Cyberspace, Surveillance and Law: a legal informatics perspective
Abstract
Nowadays, cyberspace is where a large amount of our social life takes place. Its social impact involves the necessity of surveillance, just as much as it is needed in what can be defined as the 'real' world. Surveillance techniques are made up of network monitoring through software that allow the acquisition and analysis of digital elements. These tools can allow a clear vision of the electronic communications that have crossed the cyberspace. These software allow the observation of contents in real time and the storage of data in databases for its examination afterwards. Data is bound to its properties and related information and can be a target for digital forensic acquisition using computer forensic techniques - the discipline for the acquisition, custody and analysis of data for judiciary purposes - so that it can be used as evidence in court.
The impact of this type of technology on cyberspace monitoring is significant. Whoever organizes surveillance activities has all the data from the whole of cyberspace at his disposal, together with their properties, in a database that can be queried and exploited for its filing properties. The impact on web users is also considerable and full of problematic issues. The influence of these technologies on the delicate equilibrium between surveillance needs and fundamental human rights is unavoidably high, particularly regarding online privacy rights. The problematic issues can be analyzed and resolved using legal informatics solutions aimed at balancing technique and law in a way that does not pervert one of the two in favor of the other. The issue must be faced based on the rule of technical experience that 'it's not the software that can be legal or not, it's all about how it's used'. It is a rule that says that these kinds of software cannot and must not be put under accusation: They are developed for a precise purpose that they perfectly fulfill. The technical configuration, influenced by the user's will and purposes, could instead be a topic for discussion. As with any software, these tools also have to be installed and configured, according to the user's needs, in this specific case the police force's needs. The fact that even only some cyberspace areas can be monitored requires decisions that fall into in the technical-juridical field and that have to be taken before the tool's installation. This decision-making moment is the real fulcrum of the informatics law issue: How can cyberspace surveillance be organized so that it can be effective for the police authorities, yet at the same time protect users? The solution to this problem lies in legal informatics: Best Practices need to be developed, with juridical techniques regarding the selection of the best option, transparency and ethics of cyberspace surveillance activities.
Downloads
Published
Issue
Section
License
EJLT is an open access journal, aiming to disseminate academic work and perspectives as widely as possible to the benefit of the author and the author’s readers. It is the assumption of the EJLT that authors who publish in the journal wish their work to be available as freely and as widely as possible through the open access publishing channel.
Authors who publish with EJLT will retain copyright and moral rights in the underlying work but will grant all users the rights to copy, store and print for non-commercial use copies of their work. Commercial mirroring may also be carried out with the consent of the journal. The work must remain as published – without redaction or editing – and must clearly state the identity of the author and the originating EJLT url of the article. Any commercial use of the author’s work - apart from mirroring - requires the permission of the author and any aspects of the article which are the property of EJLT (e.g. typographical format) requires permission from EJLT.
Authors can sometimes become no longer contactable (through, for example, death or retirement). If this occurs, any rights in the work will pass to the European Journal of Law and Technology which will continue to make the work available in as wide a manner as possible to achieve the aims of open access and ensuring that an author's work continues to be available. An author - or their estate - can recover these rights from EJLT by providing contact information.
The European Journal of Law and Technology holds rights in format, publication and dissemination.
EJLT, as a non-commercial organisation - which receives donations to allow it to continue publishing – must retain information on reader access to journal articles. This means that we will not give permission to mirror the journal unless we can be provided with full details as to reader access to each and every journal article. We prefer and encourage deep linking rather than mirroring. Encouragement is thus given for all users – commercial and non-commercial – to provide indexes and links to articles in the EJLT where the index or link points to the location of the article on the EJLT server, rather than to stored copies on other servers.
Please contact the European Journal of Law and Technology if you are in any doubt as to what this statement of use covers.