Digital Technologies, Politics, and Society Across Africa

Total Page:16

File Type:pdf, Size:1020Kb

Digital Technologies, Politics, and Society Across Africa A COLLECTION OF ESSAYS EXPLORING THE INTERPLAY BETWEEN DIGITAL TECHNOLOGIES, POLITICS, AND SOCIETY ACROSS AFRICA Edited by Nic Cheeseman and Lisa Garbe 04 INTRO: Nic Cheeseman, Lisa Garbe and Idayat Hassan: Why digital democracy will take more than technology in Africa 09 Nanjala Nyabola: Governance and Public Policy in the Digital Age 13 Maggie Dwyer and Thomas Malony: How social media is changing politics in Africa 17 Kofi Yeboah: How AI is transforming Africa’s political landscape 21 Alina Rocha Menocal: Digital technologies and the new public square: revitalising democracy? 27 Gbenga Sesan: How to revive Africa’s lost civic spaces 31 Lisa Garbe: What we do (not) know about internet shutdowns in Africa 36 Julie Owono: Why Silicon Valley needs to be more responsible in Africa 40 Toussaint Nothias: Facebook’s ongoing scramble for Africa 47 Michael Asiedu: The role of the courts in safeguarding online freedoms in Africa CONTENTS 51 Herman Wasserman: Fake news in Africa – how big is the problem? 55 Ashwanee Budoo: How fighting fake news hurts free speech 59 Steven Feldstein: How digital repression is changing African politics 64 Lisa-Marie Selvik: How to ensure digital access to information in Africa 68 Khamis Mutwafi: What Google trends data can tell us about the Tanzanian general election 73 Nic Cheeseman, Jonathan Fisher, Idayat Hassan and Jamie Hitchen: Is WhatsApp undermining democracy in Africa? 77 Bruce Mutsvairo: Why social activists face an uphill struggle in Zimbabwe 81 Idayat Hassan and Jamie Hitchen: How hashtag activism moves offline in the Gambia 85 Azeb Madebo: Social Media, the Diaspora, and the Politics of Ethnicity in Ethiopia 93 Paul Onanuga: How young, queer Nigerians use Twitter to fight homophobia 97 Grace Natabaalo, Lulu Jemimah, Jamie Hitchen and Eloïse Bertrand: Short on strategy: WhatsApp use in the Ugandan elections ABOUT THE EDITORS: Nic Cheeseman is the Professor of Democracy at the University of Birmingham and the author and editor of more than 10 books on democracy and politics in Africa. He is also the founder and co-editor of Democracy in Africa (DIA), which is dedicated to the study democracy in Africa and to making it easier for those who are already working in, and on, the continent to share ideas and information. Lisa Garbe is a researcher based at the political science institute at the University of St. Gallen. She studies the opportunities and risks of digitalization for democracy in Africa and the specific role that transnational actors play in shaping them. ACKNOWLEDGEMENTS This compiled collection is the result of a collaboration between DIA and DCSL. The editors would like to thank Toussaint Nothias, Associate Director of Research at DCSL for editorial and production support, and Mahyar.Kazempour for design and layout. The editors would also like to thank all the authors for their contributions. The views expressed in these posts are solely those of the authors and do not necessarily reflect those of Democracy in Africa or the Digital Civil Society Lab. INTRODUCTION 1 WHY DIGITAL DEMOCRACY WILL TAKE MORE THAN TECHNOLOGY IN AFRICA By Nic Cheeseman, Lisa Garbe and Idayat Hassan | October 5, 2020 From the mid-2000s onwards, the digital revolution raised hopes of democratic transformation and strengthening in Africa. But it hasn’t quite turned out like that. Now, almost a decade after the “Arab Spring”, techno-optimism has given way to techno-pessimism. 4 African leaders have proved able to blunt the transformative potential of smart phones through censorship and internet shutdowns. When the internet is on, social media attracts more attention for spreading fake news than preventing election rigging. What was once thought of as “liberation technology” has turned out to be remarkably compatible with the maintenance of the status quo. Or has it? Does this more pessimistic reading overlook genuine progress? This publication edited by Nic Cheeseman and Lisa Garbe draws together the latest research on the extent to which digital technology has changed Africa … and the ways in which Africa is changing digital technology. The articles show that we should not miss the wood for the trees: despite disappointment, digital technology has had profound impacts on African politics and society. But, they also highlight how much more needs to be known about digital technology on the continent. Digital access and inclusion A lot of recent analysis has focused on the digital divide in Africa, and the many people excluded from online access by poverty and lack of coverage. Yet researchers have also found that closing this divide cannot be achieved by cheaper technology alone. Using digital technology to access information and resources is only possible when a set of political, legal, and economic conditions are in place. For example, the content that citizens can access increasingly depends on giant tech companies, especially for poorer citizens. In his contribution on Facebook’s Free Basics ‒ a service that provides basic online services without data charges ‒ Toussaint Nothias explains that tech corporations’ dominant position enables them to shape how individuals use the internet under the pretence of making it more affordable. This raises tough questions about whether multinational companies engage ethically in Africa. As Julie Owono’s contribution points out, Facebook has been accused of “dumping” products such as Free Basics, stymieing the production of local alternatives. This has raised concerns of a fresh “scramble for Africa”, with multinational companies expending more energy and resources in securing new users than tackling hate speech and misinformation. Social media, democracy and accountability From the recent “virtual protest” in Zambia to #ZimbabweanLivesMatter, the potential of social media to empower dissenting voices is clear. Social media is also becoming increasingly important before, during and after African elections. Idayat Hassan and Jamie Hitchen’s analysis of WhatsApp and Facebook use ahead of elections in The Gambia shows that even in rural areas with limited connectivity, 5 social media content contributes to offline political mobilisation. An analysis of political mobilisation during Uganda’s 2021 elections by Grace Natabaalo, Lulu Jemimah, Jamie Hitchen & Eloïse Bertrand shows that politicians also actively use social media groups for campaigning – but that this is often disorganised and so new technology is not always used to maximum effect. Similar limitations have been identified elsewhere. While social media provides important tools for digital activism from marginalised groups, such as for anti-homophobic advocacy in Nigeria, online activism often lacks “leadership, coordination and in some cases identity”. Further challenges are on the horizon. Azeb Madebo reveals how the use of social media by the Ethiopian diaspora has fuelled the polarisation between the Oromo community on the one hand, and the Ethiopian government and Ethiopian nationalists on the other. Not all fake news is believed of course, and it is important to keep in mind that many users are aware that they are being sent disinformation. Indeed, survey data collected by Herman Wassermann and Dani Madrid-Morales in Kenya, Nigeria, and South Africa, shows that African citizens have much lower trust in social media than Americans. When stories play into widely held fears, prejudices and assumptions, however, they can exacerbate distrust and encourage a cycle of violence. It is, therefore, significant that there is relatively little regulation of content moderation. Julie Owono shows that in part this can be attributed to the limited local capacity of content providers such as Facebook or Twitter. Neither has invested heavily in African experts capable of identifying fake news and hate speech circulated on their platforms. In part, it is also rooted in the limited funding available for civil society groups, considerable linguistic diversity, and the volume of information being shared. As a result, organisations such as Africa Check highlight instances of fake news but cannot hope to cover all harmful content. Many questions, few answers Unfortunately, there are no easy answers to the challenge of problematic content because when governments do try and combat free speech, Ashwanee Budoo finds that misinformation is often abused as an excuse to clamp down on freedom of expression. There is also a significant risk, according to Kofi Yeboah, that the spread of Artificial Intelligence will destabilize African politics. These accounts highlight that there is still a lot to learn about the causes and consequences of social media. Fortunately, social media itself provides an opportunity to study political interest, discourse, or participation, as demonstrated by Khamis Mutwafi’s analysis of what Google Trends data tell us about the Tanzanian elections. 6 As Nanjala Nyabola puts it, “the digital is changing the way we do politics and international relations”, with both citizens and governments using social media to shape political discourse. Steven Feldstein predicts that neither side in will gain a decisive advantage, but rather that both sides will continuously adapt their strategies resembling a game of cat-and-mouse. The conclusion that the impact of social media is complex and ever changing is further supported by the contribution by Maggie Dwyer and Thomas Molony, which sets out some of the very different ways in which social media is shaping political engagement in Africa. Free speech, censorship and internet
Recommended publications
  • ICC-ASP/18/25 Assembly of States Parties
    International Criminal Court ICC-ASP/18/25 Distr.: General Assembly of States Parties 29 November 2019 Original: English Eighteenth session The Hague, 2-7 December 2019 Report of the Bureau on complementarity I. Background ................................................................................................................. 2 II. General findings .......................................................................................................... 2 III. The President of the Assembly of States Parties, and the Secretariat ......................... 4 IV. The Court .................................................................................................................... 6 V. Broader efforts of the international community .......................................................... 6 VI. Conclusion .................................................................................................................. 9 Annex I: Draft resolution language for the omnibus resolution ................................... 10 Annex II: Draft language for inclusion in the annex on mandates of the omnibus resolution ....................................................................................................... 12 Annex III: Summaries of 2019 meetings ......................................................................... 13 25E291119 ICC-ASP/18/25 I. Background 1. At its 7 February 2019 meeting, the Bureau re-appointed Australia and Romania as ad country focal points for the topic of complementarity. As such, Australia and
    [Show full text]
  • Paths to Our Digital Future Table of Contents
    INTERNET SOCIETY GLOBAL INTERNET REPORT Paths to Our Digital Future Table of Contents Foreword by Kathy Brown, Executive summary Introduction President and CEO, 5–13 14–16 Internet Society 3–4 How we see the Internet Drivers of Change Drivers of Change 16–19 & Areas of Impact 24–61 21–23 Areas of Impact What if? Recommendations 62–84 85–103 104–110 Conclusion Methodology Acknowledgements 111–113 114–117 118–119 internetsociety.org 2 Foreword Foreword by Kathy Brown, President and CEO, Internet Society The Internet Society’s history is inseparably tied to The Internet Society’s fourth annual Global Internet the history of the Internet itself. We were founded Report — Paths to Our Digital Future — explores in 1992 by Internet pioneers Bob Kahn and Vint Cerf, this important question. This comprehensive report along with numerous other visionary individuals brings together insights from across our diverse and organisations. These early Internet luminaries global community to inspire all who engage with the believed that ‘a society would emerge from the Internet to think differently and to prepare for the idea that is the Internet’. And they were right. The opportunities and challenges on the horizon. Internet has come a long way since its inception, and is now part of our social fabric — essential to how No one knows exactly how the Internet will evolve, we connect, communicate, create and collaborate. but we do know it will require new thinking, new approaches and new tools for this rapidly changing 2017 marks a significant milestone for the Internet world around us. Society.
    [Show full text]
  • The Open Internet
    The Open Internet What it is, and how to avoid mistaking it for something else. SEPTEMBER 2014 Introduction1 It is not by chance that we have enjoyed the extraordinary success of the Internet as a global engine of economic, political, cultural, and social progress. Fundamental principles embedded in the architecture of the Internet as a collaboration among designers, builders, providers, and users led directly to this success. Sustaining it will require a commitment by today’s policy makers to understand and respect those principles—not because they are honored by time or tradition, but because they confer tangible present and future benefits. The term "Open Internet" has been used so often and so freely that everyone knows what it means—or thinks they know what it means, and assumes that everyone else means the same thing when they use it. After all, the core enabling principle of the Internet as a system that includes users, applications, and infrastructure is openness, which infuses every aspect of the modern Internet—technical, economic, political, and social. But depending on the context in which it is used, the word open conveys different meanings, particularly when subtle (or not–so–subtle) variations are introduced by translation from one language to another; and because “openness” has become an important issue in many Internet political debates, defining what it means has become part of those debates. As is usually the case when people understand the terms and concepts of a debate differently, it will be difficult for us to resolve important issues of Internet policy until we reconcile our different understandings of open and openness in principle and in practice.
    [Show full text]
  • North Korean Cyber Capabilities: in Brief
    North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting.
    [Show full text]
  • Assessment of ECOWAS Interventions in Guinea Bissau, Burkina Faso and the Gambia
    International Journal of Research and Innovation in Social Science (IJRISS) |Volume II, Issue IV, April 2018|ISSN 2454-6186 Assessment of ECOWAS Interventions in Guinea Bissau, Burkina Faso and the Gambia Charles Akale1, Kingsley Chigozie Udegbunam2*, Julie Sanda3 1Research Fellow at the Centre for Strategic Research and Studies, National Defense College, Abuja, Nigeria 2Social Sciences Unit, School of General Studies, University of Nigeria, Nsukka, Nigeria 3Research Fellow at the Centre for Strategic Research and Studies, National Defence College, Abuja, Nigeria *Corresponding author: Kingsley Chigozie Udegbunam he increase in violent hostilities on the African continent ECOWAS MECHANISM FOR CONFLICT PREVENTION, T since the 1990s can be attributed to the withdrawal of MANAGEMENT, RESOLUTION, PEACEKEEPING AND super power strategic interest in Africa following the end of SECURITY the Cold War. The end of the Cold War dramatically The ECOWAS conflict management framework provides for changed the global strategic landscape. Although threat of regional intervention in political crisis in members states. big power and regional conflicts diminished, the security ECOMOG has been adopted as the regional intervention landscape became characterized by political fragmentation. force. Intervention became popular in the 1990s when In the Third World particularly West Africa has experienced ECOWAS deployed ECOMOG forces into Liberia to prevent many conflicts arising from a multiplicity of causes such as the overthrow of the unpopular government of President bad governance among others. The intensity and carnage that Samuel Doe by the National Patriotic Front of Liberia (NPFL) attended these conflicts, coupled with the inactions of the led by Charles Taylor. ECOMOG intervention can take the “big powers”, reinforced the need for an “African solution” form of peacekeeping or peace enforcement.
    [Show full text]
  • PDF Communicating Fact Checks Online
    FEBRUARY 2020 Communicating fact checks online Striking the balance between commanding attention and conveying information A JOINT BRIEFING FROM: About this briefing Misinformation causes real harm to people’s lives, health, finances and to democracy. We need good evidence on how to tackle it. This briefing is part of a research programme set up by Africa Check, Chequeado and Full Fact to find that evidence and make it useful. In this briefing Full Fact’s ResearcherDr. Dora-Olivia Vicol explores the evidence on how to communicate fact checks to strike the right balance between commanding attention and conveying information online. We thank Paula Szewach and the research team at the Africa Centre for Evidence for their help in gathering regional evidence. We also extend our warmest thanks to Prof. Lisa Fazio, Libby Miller and Tristan Fern for their kind comments on earlier drafts. We welcome feedback and comments at [email protected] Full Fact 2 Carlton Gardens London SW1Y 5AA k [email protected] D @FullFact K fullfact.org Africa Check Johannesburg K africacheck.org Chequeado Buenos Aires K chequeado.com This research was supported by a grant from Luminate. Published by Africa Check, Chequeado and Full Fact, February 2020. Published under the Creative Commons Attribution-ShareAlike 4.0 International License. Communicating fact checks online Contents Summary ������������������������������������������������������������������������������������������������������������������������������������������������������������������������4 Reach
    [Show full text]
  • Social Media and Politics: Theoretical and Methodological Considerations in Designing a Study of Political Engagement
    Social Media and Politics: Theoretical and Methodological Considerations in Designing a Study of Political Engagement Paper presented at Politics: Web 2.0: An International Conference New Political Communication Unit Royal Holloway, University of London April 17-18, 2008 Maja Turnšek University of Ljubljana, Faculty of Social Sciences, Slovenia [email protected] Nicholas W. Jankowski Virtual Knowledge Studio for the Humanities and Social Sciences, Amsterdam, The Netherlands [email protected] 1 Introduction Web 2.0 has become the buzz word describing a plethora of social media available on the internet, includingblogs, photo and file sharing systems (e.g., Flickr, SlideShare, YouTube), and social networking sites (e.g., Friendster, MySpace, SecondLife). Although these media are largely designed for personal presentation, political speech and action sometime emerge, such as in postings protesting government actions on YouTube, creation of candidate headquarters in SecondLife, and utilization of still image and video functionalities on mobile phones during demonstrations and police confrontations. Last year, as candidates began preparing for the U.S. Presidential Primaries, CNN coined the term YouTube-ification of Politics to describe this development. From a perspective ascribing importance to everyday settings as venues for political expression, these Internet-based social media have become both the tools for and sites of politics. The question, however, is how such manifestations of political life can be empirically investigated within a social science theoretical framework. In this paper we examine the theoretical and methodological approaches involved in studying social media utilized for political expression and action. In question form, we ask: How do empirically oriented social scientists consider the theoretical and methodological challenges involved in investigating social media? We address this question through examining a sample of research-oriented peer reviewed journal articles addressing facets of social media.
    [Show full text]
  • Never Agains IV February 2010
    the Availability Digest www.availabilitydigest.com More Never Agains IV February 2010 It is once again time to reflect on the damage that IT systems can inflict on us mere humans. We have come a long way in ensuring the high availability of our data-processing systems. But as the following stories show, we still have a ways to go. During the last six months, hardware/software and network faults shared responsibility, each causing about one-third of the outages. The rest of the outages were caused by a variety of problems such as power failures, construction mishaps, and hacking. Rackspace Hit with Another Outage Techcrunch, June 20, 2009 – On June 20, Rackspace suffered yet another outage1 due to a power failure. The breaker on the primary utility feed powering one of its nine data centers tripped, causing data center’s generators to start up. However, a field excitation failure escalated to the point that the generators became overloaded. An attempt by Rackspace to fail over to its secondary utility feed failed because the transfer switch malfunctioned. When the data center’s batteries ran out, the data center went down. Failovers do fail. Have a contingency plan no matter the extent of your redundancy. NYSE Suffers Several Outages in Less Than a Month Reuters, July 2, 2009 – On Thursday morning, July 2, brokers on the floor of the New York Stock Exchange found that they could not route orders, causing the NYSE to halt trading in some stocks and to extend the trading day. During the previous month, a software glitch halted trading; and an order-matching problem affected timely order reconciliation.
    [Show full text]
  • Mathematics in African History and Cultures
    Paulus Gerdes & Ahmed Djebbar MATHEMATICS IN AFRICAN HISTORY AND CULTURES: AN ANNOTATED BIBLIOGRAPHY African Mathematical Union Commission on the History of Mathematics in Africa (AMUCHMA) Mathematics in African History and Cultures Second edition, 2007 First edition: African Mathematical Union, Cape Town, South Africa, 2004 ISBN: 978-1-4303-1537-7 Published by Lulu. Copyright © 2007 by Paulus Gerdes & Ahmed Djebbar Authors Paulus Gerdes Research Centre for Mathematics, Culture and Education, C.P. 915, Maputo, Mozambique E-mail: [email protected] Ahmed Djebbar Département de mathématiques, Bt. M 2, Université de Lille 1, 59655 Villeneuve D’Asq Cedex, France E-mail: [email protected], [email protected] Cover design inspired by a pattern on a mat woven in the 19th century by a Yombe woman from the Lower Congo area (Cf. GER-04b, p. 96). 2 Table of contents page Preface by the President of the African 7 Mathematical Union (Prof. Jan Persens) Introduction 9 Introduction to the new edition 14 Bibliography A 15 B 43 C 65 D 77 E 105 F 115 G 121 H 162 I 173 J 179 K 182 L 194 M 207 N 223 O 228 P 234 R 241 S 252 T 274 U 281 V 283 3 Mathematics in African History and Cultures page W 290 Y 296 Z 298 Appendices 1 On mathematicians of African descent / 307 Diaspora 2 Publications by Africans on the History of 313 Mathematics outside Africa (including reviews of these publications) 3 On Time-reckoning and Astronomy in 317 African History and Cultures 4 String figures in Africa 338 5 Examples of other Mathematical Books and 343
    [Show full text]
  • 2018-2019 Year in Review
    Year in Review 2018–2019 Table of Contents Reflections on the Year ..................................................................................................4 From the Headlines ..........................................................................................................6 Letter from the Faculty Chair ........................................................................................8 Our Work ............................................................................................................................9 Programs ............................................................................................................10 AGTech Forum .................................................................................................................................10 Assembly ..........................................................................................................................................11 CopyrightX .......................................................................................................................................13 Cyberlaw Clinic ..............................................................................................................................14 Techtopia ..........................................................................................................................................16 Spotlight: Ethics and Governance of Artificial Intelligence Initiative 17 Projects & Tools ................................................................................................20
    [Show full text]
  • OUT of AFRICA: Byting Down on Wildlife Cybercrime CONTENTS
    OUT OF AFRICA: Byting Down on Wildlife Cybercrime CONTENTS 1 | EXECUTIVE SUMMARY 2 2 | BACKGROUND 4 3 | RESEARCHING ONLINE WILDLIFE TRADE IN AFRICA 5 4 | KEY RESULTS AT A GLANCE 7 5 | METHODOLOGY 9 6 | CITES AND WILDLIFE CYBERCRIME 10 7 | OUR PARTNERS 11 8 | INTERNET USE IN AFRICA 13 9 | SUMMARY RESULTS 14 10 | RESULTS BY COUNTRY 19 SOUTH AFRICA • NIGERIA • IVORY COAST • KENYA • TANZANIA • UGANDA • ETHIOPIA 11 | CONCLUSIONS AND RECOMMENDATIONS 29 1 | EXECUTIVE SUMMARY The International Fund for Animal Welfare (IFAW) This research is part of a broader project to has been researching the threat that online wildlife address wildlife cybercrime in Africa, funded by the trade poses to endangered species since 2004. During US government’s Department of State’s Bureau of that time, our research in over 25 countries around International Narcotics and Law Enforcement Affairs the globe has revealed the vast scale of trade in wildlife (INL). The wider project included researching trade in and their parts and products on the world’s largest elephant, rhino and tiger products over the 'Darknet'; marketplace, the Internet - a market that is open for providing training on investigating wildlife cybercrime business 24 hours a day, 365 days a year. to enforcers in South Africa and Kenya; ensuring policy Whilst legal trade exists in respect of many species makers addressed the threat of wildlife cybercrime of wildlife, online platforms can provide easy opportunities through adopting Decision 17.92 entitled Combatting for criminal activities. Trade over the Internet is often Wildlife Cybercrime at the CoP17 of the Convention largely unregulated and anonymous, often with little to on International Trade in Endangered Species of Wild no monitoring or enforcement action being taken against Fauna and Flora (CITES) in Johannesburg 2016; carrying wildlife cybercriminals.
    [Show full text]
  • Democratic Strain and Popular Discontent in Europe: Responding to the Challenges Facing Liberal Democracies
    DEMOCRATIC STRAIN AND POPULAR DISCONTENT IN EUROPE: RESPONDING TO THE CHALLENGES FACING LIBERAL DEMOCRACIES Report of the Standing Committee on Foreign Affairs and International Development Michael Levitt, Chair JUNE 2019 42nd PARLIAMENT, 1st SESSION Published under the authority of the Speaker of the House of Commons SPEAKER’S PERMISSION The proceedings of the House of Commons and its Committees are hereby made available to provide greater public access. The parliamentary privilege of the House of Commons to control the publication and broadcast of the proceedings of the House of Commons and its Committees is nonetheless reserved. All copyrights therein are also reserved. Reproduction of the proceedings of the House of Commons and its Committees, in whole or in part and in any medium, is hereby permitted provided that the reproduction is accurate and is not presented as official. This permission does not extend to reproduction, distribution or use for commercial purpose of financial gain. Reproduction or use outside this permission or without authorization may be treated as copyright infringement in accordance with the Copyright Act. Authorization may be obtained on written application to the Office of the Speaker of the House of Commons. Reproduction in accordance with this permission does not constitute publication under the authority of the House of Commons. The absolute privilege that applies to the proceedings of the House of Commons does not extend to these permitted reproductions. Where a reproduction includes briefs to a Standing Committee of the House of Commons, authorization for reproduction may be required from the authors in accordance with the Copyright Act.
    [Show full text]