IDP2014 (VI). Internet and politics (I)

Notes from the 10th Internet, Law and Politics Congress: A decade of transformations, organized by the Open University of Catalonia, School of Law and Political Science, and held in Barcelona, Spain, on 3-4 July 2014. More notes on this event: idp2014.

Moderator: Ismael Peña-López Lecturer, School of Law and Political Science (UOC).

Towards a Magna Carta for the Internet: A right to online protests?
Argyro P Karanasiou. Lecturer in Law (Centre for Intellectual Property Policy & Management, CIPPM) – Bournemouth University, UK.

What happens when the Internet does not work?

  • “The day the Internet went dark: major Internet corporations go to strike to protest against laws against Neutrality.
  • “The day that almost broke the Internet”: Spamhaus blackmailed Cyberbunker, by attacking their servers. The whole Internet slew down.

Are DDoS attacks the equivalent of sit-ins? Are DDoS attacks a way to slow down business as usual, as it traditionally happened with sit-ins? Can you occupy cyberspace? It many jurisdictions DDoS is considered a crime — not a sit-in like protest.

  • Benkler: they are sit-ins by design, they are doing it “for the lulz”. It’s distraction, not destruction.
  • Low participatory threshold.
  • No personal cost incurred.
  • No need for technical experiences.
  • The conduct argument: is it free speech? it kind of is.
  • Is it a public protest? It kind of is an expressive boycott.
  • The public forum argument: is it a public forum, or a non designated public forum? Maybe the Internet is a semi-private space and thus DDoS would be an act of trespassing.
  • But DDoS is also against the free speech of others, so…

DDoS is cybotage, with an obstructive nature.

Anonymous Bulgaria: “I like to lumpen lumpen”
Julia Rone. PhD researcher, Department of Social and Political Science, European University Institute, Florence

What is the political potential of Anonymous (in the particular case of Bulgaria and the protests against the government in June 2013).

Origins of hacktivism: hacking community (Stallman); the increasingly prominence of immaterial labour in contemporary society, the multitude which is interconnected (Hardt and Negri); the new social movements (Melucci, Della Porta).

Anonymous has become a very powerful brand, that anyone can use or appropriate, and that has even created inner factions on what to do, how to do things and organize and decide, etc. There are very deep differences (in skills, in attitudes, in ideology) between anonymous groups. In the case of Bulgaria, the most popular group is deeply concerned by national politics.

There is a strive for leaderlessness.

There is also a strive for going against everything.

Where does this fighting everything leads to?

Though sometimes Anonymous do make proposals for new or renewed political systems, very technology centred, but which do not take into account learnings of the past, or what happens with the disconnected ones.

Is Anonymous a real connected multitude in the sense of Hardt and Negri? How are politics articulated under this vision? Can we achieve large consensus? What will happen if the multitude takes power? Will the multitude be destructive? Are there any constructive proposals?

Discussion

Q: what is the role of anonymity? Can we have a debate with anonymous people? Karanasiou: anonymity is very disenfranchising, and this adds barriers to debate. Rone: anonymity is crucial for Anonymous, and this is about not having a leader, a most important point in their ideology.

Ismael Peña-López: slacktivism usually is backed by deep spaces of deliberation. Are there deliberation spaces behind DDoS attacks or Anonymous actions? Karanasiou: as all these practices take place online, and the Internet is a very powerful space for deliberation. Rone: I do not think that there is a connection, or a deliberation space between Anonymous and the rest of the population. Indeed, there are many “misuses” of the brand of Anonymous.

Q: what do you think about anonymizers and the deep web in general? Karanasiou: it depends on how you use anonymity. If it is to guarantee your freedom of speech, right. But there are strings attached related to legitimacy, etc. So you have to assume this cost. Rone: there are ethics and rules in the group, but you have to work to keep them from being misused.

Share:

10th Internet, Law and Politics Conference (2014)

IDP2014 (V). e-Government (II)

Notes from the 10th Internet, Law and Politics Congress: A decade of transformations, organized by the Open University of Catalonia, School of Law and Political Science, and held in Barcelona, Spain, on 3-4 July 2014. More notes on this event: idp2014.

Chairs: Marc Vilalta Reixach, Lecturer, School of Law and Political Science (UOC).

The implementation of ICTs in public administration at Girona (Spain)
Núria Galera (independent lawyer), Mariona López Ortiz (independent lawyer).

Most city councils in the province of Girona have websites. Though a little bit outdated in formal matters, many of them feature an electronic office through which administrative procedures can be performed.

Usually, the bigger the city, the bigger the investment in e-government.

Other initiatives besides e-administration:

  • e-Rutes [e-routes], on supporting tourism through mobile apps.
  • SIMSAP, for the management of the public health system, especially strengthening the management of inner communications and procedures.
  • Girona, territori cardioprotegit [Girona, a cardioprotected Girona], a service that geolocalizes automated external defibrillators (AED).

10 years of recognised electronic signature. Did it have any significant impact in e-administration?
Ignacio Alamillo Domingo, researcher at GRISC, Universitat Autònoma de Barcelona, Nuria Cuenca León, laywer at the Universitat Oberta de Catalunya.

The legislating bodies recognize the electronic signature as valid as the handwritten one, opening the potential of being able to sign without physical presence. Notwithstanding, it does not seem that the electronic signature is juridically as valid as the handwritten one. This is both happening in e-administration procedures and in the field of electronic invoicing.

Spain initially was very ambitious in its plans on digital signature, but they were later loosened and the situation now is that digital signature is decreasing use and heads toward extinction.

Maybe other kinds of signature, more open or more broadly accepted or more fit to the needs of the procedure would be a good bet for future policies and regulation.

Effects of the implementation of a public procurement by electronic means and its incidence in the Spanish landscape: beyond a change of format
Jordi Romeu Granados, Doctorando en Gobierno y Administración Pública UCM – IUIOG, Carmen Pineda Nebot, Consultora de Administraciones Públicas, Gregorio Juárez Rodríguez Doctorando en Gobierno y Administración Pública UCM – IUIOG

e-Procurement have different effects.

Technical and administrative effects:

  • Publicity and transparency.
  • Accessibility and interoperability.
  • Objectivity and limitations to arbitrary decisions.
  • Efficacy and efficiency.
  • Security and traceability of information.

Political and social effects:

  • Open government.
  • Limits to corruption.
  • Social control.
  • Collective intelligence.

Economic effects:

  • concurrence and competitiveness.
  • Economic savings.

Pioneer experiences in Spain: electronic public procurement model of the Basque Government (2002); electronic procurement system of the University of Almería; electronic public procurement of the City of Gijón (2013).

There are many benefits of e-procurement, and, presumably, no major inconveniences. It does require a change of culture with strong leadership.

Transparency in electronic public administration in the digital era
Belén Andrés Segovia. Doctoranda en Derecho Administrativo en la Universidad de Valencia

Citizens demand more of their governments than some services, or that these services are provided efficiently and with efficacy, but also that these services are provided ethically, objectively, and with transparency.

Thus, transparency can contribute to foster e-government, as they feed back each other positively.

But the Spanish Law 19/2013 of Transparency does not seem to be providing tools for that. It seems that the law is turning the walls of the Government into glass through which the citizen can look through, but all the information is stored on wooden or metal boxes, which you cannot inspect.

Share:

10th Internet, Law and Politics Conference (2014)

IDP2014 (IV). e-Government (I)

Notes from the 10th Internet, Law and Politics Congress: A decade of transformations, organized by the Open University of Catalonia, School of Law and Political Science, and held in Barcelona, Spain, on 3-4 July 2014. More notes on this event: idp2014.

Chairs: Agustí Cerrillo Martínez, Chair professor of Administrative Law, School of Law and Political Science (UOC)

eGovernment as an instrument for the protection of the environment. Electronic services of environmental information (2003-2013)
Francisco Javier Sanz Larruga. Catedrático de Derecho Administrativo de la Universidad de A Coruña

GPS, LBS, SIGs, WMS, aerial photography systems… there are now plenty of ways to geolocalize information.

And we want all this information to be public so that citizens can use it for environmental purposes. Where’s the limit? How does it relate with privacy and other rights? In Spain, the Law 14/2010 deals with these issues, plus other laws that deal, for instance, with interoperability of databases.

This public information is increasingly useful for territory planning, for trials as evidence, etc.

Drones now are on a legal void, but can be very helpful in providing geographical information (especially through photography) and should thus be regulated.

On the administrative simplification and the perversion of electronic requests that neutralize the reduction of administrative burdens
Mª Dolores Rego Blanco. Profesora Titular de Derecho Administrativo. Universidad Pablo de Olavide.

How can we reduce non-justified, unnecessary or excessive requests to the government sent electronically?

First of all, what is an administrative burden? The issue is, that despite the fact that electronic requests have much lower costs than face-to-face (or traditional mail) requests, we may end up having so much electronic requests that the total cost could be higher than by traditional means.

We have to be careful, though, that when trying to add some requisites to avoid overwhelming requests, we do not harm the rights of the petitioners.

Digital administration and transparency in the Italian legal system
Enrico Carloni. Associate professor of administrative law at the University of the Studies of Perugia

Where is the balance between government transparency and the privacy, personal data protection, etc. of MPs and other elected representatives?

Digitization of most G2B relationships is bringing more traceability and thus transparency. But it is also putting some struggle to SMEs which are having difficult times to catch up with the evolution of technology, be it because of lack of infrastructure be it because of lack of skills.

There is a conflict between open data — gathering all the information and putting it together — and privacy — avoiding the collection of personal data in order to identify someone.

Share:

10th Internet, Law and Politics Conference (2014)

IDP2014 (III). Gerald Spindler: Liability of ISP providers – recent developments in the EU

Notes from the 10th Internet, Law and Politics Congress: A decade of transformations, organized by the Open University of Catalonia, School of Law and Political Science, and held in Barcelona, Spain, on 3-4 July 2014. More notes on this event: idp2014.

Chairs: Miquel Peguera. Professor, School of Law and Political Science (UOC).

Gerald Spindler. Professor of Civil Law, Commercial and Economic Law, Comparative Law, Multimedia- and Telecommunication Law at the University of Göettingen (Germany).
Liability of ISP providers – recent developments in the EU

Liability Privileges and injunctions:

  • Art. 12 E-Commerce-Directive – Access Provider.
  • Art. 13: Caching.
  • Art. 14: Host-Provider.
  • Art. 15: monitoring duties.

Strong debate whether injunctions, or client monitoring is or is not covered by the law. There are some monitoring obligations, subject to specific content and specific infringements. But the role of freedom of speech has to be preserved, including commercial speech.

Host providing and Neutrality: more than file sharing, the problem now is file hosting. Related to neutrality, e.g. the German High Federal Court forces to distinct between third party content and own content, being liability conditioned to whether the content is a third party’s or not, or if the hosting provider does know whether the content is legal or not.

Host providing and knowledge: obligation to contact the rightholder/injunction claimant in case of doubts. Still not clear, though.

Monitoring duties of the access provider: there is none, the access provider does not need to monitor the uses. Indeed, users have their privacy protected. But law has been evolving and granting some access providers the right (or the obligation…) to block some content (e.g. websites) guaranteeing that a proper balance of constitutional rights (provider, rightholders, users) is regarded.

Injunctions and social networking sites and blogs: the provider is obliged to notify the blogger of a claim, and if the blogger does not react, the provider has to take down the message; if the blogger reacts, it is up to the claimant if she pursues her claim, and to the provider to decide if the message will be taken down. So far, there are no monitoring obligations of the provider for the future.

Perspectives: anonymity and identification. Enforcement needs identity data of the infringer: how can you claim liability if you do not know the identity of the infringer? There is a conflict between disclosure of identity data of users and data protection, between anonymity and liability of intermediaries. On the other hand, should anonymizers be liable for enabling the anonymity and thus makes liability more difficult?

Hadopi Law is (clearly) against many constitutional rights, but the other option, a notice-and-take-down approach may not be a solution for many issues (is definitely not a solution for repeated infringements, as it always acts ex-post).

Conflicts of laws: intellectual property rights and trademarks; unfair competition; personality rights and privacy; how can the level of protection of jurisdictions be compared…

Discussion

Q: what about the case of Google and the right to be forgotten? Spindler: there has always been a conflict between media to inform and the protection of privacy. And this conflict has now extended to social networking sites and Google itself. It seems fair to hold back this extension of “the right to inform” so that it does not steps too much upon the right to privacy.

Miquel Peguera: now, the cost of defending intellectual property rights falls upon the rightholders. But access providers benefit, indirectly, from the exploitation of these rights. Should they contribute to detect infringement (and thus contribute in supporting the burden of the costs)? Spindler: They maybe should, but it is not straightforward.

Share:

10th Internet, Law and Politics Conference (2014)

IDP2014 (II). Ramon Casas Vallès: Ten years of intellectual property on the Internet law reforms

Notes from the 10th Internet, Law and Politics Congress: A decade of transformations, organized by the Open University of Catalonia, School of Law and Political Science, and held in Barcelona, Spain, on 3-4 July 2014. More notes on this event: idp2014.

Chairs: Raquel Xalabarder. Professor, School of Law and Political Science (UOC).

Ramon Casas Vallès. Professor of Intellectual Property at University of Barcelona.
Ten years of intellectual property on the Internet law reforms

The ancient Spanish Law of Intellectual Property (1979) was technologically neutral and thus could be applied in reality despite the many evolutions of technology.

But the new Law of 1987 had to face many issues: new technologies, European law, and the particularities of Spain.

The frontiers between what is public and private and between what is usage and what is delivering have blurred. What is now usage? What is now exploitation? Now, using can mean exploitation of affect those who are trying to benefit from exploitation.

On the other hand, the concept of reproduction has also changed. We now reproduce everytime we browse the Internet. Which does not mean it goes against intellectual property rights. But is there exploitation every time we distribute and/or communicate? Google Books is a good example of distribution without the aim of exploiting, as it is the information about the book what is exploited, despite the fact that the whole content is communicated.

The concept of distribution and public broadcasting are different in Europe and Spain.

There are several issues that relate to Spanish institutions and uses, such as piracy or “piracy”. The issue of piracy was addressed with the right to private copy and the right to compensation to the right holders.

As circumventing the former law became quite easy — both technically, both legally — the new (coming) law what directly does is trimming many user rights. On the other hand, the costs of exploitation or loss of benefits of exploitation of some intellectual property rights do not fall upon the users or potential users, but upon the costs of the whole citizenry, as they are supported by the State budgets.

In the new project of law, vicarious cooperation of induction to illegal use will also be punished, such as creating software to enable P2P file sharing.

Discussion

Francisco Jurado: how can we punish coding a technology that may enable illegal file sharing but also legal file sharing? Casas: there are two logics here. The technological one: if it can be done, so be it. And the legal one: if it can be done, let us think whether we want this to be. And the legal thinking on P2P file sharing should be whether we want that. And we want that depending on the majority use of such technology. If the 99% of uses is illegal, maybe we should ban a certain technology, despite its “it’s-possible-so-let’s-do-it” nature.

Q: intellectual property law is still focused on protection, and it seems that creation has been left aside. Is that it? Casas: intellectual property is not the origin, but the consequence of creation. And property is about the right to decide what the creator can do with her work. Do we need to foster creation because it is in the public benefit that there is more creation, etc, etc, etc? Right, but always respecting the particular decisions of the individual upon her creation.

Q: how long can we keep the regulation of copyright on a national basis, or we have to have an international (common) copyright law? Casas: It is impossible to protect intellectual property rights without international standards. It has always been so (the Bern agreement, the OMPI treatments, etc.) and we will see more of that.

Q: what happens with streaming? what happens with ebooks and used software? how can we compute the damage to right holders? Casas: it is very difficult to compute what is the damage to right holders. In the case of Spain, the calculations have been “how much am I (as the Government) willing to pay?”. Used software: does not apply in Spain. Streaming is public communication.

Share:

10th Internet, Law and Politics Conference (2014)

IDP2014 (I). Helen Margetts: Chaotic pluralism. Politics after a decade of social media

Notes from the 10th Internet, Law and Politics Congress: A decade of transformations, organized by the Open University of Catalonia, School of Law and Political Science, and held in Barcelona, Spain, on 3-4 July 2014. More notes on this event: idp2014.

Chairs: Joan Balcells. Lecturer, School of Law and Political Science (UOC).

Helen Margetts. Director of the Oxford Internet Institute. Professor of Society and the Internet at the OII, University of Oxford.
Chaotic pluralism. Politics after a decade of social media

How has changing use of social media affected politics over the last decade? And what model of democracy, if any, has encapsulated what is going on?

Pluralism has surely been the winner in the bets: more competing elements in democracy, diversity of political institutions and policy-making, the existence a group for every interest, counter-mobilization undermining monopolistic exercise of power, etc.

In the last 10 years, more people have gone online, in the whole world. There has been a rapid growth of Internet penetration almost everywhere. And not only more people is online, but people is spending more and more time online too: especially on social media.

Tiny acts of action or collaboration on the Internet have been possible: micro-donations of money and time. The aggregation of these micro-donations are very important, but are causing a strong debate on whether this is politics, or clicktivism, slacktivism or what. But the think is that many people that would never participate in politics, now do. And this tiny participation can scale up to massive participation and engagement.

But these mobilizations are unstable, unpredictable. There is a new ecology of participation which we still do not know how it works. We know that much or e-petitions fail, but that it is not about the issue (which is not important), but about other aspects. On the other hand, we see many small changes and few large changes. We can see tipping points that, when reached, they position the petition above the threshold of success.

The dynamics of political participation:

  • Exposition to social information, about the participation of others. On social media, you know, in real-time, what other people are doing, what are they voting or supporting.
  • Visibility vs. anonymity. This duality influences the way you and/or your peers participate.
  • Network effects.

Leadership without leaders: social media platforms provide ‘zero-touch’ co-ordination; rather thnn institutions, organizations; political action needs starters and followers to mobilize, but no necessarily leaders.

We are heading to chaotic pluralism: a pluralist pattern of competing interests, more disorganized but also much more active.

But chaotic pluralism offers us the means to understand it: every single act takes place in a digital environment, it leaves a trace, it generates big data, with natural science models, with experiments, etc.

Chaothic pluralism payoffs: social media provide a continuous flow of information between governors and government; social media as a barometer of public services, means of self improvement; government seeing like a citizen, rather than a state.

Chaotic pluralism challenges: natural science and social science having to work together, in multi-disciplinary teams; education and training to understand big data; reputational challenges of this research; new ethical frameworks.

Discussion

Q: to what extent can you trust people that there are no leaders? aren’t there leaders, even if there are informal ones? To what extent is it just rethorics that there are no leaders? Margetts: It is true that there is people that are at the core of mobilizations, or at organizing and promoting something. And it is true that these headless organizations have the risk of some people “taking over”, but there is too much chaos for the concept of “taking over” even applying to this kind of organization. Organizations are qualitatively different.

Share:

10th Internet, Law and Politics Conference (2014)