首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
网络攻击往往由非国家行为体发起,实践中亦罕见有国家主动承认对网络攻击负责的实例。相应地,由于网络攻击的溯源存在技术、政治和法律方面的难题,受害国很难在传统自卫权的框架下对来自他国的网络攻击行使自卫权。非国家行为体尚不能构成传统武力攻击情境下的自卫权行使对象,更不宜成为网络空间自卫权的行使对象。作为替代,近年来将"不能够或不愿意"理论适用于网络空间自卫权的主张"甚嚣尘上"。"不能够或不愿意"理论表面上具有一定的正当性,但从既有国家归因标准和常规的自卫必要性的角度来看,该理论本质上缺乏实然法层面的法律依据,而且在适用时将面临一系列的法律不确定性。中国在参与网络空间国际造法的进程中,应当警惕将非国家行为体作为网络空间自卫权行使对象的主张,并应努力防止"不能够或不愿意"理论的引入和滥用,以遏制网络空间的军事化。  相似文献   

2.
In an unprecedented legal development, the case of violence in video games has now reached the highest American court. The US Supreme Court is set to decide whether states can restrict minors from buying violent video games in the case of Schwarzenegger v. Entertainment Merchants Association. The decision could have serious implications on the future of First Amendment rights and children’s ’welfare. To resolve Schwarzenegger, the Justices will need to decide how much First Amendment protection should be extended to violent video games and whether minors have a greater constitutional right to violence than they do to obscenity.  相似文献   

3.
Press curiosity to report on legal proceedings has been a salacious feature in history of mass media. Pre-trial comment, media coverage of press proceedings and the protection of privacy of the defendant are some of the main legal issues which are raised by the ambiguous relation of media to court proceedings. The Internet revolution and the emergence of the blogosphere have added a new dimension to the analysis of these legal issues. A balance between freedom of expression and the guarantee of a fair unprejudiced process has to be achieved in the context of application of legal mechanisms of protection of the justice’s authority, such as contempt of court. As regards the question of media coverage of the court proceedings, the decision of the UK Supreme Court on May 2011 to permit television coverage of its hearings demonstrates an important shift as regards how publicity is perceived by the administration of justice in the UK, while there is a certain disparity between national legislators in the way they deal with this issue at a European level. The legal question of the protection of the defendant through the effective guarantee of the presumption of innocence and, consequently, that of a fair trial is often combined with the debate about the right of the defendant’s privacy not only when there is a pressing social need for information to the public before or during the court trial but also many years after the end of the legal proceedings.  相似文献   

4.
In November 2016, China passed its first Cybersecurity Law, aiming to strengthen cyberspace governance through a number of initiatives, including Internet operator security protection, personal information protection, special protection of critical information infrastructure, local storage of data, and security evaluation for data export. This Article discusses the major concepts and principles of the Cybersecurity Law. It also discusses the tensions and controversies inherent in the law. All in all, the Cybersecurity Law exhibits distinctive Chinese characteristics. It is premised on the concept of cyberspace sovereignty and emphasizes security over free flow of data and freedom of speech. It provides a basic legal framework for cyberspace governance in China, to be supplemented by implementing regulations in years to come.  相似文献   

5.
Criminality information practices involve public authorities in the UK (and elsewhere) gathering, retaining and sharing information that connects with an identifiable individual; all with the ostensible aim of upholding and improving standards of public protection. This piece first charts the landscape of contemporary criminality information practices in the UK today. The article then examines recent legal emphases and policy directions for public protection networks. Consideration is then given in the piece to privacy rights and values and the difficulties in providing an exact typology and grounding for these. The piece then outlines a suggested framework for correct legal regulation, as well as a through commentary on the work done by Catherine Bellamy et al. to empirically determine the extent to which public protection information sharing can in fact occur in correct adherence to legal regulation. A socio-legal analysis is undertaken of the nature of public protection networks as variants on Goffman's performance teams within a dramaturgical routine that foregrounds stigmatisation of perceived ‘risky’ individuals as an aspect of that routine. This piece also explores the processes of institutional isomorphism as a reaction to shifting policy directions and legal doctrines, acting as a driving force towards a hierarchical performance of criminality information practices by public protection networks. Three conclusions are offered up for consideration: firstly, that the growing complexity of the law and regulation relating to criminality information practices might improve privacy values in the criminal justice system and help to add precision to necessary processes of stigmatisation in relation to the aim of public protection. Secondly, that these shifts in the law still need ongoing revisions, in order that a hierarchical approach to criminality information practices can be arrived at over time. Thirdly, that if the permanency of potential stigmatisation through the indefinite retention of criminality information cannot change, due to the competing pressure on the criminal justice system from public protection duties, then consultation with ‘risky’ individuals where practicable, before criminality information connected to them is shared across public protection networks becomes essential as a privacy-enhancing value and practice.  相似文献   

6.
At a moment when the European Union and globalisation are, in their different contexts, bringing systems of traditional law (like the Common Law), whose texts are presented as monuments to historical legal cultures, into confrontation with systems of written law which claim to be rational embodiments of universal principles of liberal justice, how might we remember Jeremy Bentham, the pioneer of the critique of the former in the name of the latter? This essay in ‘law-and-literature’ looks at the relation between memory, fiction and writing in both the Common Law and in the two last projects for which the radical legal positivist sought to be remembered: the Constitutional Code for the Use of All Nations and All Governments Professing Liberal Opinions (1830) and Auto-Icon: Or, Farther Uses of the Dead to the Living (published posthumously in 1842). By examining Bentham’s linguistic theory and practice, the article raises questions about the relations between the ‘law’ of writing and the writing of law.  相似文献   

7.
In this paper, the author sets out the way in which the UK approach to privacy protection is able to extend its reach to anonymous postings. Whilst anonymity might sometimes be seen as one of the essential characteristics of communicating on-line, it does not provide an impenetrable veil of protection in respect of a privacy violation claim. Instead, there are avenues available to identify anonymous communicators, which have implications both for internet freedom and jurisdiction in cyberspace. In the UK, our common law has not denied bloggers, or other on-line contributors, anonymity per se. However, it will be argued that recent UK judgments represent a warning to anonymous communicators that they can be held liable for what they post on-line and that naivety is no defence at law. Whilst on-line platforms allow people to effectively become journalists; to become publishers, as familiar users, they should become more aware of the consequences of their on-line postings and appreciate that they will not be able to escape from the application of third party disclosure orders. However, as these are not without their problems, it is possible that anonymous communicators may have the last laugh.  相似文献   

8.
World leaders are beginning to look beyond temporary fixes to the challenge of securing the Internet. One possible solution may be an international arms control treaty for cyberspace. The 1997 Chemical Weapons Convention (CWC) provides national security planners with a useful model. CWC has been ratified by 98% of the world’s governments, and encompasses 95% of the world’s population. It compels signatories not to produce or to use chemical weapons (CW), and they must destroy existing CW stockpiles. As a means and method of war, CW have now almost completely lost their legitimacy. This article examines the aspects of CWC that could help to contain conflict in cyberspace. It also explores the characteristics of cyber warfare that seem to defy traditional threat mitigation.  相似文献   

9.
This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence.The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date.This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally.In this article, the authors examine whether static and dynamic IP addresses are “personal data” as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector.  相似文献   

10.
This article examines the two most influential international initiatives on electronic signatures (UNCITRAL’s 1996 Model Law on Electronic Commerce and the 1999 EU Electronic Signature Directive). It considers whether the legislative approaches in Australia and the United Kingdom based on these initiatives are helpful in deciding whether lower level signature methods such as simple email messages are likely to satisfy a legal requirement for a signature. The conclusion reached is that they are unhelpful. The article goes on to consider whether legislative amendments based on UNCITRAL’s 2001 Model Law on Electronic Signatures or the 2005 UN Convention on the Use of Electronic Communications in International Contracts would improve the identified weaknesses. It concludes that such an update would clarify some issues, but that overall it will not solve the difficulties. The article ends with a brief speculation on the likely attributes of a more helpful approach.  相似文献   

11.
A growing body of sociolegal scholarship focuses the study of law away from formal texts and legal institutions and toward the experiences and perceptions of “everyday” citizens. This study introduces seventeen “radical” environmentalists who engage a repertoire of tactics that includes some actions that involve relatively severe forms of illegality. This research seeks to investigate the role of civil disobedience and lawbreaking within the radical environmental movement and the corresponding legal consciousness of movement actors. Utilizing ethnographic fieldwork and content analysis, this analysis suggests that Ewick and Silbey's (1998 ) three‐tiered model of legal consciousness is an operative starting point, but could be enhanced through theoretical expansion. This study proposes a new category of legal consciousness—Under the Law—that views the law as the protector and defender of a social order that is fundamentally illegitimate. Under the Law is qualitatively different from existing conceptualizations of legal consciousness and reaffirms the mutually constitutive nature of law and society.  相似文献   

12.
The Art. 29 Working Party (hereinafter “Art. 29 WP”) is an influential body comprised of representatives from the Member State Data Protection Authorities2 established under the Data Protection Directive 95/46/EC, has recently issued an opinion with the Working Party on Police and Justice. This is quite significant, since the opinion sets out some of the issues that will need to be addressed in the lead up to the revision of the Data Protection Directive 95/46/EC.3 This comes at a time, when there have been discussions on the current application of the European Data Protection Directive to the internet,4 (such as social networking) and the recent European Commission’s consultation on the legal framework for the fundamental right to protection of personal data. Not least, there have been a number of cases brought before the European Court of Justice dealing with the partial implementation of the Data Protection Directive 95/46/EC.5The aim of this paper is to consider in detail the issues set out by the Art. 29 WP and the likely challenges in revising the Data Protection Directive 95/46/EC.  相似文献   

13.
不动产登记簿的公信力和善意取得制度是两种构造迥异的物之交易信赖保护机制。善意取得制度以占有不足以充分表征动产所有权为构造前提,以竭力衡量所有权人与善意第三人的利益关系为轴心;不动产登记簿的公信力制度以不动产登记簿可以作为权利外观为构造前提,以完备的不动产登记制度为根基。善意取得制度的效果只能是第三人由无权利人取得物权;不动产登记簿的公信力所具有的效果不但有积极信赖保护与消极信赖保护之分,且其积极信赖保护的内容除由无权利人取得物权外,还包括由有权利人取得物权、受领给付、获得权利顺位等。因此,以善意取得制度保护不动产交易的便捷与安全,其局限非常明显。物权法第106条应限缩解释为主要适用于动产,不动产交易的信赖保护可通过解释物权法第16条来实现。  相似文献   

14.
The Jewish Law (Halakahh) is probably the older legal system working in our time. It is established on a hierarchy of different texts. The oldest and more authoritative is the Torah (the five books of Moshe), then come the Mishnah, the Talmud, the compilation as Maimonide’s Mishne Torah and Caro’s Shulchan Arukh, then the responsa of the rabbis. While the authorship of the later texts is more or less clear, the one of the Torah is highly problematic, also in the self-understanding of Jewish hermeneutics. This question is discussed in the present paper not from a philological-historical point of view, but from a semiotic one, trying to understand what devices and regimes of enunciation are enacted by the text in order to establish its semiotic-juridical effects. A special double enunciation frame is proposed as the mark of the legislative power in the text, in correlation with another textual device, a sort of divine “signature”. The further evolution of the authorship of the Jewish Law is discussed in its relation with the question of the autonomy in the interpretation of the sacred text.  相似文献   

15.
Upon receipt of a right to be forgotten request, private actors like Google are responsible for implementing the balancing test between competing rights of privacy and data protection and free expression and access to information. This amounts to private jurisprudence that data subjects, lawyers, and interested parties could, theoretically, game to their advantage. This paper critiques this process and argues two separate, but related points. (1) Search engines have become the sole arbiter of the rights to privacy and data protection under Articles 7 and of the Charter of Fundamental Rights and Articles 8 and 10 of the European Convention of Human Rights, when safeguarding should be a responsibility of state authorities. (2) As private actors face litigation if their decision is not acceptable to the data subject, the right to access information and the public's right to know is compromised. Search engines exert considerable power over access to and Internet usage, yet nevertheless benefit from frameworks that permit a lack of adherence to similar human rights standards as public actors or agencies. As such, empowering search engines as decision-makers over conflicting fundamental rights is problematic. Rather than allow the content of the right to be forgotten to be fleshed out by private actors, the significant body of existing jurisprudence should form the basis for public guidelines on how to implement the right to be forgotten. An analysis of case law of national courts, the European Court of Human Rights and the CJEU reveals two related matters: it is possible to reverse engineer how search engines determine which requests will be actioned and those which will be denied. This paper argues a) collectively the body of jurisprudence is of sufficient standing to develop a public and transparent balancing test that is fair to all stakeholders and b) private actors should no longer be resolving the conflict between competing fundamental rights. The paper closes by positing a framework, loosely based on ICANN's Uniform Domain Resolution Procedure for resolving conflict between conflicting cyber property rights that provides transparency and accountability to the right to be forgotten and removes search engines as arbiters of the balancing test in select cases.  相似文献   

16.
The software patent debate   总被引:1,自引:0,他引:1  
Legal context. This article has practical application for thoseworking in the patent field, particularly with regards to thefiling of software patent applications. Key points. The article provides a detailed explanation of thestate of the art with regards to the legal protection of software,and describes the latest legal developments in the area, includingthe failed Directive on Computer Implemented Inventions andsome recent cases that may shed more light on some of the technicalissues involved in the area of software. The paper also exploressome of the arguments put forward by those in favour and opposedto software patents, in order to ascertain their validity. Practical significance. Existing case law may provide help tosolve the problem of patentability, but it might also be a goodidea to resurrect the idea that there should be a sui-generissoftware right.  相似文献   

17.
No one would disagree that the purposes and aims of child pornography laws are legitimate and necessary. Recently, however, these laws, which have the ostensible aim of protecting children, are instead being used to punish children and dissuade the new phenomenon of “sexting” in the United States. “Sexting” refers to the use of mobile phones with built-in cameras to produce and distribute images of oneself in a sexually provocative or revealing position. The potential danger that this trend poses to minors is huge. Photographs produced by the use of “sexting” can be distributed to unintended third parties, often leading to embarrassment and harassment. Moreover, senders are also in danger of being charged with possession and distribution of child pornography, regardless of the fact that they are minors and the pictures are often of themselves. Not only is charging minors with child pornography a rather new phenomenon, it also appears to be a strategy that several states are adopting. This paper will look at the growing trend of charging minors who engage in “sexting” with child pornography charges by a case study of an actual prosecution, what the consequences of such a conviction entails in the United States, legislative responses, and an analysis of the appropriateness of using the legal system as a way of dealing with this problem.  相似文献   

18.
王婧 《政法论丛》2012,(6):121-126
我国现行刑事诉讼立法中,犯罪嫌疑人未成年亲属负有作证义务违背了社会的基本道德伦理,针对未成年人作证的保护机制存在疏漏。新修订的《刑事诉讼法》在一定范围内承认了亲属间的作证特免权,完善了法定代理人到场制度。考虑到证人人权保护、未成年人的健康成长与社会和谐,今后立法上有必要进一步扩大亲属作证特免权的范围,借鉴合适成年人参与制度,完善未成年人作证的保护。  相似文献   

19.
This paper discusses the feasibility of EU legal action in the field of electronic identity (eID) within the new distribution of legal competences and the provision of novel legal basis engendered by the Treaty of Lisbon. The article attempts to find a ‘legal anchor’ to the idea of a pan-European electronic identity within EU law, looking at the issues of competences and legal basis. After examining various different areas of competence and the most feasible (and probable) candidates for a legal basis supporting an EU legal framework for eID, the paper argues that the latter should be found in the combination of Article 16 TFEU (concerning the right to the protection of personal data) with Article 3 TUE, and Articles 26 and 114 TFEU (concerning the establishment and functioning of the Internal Market), which also constitute the area of competence where an eID legal initiative can be pursued.  相似文献   

20.
United States Supreme Court has affirmed the right of states to require parental consent or notice from minors seeking abortion. We examine an underlying presumption that minors are not competent to consent to abortion. Participants (N=75 age 13–21, seeking a pregnancy test at a women's medical clinic) completed an interview that was audiotaped and scored on four cognitive and volitional criteria of legal competence. Competence was compared in three age groups (≤15; 16–17; 18–21) for participants who considered abortion and for those who did not. Adolescents age 16–17 and adolescents ≤15, who considered abortion, appeared as competent as legal adults; only≤15-year-old adolescents who did not consider abortion appeared less competent. Regression analysis was used to identify psychosocial predictors of competence. Results challenge the presumption that minors are not competent. An alternate policy based upon informed consent and empowerment of minors as decision makers is proposed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号