Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl
Ograniczanie wyników
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 3

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
In the article the author examines state filtering of electronic content in terms of its compliance with international law, especially with provisions guaranteeing the freedom of expression and access to information. The White House implemented program “Internet Freedom”, whose aim is to introduce software enabling the circumvention of local content control in “filtering countries”, is subject to thorough analysis. The analysis covers recent (2011) events in Egypt, where the world’s first successful attempt at shutting down the Internet within state borders was completed. Although enforced through legitimate state actions this Internet shut-down was circumvented with the use of Google-introduced technology. The technology and its use seemed to meet the ideas behind the “Internet Freedom” program, introduced by the White House a few month prior to the Egypt events. In the course of argument the author discusses international responsibility for the possible breach of their international obligations by both: Egypt and the U.S. She provides for the assessment of the legality of the actions of Egyptian authorities’ introducing an Internate filter that constitutes an infringement of freedom of expression, as well as the responsibility of United States for their failure to halt a U.S. legal entity enabling users to circumvent the legitimate Egyptian technology. The author argues that the character of the global network requires a redefinition of state sovereignty, especially in the context of human rights protection on-line. An idea introduced by R.H. Weber of “shared sovereignty” is mentioned, as it reflects the basic principle of international Internet law: the principle of multistakeholder governance.
EN
The author discusses the consequences of Virginia D.C. temporary restraining order against 27 anonymous defendants, resulting in the blocking of 273 domain names, dully registered by foreign individuals. The in rem proceedings were conducted based on personal jurisdiction over the Doe Defendants. This case constitutes a dangerous precedent for exercising jurisdiction over electronic contacts, creating actually a universal competence of the Virginia court. To support this thesis the paper contains a brief summary of the precautious U.S. jurisdictional practice in Internet cases exercised so far. The author presents the evolution of the U.S. judiciary and its noteworthy achievements in setting the jurisdictional standards for cyberspace (e.g. limiting the effective jurisdiction and applying the effects test). She also briefly discusses the international principles of jurisdiction and their applicability (or lack thereof) in the U.S. national legal system. Neither the U.S. judiciary practice nor the international law principles were reflected in this February 2010 Waledac decision, making it a dangerous turning point for all international e-business cases.
EN
The paper presents the international law mechanism allowing to prosecute a state for electronic threats generated from its territory, directed against a foreign sovereign. It discusses the possibility to recognize a cyber-attack as an act of international aggression and shows it difficult at the present state of international debate. It than reaches to the traditional notion of state responsibility for the lack of due diligence as the source of states responsibility for cyber-attacks. Such due diligence should be conducted through sufficient criminal law regulation, properly executed in order to prevent electronic attacks. In order for a sufficient legal system of protection against cyberattacks to be created, an international debate, resulting in international guidelines, should be initiated. The results of such a debate would than allow for the uniformity of national criminal law regulations. As a starting point for such a debate a rough analysis of the Polish penal code rules, especially its Chapter XXXIII, has been presented. The Authors point to the need of an international debate on the system of protection against cyberattacks on key state electronic infrastructure, emphasizing however the already existent international obligation for states to take responsibility for attacks conducted form their territory.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.