首页 > 最新文献

Masaryk University Journal of Law and Technology最新文献

英文 中文
The Principles Established by the Recommendation CM/Rec(2017)5 on Standards for E-voting Applied to Other Channels of Remote Voting 建议CM/Rec(2017)5中关于应用于其他远程投票渠道的电子投票标准所确立的原则
Pub Date : 2019-06-30 DOI: 10.5817/MUJLT2019-1-1
Robert Müller-Török
E-voting is highly suspicious to many citizens and institutions. Past pilot implementations ended before Supreme Courts and mostly not in favour of e-voting. Beside these political and legal battles regarding e-voting, postal voting seems to be commonly accepted and not in question. Motivated by a landmark ruling of the Austrian Constitutional Court in 2016, which led to the revocation of the run-off elections result due to irregularities with postal voting, this paper analyses whether current postal voting regulations and standards in Germany comply to the principles established by the latest Council of Europe (CoE) recommendation on standards for e-voting. Both voting channels are channels for remote voting, hence principles established for one channel must, in the view of the author, also be fully applicable for the other channel. This paper applies the standards set by the recommendation to e-voting to the more commonly used remote voting channel postal voting and concludes that most of these standards cannot be met.
许多公民和机构对电子投票持高度怀疑态度。过去的试点实施在最高法院之前就结束了,而且大多不支持电子投票。除了这些关于电子投票的政治和法律斗争,邮政投票似乎被普遍接受,没有问题。2016年,奥地利宪法法院做出了一项具有里程碑意义的裁决,由于邮政投票存在违规行为,导致第二轮选举结果被撤销。本文以这一裁决为背景,分析了德国现行的邮政投票法规和标准是否符合欧洲委员会(CoE)关于电子投票标准的最新建议所确立的原则。两个投票渠道都是远程投票的渠道,因此笔者认为,为一个渠道建立的原则也必须完全适用于另一个渠道。本文将电子投票建议所设定的标准应用到更常用的远程投票渠道邮政投票中,发现大多数标准都不能满足。
{"title":"The Principles Established by the Recommendation CM/Rec(2017)5 on Standards for E-voting Applied to Other Channels of Remote Voting","authors":"Robert Müller-Török","doi":"10.5817/MUJLT2019-1-1","DOIUrl":"https://doi.org/10.5817/MUJLT2019-1-1","url":null,"abstract":"E-voting is highly suspicious to many citizens and institutions. Past pilot implementations ended before Supreme Courts and mostly not in favour of e-voting. Beside these political and legal battles regarding e-voting, postal voting seems to be commonly accepted and not in question. Motivated by a landmark ruling of the Austrian Constitutional Court in 2016, which led to the revocation of the run-off elections result due to irregularities with postal voting, this paper analyses whether current postal voting regulations and standards in Germany comply to the principles established by the latest Council of Europe (CoE) recommendation on standards for e-voting. Both voting channels are channels for remote voting, hence principles established for one channel must, in the view of the author, also be fully applicable for the other channel. This paper applies the standards set by the recommendation to e-voting to the more commonly used remote voting channel postal voting and concludes that most of these standards cannot be met.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42802634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rethinking the Jurisprudence of Cyberspace. Reed, C.; Murray, A. 对网络空间法学的再思考。里德,C。;Murray,A。
Pub Date : 2019-06-30 DOI: 10.5817/MUJLT2019-1-6
Dominika Galajdová
Reed, C.; Murray, A. (2018) Rethinking the Jurisprudence of Cyberspace. Cheltenham: Edward Elgar Publishing, 235 p.
里德,c;Murray, A.(2018)重新思考网络空间的法理学。切尔滕纳姆:爱德华·埃尔加出版社,235页。
{"title":"Rethinking the Jurisprudence of Cyberspace. Reed, C.; Murray, A.","authors":"Dominika Galajdová","doi":"10.5817/MUJLT2019-1-6","DOIUrl":"https://doi.org/10.5817/MUJLT2019-1-6","url":null,"abstract":"Reed, C.; Murray, A. (2018) Rethinking the Jurisprudence of Cyberspace. Cheltenham: Edward Elgar Publishing, 235 p.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48566919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Tallinn Manuals and the Making of the International Law on Cyber Operations 《塔林手册》与网络作战国际法的制定
Pub Date : 2019-06-30 DOI: 10.5817/MUJLT2019-1-4
Papawadee Tanodomdej
The Tallinn Manuals (the Manuals) attempted to clarify how to apply existing international law to cyber operations. Though the Manuals are non-binding instruments, the Group of International Experts claimed that they reflected the lex lata applicable to cyber operations. However, this claim is questionable due to the dominating role of a few Western states in the drafting process and the linked neglect of the practice of “affected states” in cyber operations. This article examines the quality of the Manuals’ drafting process and the composition and impartiality of the experts involved. It focuses on the issue of the prohibition of the use of force. The aim of this examination is not to discuss whether the Manuals provided the right answer to the question of how international law applies to cyber operations. Rather, they function as a case study of how legal scholarship may affect the making of international law. The article concludes that certain rules in the Manuals are marked by NATO influence and overlook the practice of other states engaged in cyber operations. Therefore, the Manuals disregard the generality of state practice, which should be the decisive factor in the formation of customary international law. As far as “political activism” may be involved, the article argues that the role of legal scholars as assistants to the cognition of international law could be compromised.
《塔林手册》(以下简称《手册》)试图澄清如何将现有国际法适用于网络行动。虽然这些手册是不具约束力的文书,但国际专家组声称,它们反映了适用于网络行动的现行法。然而,由于少数西方国家在起草过程中的主导作用以及对网络行动中“受影响国家”实践的相关忽视,这种说法值得怀疑。本文审查了手册起草过程的质量以及所涉专家的组成和公正性。它的重点是禁止使用武力的问题。本研究的目的不是讨论《手册》是否为国际法如何适用于网络行动的问题提供了正确答案。相反,它们的作用是作为法律学术如何影响国际法制定的案例研究。文章的结论是,《手册》中的某些规则受到北约的影响,忽视了其他国家参与网络行动的做法。因此,《手册》忽视了国家实践的普遍性,而这应该是形成习惯国际法的决定性因素。就“政治行动主义”而言,本文认为法律学者作为国际法认知助手的作用可能会受到损害。
{"title":"The Tallinn Manuals and the Making of the International Law on Cyber Operations","authors":"Papawadee Tanodomdej","doi":"10.5817/MUJLT2019-1-4","DOIUrl":"https://doi.org/10.5817/MUJLT2019-1-4","url":null,"abstract":"The Tallinn Manuals (the Manuals) attempted to clarify how to apply existing international law to cyber operations. Though the Manuals are non-binding instruments, the Group of International Experts claimed that they reflected the lex lata applicable to cyber operations. However, this claim is questionable due to the dominating role of a few Western states in the drafting process and the linked neglect of the practice of “affected states” in cyber operations. This article examines the quality of the Manuals’ drafting process and the composition and impartiality of the experts involved. It focuses on the issue of the prohibition of the use of force. The aim of this examination is not to discuss whether the Manuals provided the right answer to the question of how international law applies to cyber operations. Rather, they function as a case study of how legal scholarship may affect the making of international law. The article concludes that certain rules in the Manuals are marked by NATO influence and overlook the practice of other states engaged in cyber operations. Therefore, the Manuals disregard the generality of state practice, which should be the decisive factor in the formation of customary international law. As far as “political activism” may be involved, the article argues that the role of legal scholars as assistants to the cognition of international law could be compromised.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44789686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Grading AG Szpunar's Opinion in Case C-18/18 – A Caution against Worldwide Content Blocking as Default 对AG Szpunar在C-18/18案件中的意见进行评级-对全球内容屏蔽作为默认设置的警告
Pub Date : 2019-06-14 DOI: 10.5817/MUJLT2019-2-10
D. Svantesson
On 4th of June 2019, Advocate General Szpunar delivered his Opinion in Case C-18/18 between Eva Glawischnig-Piesczek (an Austrian politician) and Facebook Ireland Limited. The politician had sought to have certain current and future content – argued to be defamatory – blocked by Facebook with worldwide effect. This is arguably the most important Internet speech-related case currently before the Court of Justice of the European Union (CJEU) and will doubtlessly influence court reasoning far beyond Europe.This Comment analyses AG Szpunar’s interesting, but problematic, Opinion with particular emphasis on his reasoning in relation to the question of scope of jurisdiction; that is, what is the appropriate geographical scope of orders in these circumstances, rendered by a court that has personal jurisdiction and subject matter jurisdiction.
2019年6月4日,Szpunar总检察长就Eva glawischnigi - piesczek(奥地利政治家)与Facebook Ireland Limited之间的C-18/18案发表了意见。这位政治家曾试图让Facebook屏蔽某些当前和未来的内容(被认为是诽谤的),并在全球范围内产生影响。这可以说是目前欧盟法院(CJEU)审理的最重要的互联网言论相关案件,无疑将影响欧洲以外的法院推理。本评论分析了斯普纳法官的有趣但有问题的意见,特别强调了他对管辖权范围问题的推理;也就是说,在这种情况下,由具有属人管辖权和标的物管辖权的法院作出的命令的适当地理范围是什么。
{"title":"Grading AG Szpunar's Opinion in Case C-18/18 – A Caution against Worldwide Content Blocking as Default","authors":"D. Svantesson","doi":"10.5817/MUJLT2019-2-10","DOIUrl":"https://doi.org/10.5817/MUJLT2019-2-10","url":null,"abstract":"On 4th of June 2019, Advocate General Szpunar delivered his Opinion in Case C-18/18 between Eva Glawischnig-Piesczek (an Austrian politician) and Facebook Ireland Limited. The politician had sought to have certain current and future content – argued to be defamatory – blocked by Facebook with worldwide effect. This is arguably the most important Internet speech-related case currently before the Court of Justice of the European Union (CJEU) and will doubtlessly influence court reasoning far beyond Europe.This Comment analyses AG Szpunar’s interesting, but problematic, Opinion with particular emphasis on his reasoning in relation to the question of scope of jurisdiction; that is, what is the appropriate geographical scope of orders in these circumstances, rendered by a court that has personal jurisdiction and subject matter jurisdiction.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47655141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online Behavior Recognition: Can We Consider It Biometric Data under GDPR? 在线行为识别:我们能考虑GDPR下的生物特征数据吗?
Pub Date : 2018-09-17 DOI: 10.5817/MUJLT2018-2-3
Alzbeta Solarczyk Krausová
Our everyday use of electronic devices and search for various contents online provides valuable insights into our functioning and preferences. Companies usually extract and analyze this data in order to predict our future behavior and to tailor their marketing accordingly. In terms of the General Data Protection Regulation such practice is called profiling and is subject to specific rules. However, the behavior analysis can be used also for unique identification or verification of identity of a person. Therefore, this paper claims that under certain conditions data about online behavior of an individual fall into the category of biometric data within the meaning defined by the GDPR. Moreover, this paper claims that profiling of a person can not only be done upon existing biometric data as biometric profiling but it can also lead to creation of new biometric data by constituting a new biometric template. This claim is based both on legal interpretation of the concepts of biometric data, unique identification, and profiling as well as analysis of existing technologies. This article also explains under which conditions online behavior can be considered biometric data under the GDPR, at which point profiling results in creation of new biometric data and what are the consequences for a controller and data subjects.
我们每天使用的电子设备和在网上搜索的各种内容为我们的功能和偏好提供了宝贵的见解。公司通常提取和分析这些数据,以预测我们未来的行为,并相应地调整他们的营销。根据《通用数据保护条例》(General Data Protection Regulation),这种做法被称为剖析,并受到特定规则的约束。然而,行为分析也可以用于一个人的唯一识别或身份验证。因此,本文认为在一定条件下,个人在线行为数据属于GDPR定义的生物特征数据范畴。此外,本文还声称,对一个人的分析不仅可以在现有的生物特征数据上进行生物特征分析,还可以通过构建新的生物特征模板来创建新的生物特征数据。该权利要求是基于对生物特征数据、唯一识别和分析概念的法律解释以及对现有技术的分析。本文还解释了在哪些条件下在线行为可以被视为GDPR下的生物特征数据,在什么情况下分析会导致创建新的生物特征数据,以及对控制器和数据主体的后果。
{"title":"Online Behavior Recognition: Can We Consider It Biometric Data under GDPR?","authors":"Alzbeta Solarczyk Krausová","doi":"10.5817/MUJLT2018-2-3","DOIUrl":"https://doi.org/10.5817/MUJLT2018-2-3","url":null,"abstract":"Our everyday use of electronic devices and search for various contents online provides valuable insights into our functioning and preferences. Companies usually extract and analyze this data in order to predict our future behavior and to tailor their marketing accordingly. In terms of the General Data Protection Regulation such practice is called profiling and is subject to specific rules. However, the behavior analysis can be used also for unique identification or verification of identity of a person. Therefore, this paper claims that under certain conditions data about online behavior of an individual fall into the category of biometric data within the meaning defined by the GDPR. Moreover, this paper claims that profiling of a person can not only be done upon existing biometric data as biometric profiling but it can also lead to creation of new biometric data by constituting a new biometric template. This claim is based both on legal interpretation of the concepts of biometric data, unique identification, and profiling as well as analysis of existing technologies. This article also explains under which conditions online behavior can be considered biometric data under the GDPR, at which point profiling results in creation of new biometric data and what are the consequences for a controller and data subjects.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43591643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Right of Access under GDPR and Copyright GDPR下的访问权和版权
Pub Date : 2018-09-17 DOI: 10.5817/MUJLT2018-2-5
Angela Sobolčiaková
The paper discusses the right to obtain a copy of personal data based on the access right guaranteed in Articles 15 (3) and limited in 15 (4) of the GDPR. Main question is to what extent, the access right provided to data subject under the data protection rules is compatible with copyright. We argue that the subject matter of Article 15 (3) of the GDPR - copy of personal data – may infringe copyright protection of third parties but not a copyright protection attributed to the data controllers.Firstly, because the right of access and copyright may be in certain circumstances incompatible. Secondly, the data controllers are primarily responsible for balancing conflicting rights and neutral balancing exercise could only be applied by the Data Protection Authorities. Thirdly, the case law of the CJEU regarding this issue will need to be developed because the copy as a result of access right may be considered as a new element in data protection law.
本文讨论了基于《通用数据保护条例》第15(3)条保障和第15(4)条限制的访问权获得个人数据副本的权利。主要问题是,根据数据保护规则向数据主体提供的访问权在多大程度上与版权兼容。我们认为,GDPR第15(3)条的主题——个人数据的副本——可能侵犯了第三方的版权保护,但不属于数据控制者的版权保护。首先,因为访问权和版权在某些情况下可能不兼容。其次,数据控制者主要负责平衡相互冲突的权利,只有数据保护机构才能进行中立的平衡。第三,需要制定欧盟法院关于这一问题的判例法,因为作为访问权结果的副本可能被视为数据保护法中的一个新要素。
{"title":"Right of Access under GDPR and Copyright","authors":"Angela Sobolčiaková","doi":"10.5817/MUJLT2018-2-5","DOIUrl":"https://doi.org/10.5817/MUJLT2018-2-5","url":null,"abstract":"The paper discusses the right to obtain a copy of personal data based on the access right guaranteed in Articles 15 (3) and limited in 15 (4) of the GDPR. Main question is to what extent, the access right provided to data subject under the data protection rules is compatible with copyright. We argue that the subject matter of Article 15 (3) of the GDPR - copy of personal data – may infringe copyright protection of third parties but not a copyright protection attributed to the data controllers.Firstly, because the right of access and copyright may be in certain circumstances incompatible. Secondly, the data controllers are primarily responsible for balancing conflicting rights and neutral balancing exercise could only be applied by the Data Protection Authorities. Thirdly, the case law of the CJEU regarding this issue will need to be developed because the copy as a result of access right may be considered as a new element in data protection law.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41593499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Searching for a Reference: Using Automated Text Analysis to Study Judicial Compliance 寻找参考:利用文本自动分析研究司法合规性
Pub Date : 2018-09-17 DOI: 10.5817/MUJLT2018-2-2
Katarína Šipulová, Hubert Smekal, Jozef Janovský
The concept of judicial compliance has attracted plenty of attention in the last two decades. Yet, despite the growing scholarly interest, important research questions remain largely unresolved. This is partly due to the persistent use of unsystematic research, built on the cherry picking of cases. The content of only a few well-known judgments has been thoroughly examined, and the rest remains largely ignored by the legal scholarship. The aim of this article is to introduce a sketch of a new three-level approach for improving research on judicial compliance in a multi-level arena. We show how the use of automated text analysis in combination with more traditional legal methods might shed more light on the concept of judicial compliance and judicial dialogues. We explain the procedure of the automated collection of data and their coding and also point out the risks of using automated text analysis when studying judicial compliance. The approach is demonstrated on a single case study of the use of European Court of Human Rights rulings by Czech apex courts. This study assesses how often and in what way the domestic courts engage with the European Court of Human Rights case law.
司法合规的概念在过去二十年中引起了大量关注。然而,尽管学术界的兴趣日益浓厚,但重要的研究问题在很大程度上仍未解决。这在一定程度上是由于持续使用基于对案例的精心挑选的非系统研究。只有少数知名判决的内容得到了彻底的审查,其余的大部分仍然被法律学者忽视。本文的目的是介绍一种新的三级方法,以在多层次的舞台上改进司法合规研究。我们展示了如何将自动文本分析与更传统的法律方法相结合,从而更好地阐明司法合规和司法对话的概念。我们解释了自动收集数据的程序及其编码,并指出了在研究司法合规性时使用自动文本分析的风险。捷克最高法院使用欧洲人权法院裁决的单一案例研究表明了这种方法。这项研究评估了国内法院与欧洲人权法院判例法接触的频率和方式。
{"title":"Searching for a Reference: Using Automated Text Analysis to Study Judicial Compliance","authors":"Katarína Šipulová, Hubert Smekal, Jozef Janovský","doi":"10.5817/MUJLT2018-2-2","DOIUrl":"https://doi.org/10.5817/MUJLT2018-2-2","url":null,"abstract":"The concept of judicial compliance has attracted plenty of attention in the last two decades. Yet, despite the growing scholarly interest, important research questions remain largely unresolved. This is partly due to the persistent use of unsystematic research, built on the cherry picking of cases. The content of only a few well-known judgments has been thoroughly examined, and the rest remains largely ignored by the legal scholarship. The aim of this article is to introduce a sketch of a new three-level approach for improving research on judicial compliance in a multi-level arena. We show how the use of automated text analysis in combination with more traditional legal methods might shed more light on the concept of judicial compliance and judicial dialogues. We explain the procedure of the automated collection of data and their coding and also point out the risks of using automated text analysis when studying judicial compliance. The approach is demonstrated on a single case study of the use of European Court of Human Rights rulings by Czech apex courts. This study assesses how often and in what way the domestic courts engage with the European Court of Human Rights case law.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49568863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The African Union Convention on Cybersecurity: A Regional Response Towards Cyber Stability? 非洲联盟网络安全公约:对网络稳定的区域回应?
Pub Date : 2018-09-17 DOI: 10.5817/MUJLT2018-2-1
U. Orji
Following the liberalization of telecommunication markets in African States, and the increasing availability of wireless technologies and broadband capacity, the levels of Internet penetration and ICT access in Africa has continued to grow in a phenomenal manner since the beginning of the new millennium. Internet use statistics indicate that Africa’s Internet user population grew from about four and a half million people in 2000 to about 400 million people in December, 2017. However, widespread ICT access and Internet penetration in Africa has also raised concerns over the need to promote cybersecurity governance and cyber stability across the continent. This prompted the African Union to establish a regional cybersecurity treaty, known as the African Union Convention on Cyber Security and Personal Data Protection, in June, 2014. The Convention imposes obligations on Member States to establish legal, policy and regulatory measures to promote cybersecurity governance and control cybercrime. This article analyzes the nature and scope of the cybersecurity governance obligations under the Convention and examines how the adoption of the Convention can promote cyber stability in the African region. In so doing, the paper also examines the challenges impeding the application of the Convention as a framework for promoting regional cyber stability in Africa. The paper identifies the slow pace of Member State ratification and the absence of effective regional coordination as some of the major reasons why the Convention has not been effectively applied as a framework for promoting regional cyber stability. Therefore, the paper makes a case for the establishment of a regional monitoring mechanism within the AU framework to improve the regional harmonization of cybersecurity governance frameworks, and harness the application of the Convention as a framework for promoting regional cyber stability.
随着非洲国家电信市场的自由化,以及无线技术和宽带容量的增加,非洲的互联网普及率和信通技术接入水平自新千年开始以来继续以惊人的方式增长。互联网使用统计数据显示,非洲的互联网用户人数从2000年的约450万人增加到2017年12月的约4亿人。然而,非洲广泛的信息通信技术接入和互联网普及也引发了人们对促进整个非洲大陆网络安全治理和网络稳定必要性的担忧。这促使非洲联盟于2014年6月建立了一项区域网络安全条约,即《非洲联盟网络安全和个人数据保护公约》。《公约》规定会员国有义务制定法律、政策和监管措施,以促进网络安全治理和控制网络犯罪。本文分析了《公约》规定的网络安全治理义务的性质和范围,并探讨了《公约》的通过如何促进非洲地区的网络稳定。在此过程中,本文还考察了阻碍《公约》作为促进非洲区域网络稳定的框架应用的挑战。该文件指出,会员国批准《公约》的速度缓慢以及缺乏有效的区域协调是《公约》未能作为促进区域网络稳定的框架得到有效应用的一些主要原因。因此,本文建议在非盟框架内建立区域监测机制,以促进网络安全治理框架的区域协调,并利用《公约》的应用作为促进区域网络稳定的框架。
{"title":"The African Union Convention on Cybersecurity: A Regional Response Towards Cyber Stability?","authors":"U. Orji","doi":"10.5817/MUJLT2018-2-1","DOIUrl":"https://doi.org/10.5817/MUJLT2018-2-1","url":null,"abstract":"Following the liberalization of telecommunication markets in African States, and the increasing availability of wireless technologies and broadband capacity, the levels of Internet penetration and ICT access in Africa has continued to grow in a phenomenal manner since the beginning of the new millennium. Internet use statistics indicate that Africa’s Internet user population grew from about four and a half million people in 2000 to about 400 million people in December, 2017. However, widespread ICT access and Internet penetration in Africa has also raised concerns over the need to promote cybersecurity governance and cyber stability across the continent. This prompted the African Union to establish a regional cybersecurity treaty, known as the African Union Convention on Cyber Security and Personal Data Protection, in June, 2014. The Convention imposes obligations on Member States to establish legal, policy and regulatory measures to promote cybersecurity governance and control cybercrime. This article analyzes the nature and scope of the cybersecurity governance obligations under the Convention and examines how the adoption of the Convention can promote cyber stability in the African region. In so doing, the paper also examines the challenges impeding the application of the Convention as a framework for promoting regional cyber stability in Africa. The paper identifies the slow pace of Member State ratification and the absence of effective regional coordination as some of the major reasons why the Convention has not been effectively applied as a framework for promoting regional cyber stability. Therefore, the paper makes a case for the establishment of a regional monitoring mechanism within the AU framework to improve the regional harmonization of cybersecurity governance frameworks, and harness the application of the Convention as a framework for promoting regional cyber stability.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42300057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Quo Vadis Open data? Quo Vadis开放数据?
Pub Date : 2018-09-17 DOI: 10.5817/MUJLT2018-2-4
Jozef Andraško, Matúš Mesarčík
New technologies have irreversibly changed the nature of the traditional way of exercising the right to free access to information. In the current information society, the information available to public authorities is not just a tool for controlling the public administration and increasing its transparency. Information has become an asset that individuals and legal entities also seek to use for business purposes. PSI particularly in form of open data create new opportunities for developing and improving the performance of public administration.In that regard, authors analyze the term open data and its legal framework from the perspective of European Union law, Slovak legal order and Czech legal order. Furthermore, authors focus is on the relation between open data regime, public sector information re-use regime and free access to information regime.New data protection regime represented by General Data Protection Regulation poses several challenges when it comes to processing of public sector information in form of open data. The article highlights the most important challenges of new regime being compliance with purpose specification, selection of legal ground and other important issues.
新技术不可逆转地改变了行使自由获取信息权利的传统方式的性质。在当前的信息社会中,公共当局可获得的信息不仅仅是控制公共行政和提高其透明度的工具。信息已成为个人和法律实体寻求用于商业目的的资产。PSI,特别是以开放数据的形式,为发展和提高公共行政绩效创造了新的机会。在这方面,作者从欧盟法律、斯洛伐克法律秩序和捷克法律秩序的角度分析了开放数据一词及其法律框架。此外,作者还重点研究了开放数据制度、公共部门信息重用制度和信息自由获取制度之间的关系。以《通用数据保护条例》为代表的新数据保护制度在处理公开数据形式的公共部门信息方面提出了一些挑战。这篇文章强调了新制度最重要的挑战是遵守目的规范、法律依据的选择和其他重要问题。
{"title":"Quo Vadis Open data?","authors":"Jozef Andraško, Matúš Mesarčík","doi":"10.5817/MUJLT2018-2-4","DOIUrl":"https://doi.org/10.5817/MUJLT2018-2-4","url":null,"abstract":"New technologies have irreversibly changed the nature of the traditional way of exercising the right to free access to information. In the current information society, the information available to public authorities is not just a tool for controlling the public administration and increasing its transparency. Information has become an asset that individuals and legal entities also seek to use for business purposes. PSI particularly in form of open data create new opportunities for developing and improving the performance of public administration.In that regard, authors analyze the term open data and its legal framework from the perspective of European Union law, Slovak legal order and Czech legal order. Furthermore, authors focus is on the relation between open data regime, public sector information re-use regime and free access to information regime.New data protection regime represented by General Data Protection Regulation poses several challenges when it comes to processing of public sector information in form of open data. The article highlights the most important challenges of new regime being compliance with purpose specification, selection of legal ground and other important issues.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49490743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Delictual Liability for Damage Caused by Fully Autonomous Vehicles: The Estonian Perspective 从爱沙尼亚的角度看全自动驾驶汽车造成的损害的不可撤销责任
Pub Date : 2018-06-29 DOI: 10.5817/MUJLT2018-1-3
Taivo Liivak, Janno Lahe
Self-driving vehicles have become a reality. For instance, in the summer of 2017, self-driving buses carried passengers on a designated route in Estonia's capital Tallinn. Regrettably, traffic accidents involving self-driving vehicles have also become a reality. This article focuses on fully autonomous vehicles. The safe and responsible use of fully autonomous vehicles calls for appropriate rules and an appropriate allocation of liability. Above all, fully autonomous vehicles pose a challenge to the law of delict. The article seeks to establish, based on the example of Estonian law, whether the application of delictual liability is affected by the autonomy of a vehicle and, if so, whether related differences are significant, and whether the law of delict needs to be modified in the light thereof. The issues are discussed primarily in the context of Estonian law, but parallels with German law are drawn as well. The conclusions drawn are more or less universal and can be taken into account also in other jurisdictions besides Estonia. The article analyses liability for damage caused by fully autonomous vehicles under general delictual liability, strict liability and product liability.
自动驾驶汽车已经成为现实。例如,2017年夏天,在爱沙尼亚首都塔林,自动驾驶巴士在指定路线上载客。令人遗憾的是,涉及自动驾驶车辆的交通事故也已成为现实。本文关注的是全自动驾驶汽车。安全和负责任地使用全自动驾驶汽车需要适当的规则和适当的责任分配。最重要的是,全自动驾驶汽车对违法法构成了挑战。该条试图以爱沙尼亚法律为例,确定违法行为赔偿责任的适用是否受到车辆自主权的影响,如果是,相关差异是否显著,以及违法行为法是否需要据此进行修改。这些问题主要是在爱沙尼亚法律的背景下讨论的,但也与德国法律有相似之处。得出的结论或多或少具有普遍性,在爱沙尼亚以外的其他司法管辖区也可予以考虑。本文从一般侵权责任、严格责任和产品责任三个方面分析了全自动驾驶汽车的损害赔偿责任。
{"title":"Delictual Liability for Damage Caused by Fully Autonomous Vehicles: The Estonian Perspective","authors":"Taivo Liivak, Janno Lahe","doi":"10.5817/MUJLT2018-1-3","DOIUrl":"https://doi.org/10.5817/MUJLT2018-1-3","url":null,"abstract":"Self-driving vehicles have become a reality. For instance, in the summer of 2017, self-driving buses carried passengers on a designated route in Estonia's capital Tallinn. Regrettably, traffic accidents involving self-driving vehicles have also become a reality. This article focuses on fully autonomous vehicles. The safe and responsible use of fully autonomous vehicles calls for appropriate rules and an appropriate allocation of liability. Above all, fully autonomous vehicles pose a challenge to the law of delict. The article seeks to establish, based on the example of Estonian law, whether the application of delictual liability is affected by the autonomy of a vehicle and, if so, whether related differences are significant, and whether the law of delict needs to be modified in the light thereof. The issues are discussed primarily in the context of Estonian law, but parallels with German law are drawn as well. The conclusions drawn are more or less universal and can be taken into account also in other jurisdictions besides Estonia. The article analyses liability for damage caused by fully autonomous vehicles under general delictual liability, strict liability and product liability.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46571722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Masaryk University Journal of Law and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1