diff --git a/HarmfulCommunications201908.org b/HarmfulCommunications201908.org index c568a23..44ca895 100644 --- a/HarmfulCommunications201908.org +++ b/HarmfulCommunications201908.org @@ -127,7 +127,7 @@ D02 XR20 ** Possible issues document (captured [2019-08-24 Sat]) -*** Online Harrassment, harmful communications and related offences +*** Online Harassment, harmful communications and related offences *Possible issues for address* **** Definition of communication in legislation 1. There are currently significant gaps in legislation with @@ -362,7 +362,7 @@ service that they provide, including ensuring that it is kept running and updates are applied appropriately, and so on. - This submission is primarilty concerned about self-hosting as a + This submission is primarily concerned about self-hosting as a hobby and self-hosting engaged in by charity, non-governmental or community organisations. However, self-hosting for commercial purposes is a valid use-case, but implications of regulations on @@ -414,7 +414,7 @@ powerful experience. - Community -- While some of the global services with household names offer features go small businesses and community groups - (like footall clubs or debating societies), often the lock-in + (like football clubs or debating societies), often the lock-in and exclusivity involved can make it hard to include everyone who needs to be involved. Hosting your own services allows you to set the rules and codes of conduct. @@ -422,9 +422,9 @@ software projects can people often learn about the tools and systems they use, and grow their knowledge of the technologies involved. - - Collaboration -- the softwas that implements self-hosted + - Collaboration -- the software that implements self-hosted services often some under the terms of a Free or Open Source - Software copyright licence, which allows for peope to copy and + Software copyright licence, which allows for people to copy and improve software, and these improvements often find their back to the original project for others to benefit. - Protection -- Governments in countries where civil rights are @@ -652,7 +652,7 @@ ** CONSDONE Content Moderation Much of the focus on legislative efforts to deal with harmful or - objectional material on services that permit uploads from users is + objectionable material on services that permit uploads from users is on what the service providers do about it. Many argue that they are not doing anything, or at least not enough. @@ -663,7 +663,7 @@ material or not, to suppress someone's freedom of expression or not, based on a set of if-then-else questions. - It's illegal in Germany to say anything that can be construed as - glorifying the Holacaust. In the UK it isn't. Facebook can + glorifying the Holocaust. In the UK it isn't. Facebook can suppress such information from users it believes are in Germany, but to do so for those in the UK would be an illegal denial of free expression, regardless of how objectionable the material @@ -759,7 +759,7 @@ could only be done by people who support the atrocity, this is not necessarily true. Other reasons to share the video or portions of it might include - - to appeal for help in finding someone caught up in the masssacre + - to appeal for help in finding someone caught up in the massacre - Legitimate news reporting of such an event. - to help investigate the shooting and its circumstances[fn:ForArch:Forensic Architecture, @@ -848,7 +848,7 @@ * Legislation should focus not on the tool, but on the behaviour. In the main, therefore, it's the behaviour of those performing the bullying or abuse that should be - targetted and not the "tool" used as the communications + targeted and not the "tool" used as the communications medium. I expand on this in the "User behaviour" section of this submission. - Question 2 :: What lessons can be learned from models used in @@ -916,7 +916,7 @@ not on the real offender, runs real risks of damaging human rights of totally innocent parties, as well as stifling innovation and consolidating the market - positions of the majar operators + positions of the major operators ** CONSDONE Harassment, stalking & other forms of online abuse - Question 4 :: Online harassment can take the form of on-consensual taking and distribution of intimate @@ -1015,7 +1015,7 @@ associated with a personal identity is "fake" needs to be challenged. It is the /behaviour/ of the account than needs to be considered. This is true of - accounts that are associated with indentifiable + accounts that are associated with identifiable individuals as well as of pseudonymous accounts[fn:trolls:A well-known Irish public figure who offers commentary on many aspects of society @@ -1023,7 +1023,7 @@ elicit angry responses. I describe this person as "A master of the false equivalence". This is the classic online trolling behaviour. Similarly, on the 18th - September 2019, a prominant UK journalist tweeted + September 2019, a prominent UK journalist tweeted personal details of a father who publicly challenged UK Prime Minister Boris Johnson regarding the state of the NHS. This was construed by many as a @@ -1033,7 +1033,7 @@ It should not be assumed that pseudonymous accounts are created in order for the users to escape legal consequences for criminal communications. There are - many reasons for maintaining a psuedonymous presence + many reasons for maintaining a pseudonymous presence online, some of which I have personally encountered being: - To protect against a physically abusive family @@ -1053,7 +1053,7 @@ created for reasons of abuse or harmful communication. In fact, there's good reason to assume that the significant majority of pseudonymous accounts operate for completely innocent - reaons[fn:realnames:facebook excepted. However, facebook's + reasons[fn:realnames:facebook excepted. However, facebook's real-name policy is itself wrong, and does a great deal of damage to people who have good reasons for their names not to be associated with their online presences.].