Internet: Case-Law of the European Court of Human Rights

Total Page:16

File Type:pdf, Size:1020Kb

Internet: Case-Law of the European Court of Human Rights DIVISION DE LA RECHERCHE RESEARCH DIVISION _______________________ Internet: case-law of the European Court of Human Rights Updated: June 2015 Publishers or organisations wishing to reproduce all or part of this report (or a translation thereof) in print or on line are asked to contact [email protected] for further instructions. © Council of Europe/European Court of Human Rights, 2011, June 2015 (update) The document is available for downloading at www.echr.coe.int (Case-Law – Case-Law Analysis – Case-law research reports). The report was prepared by the Research Division and does not bind the Court; it may be subject to editorial revision. © Council of Europe / European Court of Human Rights, updated June 2015 ii TABLE OF CONTENTS INTRODUCTION .................................................................................................................... 4 I. JURISDICTION ISSUES ................................................................................................. 4 II. Data-protection and retention issues relevant for the Internet .................................... 7 (1) The scope of Article 8 and personal data ....................................................................................... 7 (2) Basic principles in respect of data storage as set out in the Court’s case-law .............................. 9 (3) Data retrieved following surveillance .......................................................................................... 10 (4) The taking and retention of fingerprint or cellular material and the storage of DNA profiles .... 11 (5) Storage of other personal data on public databases .................................................................... 12 (6) Data protection with specific reference to the Internet ................................................................ 14 III. Internet and freedom of expression ............................................................................... 17 (1) The Court’s general principles concerning freedom of expression apply to the Internet ............ 17 (2) Interpretation of the Convention “in the light of present-day conditions” must take into account the specific nature of the Internet as a “modern means of imparting information” .................... 22 (a) Principles .................................................................................................................................................... 22 (b) Limits .......................................................................................................................................................... 23 (3) Restrictions that might prove necessary in the Internet context (Article 10 § 2) ......................... 24 (4) The “duties and responsibilities” of an Internet news portal as regards online comments posted by users ........................................................................................................................................ 27 (5) Press publications on the Internet: reinforcement of journalists’ “duties and responsibilities” . 29 (6) Higher level of protection of freedom of expression in the area of political, militant and polemical expression on the Internet ........................................................................................... 32 (a) Principles .................................................................................................................................................... 32 (b) Extent of admissible political criticism ....................................................................................................... 32 (c) Limits to admissible criticism ..................................................................................................................... 32 (7) The chilling effect on freedom of expression ................................................................................ 33 IV. Internet and Intellectual Property ................................................................................. 35 (1) Presentation ................................................................................................................................. 35 (2) Intellectual property falls under Article 1 of Protocol No. 1 to the Convention .......................... 36 (a) Property rights ............................................................................................................................................. 36 (b) Moral rights................................................................................................................................................. 37 (3) Conclusion ................................................................................................................................... 40 V. Access to information and the Internet under Article 10 of the Convention ............ 40 (1) Applicability of Article 10 ............................................................................................................ 40 (2) State obligations ........................................................................................................................... 41 (3) Recent developments .................................................................................................................... 42 (4) Restrictions .................................................................................................................................. 43 (5) Access to Internet ......................................................................................................................... 44 (6) Conclusion .................................................................................................................................. 46 VI. Obligation of States to combat violence and other criminal or unlafwul activities .. 47 1) Internet: positive obligations of States and protection of individuals’ rights .............................. 47 (a) Protecting the integrity of vulnerable individuals, including children and minors....................................... 47 (b) Online publication of photos showing sexual practices ............................................................................... 48 (c) Internet and defamation, threats and insults ................................................................................................ 49 (d) Protection of immigrants and foreigners ..................................................................................................... 50 (e) Internet and the disclosure of financial and wealth data .............................................................................. 51 (f) Protection of Internet communications and States’ obligations ................................................................... 53 2) Positive obligations of States to prevent violence and other criminal or illegal activities, as developed in other contexts .......................................................................................................... 53 (a) Positive obligation to protect individuals against slavery and human trafficking under Article 4 ............... 53 (b) Positive obligation to protect individuals against physical harm and sexual abuse ..................................... 53 (c) Positive obligation to combat racism, hate speech, discrimination, intolerance and the glorification of violence and terrorism ................................................................................................................................. 54 APPENDIX - List of judgments and decisions .................................................................... 57 © Council of Europe / European Court of Human Rights, updated June 2015 iii INTERNET: CASE-LAW OF THE EUROPEAN COURT OF HUMAN RIGHTS INTRODUCTION At the request of the Directorate General of Human Rights and the Rule of Law, the Research and Library Division of the Registry of the European Court of Human Rights has updated the report on “Internet: case-law of the European Court of Human Rights”, published in June 2011. This latest version, as updated in June 2015, covers the Court’s case-law on various related or interconnected subjects. Leading judgments are accordingly cited in various places. Therein lies the added value of this study: it offers a transversal approach based on clear, pertinent, ready-to-use information. The complex subject covered here relates to your many centres of interest on various levels. The report provides reliable, up-to-date access, a thread to guide the reader safely through the Court’s judgments and pending cases concerning the Internet, a constantly developing area of the law. I. JURISDICTION ISSUES The Research Division has been asked to explore the Court’s jurisprudence on jurisdictional issues in Internet-related cases. It should be noted at the outset that the term “jurisdiction” primarily means the power of a court to hear and decide a case or make a certain order. However, this term is also used to refer to the territorial limits within which the jurisdiction of a court may be exercised. In this regard, it is useful to bear in mind that jurisdiction is an aspect of a State’s sovereignty and for this reason it is generally confined to the territory of that State (Al-Skeini and Others v. the United Kingdom [GC], no. 55721/07, § 131, ECHR 2011). However, transactions or publications on the Internet may span many borders. In other words, there is more often than not a cross-border element in Internet-related cases. That raises the question,
Recommended publications
  • Issues Paper on Cyber-Crime Affecting Personal Safety, Privacy and Reputation Including Cyber-Bullying (LRC IP 6-2014)
    Issues Paper on Cyber-crime affecting personal safety, privacy and reputation including cyber-bullying (LRC IP 6-2014) BACKGROUND TO THIS ISSUES PAPER AND THE QUESTIONS RAISED This Issues Paper forms part of the Commission’s Fourth Programme of Law Reform,1 which includes a project to review the law on cyber-crime affecting personal safety, privacy and reputation including cyber-bullying. The criminal law is important in this area, particularly as a deterrent, but civil remedies, including “take-down” orders, are also significant because victims of cyber-harassment need fast remedies once material has been posted online.2 The Commission seeks the views of interested parties on the following 5 issues. 1. Whether the harassment offence in section 10 of the Non-Fatal Offences Against the Person Act 1997 should be amended to incorporate a specific reference to cyber-harassment, including indirect cyber-harassment (the questions for which are on page 13); 2. Whether there should be an offence that involves a single serious interference, through cyber technology, with another person’s privacy (the questions for which are on page 23); 3. Whether current law on hate crime adequately addresses activity that uses cyber technology and social media (the questions for which are on page 26); 4. Whether current penalties for offences which can apply to cyber-harassment and related behaviour are adequate (the questions for which are on page 28); 5. The adequacy of civil law remedies to protect against cyber-harassment and to safeguard the right to privacy (the questions for which are on page 35); Cyber-harassment and other harmful cyber communications The emergence of cyber technology has transformed how we communicate with others.
    [Show full text]
  • Paradism Appendix Official
    Paradism – A Project for Society 1 1 Canadian Raelian Church (2014) We are rapidly approaching a Canadian society – and a world society too – in which human work will be unnecessary! We call that new society paradism. "Paradism is the essential key to the future of humanity. And it's possible now... It can be done in a few weeks, not in a few years... just a few weeks!"- Rael Introduction This document is intended primarily for politicians and the media, since the former have the power to change things and the latter to influence them. (That is, as long as they have the will to do it.) But this text also speaks to all who know that work can soon be rapidly eliminated through science and the cutting edge technologies available today, especially robotics. Those who become unemployed through this change need not lack for anything. Instead, they can blossom and thrive in a leisure society, where the arts, sports, mutual aid and collaboration will prevail. Robot workers will meet all material needs. That is paradism! Those who rightly question the current functioning of our society can help bring about the profound changes essential to create the just, 2 idyllic society just described. By actively contributing to those changes, they will be able to leave a positive heritage for the entire world. Under the current system, a few people are using technology selfishly, impoverishing the majority (many of whom have already lost or are about to lose their jobs due to technological advances) to enrich only themselves. Technological progress is inevitable, but it should be used for the good of everyone, not just the few who currently profit from it.
    [Show full text]
  • Photographs in Public Places and Privacy
    [2009] 2 Journal of Media Law 159–171 Photographs in Public Places and Privacy Kirsty Hughes In the last few years, the European Court of Human Rights (‘the Court’) has considered a number of cases relating to photographs taken in public places, and it is now clear that the jurisprudence has evolved significantly since the early cases in which no protection was afforded to the privacy interests of those photographed. The most recent cases (Reklos and Davourlis v Greece and Egeland and Hanseid v Norway) have extended the protection afforded by Article 8 of the European Convention on Human Rights (ECHR) so that the right is engaged at the stage at which photographs are taken.1 The author argues that whilst this development was necessary, there are a number of problems with the Court’s approach and that further guidance from the Court is essential. THEORIES OF PRIVACY-RELATED INTERESTS To fully understand the significance of the Article 8 ECHR photography cases, one has to have some idea of how these cases relate to the protection of privacy. There are many different theories of privacy and privacy-related interests and it is beyond the scope and purpose of this commentary to examine the details of those theories here.2 However, it * Clare College, University of Cambridge. 1 (App No 1234/05) [2009] EMLR 16 and (App No 34438/04) [2009] ECHR 622, available on HUDOC. 2 The literature is extensive; a good starting point would be Ruth Gavison, ‘Privacy and the Limits of the Law’ (1980) 89(3) Yale Law Journal 421; Hyman Gross, ‘Privacy and Autonomy’
    [Show full text]
  • A Right That Should've Been: Protection of Personal Images On
    275 A RIGHT THAT SHOULD’VE BEEN: PROTECTION OF PERSONAL IMAGES ON THE INTERNET EUGENIA GEORGIADES “The right to the protection of one’s image is … one of the essential components of personal development.” Grand Chamber of the European Court of Human Rights ABSTRACT This paper provides an overview of the current legal protection of personal images that are uploaded and shared on social networks within an Australian context. The paper outlines the problems that arise with the uploading and sharing of personal images and considers the reasons why personal images ought to be protected. In considering the various areas of law that may offer protection for personal images such as copyright, contract, privacy and the tort of breach of confidence. The paper highlights that this protection is limited and leaves the people whose image is captured bereft of protection. The paper considers scholarship on the protection of image rights in the United States and suggests that Australian law ought to incorporate an image right. The paper also suggests that the law ought to protect image rights and allow users the right to control the use of their own image. In addition, the paper highlights that a right to be forgotten may provide users with a mechanism to control the use of their image when that image has been misused. Dr. Eugenia Georgiades, Assistant Professor Faculty of Law, Bond University, the author would like to thank Professor Brad Sherman, Professor Leanne Wiseman and Dr. Allan Ardill for their feedback. Volume 61 – Number 2 276 IDEA – The Law Review of the Franklin Pierce Center for Intellectual Property Abstract ..........................................................................
    [Show full text]
  • Voting Suppression, Democracy Destroyed! Really? Shôn Ellerton, July 5, 2021 a Personal Take on the Chaos of the United States’ Recent Spate of Voting Bills and Acts
    Voting Suppression, Democracy Destroyed! Really? Shôn Ellerton, July 5, 2021 A personal take on the chaos of the United States’ recent spate of voting bills and acts. I love reading about crazy cults, and there’s one which I found totally and utterly bizarre, but seemingly harmless. It is a cult by the name of Raëlism. Basically, it’s one of those UFO religions, this being one, where an alien comes down to meet a crazy Frenchman in a UFO during the 1970s and tells him lots of weird stuff. But one philosophy they espouse which almost seems logical is that our leadership should be run through a geniocracy, a term proposed by this movement that one must attain a certain level of intelligence before running entire nations! Here in the Western World, we do not have a geniocracy; I’m fairly certain of that, but those who live in most of Western Europe, Canada, Australia and the United States are, in my opinion, fortunate to live in a democracy. Readers of history and current affairs may be aware of nation states working under a theocracy like Iran, or a hardcore ‘Confucius’ feudal society operating under the philosophy of Juche like North Korea, or a regime where questioning the body politic is punishable as in China or a straight-up tyrannical feudal society like Saudi Arabia. Yet, there are those in the United States who belligerently cry out that their democracy is under threat, most of which, are unable to provide any reasonable explanation as to what it is that is causing the threat.
    [Show full text]
  • Tech Giants, Freedom of Expression and Privacy
    TECH GIANTS, FREEDOM OF EXPRESSION AND PRIVACY TECH GIANTS, FREEDOM OF EXPRESSION AND PRIVACY Rikke Frank Jørgensen & Marya Akhtar e-ISBN: 978-87-93893-77-1 © 2020 The Danish Institute for Human Rights Wilders Plads 8K DK-1403 Copenhagen K Phone +45 3269 8888 www.humanrights.dk Provided such reproduction is for non-commercial use, this publication, or parts of it, may be reproduced if author and source are quoted. At DIHR we aim to make our publications as accessible as possible. We use large font size, short (hyphen-free) lines, left-aligned text and strong contrast for maximum legibility. For further information about accessibility please click www.humanrights.dk/accessibility 2 CONTENT 1 EXECUTIVE SUMMARY ................................................................................... 5 2 INTRODUCTION ............................................................................................. 7 3 WHAT IS A TECH GIANT ................................................................................. 9 4 HUMAN RIGHTS PROTECTION ...................................................................... 11 4.1 THE UN ..................................................................................................... 11 4.1.1 binding rules.......................................................................................... 11 4.1.2 guidelines and recommendations .......................................................... 13 4.2 THE COUNCIL OF EUROPE AND THE EUROPEAN COURT OF HUMAN RIGHT ...........................................................................................................
    [Show full text]
  • Download PDF # Corporatocracy
    ZIFQ0RSX3ZP1 < eBook // Corporatocracy - You Are a Corporate Citizen, a Slave of Invisible and... Corporatocracy - Y ou A re a Corporate Citizen, a Slave of Invisible and Ruth less Masters Filesize: 8.48 MB Reviews Unquestionably, this is actually the very best job by any publisher. It really is basic but unexpected situations within the 50 % from the book. I discovered this book from my dad and i advised this publication to discover. (Dr. Willis Walter) DISCLAIMER | DMCA 269IHWNSIOTU ^ Doc > Corporatocracy - You Are a Corporate Citizen, a Slave of Invisible and... CORPORATOCRACY - YOU ARE A CORPORATE CITIZEN, A SLAVE OF INVISIBLE AND RUTHLESS MASTERS To download Corporatocracy - You Are a Corporate Citizen, a Slave of Invisible and Ruthless Masters eBook, please follow the link listed below and download the document or have accessibility to other information which are highly relevant to CORPORATOCRACY - YOU ARE A CORPORATE CITIZEN, A SLAVE OF INVISIBLE AND RUTHLESS MASTERS ebook. Soul Science University Press, United States, 2014. Paperback. Book Condition: New. 216 x 140 mm. Language: English . Brand New Book ***** Print on Demand *****.A government is the system by which a state or community is governed. This usage is analogous to what is called an administration . A form of government refers to the set of political systems and institutions that make up the organisation of a specific government. Government of any kind aects every human activity in many important ways. For this reason, political scientists generally argue that government should not be studied by itself; but should be studied along with anthropology, economics, history, philosophy, and sociology.
    [Show full text]
  • The Failure to Define the Public Interest in Axel Springer AG V
    Boston College International and Comparative Law Review Volume 36 Article 5 Issue 3 Electronic Supplement 2-18-2014 Meaningful Journalism or "Infotainment"? The Failure to Define the Public nI terest in Axel Springer AG v. Germany Kathryn Manza Boston College Law School, [email protected] Follow this and additional works at: http://lawdigitalcommons.bc.edu/iclr Part of the Communications Law Commons, Comparative and Foreign Law Commons, Entertainment, Arts, and Sports Law Commons, First Amendment Commons, Human Rights Law Commons, and the International Law Commons Recommended Citation Kathryn Manza, Meaningful Journalism or "Infotainment"? The Failure to Define the Public Interest in Axel Springer AG v. Germany, 36 B.C. Int'l & Comp. L. Rev. E. Supp. 61 (2014), http://lawdigitalcommons.bc.edu/iclr/vol36/iss3/5 This Comments is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College International and Comparative Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. MEANINGFUL JOURNALISM OR “INFOTAINMENT”? THE FAILURE TO DEFINE THE PUBLIC INTEREST IN AXEL SPRINGER AG v. GERMANY Kathryn Manza* Abstract: Although American courts provide wide discretion for freedom of the press, the Convention for the Protection of Human Rights and Fundamental Freedoms ensures that the right to privacy enjoys equal footing with freedom of expression in Europe. When navigating the grey areas between these two frequently opposing rights, the European Court of Human Rights allows private information about a public figure to be published only to the extent the information contributes to the public in- terest.
    [Show full text]
  • 'The Right to Be Forgotten: More Than a Pandora's Box?'
    Rolf H. Weber The Right to Be Forgotten More Than a Pandora’s Box? by Rolf H. Weber,* Dr.; Chair Professor for International Business Law at the University of Zurich and Visiting Professor at the University of Hong Kong Abstract: Recently, political voices have ple of free speech. Therefore, its scope needs to be stressed the need to introduce a right to be forgot- evaluated in the light of appropriate data protection ten as new human right. Individuals should have the rules. Insofar, a more user-centered approach is to right to make potentially damaging information dis- be realized. “Delete” can not be a value as such, but appear after a certain time has elapsed. Such new must be balanced within a new legal framework. right, however, can come in conflict with the princi- Keywords: Data protection; delete; free speech; privacy; privacy enhancing technologies; user-centered ap- proach © 2011 Rolf. H. Weber Everybody may disseminate this article by electronic means and make it available for download under the terms and conditions of the Digital Peer Publishing Licence (DPPL). A copy of the license text may be obtained at http://nbn-resolving. de/urn:nbn:de:0009-dppl-v3-en8. Recommended citation: Rolf H. Weber, The Right to Be Forgotten: More Than a Pandora’s Box?, 2 (2011) JIPITEC 120, para. 1. A. Introduction specific “case” is described in Mayer-Schönberg- er’s book Delete: The Virtue of Forgetting in the Digital 4 1 In 2010 a first legislative project was developed in Age. Stacy Snyder, a 25-year-old former education France that envisaged
    [Show full text]
  • Sample File Heavily on Patriotism and National Identity
    Empire Builder Kit Preface ............................................................ 2 Government Type Credits & Legal ................................................ 2 An empire has it rulers. The type of ruler can How to Use ..................................................... 2 often determine the character of a nation. Are Government Types ......................................... 3 they a democratic society that follows the will Simple Ruler Type ....................................... 3 of the people, or are they ruled by a harsh dictator who demand everyone caters to their Expanded Ruler Type .................................. 4 every whim. They could even be ruled by a Also Available ................................................ 10 group of industrialists whose main goal is the acquisition of wealth. Coming Soon ................................................. 10 This part of the Empire Builder kit outlines some of the more common, and not so common, types of ruler or government your empire or country may possess. Although designed with fantasy settings in mind, most of the entries can be used in a sci-fi or other genre of story or game. There are two tables in this publication. One for simple and quick governments and A small disclaimer – A random generator will another that is expanded. Use the first table never be as good as your imagination. Use for when you want a common government this to jump start your own ideas or when you type or a broad description, such as need to fill in the blank. democracy or monarchy. Use the second/expanded table for when you want something that is rare or you want more Sample details,file such as what type of democracy etc. If you need to randomly decide between the two tables, then roll a d20. If you get 1 – 18 then use the simple table, otherwise use the expanded one.
    [Show full text]
  • Protecting Fundamental Rights Online in the Algorithmic Society
    From Constitutional Freedoms to the Power of the Platforms: Protecting Fundamental Rights Online in the Algorithmic Society Giovanni De Gregorio* Summary: 1. Introduction. – 2. From Public to Private as from Atoms to Bits: the Reasons for a Governance Shift. – 3. Delegated Exercise of Quasi-Public Powers Online. 3.1 The Online Content Management. 3.2 The Right to Be Forgotten Online. – 4. Autonomous Exercise of Quasi- Public Powers Online. Towards a private constitutional order or an absolute regime? – 5. Solutions and Perspectives. 5.1 An Old-School Solution: Nudging Online Platforms to Behave as Public Actors. 5.2 An Innovative Solution: Enforcement of Fundamental Rights. – 6. Conclusion: Digital Humanism v Techno-Authoritarianism. 1. Introduction In recent decades, globalisation has challenged the boundaries of constitutional law by calling traditional legal categories into question.1 The internet has played a pivotal role in this process.2 On the one hand, this new protocol of communication has enabled the expanded exercise of individuals' fundamental rights such as freedom of expression.3 On the other hand, unlike other ground-breaking channels of communication, the cross-border nature of the internet has weakened the power of constitutional states, not only in terms of the territorial application of sovereign powers vis-à-vis other states but also with regard to the protection of fundamental rights in the online environment. It should come as no surprise that, from a transnational constitutional perspective, one of the main concerns of states is the limitations placed on their powers to address global phenomena occurring outside their territory.4 The development of the internet has allowed new businesses to exploit the opportunities deriving from the use of a low-cost global communication technology for delivering services without any physical burden, regardless of their location.
    [Show full text]
  • Celebrity Privacy and the Development of the Judicial Concept of Proportionality
    Celebrity privacy and the development of the judicial concept of proportionality: How English law has balanced the rights to protection and interference Robin Callender Smith Queen Mary University of London Centre for Commercial Law Studies Submitted in partial fulfilment of the requirements of the Degree of Doctor of Philosophy Date submitted: 11 August 2014 Examined by viva 6 November 2014 External examiner: Professor Ian Lloyd (Southampton University) Internal examiner: Dr. Andrew Scott (London School of Economics) Passed without corrections Statement of Originality I, Robin Callender Smith, confirm that the research included within this thesis is my own work or that where it has been carried out in collaboration with, or supported by others, that this is duly acknowledged below and my contribution indicated. Previously published material is also acknowledged below. I attest that I have exercised reasonable care to ensure that the work is original, and does not to the best of my knowledge break any UK law, infringe any third party’s copyright or other Intellectual Property Right, or contain any confidential material. I accept that the College has the right to use plagiarism detection software to check the electronic version of the thesis. I confirm that this thesis has not been previously submitted for the award of a degree by this or any other university. The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without the prior written consent of the author. Robin Callender Smith 11 August 2014 2 Details of collaboration and publications R Callender Smith, Press Law (Sweet & Maxwell 1978).
    [Show full text]