| Digital Evidence Changing the Paradigm of Human Rights Protection|
Salvatore di Cerbo
In a “digital world” like ours, vast Information and Communication Technology (ICT)
infrastructures are highways where run extensive flows of information, dictating the
rhythm of our day-to-day lives. Such a deep influence, close to be an addiction for us, turns
ICT an unquestioned feature of modern life. These premises well portrait the landscape in which the diverse spectrum of actors
committed to promote, defend and restore the human rights operate. Therefore, the risk is
to mistake the means with the ends; but, even if the subject of this work, Digital Evidence,
is technology-related, the purpose of the study is the goal to which it tends: human rights
and their protection. Moreover, the wide diffusion of “capturing devices” that allow the documentation of human
rights abuses throughout massive streams of data from diverse sources will raise new
needs: in primis a careful collection and interpretation of the most relevant ones, and then
the establishment of mechanisms to ensure the validity and reliability of newly acquired
information. The whole chain that connects all the required steps in order to turn digital data into
“digital legal evidence” relevant for the protection of human rights, represents a challenge
for human rights practitioners, as individual activists, as well as organizations. Every single
step is fundamental: collection, management, preservation, analysis and security of data,
along with an effective communication and strategic use of evidence. Twitter tweets, Facebook and Blogs posts, Instagram photos and Youtube videos, even
when considered too weak for a conviction to be founded on, can play an important
role outside of a courtroom, establishing the grounds for prosecution indictments or, in
general, creating awareness of human rights abuses. Consequently, new forms of human rights activism, like the so-called “hashtag activism”,
pass through social media and have the power to generate a real change at both legal and
awareness level. The risk to be avoided is to mortify this power using social media as a
shortcut to be politically active or socially trendy making a mere “clictivism”. Hence, the core of this work revolves around the pivotal question of legal sufficiency of
the digital means employed in recording human rights abuses and the consolidation of
standards and procedures regulating the admissibility of collected evidence in the court of
law. The purpose is to provide an answer from a tri-folded point of view. The U.S. legal system leads in the regulation of the requirements for digital evidence to be
admitted at trial; nonetheless, also International courts like ICC, ICTY and ICTR follow
rules and procedure for that purpose, based on authenticity, protection of privacy, chain
of possession and reliability of the electronic evidence. At the European level, instead, the
lack of a common legislation relevant to the admissibility of d-evidence at trial required a
comparative study of the respective provisions contained in many Europeans countries’
procedural law. For these three levels a special attention is reserved to the analysis
of the lifecycle of digital evidence, from the creation and use of digital digital human
rights documentation for immediate purpose to its later admission as evidence in legal
proceedings, as well as to the authentication issue. At the last stage a collection of the most relevant case law form the principal U.S. courts
and International courts is provided.
|A Comparative Study of Cybercrime in Criminal Law|
The development of information technology provides new opportunities for crimes. Firstly, it facilitates traditional crimes such as fraud, and secondly, it breeds new crimes such as hacking. The traditional crimes facilitated by information technology and the new crimes bred by it are the so-called cybercrime in this book. To regulate cybercrime, legal regimes have developed countermeasures in the field of criminal law at different levels. At the national level, China, the United States, England and Singapore have all undergone reforms to adapt their criminal law. At the international level, the Council of Europe has drafted the Convention on Cybercrime and opened it for signatures. However, the still commonly committed cybercrime, such as DDoS attacks and online fraud, indicates the insufficiency of these countermeasures. In this background, this book intends to answer the research question: how can the criminal law be adapted to regulate cybercrime? By using doctrinal research and comparative study as the main methods, this book firstly explores and analyses the approaches of cybercrime legislations in the selected five legal regimes both in the past and in the present, and secondly, compares the different approaches and concludes with respect to the following aspects: Aspect 1: Do we need a cyber-specific legislation to regulate cybercrime? Aspect 2: If we do need a specific legislation, what approaches are more systematic for it? Aspect 3: What principles are sufficient and appropriate to determine jurisdiction over cybercrime? Aspect 4: What is the function of the Convention on Cybercrime in shaping appropriate legislation against cybercrime?
|Forensic Psychiatry: Day by Day|
Karel T.I. Oei
Writing little articles under the heading “snippets” might at the reader’s first glance give the impression that this book is (mainly?) concerned with tearing out (telling) written pieces of paper to present them in a collection as a collage. Or to scatter them over the readers as a sort of “ticker tape parade”. That term “snippets”, however, is supposed to indicate a sort of personal figure of speech, which primarily serves for digital interaction. They are daily articles from quality newspapers which are sent out to a wide circle of acquaintances under a fitting headline and with the author’s spontaneous reaction. Snippets are supposed to make these recipients think about what drew the author’s attention. They are stimuli that provoke reactions. Often complementary snippets are put together (by means of inserted comments). Sometimes there is a chain. The original text is distinct from snippets and reactions by means of font size. And more or less extensive footnotes are used.
|The Doctrine of Command Responsibility and the Need to Avoid Arbitrary Punishments|
When should a superior be held responsible for the crimes of his subordinates? Power and Responsibility are to be seen as a continuum, with one flowing along the other. What often emerges is the idea of a power which, pretending to do well, has in it the seeds of “evil”. An “evil” restrained, but always ready to manifest in exceptional moments, as a surplus of sovereignty. Thus, having power can compel a person to abridge the limits of morality and infringe upon the rights of others. Therefore, a leader, under the “intoxication” of power, could refuse to respect the rights of others, and become irresponsible and unaccountable. Moving along the same idea, responsibility without power becomes meaningless. Unless a person has been entrusted an adequate amount of power, the responsibility entrusted cannot be performed. Thus, power and responsibility require the support of each other in every walk of life. Power and Responsibility: that is where Command Responsibility comes from.
C.L. van Blom & E.J.M.F.C. Broers (eds.)
On 12 and 13 December 2013, the Department of Public Law, Jurisprudence and Legal History at Tilburg Law School convened an international conference on legal history in honour of Dr. Olga Tellegen-Couperus, who in August of that year had formally retired from Tilburg University after 36 years. Colleagues and friends came from the Netherlands and from all over Europe to celebrate their years of professional exchange and comradeship with Olga. During two enthralling days, those who had known Olga for years and had developed long standing friendships with her mingled with other participants, including Olga’s PhD students. The different topics discussed mirrored Olga’s broad interests in proper legal history, Roman law, rhetoric and Common Law. All possible intertwining relations between those legal disciplines were brought forward in sound scholarly presentations, discourses and humorous talks. All participants took pleasure in sharing their academic research, engaging in debate and enjoying each other’s company. At the close of the conference, the plan was devised to capture the good atmosphere of the gathering in a booklet. After some preparation, we are now proud to present Ad Fundum, a liber amicorum for our beloved and highly respected colleague, Olga Tellegen-Couperus. The title of this festschrift is a true reflection of the thorough and enthusiastic way in which Olga committed herself to her academic career.
|Childrenís Rights in a Digital Environment and European Union Law|
Being online has become part of the daily routine for the most of us, particularly for young people. Children are growing up in a fast-paced technological environment, in which the new Information and Communications Technologies (ICTs) such as smartphones or tablets provide limitless internet access and with that a limitless communication. The internet changes the way children interact, communicate, play and learn and in this context, it offers a broad range of opportunities. However, given that the dissemination of personal data as well as of violent or illegal content has been facilitated, the online environment also entails new risks to which children are exposed. With the increasing children’s internet use, the anxiety that children are particularly vulnerable to those risks grows and raises questions about how policy makers, the public and parents may effectively protect children online by balancing opportunities and risks. The aim of this book is to analyse the current legal framework with regard to the protection of the children’s rights in a digital environment. It examines which legal provisions apply to the risks a child may encounter when using the internet and in particular, which instruments have been implemented to prevent child pornography, grooming and the violations of personal data protection rights. It is intended to give an overview of the existing legal instruments on an international and a European Union level, with focus on the European Union legislation and the recent developments in the case law of the European Court of Justice.
|Rechtshandelingen en NULLITEITEN|
Het centrale gedeelte van het Nederlands vermogensrecht is neergelegd in titel 3.2 van het Burgerlijk Wetboek. Deze titel geeft regels voor rechtshandelingen en nulliteiten. Vooral op het laatste deel van deze titel richten zich de bezwaren van de auteur. Het gebouw van de nulliteiten - met name art. 3:40 BW - berust op fundamenten uit de Tweede Wereldoorlog, die zijn belichaamd in twee arresten van de Hoge Raad uit 1951. Na ruim 70 jaar is dit bouwsel sleets geraakt en is er behoefte aan vernieuwing. Aan het antwoord op de vraag hoe deze eruit moet zien, is deze monografie gewijd. Dit heeft geleid tot een formulering van een nieuw art. 3:40 BW en verandering van enige daarmee samenhangende voorschriften. Bij het voorgaande moet rekening worden gehouden met een afwijkend stelsel van nulliteiten in de Richtlijn oneerlijke bedingen in consumentenovereenkomsten (1993). Dit verschil doet zich vooral voelen bij de onmogelijkheid tot matiging van een contractuele boete. Aangezien het Nederlandse systeem vrucht is van het pandectisme dat zich heeft verbreid over grote delen van Europa heeft rechtsvergelijking in deze materie geen zin.
|Recht en armoede|
Sarah van Kampen & Michael Milo (eds.)
Recht en armoede – in een zestal bijdragen wordt de verhouding tussen beide vanuit verschillende juridische disciplines geadresseerd. Armoede als blijvend actueel maatschappelijk onderwerp raakt allen, die het recht beoefenen in praktijk en in theorie, in wetgeving, rechtspraak en in het rechtsgeleerd onderzoek. Law and poverty - relations between both domains are explored in six contributions (two English), from various legal perspectives in the Dutch and South African jurisdiction. The theme is of continuing importance and calls upon lawyers - judges, legislators and professors alike.
|Computer Forensics and Digital Evidence|
The book has the aim to explain the relevance of the Computer Forensic within investigations related to crimes which involve technology supports. The paramount importance that the innovations have gained in people’s life is a signal of the necessity to acquire knowledges about them. This statement must be considered especially in regards to crime investigations where an unlawful act could irremediably damage lives and rights. Experts in this area are constantly asked to improve their competence in regards to technological data collection, analysis and conservation due to the difficulty to preserve them as a reliable proof in the Court. Although many difficulties still cause flaws within the
Computer Forensic investigations, the development of this branch of knowledge are increasing every day. This publication tries to outline an understandable and incisive description it under a scientific and legal point of view.