian perspective, this figuration of internet as a kind

of cybernetic terrain works to undermine the symbolic distance

between metaphoric and the real .This basically suggests, how

baudrillard’s theory can be used to dissuade internet beyond its

modern closures. Replacing the one world with possible worlds,

internet ultimately offers both the seductions of a postmodern

world.

Conventional human rights discourse in cyberspace

It seems however necessary to expand the discussion with a

conceptual critique of the conventional human rights discourse.

The real significance of human rights standards can only be

uncovered if a number of theoretical inadequacies are addressed

and remedied. Conventional theories on human rights imply

limitations to the understanding of human rights that erode the

effective implementation of the very basic claims they enunciate.

These theories are characterized by their exclusive emphasis on

individual rights; their limited interpretation of the concept

11 Baudrillard in cyberspace:internet,virtuality, and post modernity ;mark nunes,dekalb college,1995(originally published in style 29(1995):314-327

Human rights in cyberspace

‘freedom’; their limited understanding of the concept ‘equality’;

their limited scope for ‘horizontal effect’; and their lack of

institutional consideration.

Collective claims.

Human rights in cyberspace should not only be articulated as

individual rights, but should be recognized both as individual

and as collective rights. Since in the discussion on the locus

of human rights the individual and the community cannot be

separated. Individuals do not exist in isolation and are members

of communities. Communities do not exist outside the individuals

that make up the collective. Sanders concludes that "individual

rights and collective rights are distinct ideas, they are

separate categories. Some individual rights can be vindicated

without reference to collective rights...But other basic rights -

such as freedom of religion-cannot be effectively vindicated

without the recognition of collective rights".12 To put human

rights exclusively in either category limits unduly the rights of

individuals as members of a community or the rights of the

collectivity. Collective claims to cyberspace communications

require provisions on the access to public communication on

behalf of social groups. This is particularly important as so

many social groups, eg women, ethnic minorities, or poor

communities tend to be excluded from cyberspace communications.In

addition to this right of access for communities, collective

12 Sanders, D. ‘Collective Rights’, (1991)Human Rights Quarterly, 13: 368-386

Human rights in cyberspace

claims also include the right to development, and the recognition

of communal knowledge resources. Collective claims also imply

provisions on cultural identity, on the recognition of cultural

diversity and linguistic variety, or on the cultural autonomy of

communities.

Liberty

The basic assumption related to liberty in conventional human

right discourse is that freedom of information is the freedom of

expression guaranteed against the interference of state. Which is

a negative freedom whereas if we consider the case of

cyberspace it is more inclined towards the positive aspect of

freedom according to this there should be complete development of

an individual that implies the entitlement to socio-economic

conditions that support the development of "information-capital".

Which is possible when there is complete freedom as regards the

freedom of expression which is defined to include the overall

development.

Security

There are social risks related to cyberspace-technology. These

include nuclear warfare triggered off by computer malfunctioning,

large-scale financial frauds, technological addiction, and

aviation diasters. Intentional harm is easily inflicted in

cyberspace. Computer networks enable people to communicate in

anonymity. Anonymity brings out the worst in people. Under the

Human rights in cyberspace

cloak of anonymity people engage in harmful acts against others

through abuse and deceit. Apparently, anonymity creates a ‘moral

distance’ to the victim which makes it easier to commit harmful

acts. The Information Superhighway creates enormously attractive

opportunities for ‘digital crooks’ and ‘cybersnoopers’. Such

crimes and misdemeanours which range from copyright infringements

to electronic surveillance pose serious threats to people’s moral

and physical integrity.Cyberspace-related social risks to human

security are also induced by the increasing dependence upon

vulnerable and error-prone digital systems. A risk factor is also

the cybernisation of daily life which reinforces current trends

towards high-speed, robot-centric societies.13

In order to protect netizens from such cyber insecurity and risks

,there is a requirement for safeguarding their rights in

cyberspace which can be best defined under human rights because

of its universal character .if we read article 3("Everyone has

the right to life, liberty and security of person") of universal

declaration of human rights in context of article 5 and 9 which

protect people’s moral and physical integrity against

interference from state and non-state actors. This implies

protection against torture, cruel inhuman and degrading treatment

and against arbitrary treatment in the form of arrest, detention

or exile on grounds not established by law.The International

13 CeesHamelink, ‘Human Rights in Cyberspace’(1989)UN Chronicle p-22

Human rights in cyberspace

Covenant on Civil and Political Rights provides for a similar

protection of personal security in Article 914. In the

International Covenant on Social and Economic Rights (Article 9)

security is broadened to social security, inclusive of social

security. Now since social security and physical integrity is

much a concept being realized in cyberspace too So these human

rights can be implemented into cyberspace .

Horizontal effect

Human rights should have horizontal effect. They should not only

apply to state-citizen, but also to citizen-citizen relationships

In the case of information provision there should be protection

against information oligopolies organized by fellow-citizens.

This so called "Drittwirkung" or third party effect of human

rights means, for example, that information rights of people

should be free from interference by public as well as by private

parties15. Already in the discussions leading to the human rights

Covenants it was proposed that interference by private parties

should be barred. The proposal did not acquire the status of

legal provision. "An individual has the right to freedom of

opinion without interference by private parties as well, and the

14 International Covenant on Civil and Political RightsAdopted and opened for signature, ratification and accession by General Assembly resolution 2200A (XXI) of 16 December 1966 entry into force 23 March 1976, in accordance with Article 49

15 Eric Eng, ‘Third Party Effect of Fundamental Rights (Drittwirkung)’ (2009)hanse law review< http://www.hanselawreview.org/pdf8/Vol5No2Art02.pdf> accessed on 17 february 2014

Human rights in cyberspace

state is obliged to ensure that freedom....It is doubtful,

however, whether the complex problem of protecting a person’s

opinion against interferences by other individuals can be solved

in this global and absolute manner"16 .The right to freedom of

expression goes beyond this negative freedom from interference,

however, and includes the recognition of positive free speech

rights.If the freedom of expression is interpreted in more than

the classical negative sense, the positive interpretation makes

it necessary to define this right not merely as a liberty but as

a claim-right. A positive freedom to communicate implies the

claim-right to express opinions and the related entitlement to

facilities for the exercise of this right. The recognition of

freedom of expression as positive claim-right is particularly

important in situations where the voices of some people are

systematically excluded. In such situations the mere freedom from

interference does not enable people to participate in public

communication 17

It is becoming increasingly clear that cyberspace needs defense

against attempts to impose censorship. This defense should not

only be directed against governmental actors. Informational self-

determination (encompassing free speech, freedom to receive and

16Partsch. K.J. Freedom of Conscience and Expression, and Political Freedoms,(1981). Henkin. L. (ed.), The International Bill of Rights. New York:Columbia University Press. pp. 209-245.

17 Barendt, E. ‘Freedom of Speech’(1985) Oxford: Clarendon Press pp-86

Human rights in cyberspace

seek information, the right to control person-related

information, the right to confidentiality of communication, and

the right to refuse information) is threatened by the fashionable

Information Superhighway project.

Privacy vs freedom of expression

Interrelation

Freedom is always understood in context of privacy since the

positive interpretation of freedom does not only means non-

interference by state but also the complete social, economical,

intellectual development of an individual without any

interference Undue interference with individuals’ privacy can

both directly and indirectly limit the free development and

exchange of ideas. Restrictions of anonymity in communication,

for example, have an evident chilling effect on victims of all

forms of violence and abuse, who may be reluctant to report for

fear of double victimization. In this regard, article 17 of ICCPR

refers directly to the protection from interference with

“correspondence”, a term that should be interpreted to encompass

all forms of communication, both online and offline.18 the right

to private correspondence gives rise to a comprehensive

obligation of the State to ensure that e-mails and other forms of

online communication are actually delivered to the desired

18 ICCPR commentary, p.401

Human rights in cyberspace

recipient without the interference or inspection by State organs

or by third parties.19

The Human Rights Committee analyzed the content of the right to

privacy (art. 17) in its General Comment No. 16 (1988), according

to which article 17 aims to protect individuals from any unlawful

and arbitrary interferences with their privacy, family, home, or

correspondence, and national legal frameworks must provide for

the protection of this right. This provision imposes specific

obligations relating to the protection of privacy in

communications, underlining that “correspondence should be

delivered to the addressee without interception and without being

opened or otherwise read. Surveillance, whether electronic or

otherwise, interceptions of telephonic, telegraphic and other

forms of communication, wire-tapping and recording of

conversations, should be prohibited.”20

In its General Comment No. 34 (2011) on the right to freedom of

expression, the Human Rights Committee indicated that States

parties should take account of the extent to which developments

in information and communication technologies have substantially

changed communication practices. The Committee also called on

States parties to take all necessary steps to foster the

independence of these new media. The General Comment also

analyses the relationship between the protection of privacy and19 ICCPR commentary, p.40120 Centre for Civil and Political Rights (CCPR) General Comment No. 16. (General Comments), p.8.

Human rights in cyberspace

freedom of expression, and recommends that States parties respect

that element of the right of freedom of expression that embraces

the limited journalistic privilege not to disclose information

sources.21

Tensions also exist between the right to privacy and the right

to freedom of expression, for example, when information

considered to be private is disseminated through the media. In

this sense, article 19 (3) provides for restrictions on freedom

of expression and information to protect the rights of others.

However, as it happens for all permissible limitations to the

right to freedom of expression , the principle of proportionality

and the ‘do no harm’ harm principal must be strictly observed,

since there is otherwise danger that freedom of expression would

be undermined. Particularly in the political arena, not every

attack on the good reputation of politicians must be permitted,

since freedom of expression and information would otherwise be

stripped of their crucial importance for the process of forming

political opinions,22 advocating for transparency and combating

corruption The international jurisprudence at regional level

indicates that in situations of conflict between privacy and

freedom of expression, reference should be made to the overall

public interest on the matters reported.23

21 ICCPR General Comment No. 34. 22 Nowak, Manfred, United Nations Covenant on Civil and Political Rights: CCPRCommentary (1993), p.462 23 UNESCO, Global Survey on Internet Privacy and Freedom of Expression, 2012, pp. 53 and 99.

Human rights in cyberspace

Guiding principles

principal of proportionality

The framework of article 17 of the ICCPR enables necessary,

legitimate and proportionate restrictions to the right to privacy

by means of permissible limitations. In contrast with the

provisions of article 19, paragraph 3, which spell out elements

of a test for permissible limitations,24 the formulation of

article 17 does not contain a limitation clause. Despite these

differences in wording, it is understood that article 17 of the

Covenant should also be interpreted as containing elements of a

permissible limitations test already described in other General

Comments of the Human Rights Committee.

The right to privacy should be subject to the same permissible

limitations test as the right to freedom of movement, as

elucidated in General Comment 27.25 The test as expressed in the

comment includes, inter alia, the following elements:

(a) Any restrictions must be provided by the law ;

(b) The essence of a human right is not subject to restrictions ;

(c) Restrictions must be necessary in a democratic society ;

(d) Any discretion exercised when implementing the restrictions

must not be unfettered ;

24 Lists of permissible limitations are also included in art. 12, (3), on the right to liberty of movement and freedom to choose his residence; art. 18, (3), on the right to freedom of thought, conscience and religion; art. 21, on the right of peaceful assembly; and art. 22, (2), on the right to freedom of association 25 ICCPR General Comment No. 34

Human rights in cyberspace

(e) For a restriction to be permissible, it is not enough that it

serves one of the enumerated legitimate aims. It must be

necessary for reaching the legitimate aim ;

(f) Restrictive measures must conform to the principle of

proportionality, they must be appropriate to achieve their

protective function, they must be the least intrusive instrument

amongst those which might achieve the desired result, and they

must be proportionate to the interest to be protected.

‘Do no harm’ principle

When we talk in context of freedom and privacy the basic

principle that should be adhered to is the do no harm principle,

this principle defines the limits to one’s freedom and privacy of

other . the simple rule is that one should enjoy one’s freedom

without affecting the rights of others . there is a private

sphere of each individual that defines their private rights .one

should keep this principle in mind while exercising his freedom

rights that they don’t have to interfere or disturb the private

sphere of others. This can both be implemented vertically (state-

citizen) and horizontally(citizen-citizen) relations.

It has also been given in the guidelines of united nations that

UN democracy assistance, while remaining proactive and

innovative, must nevertheless ‘do no harm.’ For example, ill-

timed, and in particular premature elections encouraged by the

international community in fragile societies have sometimes

entrenched undemocratic, nationalist or extremist groups in

Human rights in cyberspace

power, and radicalized political discourse. Ill-conceived and

poorly conceptualized programmes, and the promotion of

inappropriate foreign models, also have the potential to endanger

democratic transitions and, in some cases, they have even

contributed to enhanced societal violence and conflict.26

OECD principles

The OECD guidelines on the protection of privacy and transborder

flows of personal information were developed way back in 1980 to

help harmonize national privacy legislation and, at the same time

, prevent interruption in international flows of data. these

principles still have much relevance today and can be guides for

the direction that may be taken by states for privacy

protection .the guidelines consists of 8 basic principles:

1. Collection Limitation Principle

There should be limits to the collection of personal data and any

such data should be obtained by lawful and fair means and, where

appropriate, with the knowledge or consent of the data subject.

2. Data Quality Principle

Personal data should be relevant to the purposes for which they

are to be used, and, to the extent necessary for those purposes,

should be accurate, complete and kept up-to-date.

3. Purpose Specification Principle

26 UNGuidance Note of the Secretary-General on Democracy,(2007) General Assembly resolution A/RES/62/7.

Human rights in cyberspace

The purposes for which personal data are collected should be

specified not later than at the time of data collection and the

subsequent use limited to the fulfillment of those purposes or

such others as are not incompatible with those purposes and as

are specified on each occasion of change of purpose.

4. Use Limitation Principle

Personal data should not be disclosed, made available or

otherwise used for purposes other than those specified except:

a) with the consent of the data subject; or

b) by the authority of law.

5. Security Safeguards Principle

Personal data should be protected by reasonable security

safeguards against such risks as loss or unauthorized access,

destruction, use, modification or disclosure of data.

6. Openness Principle

There should be a general policy of openness about developments,

practices and policies with respect to personal data. Means

should be readily available of establishing the existence and

nature of personal data, and the main purposes of their use, as

well as the identity and usual residence of the data controller.

7. Individual Participation Principle

An individual should have the right:

Human rights in cyberspace

a) to obtain from a data controller, or otherwise, confirmation

of whether or not the data controller has data relating to him;

b) to have communicated to him, data relating to him within a

reasonable time;  at a charge, if any, that is not excessive;  in

a reasonable manner; and  in a form that is readily intelligible

to him;

c) to be given reasons if a request made under subparagraphs (a)

and (b) is denied, and to be able to challenge such denial; and

d) to challenge data relating to him and, if the challenge is

successful to have the data erased, rectified, completed or

amended.

8. Accountability Principle

A data controller should be accountable for complying with

measures which give effect to the principles stated above.

2.HUMAN RIGHTS CYBER REGIME

Human right cyber regime is a regime that combines both human

rights and cyber regime in one form. This kind of regime contains

both character of international human rights regime and the cyber

regime . in order to understand the human right cyber regime we

need to first contextualize the regime and find its applicability

in cyberspace secondly we need to also look at “multi stake

holder approach” to analyze the theory of human right cyber

regime further ,since this theory contains conflating character

Human rights in cyberspace

of normative and technical aspect contained in it , which

distinguishes it from other regimes of patterned behavior .

Regime analysis

In order to find a relevant solution for the problem and make the

rules and laws uniform for all nation .we need to understand the

regime theory and its applicability in cyberspace .firstly we

need to define a regime and then its scope of applicability in

cyberspace . Regime analysis is truly part of a long term

research program that analyzes the impact of ideas and material

factors on international cooperation, and their interplay. 

Ultimately, regime analysis promises a form of emancipator

politics.  By better understanding the specific influences in

world politics, their domains, and their interactions, we can

finally appreciate the full array of forces that shape world

politics.27

Regime theory can be defined by three different perspective,

first perspective defines it as patterned behavior Donald

puchla and Raymond Hopkins argue that a regime exists in every

substantive issue –area in international relations, where there

is regularity in behavior , some kinds of principles norms or

rules must exist to account for it.28But this definition is broad

27 Peter m. has , ‘enduring relevance of international regime’(2013), e-international relation < http://www.e-ir.info/2013/01/22/the-enduring-relevance-of-international-regimes/> accessed on 17 february 2014.

28 Donald puchla and Raymond Hopkins,”international regimes:lessons from inductive analysis, (1982) (36)(2)interenational organization <http://links.jstor.org/sici?sici=0020 -8183%28198221%2936%382%3c245%3AIRLFLA

Human rights in cyberspace

and runs the risk of conflating regularized patterns of behavior

with rules , and almost certainly overestimates the level of

normative consensus in international politics .29 jerome stephens

and Ernst b.haas has commented that deducing regimes from

patterned behavior makes it difficult to decide how they

mediate , constrain , or influence behavior.the term regime is

sometimes used in apurely descriptive way to group a range of

state behaviors in a particular issue –area , but since the

potential for tautology is high , this approach has largely been

abandoned.30 Another perspective of regime is the explicit and

implicit commitments in regime behavior Krasner defines a regime

as “implicit or explicit principles, norms, rules and decision –

making procedures around which actors’ expectations converge in a

given area of international relations.31but despite the care with

which these norms and principles have been

defined ,”principles”(which include not only beliefs of fact and

causation, but also of rectitude)shade off into norms, “standards

of behavior defined in terms of rights and obligations,norms in

turn are difficult to distinguish from rules,”specific

prescriptions or proscriptions for action.”32

%3E2.0.CO%3B2-C> accessed on 17 february 201429 Friedrich hayek,’ law legislation and liberty’(1973)(1)rules and orders(Chicago:university of Chicago press,1973) pp-78-7930 Ernst b.has, ‘on system and international regimes’(1975)(27)world politics ,pp-147-74; Jerome stephens, ‘an appraisal of some systems approachesin the study of international systems’(1972)(16)international studies quarterly ,pp-76-79 31 Stephen Krasner, ‘structural causes and regimes consequences ;regimes as intervening variables’(1977)international regimes ,pp-1-21.32 Friedrich kratochwil, ‘the force of prescriptions’(1984)(38)international organization,pp-685;john ruggie and Friedrich kratochwil,’international

Human rights in cyberspace

Third , more restrictive definition treats regime as multilateral

agreements among states which aim to regulate national actions

within an issue area.33regimes define the range of permissible

state action by outlining explicit injunctions. Regimes often

contain rules which govern or specify their own transformation,

but to explain “regime change” per se is to explain why states

would agree to modify the codified rights and rules that regulate

their behavior .this approach risks the change of formalism- a

charge which has plagued the study of international law . on the

other hand, it focuses attention on the evolution of the texts

constituting international agreements ; it also clearly separates

normative consensus from definition of regimes , treating it

rather as a casual or constitutive variable that may be useful in

explaining cooperation.34

Regime: dimension of variance and change

Many studies fail to specify what they mean by regime

transformation or treat it in a uni-dimensional way, regimes may

change over time or vary across cases in at least four

ways :strength, organizational form , scope, and allocation mode.

as cyberspace is a new concept and we know we need variance

from traditional ways to define a perfect human right cyber

organization:a state of the art on the art of the state ‘,(1986)( autumn 40)international organization,pp-753-766.33 Vinod aggarwal,’liberaln protectionism:the international politics of organized textile trade ‘(1985)chp-2,berkeley:university of califonia press)34 Ducan snidal, ‘limits of hegemoric stability theory’ ,(1985)(39)international organization pp-579-614

Human rights in cyberspace

regime to provide solution to the present problem that is

mushrooming in the virtual world.

a. Strength

The degree of compliance with regime injunction , particularly in

instances where short term or myopic self interests collide with

regime rules is the measure for strength of any regime theory35

since cyberspace is a virtual world and reaches to every

individual and country on the globe this makes participation in

cyberspace much easier and due to presence of different actors in

cyberspace there is greater compliance and hence regime is much

stronger.

b. Organizational Form

There is a need for a structured, potentially autonomous,

organizational structure because complex cooperative task require

such organizational structure moreover, if cooperation is already

highly institutionalized ,theories resting on assumptions of

anarchy are highly misleading ; black boxing organizational

structure and processes will lead to simplistic predictions.36

Especially cyberspace requires such organized form because of its

complexities and absence of territorial borders and undefined

authority , only mutual agreements and deliberations can solve

various cyberspace issue.

35 Stephen Krasner,’structural conflict:the third world against global liberlism’(1985)chp-2(Berkeley :university of California,1985)36 W.richard scott, organizatios:rational, natural and open systems(engelwood cliffs, N.J : PRENTICE HALL,1981)CHP5

Human rights in cyberspace

Also principle governing representation are another dimension of

organizational variance, many international organization are

structured to give single representation to country members and

many are based on weighted voting system (eg. IMF and WORLD

BANK ) . now especially in cyberspace there needs to be equal

representation to all the actors whether member states or any

private or non –state actor so to establish cyberspace on

democratic lines.

c. Scope

The range of issues that a regime covers is called scope .though

this has attracted really less theoretical attention but its

neglect can cause misleading characterizations. Taking an example

of trade regime where failure to comply to certain GATT (general

agreement on tariffs and trade) provisions signaled a weakening

of trade regime in 1970s . yet at the same time , the regime ‘s

scope expanded through the negotiations of the TOKYO ROUND

CODES .37the most contentious questions on the human right cyber

space agenda concerns the regimes scope –namely , what should be

its composition , how would it issue new issues concerning cyber

crime and human right infringement , international and national

perspective regarding the issue .

d. Allocation mode

37 Stephen Krasner ,’the tokyo round :pluralistic interests and prospects for stability in the global training sysytem’(1979)(23)international studies quaterly ,pp-491-531.

Human rights in cyberspace

Allocation mode in a regime can be how the rights are distributed

and whether there is implicit or explicit approach in providing

structure of property and use of rights . there are two kinds of

allocation mode , market oriented regime or authoritative mode of

allocation .

A market oriented regime supports the private allocation of

resources , discourages national controls , guarantees property

rights, and facilities private contracting . as Oran young

states, “free enterprise systems are not institutional

arrangements operating outside or in the absence of any regime .

such systems clearly require explicit structures of property or

use of rights”38at another extreme is authoritative allocation

which involves the direct control of resources by regime

authorities and will demand more extensive , and potentially

autonomous , organizational structures. The nature of issue-area

and extent of cooperation sought will partly determine the

preference for market oriented or authoritative modes of

allocation. 39

Multi-stake holder approach

Multi stake holder approach is different from regime approach

since regime approach has character of reciprocity and common

created rules where as in multi- stake holder approach is based

on equal representation of actors and grouping of actor , these38 Oran young,’compliance and public authority’,(1)p-5539 Robert rothstien, ‘regime creation by a coalition of the weak lessons from NIEO and the integrated program for commodities’,(1984)(28)international studies quarterly pp-307-28

Human rights in cyberspace

can be from public or private sphere ,NGOs and other stake holder

that come for common purpose .

The aim of multi-stakeholder process is to promote better

decision making by ensuring that the views of the main actors

concerned about a particular decision are heard and integrated at

all stages through dialogue and consensus building. The process

takes the view that everyone involved in the process has a valid

view and relevant knowledge and experience to bring to the

decision making. The approach aims to create trust between the

actors and solutions that provide mutual benefits (win-win). The

approach is people-centered and everyone involved takes

responsibility for the outcome. Because of the inclusive and

participatory approaches used, stakeholders have a greater sense

of ownership for decisions made. They are thus more likely to

comply with them. This approach can be the best way to resolve

issues in cyberspace since in this there is equal representation

and voluntary partnership; they come to achieve collaborative

goals through consultation and collaboration process.

3. TERRITORIAL SOVEREIGNTY AND CYBERSPACE

‘Cyberspace’ has been defined as “a global domain within the

information environment consisting of the interdependent network

of information technology infrastructures, including the

Internet, telecommunications networks, computer systems, and

Human rights in cyberspace

embedded processors and controllers”. 40There is a widely-held

view that it “is not a physical place – it defines measurement in

any physical dimension or time space continuum. It is a shorthand

term that refers to the environment created by the confluence of

cooperative networks of computers, information systems, and

telecommunication infrastructures commonly referred to as the

World Wide Web.”41 It is true that cyberspace is characterized by

anonymity and ubiquity.42 Therefore it seems logical to

assimilate it to the high seas, international airspace and outer

space43, i.e., to consider it a ‘global common’ or legally a res

communis omnium.44 However, these characterizations merely

justify the obvious conclusion that cyberspace in its entirety is

not subject to the sovereignty of a single State or of a group of

States. In view of its characteristics it is immune from

appropriation.

40Joint Chiefs of Staff, Joint Pub. 1-02, Dept. of Defense Dictionary of Military and Associated Terms, at 41(12 April 2001). See also the definition by Arie J. Schaap, ‘Cyber Warfare Operations: Development andUse under International Law’, 64 AFLR, 121-173, at 126 (2009)41 Thomas Wingfi eld, The Law of Information Conflict: National Security Law in Cyberspace, at 17 (AegisResearch Corp. 2000)42 Geoffrey L Herrera, Cyberspace and Sovereignty: Thoughts on Physical Space and Digital Space, 12 (2006), available at <http://www. allacademic.com/meta/p98069_index.html>.accessed on 19 February 2014 43 W. Franzese, ‘Sovereignty in Cyberspace: Can It Exist?’, 64 AFLR 1-42, at18 sep (2009).44 U.S Department of Defense, Strategy for Operating in Cyberspace < http://www.defense.gov/news/d20110714cyber.pdf> ;accessed on 19 Feb. 2014 U.S. Department of Defense, The Strategy for Homeland Defense and Civil Support, at 12 (2005)

Human rights in cyberspace

Despite of the correct classification of ‘cyberspace as such’ as

a res communis omnium State Practice gives sufficient evidence that

cyberspace, or rather: components thereof, is not immune from

sovereignty and from the exercise of jurisdiction. On the one

hand, States have exercised, and will continue to exercise, their

criminal jurisdiction vis-à-vis cyber crimes45 and they continue

to regulate activities in cyberspace. On the other hand, it is

important to bear in mind that “cyberspace requires a physical

architecture to exist”.46 The respective equipment is usually

located within the territory of a State. It is owned by the

government or by corporations. It is connected to the national

electric grid.47 The integration of physical components, i.e., of

cyber infrastructure located within a State’s territory, into the

‘global domain’ of cyberspace cannot be interpreted as a waiver

of the exercise of territorial sovereignty. In view of the

genuine architecture of cyberspace it may be difficult to

exercise sovereignty. Still, the technological and

technical problems involved do not prevent a State from

exercising its sovereignty, especially its criminal jurisdiction,

to the cyber infrastructure located in areas covered by its

territorial sovereignty. States have continuously emphasized

45 Council of Europe Convention on Cybercrime of 23 November 2001, E.T.S. No.185.

46 Patrick W. Franzese, ‘Sovereignty in Cyberspace: Can It Exist?’, 64AFLR 1-42, at 18 sep (2009).47 Joshua E. Kastenberg, ‘Non-Intervention and Neutrality in Cyberspace: An Emerging Principle in theNational Practice of International Law’, 64 AFLR, 43-64, 64 (2009).

Human rights in cyberspace

their right to exercise control over the cyber infrastructure

located in their respective territory, to exercise their

jurisdiction over cyber activities on their territory, and to

protect their cyber infrastructure against any trans-border

interference by other States or by individuals.48

It needs to be emphasized that the applicability of the principle

of sovereignty to the said components of, and activities in,

cyberspace is not barred by the innovative and novel character of

the underlying technology. This holds true for the majority of

rules and principles of customary international law that do apply

to cyberspace and to cyber activities. The U.S. President, in the

2011 International Strategy for Cyberspace, has clearly stated

that the “development of norms for state conduct in cyberspace

does not require a reinvention of customary international law,nor

does it render existing international norms obsolete. Long-

standing international norms guiding state behavior – in times of

peace and conflict – also apply in cyberspace.”49

This does not necessarily mean that the said rules and principles

are applicable to cyberspace in their traditional interpretation.

48 Strategy for Operating in Cyberspace, supra note 10. See further U.S. Department of Defense,Cyberspace Policy Report - A Report to Congress Pursuant to the National Defense Authorization Act forFiscal Year 2011, Section 934, at 4 et seq. (November 2011), < http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf.>; U.S.President, International Strategy for Cyberspace, at 12 et seq. (May 2011) accessed on 19February 2014 49 Ibid., at 9.

Human rights in cyberspace

In view of the novel character of cyberspace and in view of the

vulnerability of cyber infrastructure and cyber components there

is a noticeable uncertainty amongst governments and legal

scholars as to whether the traditional rules and principles of

customary international law are sufficiently apt to provide the

desired answers to some worrying

questions. It is, therefore, of utmost importance that States not

only agree on the principal application of customary

international law to cyberspace but also on a common

interpretation that takes into due consideration the “unique

attributes of networked technology”.50 Hence it is

necessary that governments “continue to work internationally to

forge consensus regarding how norms of behavior apply to

cyberspace”.51

CONCLUSION

from the paper we can conclude that the existing human rights can

be realized in the cyber space by the theoretical approaches used

and this provides that these human rights should follow either

regime approach or multistakeholder approach to reach a

deliberated and proper solution. And hence we can get answer to

all our questions .

50 Ibid.: “Nonetheless, unique attributes of networked technology require additional work to clarify how thesenorms apply and what additional understandings might be necessary to supplement them.”51 Ibid. See also the Cyberspace Policy Report, supra note 14, at 7 At p. 9

Human rights in cyberspace