NATO Cooperative Cyber Defence Centre of Excellence zamierza wydać pracę zbiorową poświęconą tematyce "The Rights to Privacy and Data Protection in Times of Armed Conflict". Osoby zainteresowane publikacją mogą przesyłać propozycje tekstów dotyczących zwłaszcza następującej problematyki:
1. Nature and Scope of Application: What role do the rights to privacy and data protection play in armed conflict? What doctrines ground their concurrent and extraterritorial application? Are digital rights the lex generalis? Can the legal obligations be identified within existing IHL treaty and customary law?
2. Relevant Actors: Does the application of these rights in wartime introduce legal obligations to non-state actors, and if so in what ways? Particularly, how do these rights apply in relations with military contractors, tech giants, internet service providers, cloud providers, thirdparty vendors and suppliers of software and hardware, armed groups (especially those that occupy territory), international fact-finding missions, courts and tribunals, journalists, and humanitarian actors.
3. Specific IHL Regimes:
a. Detainees, POWs, and Refugees: Legal obligations associated with surveillance of detainees, interrogations, access to information on detainees, and the transfer of them (see e.g. principle 11 of the Copenhagen principles or special surveillance of detainees under GCIII).
b. The Law of Occupation: Interpreting Article 43 of the Hague Regulations in the light of the human rights to privacy and data protection.
c. The Law of Peacekeeping: Legal obligations associated with the rights to privacy and data protection as they relate to de-mobilization, election monitoring, meditation and negotiation.
d. The Law of Targeting: What obligations may be derived from human rights to privacy and data protection to constrain certain types of attacks in cyberspace.
e. Weapons Acquisition: What role do the rights to privacy and data protection play in constraining weapons acquisition, particularly in the context of cyber weapons, and where such acquisition is done through collaborations with private commercial partners.
f. The Law of Neutrality: What legal obligations are imposed on third-party neutral states in connection with the protection of digital rights during the ongoing conflict. Specifically, what obligations apply to the sharing of data or the control over the tech sector’s indirect involvement in the conflict.
g. Coalition Operations: How do the rights to privacy and data protection apply in the context of multilateral campaigns, especially in the context of regional and subregional security regimes and their specific arrangements around cyber defenses, data protection, information sharing, and intelligence collaboration.
h. Specific Vulnerable Groups: How should we conceive of the rights to privacy and data protection in the context of protecting the most vulnerable in war – civilian populations, journalists, humanitarian workers, UN staff, health professionals, etc.
i. Jus Post Bellum: As criminal investigations and other jus post bellum mechanisms rely heavily on data and information collection and dissemination, how should their confidential data be evaluated, processed, and stored, and how do the rights to privacy and data protection impact the end of war and the memory of war.
4. Specific military applications of emerging technologies and their interaction with the rights to privacy and data protection in war: e.g. health tracking and monitoring, facial recognition, the use of smartphones and tablets, autonomous weapon systems, cryptography, quantum computing, artificial intelligence, and the prospect of enhanced soldiers.
Zgłoszenia (abstrakt proponowanego tekstu do 750 słów wraz z CV) należy przesyłać do 19 kwietnia br.
Dla autorów tekstów przewidziane jest honorarium.
Więcej informacji można znaleźć tutaj.
Brak komentarzy:
Prześlij komentarz