Freedom of Speech

Go back to Tutorial

Freedom of speech is the right to communicate one’s opinions and ideas without fear of government retaliation or censorship.

Governments restrict speech with varying limitations. Common limitations on speech relate to libel, slander, obscenity, pornography, sedition, incitement, fighting words, classified information, copyright violation, trade secrets, non-disclosure agreements, right to privacy, right to be forgotten, public security, public order, public nuisance, campaign finance reform and oppression. Whether these limitations can be justified under the harm principle depends upon whether influencing a third party’s opinions or actions adversely to the second party constitutes such harm or not.

The right to freedom of expression is recognized as a human right under article 19 of the Universal Declaration of Human Rights and recognized in international human rights law in the International Covenant on Civil and Political Rights (ICCPR). Article 19 of the ICCPR states that “everyone shall have the right to hold opinions without interference” and “everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice”. Article 19 additionally states that the exercise of these rights carries “special duties and responsibilities” and may “therefore be subject to certain restrictions” when necessary “[f]or respect of the rights or reputation of others” or “[f]or the protection of national security or of public order (order public), or of public health or morals”.

Generally there are three standpoints on the issue as it relates to the internet. First is the argument that the internet is a form of media, put out and accessed by citizens of governments and therefore should be regulated by each individual government within the borders of their respective jurisdictions. Second, is that, “Governments of the Industrial World… have no sovereignty [over the internet] … We have no elected government, nor are we likely to have one, … You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear.” A third party believes that the internet supersedes all tangible borders such as the borders of countries, authority should be given to an international body since what is legal in one country may be against the law in the other.

Internet Censorship

The concept of freedom of information has emerged in response to state sponsored censorship, monitoring and surveillance of the internet. Internet censorship includes the control or suppression of the publishing or accessing of information on the Internet. The Global Internet Freedom Consortium claims to remove blocks to the “free flow of information” for what they term “closed societies”. According to the Reporters without Borders (RWB) “internet enemy list” the following states engage in pervasive internet censorship: China, Cuba, Iran, Myanmar/Burma, North Korea, Saudi Arabia, Syria, Turkmenistan, Uzbekistan, and Vietnam.

A widely publicized example of internet censorship is the “Great Firewall of China” (in reference both to its role as a network firewall and to the ancient Great Wall of China). The system blocks content by preventing IP addresses from being routed through and consists of standard firewall and proxy servers at the Internet gateways. The system also selectively engages in DNS poisoning when particular sites are requested. The government does not appear to be systematically examining Internet content, as this appears to be technically impractical. Internet censorship in the People’s Republic of China is conducted under a wide variety of laws and administrative regulations. In accordance with these laws, more than sixty Internet regulations have been made by the People’s Republic of China (PRC) government, and censorship systems are vigorously implemented by provincial branches of state-owned ISPs, business companies, and organizations.

Go back to Tutorial

Share this post
[social_warfare]
Digital Signatures and Public Key Infrastructure
Footprinting

Get industry recognized certification – Contact us

keyboard_arrow_up