Beginning the tidy-up
This commit is contained in:
parent
6ed44e21c2
commit
a2b2404148
1 changed files with 81 additions and 74 deletions
|
@ -327,7 +327,7 @@
|
||||||
- The new Copyright Directive...
|
- The new Copyright Directive...
|
||||||
-
|
-
|
||||||
|
|
||||||
* CONSDONE Introduction
|
* Introduction
|
||||||
|
|
||||||
My name is Éibhear Ó hAnluain and I have been working in software
|
My name is Éibhear Ó hAnluain and I have been working in software
|
||||||
engineering and IT systems design since 1994. I thank you for the
|
engineering and IT systems design since 1994. I thank you for the
|
||||||
|
@ -343,8 +343,8 @@
|
||||||
|
|
||||||
I will also address some additional concerns I believe are relevant
|
I will also address some additional concerns I believe are relevant
|
||||||
to this analysis.
|
to this analysis.
|
||||||
* CONSDONE Self-hosting
|
* Self-hosting
|
||||||
** CONSDONE Self-hosting
|
** Self-hosting
|
||||||
For the purposes of this submission, /self-hosting/ is where an
|
For the purposes of this submission, /self-hosting/ is where an
|
||||||
individual or small group has opted to provide their own internet
|
individual or small group has opted to provide their own internet
|
||||||
services, making use either of computer capacity provided by an ISP
|
services, making use either of computer capacity provided by an ISP
|
||||||
|
@ -369,8 +369,8 @@
|
||||||
|
|
||||||
*** CONSTODO Real examples of self-hosting
|
*** CONSTODO Real examples of self-hosting
|
||||||
I host a number of services:
|
I host a number of services:
|
||||||
- [[http://www.gibiris.org/eo-blog][/Éibhear/Gibiris/]] is my blog site.
|
- [[http://www.gibiris.org/eo-blog][/Éibhear/Gibiris/, http://www.gibiris.org/eo-blog]] is my blog site.
|
||||||
- [[https://social.gibiris.org/][/Social Gibiris/]] is a micro-blogging service that is federated
|
- [[https://social.gibiris.org/][/Social Gibiris/, https://social.gibiris.org/]] is a micro-blogging service that is federated
|
||||||
with others using the /AtomPub/ technology. Thus, /Social
|
with others using the /AtomPub/ technology. Thus, /Social
|
||||||
Gibiris/ is federated with many other instances of /GNU Social/,
|
Gibiris/ is federated with many other instances of /GNU Social/,
|
||||||
/Mastodon/ and /Pleroma/. This network of federated services,
|
/Mastodon/ and /Pleroma/. This network of federated services,
|
||||||
|
@ -383,10 +383,10 @@
|
||||||
- [[https://news.gibiris.org/][/news.gibiris.org/]] is a news-aggregation service that allows me
|
- [[https://news.gibiris.org/][/news.gibiris.org/]] is a news-aggregation service that allows me
|
||||||
to gather all the news sources of interest to me into one
|
to gather all the news sources of interest to me into one
|
||||||
location, which I can then access from wherever I am.
|
location, which I can then access from wherever I am.
|
||||||
- [[https://cloud.gibiris.org/nextcloud][/cloud.gibiris.org/]] is a file-sharing platform that I use with
|
- [[https://cloud.gibiris.org/nextcloud][https://cloud.gibiris.org/]] is a file-sharing platform that I use with
|
||||||
my family when we are collaborating on projects (e.g. school
|
my family when we are collaborating on projects (e.g. school
|
||||||
projects, home improvement projects, etc.)
|
projects, home improvement projects, etc.)
|
||||||
- [[https://matrix.gibiris.org/][/matrix.gibiris.org/]] is an instant-messaging system which I set
|
- [[https://matrix.gibiris.org/][https://matrix.gibiris.org/]] is an instant-messaging system which I set
|
||||||
up for the purposes of communicating with my family and close
|
up for the purposes of communicating with my family and close
|
||||||
friends.
|
friends.
|
||||||
|
|
||||||
|
@ -434,9 +434,9 @@
|
||||||
Very often, as with me, the reason to self-host is a combination
|
Very often, as with me, the reason to self-host is a combination
|
||||||
of more than 1 of these reasons.
|
of more than 1 of these reasons.
|
||||||
|
|
||||||
** CONSDONE How accessible is self-hosting.
|
** How accessible is self-hosting.
|
||||||
In a previous, similar, submission[fn:dccae:Available [[http://www.gibiris.org/eo-blog/posts/2019/04/15_harmful-content-consultation.html][here]] and
|
In a previous, similar, submission[fn:dccae:Available [[http://www.gibiris.org/eo-blog/posts/2019/04/15_harmful-content-consultation.html][here (http://www.gibiris.org/eo-blog/posts/2019/04/15_harmful-content-consultation.html)]] and
|
||||||
[[https://www.dccae.gov.ie/en-ie/communications/consultations/Documents/86/submissions/Eibhear_O_HAnluain.pdf][here]].], I provide an outline of the challenges before someone who
|
[[https://www.dccae.gov.ie/en-ie/communications/consultations/Documents/86/submissions/Eibhear_O_HAnluain.pdf][here (https://www.dccae.gov.ie/en-ie/communications/consultations/Documents/86/submissions/Eibhear_O_HAnluain.pdf)]].], I provide an outline of the challenges before someone who
|
||||||
wants to set up their own services. They are few, and they are
|
wants to set up their own services. They are few, and they are
|
||||||
small. In summary, the reasons for this are:
|
small. In summary, the reasons for this are:
|
||||||
- The Internet is mechanism for computers to find each other and
|
- The Internet is mechanism for computers to find each other and
|
||||||
|
@ -462,7 +462,7 @@
|
||||||
operating system that was accessible to all. Linux-based
|
operating system that was accessible to all. Linux-based
|
||||||
operating systems now form the basis of a significant proportion
|
operating systems now form the basis of a significant proportion
|
||||||
of internet connected computing devices
|
of internet connected computing devices
|
||||||
globally[fn:LinuxProportions:https://en.wikipedia.org/wiki/Usage_share_of_operating_systems]
|
globally[fn:LinuxProportions:[[https://en.wikipedia.org/wiki/Usage_share_of_operating_systems][Usage share of operating systems (https://en.wikipedia.org/wiki/Usage_share_of_operating_systems)]]]
|
||||||
(including 73% of smartphones and tablet computers, somewhere
|
(including 73% of smartphones and tablet computers, somewhere
|
||||||
between 36% and 66% of internet-facing server computers), and
|
between 36% and 66% of internet-facing server computers), and
|
||||||
100% of supercomputers.
|
100% of supercomputers.
|
||||||
|
@ -470,7 +470,7 @@
|
||||||
software developers wanted to add functionality to one of the
|
software developers wanted to add functionality to one of the
|
||||||
original web server software packages, /NCSA httpd/. The Apache
|
original web server software packages, /NCSA httpd/. The Apache
|
||||||
web server now powers 43.6% of all web
|
web server now powers 43.6% of all web
|
||||||
sites[fn:apacheProportions:[[https://w3techs.com/technologies/overview/web_server/all][https://w3techs.com/technologies/overview/web_server/all]]. Incidentally,
|
sites[fn:apacheProportions:[[https://w3techs.com/technologies/overview/web_server/all][Usage of web servers]]. Incidentally,
|
||||||
the no. 2 on that web page, with nearly 42% share of websites is
|
the no. 2 on that web page, with nearly 42% share of websites is
|
||||||
/nginx/. It also started out as a project by an individual who
|
/nginx/. It also started out as a project by an individual who
|
||||||
wanted to solve a particular project.].
|
wanted to solve a particular project.].
|
||||||
|
@ -538,7 +538,7 @@
|
||||||
that if one node goes down or is attacked, the others can continue
|
that if one node goes down or is attacked, the others can continue
|
||||||
with a minimum of interruption.
|
with a minimum of interruption.
|
||||||
|
|
||||||
** CONSDONE Regulation of self-hosted services
|
** Regulation of self-hosted services
|
||||||
|
|
||||||
While it is attractive to create regulations to manage the large,
|
While it is attractive to create regulations to manage the large,
|
||||||
profit-making organisations, it is imperative that such
|
profit-making organisations, it is imperative that such
|
||||||
|
@ -580,13 +580,13 @@
|
||||||
pop into the heads of individuals, who would realise them with
|
pop into the heads of individuals, who would realise them with
|
||||||
nothing more than a computer connected to the internet.
|
nothing more than a computer connected to the internet.
|
||||||
|
|
||||||
* CONSDONE Other considerations
|
* Other considerations
|
||||||
While the main focus of this submission is to highlight the
|
While the main focus of this submission is to highlight the
|
||||||
potential risk to self-hosters from regulations that neglect to
|
potential risk to self-hosters from regulations that neglect to
|
||||||
consider the practice, I would like to take the opportunity to
|
consider the practice, I would like to take the opportunity to
|
||||||
briefly raise some additional concerns
|
briefly raise some additional concerns
|
||||||
|
|
||||||
** CONSDONE Abuse of the systems
|
** Abuse of the systems
|
||||||
|
|
||||||
To date, all systems that seek to protect others from harmful or
|
To date, all systems that seek to protect others from harmful or
|
||||||
other objectionable material (e.g. copyright infringement,
|
other objectionable material (e.g. copyright infringement,
|
||||||
|
@ -594,7 +594,7 @@
|
||||||
example, in a recent court filing, Google claimed that 99.97% of
|
example, in a recent court filing, Google claimed that 99.97% of
|
||||||
copyright infringement notices it received in from a single party
|
copyright infringement notices it received in from a single party
|
||||||
in January 2017 were
|
in January 2017 were
|
||||||
bogus[fn:googleTakedown:https://www.techdirt.com/articles/20170223/06160336772/google-report-9995-percent-dmca-takedown-notices-are-bot-generated-bullshit-buckshot.shtml]:
|
bogus[fn:googleTakedown:[[https://www.techdirt.com/articles/20170223/06160336772/google-report-9995-percent-dmca-takedown-notices-are-bot-generated-bullshit-buckshot.shtml][Google Report: 99.95 Percent Of DMCA Takedown Notices Are Bot-Generated Bullshit Buckshot]]]:
|
||||||
|
|
||||||
#+BEGIN_QUOTE
|
#+BEGIN_QUOTE
|
||||||
A significant portion of the recent increases in DMCA submission
|
A significant portion of the recent increases in DMCA submission
|
||||||
|
@ -618,7 +618,7 @@
|
||||||
that claims of copyright ownership on the part of the claimant are
|
that claims of copyright ownership on the part of the claimant are
|
||||||
to be made under penalty of perjury. However, that provision is
|
to be made under penalty of perjury. However, that provision is
|
||||||
very weak, and seems not to be a deterrent for a determined agent:
|
very weak, and seems not to be a deterrent for a determined agent:
|
||||||
https://torrentfreak.com/warner-bros-our-false-dmca-takedowns-are-not-a-crime-131115].
|
[[https://torrentfreak.com/warner-bros-our-false-dmca-takedowns-are-not-a-crime-131115][Warner Bros: Our False DMCA Takedowns Are Not a Crime]]].
|
||||||
|
|
||||||
The GDPR's /Right to be Forgotten/ is also subject to abuse. An
|
The GDPR's /Right to be Forgotten/ is also subject to abuse. An
|
||||||
individual from Europe continues to force stories related to him
|
individual from Europe continues to force stories related to him
|
||||||
|
@ -647,7 +647,7 @@
|
||||||
claimant suffers nothing for abusive claims, the regime is
|
claimant suffers nothing for abusive claims, the regime is
|
||||||
guaranteed to be abused.
|
guaranteed to be abused.
|
||||||
|
|
||||||
** CONSDONE Content Moderation
|
** Content Moderation
|
||||||
|
|
||||||
Much of the focus of legislative efforts to deal with harmful or
|
Much of the focus of legislative efforts to deal with harmful or
|
||||||
objectionable material that appear on services that permit uploads
|
objectionable material that appear on services that permit uploads
|
||||||
|
@ -718,7 +718,7 @@
|
||||||
didn't have time to determine the full context, or because it
|
didn't have time to determine the full context, or because it
|
||||||
misinterpreted or misunderstood the context.
|
misinterpreted or misunderstood the context.
|
||||||
|
|
||||||
** CONSDONE User Behaviour
|
** User Behaviour
|
||||||
Many believe that the way to deal with abusive or harmful material
|
Many believe that the way to deal with abusive or harmful material
|
||||||
online is to punish the services that host the material. This is
|
online is to punish the services that host the material. This is
|
||||||
reasonable if the material was placed onto the service by those who
|
reasonable if the material was placed onto the service by those who
|
||||||
|
@ -751,20 +751,20 @@
|
||||||
there is no attempt to change behaviour, then abusive people will
|
there is no attempt to change behaviour, then abusive people will
|
||||||
simply work around the controls and continue to abuse.
|
simply work around the controls and continue to abuse.
|
||||||
|
|
||||||
** CONSDONE Investigation support
|
** Investigation support
|
||||||
|
|
||||||
In response to the live-streaming of that horrific shooting dead of
|
In response to the live-streaming of that horrific shooting dead of
|
||||||
more than 50 people in New Zealand earlier this year, that country
|
more than 50 people in New Zealand earlier this year, that country
|
||||||
has proscribed the video recorded by that white supremacist
|
has declared the video recorded by that white supremacist terrorist
|
||||||
terrorist as "objectionable", making it a criminal offence to share
|
as "objectionable", making it a criminal offence to share
|
||||||
it[fn:banNotice:https://www.classificationoffice.govt.nz/news/latest-news/christchurch-attacks-press-releases/#christchurch-attack-video-footage-and-document-has-been-banned-in-nz-what-this-means-for-you].
|
it[fn:banNotice:[[https://www.classificationoffice.govt.nz/news/latest-news/christchurch-attacks-press-releases/#christchurch-attack-video-footage-and-document-has-been-banned-in-nz-what-this-means-for-you][Christchurch attack video footage and document has been banned in NZ – what this means for you]]].
|
||||||
|
|
||||||
While one can understand the thinking that sharing the material
|
While one can understand the thinking that sharing the material
|
||||||
could only be done by people who support the atrocity, this is not
|
could only be done by people who support the atrocity, this is not
|
||||||
necessarily true. Other reasons to share the video or portions of
|
necessarily true. Other reasons to share the video or portions of
|
||||||
it might include
|
it might include
|
||||||
- to appeal for help in finding someone caught up in the massacre
|
- to appeal for help in finding someone caught up in the massacre
|
||||||
- Legitimate news reporting of such an event.
|
- legitimate news reporting of such an event.
|
||||||
- to help investigate the shooting and its
|
- to help investigate the shooting and its
|
||||||
circumstances[fn:ForArch:Forensic Architecture,
|
circumstances[fn:ForArch:Forensic Architecture,
|
||||||
https://forensic-architecture.org/, is a research group that
|
https://forensic-architecture.org/, is a research group that
|
||||||
|
@ -772,7 +772,10 @@
|
||||||
records of events. To criminalise the sharing of such imagery and
|
records of events. To criminalise the sharing of such imagery and
|
||||||
videos with no regard as to the purpose for the sharing plays
|
videos with no regard as to the purpose for the sharing plays
|
||||||
directly into the hands of those who disregard victims' civil
|
directly into the hands of those who disregard victims' civil
|
||||||
rights.]
|
rights. Similarly, it's not correct to assume that police or
|
||||||
|
intelligence services alone perform these types of
|
||||||
|
investigations, so limiting permission to share to these
|
||||||
|
organisations would not be sufficient.]
|
||||||
- training for law enforcement or terrorism- or disaster-response
|
- training for law enforcement or terrorism- or disaster-response
|
||||||
personnel.
|
personnel.
|
||||||
|
|
||||||
|
@ -788,35 +791,35 @@
|
||||||
that it is now very easy for anyone to forge screen-shots of online
|
that it is now very easy for anyone to forge screen-shots of online
|
||||||
postings.
|
postings.
|
||||||
|
|
||||||
** CONSDONE Encrypted services
|
** Encrypted services
|
||||||
|
|
||||||
Some believe that if end-to-end encryption services that prevent
|
Some believe that if end-to-end encryption services that prevent
|
||||||
security services from accessing material were banned or
|
security services from accessing material were banned or
|
||||||
controlled, there would be less abusive behaviour online. This is
|
controlled, there would be less abusive behaviour online. This is
|
||||||
not true, nor is it a good public policy.
|
not true, nor is it a good public policy.
|
||||||
|
|
||||||
Encryption is just mathematics, and it knows neither whether its
|
Encryption is just mathematics, and it knows neither that its use
|
||||||
use is for ill or good. However, when you consider the extent to
|
is for ill or good. However, when you consider the extent to which
|
||||||
which encryption is being used -- every website that uses =https=
|
encryption is being used -- every website that uses =https= as part
|
||||||
as part of its address encrypts the traffic between itself and its
|
of its address encrypts the traffic between itself and its users,
|
||||||
users, and that is nearly every website around the world -- the
|
and that is nearly every website around the world -- the good uses
|
||||||
good uses vastly outnumber the bad uses. If people are forced to
|
vastly outnumber the bad uses. If people are forced to use an
|
||||||
use an encryption system that has been modified to make it easy for
|
encryption system that has been modified to make it easy for
|
||||||
security services to gain access to the messages, it means that all
|
security services to gain access to the messages, it means that all
|
||||||
the good, innocent uses of encryption are at risk. Recent news that
|
the good, innocent uses of encryption are at risk. Recent news that
|
||||||
Russian spies managed to infiltrate the
|
Russian spies managed to infiltrate the FBI[fn:Oath:[[https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html][Exclusive:
|
||||||
FBI[fn:Oath:https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html
|
Russia carried out a 'stunning' breach of FBI communications
|
||||||
(Please note that to access this story the user has to agree to
|
system, escalating the spy game on U.S. soil]] (Please note that to
|
||||||
many hundreds of forms tracking or spend many up to an hour
|
access this story the user has to agree to many hundreds of forms
|
||||||
examining those forms and disabling each one individually. It is
|
tracking or spend up to an hour examining those forms and disabling
|
||||||
recommended that this story be access using "Incognito" or "Private
|
each one individually. It is recommended that this story be access
|
||||||
Browsing" mode in order to be protected against tracking).],
|
using "Incognito" or "Private Browsing" mode in order to be
|
||||||
highlights how unreliable are assurances from security services
|
protected against tracking).], highlights how unreliable are
|
||||||
that they can keep secrets such as the keys to all encryption safe
|
assurances from security services that they can keep secrets such
|
||||||
from harm.
|
as the keys to all encryption safe from harm.
|
||||||
|
|
||||||
All it takes is one determined intruder, and all the good uses of
|
All it takes is one determined intruder, and all the good uses of
|
||||||
encryption are put at risk in order to safe money and effort on
|
encryption are put at risk in order to save money and effort on
|
||||||
investigating illegal activities.
|
investigating illegal activities.
|
||||||
|
|
||||||
I have written a number of articles on this matter providing more
|
I have written a number of articles on this matter providing more
|
||||||
|
@ -829,10 +832,10 @@
|
||||||
- [[http://www.gibiris.org/eo-blog/posts/2018/09/04_some-questions-5-eyes-countries-what-can-they-do.html][Some questions for the "5 Eyes" countries on what they think they
|
- [[http://www.gibiris.org/eo-blog/posts/2018/09/04_some-questions-5-eyes-countries-what-can-they-do.html][Some questions for the "5 Eyes" countries on what they think they
|
||||||
can do]]
|
can do]]
|
||||||
|
|
||||||
* CONSDONE Answers to consultation questions
|
* Answers to consultation questions
|
||||||
The follows are some answers to the questions posed in the call for
|
The follows are some answers to the questions posed in the call for
|
||||||
submissions.
|
submissions.
|
||||||
** CONSDONE Definition of communication in legislation
|
** Definition of communication in legislation
|
||||||
- Question 1 :: There are currently significant gaps in legislation
|
- Question 1 :: There are currently significant gaps in legislation
|
||||||
with regard to harassment and newer, more modern
|
with regard to harassment and newer, more modern
|
||||||
forms of communication. Is there a need to expand
|
forms of communication. Is there a need to expand
|
||||||
|
@ -866,7 +869,7 @@
|
||||||
as
|
as
|
||||||
/FOSTA-SESTA/[fn:FOSTA-SESTA:https://en.wikipedia.org/wiki/Stop_Enabling_Sex_Traffickers_Act]
|
/FOSTA-SESTA/[fn:FOSTA-SESTA:https://en.wikipedia.org/wiki/Stop_Enabling_Sex_Traffickers_Act]
|
||||||
in the US, that seeks merely to punish web sites,
|
in the US, that seeks merely to punish web sites,
|
||||||
will to more harm than good[fn:SOSTAEffect:Lura
|
will do more harm than good[fn:SOSTAEffect:Lura
|
||||||
Chamberlain, FOSTA: A Hostile Law with a Human Cost,
|
Chamberlain, FOSTA: A Hostile Law with a Human Cost,
|
||||||
87 Fordham L. Rev. 2171 (2019). Available at:
|
87 Fordham L. Rev. 2171 (2019). Available at:
|
||||||
https://ir.lawnet.fordham.edu/flr/vol87/iss5/13]. The
|
https://ir.lawnet.fordham.edu/flr/vol87/iss5/13]. The
|
||||||
|
@ -879,21 +882,24 @@
|
||||||
failure of the law to consider the effect of a
|
failure of the law to consider the effect of a
|
||||||
straight ban.
|
straight ban.
|
||||||
|
|
||||||
The recently-passed new EU Copyright directive
|
The recently-passed new EU Copyright Directive
|
||||||
mandates the filtering of user uploads based on prior
|
mandates the filtering of user uploads based on prior
|
||||||
notice that such uploads *may* be infringing
|
notice that such uploads *may* be infringing
|
||||||
copyright, subject to severe penalties, but requires
|
copyright and failure to implement this filtering is
|
||||||
mere respect for users' freedom of speech with no
|
subject to severe penalties. However, the directive
|
||||||
penalties attaching to failing to do so. The
|
requires mere respect for users' freedom of speech
|
||||||
|
with no penalties attaching to failing to do so. The
|
||||||
incentive for the service operators here is to err on
|
incentive for the service operators here is to err on
|
||||||
the side of suppressing material regardless of
|
the side of suppressing material regardless of
|
||||||
anyone's freedom of expression, as the consequences
|
anyone's freedom of expression, as the consequences
|
||||||
of not doing so could be catastrophic for the service
|
of keeping the material up could be catastrophic for
|
||||||
operator.
|
the service operator and the consequences of
|
||||||
|
infringing on someone's freedom of expression are
|
||||||
|
non-existent.
|
||||||
|
|
||||||
The proposal in the UK to apply a duty of care to
|
The proposal in the UK to apply a duty of care to
|
||||||
service operators is also destined for failure, as a
|
service operators is destined for failure, as a duty
|
||||||
duty of care is a physical-world concept that has no
|
of care is a physical-world concept that has no
|
||||||
suitable analogy in the context of internet services.
|
suitable analogy in the context of internet services.
|
||||||
|
|
||||||
Ironically, the likely best regulatory approach is
|
Ironically, the likely best regulatory approach is
|
||||||
|
@ -902,7 +908,8 @@
|
||||||
liability protection. All these services maintain
|
liability protection. All these services maintain
|
||||||
terms and conditions ("Community Rules", "Code of
|
terms and conditions ("Community Rules", "Code of
|
||||||
Conduct", etc.) and confirmed violations of these
|
Conduct", etc.) and confirmed violations of these
|
||||||
result in sanctions on the users. However, where
|
result in sanctions on the users, up to and including
|
||||||
|
permanent exclusion from the service. However, where
|
||||||
services aren't aware of violations, they are
|
services aren't aware of violations, they are
|
||||||
protected on the grounds that the behaviour that is
|
protected on the grounds that the behaviour that is
|
||||||
objectionable is not that of the service operator,
|
objectionable is not that of the service operator,
|
||||||
|
@ -914,14 +921,14 @@
|
||||||
and advancing technologies, new apps and other
|
and advancing technologies, new apps and other
|
||||||
online forums, including the more familiar social
|
online forums, including the more familiar social
|
||||||
media sites?
|
media sites?
|
||||||
+ Answer :: This is this submissions core concern. For
|
+ Answer :: This is this submission's core concern. For
|
||||||
legislation to focus on the technology, and not on
|
legislation to focus on the technology, and not on
|
||||||
the behaviour, to focus on the service operator and
|
the behaviour, to focus on the service operator and
|
||||||
not on the real offender, runs real risks of damaging
|
not on the real offender, runs real risks of damaging
|
||||||
human rights of totally innocent parties, as well as
|
human rights of innocent parties, as well as stifling
|
||||||
stifling innovation and consolidating the market
|
innovation and consolidating the market positions of
|
||||||
positions of the major operators
|
the major operators
|
||||||
** CONSDONE Harassment, stalking & other forms of online abuse
|
** Harassment, stalking & other forms of online abuse
|
||||||
- Question 4 :: Online harassment can take the form of
|
- Question 4 :: Online harassment can take the form of
|
||||||
on-consensual taking and distribution of intimate
|
on-consensual taking and distribution of intimate
|
||||||
images or videos, otherwise known as ‘revenge
|
images or videos, otherwise known as ‘revenge
|
||||||
|
@ -1025,14 +1032,14 @@
|
||||||
who offers commentary on many aspects of society
|
who offers commentary on many aspects of society
|
||||||
frequently posts messages on Twitter designed to
|
frequently posts messages on Twitter designed to
|
||||||
elicit angry responses. I describe this person as "A
|
elicit angry responses. I describe this person as "A
|
||||||
master of the false equivalence". This is the classic
|
master of the false equivalence". This is classic
|
||||||
online trolling behaviour. Similarly, on the 18th
|
online trolling behaviour. Similarly, on the 18th
|
||||||
September 2019, a prominent UK journalist tweeted
|
September 2019, a prominent UK journalist tweeted
|
||||||
personal details of a father who publicly challenged
|
personal details of a father who publicly challenged
|
||||||
UK Prime Minister Boris Johnson regarding the state
|
UK Prime Minister Boris Johnson regarding the state
|
||||||
of the NHS. This was construed by many as a
|
of the NHS. This act by the journalised was construed
|
||||||
deliberate trolling to inflict a measure of
|
by many as deliberate trolling designed to inflict a
|
||||||
unofficial retribution on the man.].
|
measure of unofficial retribution on the man.].
|
||||||
|
|
||||||
It should not be assumed that pseudonymous accounts
|
It should not be assumed that pseudonymous accounts
|
||||||
are created in order for the users to escape legal
|
are created in order for the users to escape legal
|
||||||
|
@ -1058,16 +1065,16 @@
|
||||||
there's good reason to assume that the significant majority of
|
there's good reason to assume that the significant majority of
|
||||||
pseudonymous accounts operate for completely innocent
|
pseudonymous accounts operate for completely innocent
|
||||||
reasons[fn:realnames:facebook excepted. However, facebook's
|
reasons[fn:realnames:facebook excepted. However, facebook's
|
||||||
real-name policy is itself wrong, and does a great deal of
|
real-name policy is itself wrong, and does a great deal of damage
|
||||||
damage to people who have good reasons for their names not to
|
to people who have good reasons for their names not to be
|
||||||
be associated with their online presences.].
|
associated with their online presences.].
|
||||||
- Question 12 :: Do other jurisdictions have statutory measures to
|
- Question 12 :: Do other jurisdictions have statutory measures to
|
||||||
protect victim identities in cases of online
|
protect victim identities in cases of online
|
||||||
harassment being released online posthearings,
|
harassment being released online posthearings,
|
||||||
etc?
|
etc?
|
||||||
+ Answer :: This submission is not offering any answer to this
|
+ Answer :: This submission is not offering any answer to this
|
||||||
question.
|
question.
|
||||||
** CONSDONE Harmful online behaviour and young people
|
** Harmful online behaviour and young people
|
||||||
- Question 13 :: How do we most appropriately regulate social media
|
- Question 13 :: How do we most appropriately regulate social media
|
||||||
platforms to prevent cyberbullying and
|
platforms to prevent cyberbullying and
|
||||||
inappropriate sharing of personal images?
|
inappropriate sharing of personal images?
|
||||||
|
|
Loading…
Reference in a new issue