The Challenge of Legislating Moral and Civil Wrongs in the Cyberspace: a Theory for Internet Regulatory Policy

Total Page:16

File Type:pdf, Size:1020Kb

The Challenge of Legislating Moral and Civil Wrongs in the Cyberspace: a Theory for Internet Regulatory Policy THE CHALLENGE OF LEGISLATING MORAL AND CIVIL WRONGS IN THE CYBERSPACE: A THEORY FOR INTERNET REGULATORY POLICY Submitted in partial fulfillment of the requirements of the Bachelor of Laws Degree, Strathmore University Law School By Lynda Kinya Kaimenyi 078157 Prepared under the supervision of Mr. Humphrey Sipalla January 2017 i Table of Contents Acknowledgments .................................................................................................................................... iv Declaration ................................................................................................................................................ v Abstract .................................................................................................................................................... vi List of Abbreviations .............................................................................................................................. vii List of Statutes and Instruments ............................................................................................................. viii List of Cases ............................................................................................................................................. ix CHAPTER ONE ......................................................................................................................................... 10 Introduction ................................................................................................................................................. 10 1.1 Statement of the Problem .................................................................................................................. 14 1.2 Justification of the Study .................................................................................................................. 14 1.3 Statement of Objectives .................................................................................................................... 15 1.4 Research Questions ........................................................................................................................... 15 1.5 Literature Review .............................................................................................................................. 16 1.6 Theoretical Framework ..................................................................................................................... 20 1.7 Hypothesis......................................................................................................................................... 21 1.8 Research methodology ...................................................................................................................... 22 CHAPTER TWO ........................................................................................................................................ 23 Theoretical Framework ............................................................................................................................... 23 2.0 Introduction ....................................................................................................................................... 23 2.1 Origin of Government ....................................................................................................................... 24 2.2 The Extent of Legislative Power ....................................................................................................... 27 CHAPTER THREE .................................................................................................................................... 30 The Challenge of Legislating Civil and Moral Wrongs in the Cyberspace ................................................ 30 3.0 Introduction ....................................................................................................................................... 30 3.1 Features of the Cyberspace/ Global Information Infrastructure ....................................................... 31 3.2 Disintegration of Traditional National Borders ................................................................................ 31 3.2.1 Permeable National Borders ...................................................................................................... 31 3.3 Emergence of Network Sovereignty ............................................................................................. 33 3.4 Cyber Libertarianism and Cyber Paternalism/Collectivism ............................................................. 36 CHAPTER FOUR ....................................................................................................................................... 38 International Legal Framework ................................................................................................................... 38 4.0 Introduction ....................................................................................................................................... 38 ii 4.1 Budapest Convention on Cybercrime ............................................................................................... 41 4.2 Internet Bodies .................................................................................................................................. 42 4.2.1 Internet Engineering Task Force (IETF) ........................................................................................ 42 4.2.2 Internet Corporation for Assigned Names and Numbers (ICANN) ............................................... 43 4.2.3 Internet Governance Forum (IGF) ................................................................................................. 43 4.2.4 Internet Research Task Force (IRTF) ............................................................................................ 44 4.3 Formulating Effective Cyber laws .................................................................................................... 44 CHAPTER FIVE ........................................................................................................................................ 46 Regional and National Legal Framework ................................................................................................... 46 5.0 Introduction ....................................................................................................................................... 46 5.1 African Union Convention on Cyber security and Data Protection .................................................. 47 5.2 The Kenya Cyber security and Protection Bill ................................................................................. 47 5.3 Canada............................................................................................................................................... 48 5.4 South Africa ...................................................................................................................................... 50 CHAPTER SIX ........................................................................................................................................... 54 Conclusion and Recommendations ............................................................................................................. 54 6.0 Conclusion ............................................................................................................................................ 54 6.1 Recommendations ................................................................................................................................. 55 Bibliography ............................................................................................................................................... 59 iii Acknowledgments My sincerest gratitude goes to Mr. Humphrey Sipalla for his guidance throughout this work, Professor Nii Quaynor whose insight was invaluable in the writing of this paper. iv Declaration I, LYNDA KINYA KAIMENYI, do hereby declare that this research is my original work and that to the best of my knowledge and belief, it has not been previously, in its entirety or in part, been submitted to any other university for a degree or diploma. Other works cited or referred to are accordingly acknowledged. Signed: ....................................................................... Date: .......................................................................... This dissertation has been submitted for examination with my approval as University Supervisor. Signed: ......................................................................... Mr. Humphrey Sipalla v Abstract The internet’s meteoric rise has provided vast areas of new opportunity and potential sources of efficiency for organizations of all sizes. It has however, also transformed the behaviour of the criminal element within that society. These new opportunities come saddled with unprecedented threats. Ranging from attacks on the system; unauthorised access, denial of service, malware to data breaches; that affect the integrity and confidentiality of data as well as child pornography, hate speech, cyber bullying, theft, fraud etc. This paper’s objective is to come up with a theory for internet regulatory policy. By taking into consideration the unique challenges posed to legislation, the different models of laws and incorporating the merits of various philosophies. This theory is aimed at guiding the creation of effective cyber legislation and guiding any new developments
Recommended publications
  • 201307-Informe-ICANN-47-EN.Pdf
    INTRODUCTION The 47 ICANN meeting was held from July 14 to July 18 at the Durban convention center and was attended by approximately 1800 participants from 92 countries1. This is the third meeting led by the CEO and President, Fadi Chehadé. July 15 During the opening session, the following points were discussed: i. Hamadoun Touré (UIT) gave a remote presentation in which he highlighted the will to work more closely with ICANN and publicly raised the need to formalize an agreement between the two organizations. This has not been acknowledged by ICANN, but it will surely have repercussions beyond those expressed informally. ii. The Registrar Accreditation Agreement was executed between Registries and Registrars. While it will apply directly to new gTLDs, it sets a trend that may have implications in the best practices and contractual relationships with registrars and the way they manage data, among other things: http://www.icann.org/en/resources/registrars/raa/approved-with-specs-27jun13-en.pdf iii. Fadi Chehade (ICANN CEO) announced a restructuring at ICANN to account for the impact of new gTLD management in the organization. For such purpose, three distinct operational areas have been created: the Registry-Registrar area within which a special division called “Generic Domain Names” will operate, different from the rest; the Administrative sector and the Security and Technical Sector. iv. Chehade also developed the five pillars on which the future ICANN's strategic plan is based. Thus, five strategic panels were summoned: “Strategy Panel on Identifier Technology Innovation” (responsible: Paul Mockapetris); “Strategy Panel on ICANN's Role in the Internet Organizations' Ecosystem” (responsible: Vint Cerf); “Strategy Panel on ICANN Multistakeholder Innovation” (responsible: Beth Simone Noveck); Strategy Panel on the Public Responsibility Framework (responsible: Nii Quaynor) y “Strategy Panel on the Role of ICANN in the Future of Internet Governance” (responsible not yet defined).
    [Show full text]
  • Africa Internet History: Highlights
    AFRICA INTERNET HISTORY: HIGHLIGHTS Internet Society Galerie Jean-Malbuisson, 15 Tel: +41 22 807 1444 1775 Wiehle Ave. Tel: +1 703 439 2120 InternetSociety.org CH-1204 Geneva Fax: +41 22 807 1445 Suite 201 Fax: +1 703 326 9881 [email protected] Switzerland Reston, VA 20190, USA Contents Section 1: Organizations Section 2: Technologies Section 3: Impact Section 4: African institutions and Internet governance Section 5: Some pioneers Internet Society Galerie Jean-Malbuisson, 15 Tel: +41 22 807 1444 1775 Wiehle Ave. Tel: +1 703 439 2120 InternetSociety.org CH-1204 Geneva Fax: +41 22 807 1445 Suite 201 Fax: +1 703 326 9881 [email protected] Switzerland Reston, VA 20190, USA Introduction This document on the Africa Internet history’s highlights is a collection of information from various sources. It is not a historical document per country but rather a set of global information on the Internet mainly from 1990 to 2001 in Africa Internet Society Galerie Jean-Malbuisson, 15 Tel: +41 22 807 1444 1775 Wiehle Ave. Tel: +1 703 439 2120 InternetSociety.org CH-1204 Geneva Fax: +41 22 807 1445 Suite 201 Fax: +1 703 326 9881 [email protected] Switzerland Reston, VA 20190, USA I Organizations/Initiatives Many international organizations have played an important role in Africa Internet history. Their actions were significant in the area of infrastructure, policy, capacity building and more. This section is trying to summarize some of these actions by international organizations and research centers. Internet Society Galerie Jean-Malbuisson, 15 Tel: +41 22 807 1444 1775 Wiehle Ave. Tel: +1 703 439 2120 InternetSociety.org CH-1204 Geneva Fax: +41 22 807 1445 Suite 201 Fax: +1 703 326 9881 [email protected] Switzerland Reston, VA 20190, USA − Africa Union The New Partnership for Africa's Development (NEPAD) is a programme of the African Union (AU) adopted in Lusaka, Zambia in 2001.
    [Show full text]
  • Update and Issues
    ICANN:ICANN: UpdateUpdate andand IssuesIssues PSOPSO GAGA SophiaSophia AntipolisAntipolis,, July,July, 20012001 HansHans KraajienbrinkKraajienbrink andand HelmutHelmut SchinkSchink ICANNICANN DirectorsDirectors ICANN:ICANN: TheThe BasicBasic BargainBargain ICANNICANN == InternationalizationInternationalization ofof PolicyPolicy FunctionsFunctions forfor DNSDNS andand IPIP AddressingAddressing systemssystems ++ PrivatePrivate SectorSector (non(non--governmental)governmental) ManagementManagement WhatWhat doesdoes ICANNICANN do?do? CoordinatesCoordinates policiespolicies relatingrelating toto thethe uniqueunique assignmentassignment of:of: •• InternetInternet DomainDomain NamesNames •• NumericalNumerical IPIP AddressesAddresses •• ProtocolProtocol PortPort andand ParameterParameter NumbersNumbers CoordinatesCoordinates thethe DNSDNS RootRoot ServerServer SystemSystem -- throughthrough RootRoot ServerServer SystemSystem AdvisoryAdvisory CommitteeCommittee WhatWhat areare thethe IANAIANA functions?functions? ProtocolProtocol parameterparameter assignmentsassignments • Under March 1, 2000 IETF/IAB/ICANN MOU • Documented through IETF’s RFC series • Types of numbers range from unique port assignments to the registration of character sets. • List of IANA Protocol Numbers and Assignment services: <http://www.iana.org/numbers.html> IPIP AddressAddress AllocationsAllocations DNSDNS rootroot zonezone filefile managementmanagement ICANNICANN BoardBoard ofof DirectorsDirectors President and CEO ASO Directors: M. Stuart Lynn Rob Blokzijl (Netherlands)
    [Show full text]
  • Creating Emerging Markets – Oral History Collection Dr. Nii Quaynor
    Creating Emerging Markets – Oral History Collection Dr. Nii Quaynor, Chairman, Network Computer Systems and Ghana Dot Com Interviewed by Henry McGee, Senior Lecturer, Harvard Business School January 15, 2014 in Accra, Ghana Audio interview conducted in English The Creating Emerging Markets Oral History Collection is part of the collections of Baker Library, Harvard Business School. The transcripts are made available for academic research and teaching. Any other use - including commercial reuse, mounting on other systems, or other forms of redistribution - requires permission of Harvard Business School. When use is made of these texts, it is the responsibility of the user to obtain the additional permissions for requests to cite and to observe the laws of copyright and the educational fair use guidelines. Research Inquiries & Requests to Cite Oral History Collection: Please contact Rachel Wise, HBS Archivist, [email protected] or Laura Linard, Director of Special Collections, [email protected] Preferred Citation: Interview with Dr. Nii Quaynor, interviewed by Henry McGee, Accra, Ghana, January 15, 2014, Creating Emerging Markets Oral History Collection, Baker Library Historical Collections, Harvard Business School. Baker Library Historical Collections Baker Library | Bloomberg Center Harvard Business School Boston, MA 02163 617.495.6411 [email protected] http://www.library.hbs.edu/hc © 2014 Copyright Notice The Creating Emerging Markets Oral History Collection is owned by the President and Fellows of Harvard College. Interview with Dr. Nii Quaynor, Chairman, Network Computer Systems and Ghana Dot Com Interviewed by Henry McGee, Senior Lecturer, Harvard Business School January 15, 2014 Accra, Ghana Audio interview conducted in English HM: When I think about the Internet, it’s really made us all global citizens and as a member of the Internet Hall of Fame, you certainly are a man of the world.
    [Show full text]
  • Caseyrthesis.Pdf (5.347Mb)
    ICANN or ICANN’t Represent Internet Users Rebecca E. Casey Thesis submitted to the faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of requirements for the degree of Master of Arts In Political Science Karen M. Hult, Chair Charles E. Walcott Brent K. Jesiek August 21, 2008 Blacksburg, Virginia Keywords: ICANN, descriptive representation, substantive representation, formal representation, Internet users, ICANN Board of Directors ICANN or ICANN’t Represent Internet Users Rebecca E. Casey ABSTRACT The Internet Corporation for Assigned Names and Numbers (ICANN) is the organization that provides the technical support for the Internet. ICANN is a nonprofit organization based in California and is under contract to the United States Department of Commerce. It has come under attack from many sides because it is contracted through the U.S. government and it is a private entity. One of the main components of the controversy surrounding ICANN is whether it can represent a global society as a private entity and whether that private entity can represent Internet users. I focus my study on ICANN’s Board of Directors. I evaluated the Board on the dimensions of descriptive, substantive, and formal representation (Pitkin 1967). Evaluation of ICANN’s descriptive representation focused on the Board members’ sex, educational backgrounds, and nationalities and compared the geographic representation on the Board to the global distribution of Internet users. The assessment of substantive representation looked at the Board members’ votes to determine if patterns could be viewed based on members’ descriptive characteristics. Finally, the evaluation of ICANN’s formal representation examined its Bylaws, its 2006 contract with the U.S.
    [Show full text]
  • GFCE Triple I: the Internet Infrastructure Initiative Achievements and Perspective Per December 2019
    Final Report GFCE Triple-I by Maarten Botterman GFCE Triple I: the Internet Infrastructure Initiative Achievements and Perspective per December 2019 Triple-I is a GFCE initiative with the aim to enhance justified trust in Internet (connection, email and browsing) through awareness raising on open internet security standards and instigating roll out based on good practices and experience. This initiative is proposed by the Netherlands and has the support of the GFCE community, as well as from members of the global “technical community”. This report provides an overview of where we stand per end of 2019, and the perspectives towards further deployment of the Triple-I work. Aim was to set up and execute a number of workshops around the world, in collaboration with relevant partners, to develop and demonstrate the power of awareness raising and action planning with different stakeholders in a region together in a room. Since 2018, the Triple-I facilitator has worked with the GFCE Secretariat and the global Internet community to prepare and set up a total of seven workshops and ensure constant communications about progress to the GFCE Community. Preparatory phase Following exploratory meetings in 2017 and the first quarter of 2018, it became clear the it was important to have a clear focal point for driving the GFCE Triple-I events, and to have that person both to drive preparations, and to be present on the day itself, locally, to facilitate the workshop. From GFCE the following resources were made available to all events: - The GFCE Good Practices Document on Triple I developed by TNO in 2017; - Practical in-person support by the Triple-I facilitator for making the events happen; - Financial support for project logistics and travel support for a limited number of local experts and other contributors whose participation is important for the event.
    [Show full text]
  • PDF Generated By
    NEGOTIATING INTERNET GOVERNANCE ii Negotiating Internet Governance ROXANA RADU 1 iv 1 Great Clarendon Street, Oxford, OX2 6DP, United Kingdom Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide. Oxford is a registered trade mark of Oxford University Press in the UK and in certain other countries © Roxana Radu 2019 The moral rights of the author have been asserted Published with the support of the Swiss National Science Foundation First Edition published in 2019 Impression: 1 Some rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, for commercial purposes, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, by licence or under terms agreed with the appropriate reprographics rights organization. This is an open access publication, available online and distributed under the terms of a Creative Commons Attribution – Non Commercial – No Derivatives 4.0 International licence (CC BY-NC-ND 4.0), a copy of which is available at http://creativecommons.org/licenses/by-nc-nd/4.0/. Enquiries concerning reproduction outside the scope of this licence should be sent to the Rights Department, Oxford University Press, at the address above Crown copyright material is reproduced under Class Licence Number C01P0000148 with the permission of OPSI and the Queen’s Printer for Scotland Published
    [Show full text]
  • PETALING JAYA, MALAYSIA 18–28 February 2014
    2014 THE ASIA PACIFIC’S PREMIER INTERNET SUMMIT PETALING JAYA, MALAYSIA 18–28 February 2014 Organized by Sunway Resort Hotel & Spa TMBHD00652 Telekom Asia OL.pdf 1 8/29/13 9:29 PM C M Y CM MY CY CMY K Contents APIA Welcome Message 4 APNIC Welcome Message 5 Conference Highlights 6 Venue Layout 8 Conference Timetable 11 List of Speakers 16 Sponsors 17 What next? 18 2014 APRICOT’s backup venue, in times of Network Management, MPLS, and Security. emergency, has traditionally been in Kuala The second week of the APRICOT summit Lumpur, Malaysia; it is centrally located includes tutorials and conference sessions, in our region, easy to travel to for most, with keynotes from Professor Kanchana and has a large number of suitable venues Kanchanasut, Dr Nii Quaynor and Pindar to hold our conference. APNIC, who now Wong. operates the Secretariat on behalf of APIA, agreed to take on the challenge of The APIA Board would like to thank the Welcome Message relocating an almost completely prepared tremendous support which True and conference from Bangkok to Petaling Jaya (a NECTEC have provided to APRICOT in the months of preparation work during 2013. Dear APRICOT Delegate, satellite city of Kuala Lumpur). The Board would also like to thank APNIC As you will no doubt be aware, APRICOT Preparing the venues and infrastructure for for their considerable efforts in moving 2014 was originally intended to be held in a 500+ person conference as diverse and the conference. And the Board would like Bangkok. But with the escalating political varied as ours is no small undertaking and to thank the many volunteers from the protests in Bangkok during December the team, superbly led by Molly Cheam, has community in the APRICOT Management, 2013 and January 2014, and the Thai performed many miracles to make APRICOT Programme, Fellowship and Technical Government’s declaration of a state of 2014 a reality.
    [Show full text]
  • Internet Development in Angola Our Contribution
    Internet Development in Angola Our contribution Silvio Cabral Almada & Haymée Pérez Cogle In 2006 Angola completes ten years of full Internet operation. Although its access is not possible to perform within the parameters of the universality of the four corners of our country, benefits of this technology can be already noticeable in our country. Today is possible to do our banking transactions using the home banking facility, work using remote access, send and receive messages, perform real time text chatting to and from any place, use Chat and Messenger facilities or even talk from PC to PC or from PC to Telephone using Voice over IP such as Skype, download movies, watch movies, watch television, listen to the radio, read newspapers, get scientific information, etc. As everything has a beginning, it is important to know how this technology was introduced in Angola, its background and development. It is the result of many different contributions and here we state our contribution to the introduction of new technologies. As it can be noted through our history, it is clear that love also contributed to the implementation of Internet in this immense and wonderful country. Background In 1989, after completing my studies in Ukraine in the Instituto Superior Politécnico (Polytechnic Superior Institute) of the city of Donesk, as a computer Systems Engineer, I was placed at the Ministério do Plano (Planning Ministry); previously, the State had guaranteed work for bursary students, after completing their studies, however, it happened that, after various unsuccessful contacts to the Planning Ministry (which was indicated as my employer), I decided to look in the labour market for a job.
    [Show full text]
  • ICANN Strategy Panels & the Planning Process THERESA
    SINGAPORE ‐ ICANN Strategy Panels & the Planning Process EN SINGAPORE – ICANN Strategy Panels & the Planning Process Monday, March 24th 2014 – 15:15 to 16:45 ICANN – Singapore, Singapore THERESA SWINEHART: Looks like we're ready. And, according to Alice, I'm driving. First of all, I just wanted to acknowledge Alice's incredible work on the strategy panels themselves and keeping everything orchestrated and moving forward and coordinated and just really running with the program. I just want to really publicly acknowledge that. So Alice, thank you. [ Applause ] There's a lot of projects going on. So it's very much appreciated. So this session is going to be on the ICANN strategy panels and the planning process. And I'll do a quick introduction of where we are with the strategic planning process and schedule and then actually turn it over to the chairs of the panels to go through their outcomes, their thoughts, and to open that up for questions and answers. Unfortunately, I have a meeting that had been scheduled at 4:00; so I will step out at a few minutes before that. But Pindar has been kind enough to offer to handle the closing of the sessions, so thanks and apologies about the last minute schedule. So let's see. Of course, I have to figure out what direction to point it to. Maybe not? No, no, maybe. Sorry about this. Good? Okay. So just a quick run through on the agenda. I'll talk about this for just a few minutes, and then I'll give some time back to the different strategy Note: The following is the output resulting from transcribing an audio file into a word/text document.
    [Show full text]
  • Elizabeth Williams Thesis (PDF 1MB)
    © ELIZABETH A WILLIAMS 2003 ISBN 0-9750841-0-0 THE GLOBALISATION OF REGULATION AND ITS IMPACT ON THE DOMAIN NAME SYSTEM: DOMAIN NAMES AND A NEW REGULATORY ECONOMY by ELIZABETH A WILLIAMS Bachelor of Arts (ANU) – 1985 Master of Arts (UC) – 1998 Thesis submitted in accordance with the regulations for Degree of Doctor of Philosophy Information Security Research Centre Faculty of Information Technology Queensland University of Technology December 2003 CERTIFICATE OF ACCEPTANCE Approved by Chairperson of Supervisory Committee Professor William J Caelli School of Software Engineering & Data Communications Faculty of Information Technology Queensland University of Technology Program Authorised to Offer Degree Signed: ………………………………………………………………… W J CAELLI Date: ………………………………………………………………… KEY WORDS Globalisation of regulation, the domain name system, Internet governance, information technology, critical infrastructure protection. ABSTRACT This is a multidisciplinary work that encompasses considerations of politics, regulation and technology. It considers the impact of technology on the way in which, politically, we are able to regulate technology and how we devise policy to guide that regulation. The added complication is that Internet technology knows no jurisdiction. The rulemaking established in recent years is globally applicable and is carried out without the direct involvement of national governments in the key decision making processes, particularly in the environment under examination here which focuses on the management of the technical resources of the Internet. In formulating the hypothesis that grounds this work, I have focused on two things. Firstly, that technical regulation has political, and therefore, policy implications. Secondly, that where there are policy implications with direct commercial impact, we can expect to see the vigorous involvement of corporations as they manage the environment in which they do business.
    [Show full text]
  • Webinar Alice Jansen
    20140311_StrategyPanelDra Page 1 ICANN Strategy Panels – Draft Reports - Webinar Alice Jansen: Greetings. My name is Alice Jansen, and it's a pleasure for me to welcome you to the ICANN Strategy Panel's Draft Reports Webinar. Before we begin, I'd like to briefly remind all participants of housekeeping items. This webinar is being recorded. If you have any objections you may disconnect at this time. This session is being steamed via the Adobe Connect Room. If you intend to voice comments or questions during the Q&A, please join the Adigo Bridge. Up on the screen you will find the agenda, and it's also available in the notepad. My colleague, Grace Abuhamad (ph) will be our timekeeper today. Participants' lines are muted throughout presentations and will be opened for the Q&A. During presentations you may submit questions using the Adobe Connect Chat pot. At the end of presentations you will be given the opportunity to voice your comments and questions. All lines will be unmated for the Q&A. If you are on the Bridge, please remember to mute your computer speakers once the floor is open to avoid echo. Should you not be seeking, please mute your line using *6; dial *7 to unmute. If you wish to speak during the Q&A, please raise your hand in the Adobe Connect room, to be added to the queue. Slides, recording and transcript will be made available following the session. You may find these housekeeping indications in the Adobe Connect notes. With that, we'll turn to Beth Noveck.
    [Show full text]