Cyber Surveillance and Privacy Issues vis-à-vis International Law

Authors

  • Ivneet Kaur Walia Rajiv Gandhi National University of Law

DOI:

https://doi.org/10.21776/ub.blj.2023.010.02.05

Keywords:

Human Rights; International Law; Privacy; Surveillance

Abstract

The ‘Big Brother is Watching’, is now a trend that is prevalent in the society where the unregulated and unfiltered monitoring of data and interception has led to interference with the privacy rights of the individuals. The background to the concept may not be expressly seen in text but the context of privacy be protected can be seen in legal instruments such as United Nations Declaration on Human Rights, International Covenant on Civil and Political Rights. Though, the legal jurisprudence has also taken sides for placing community interest over individual interest but has often been deficient in providing objective reasonings and justifications. When the privacy and the human rights are interfered with, no one but the State should own the responsibility. The contours of this responsibility have been circumscribed by the existing international legal instruments, but their effectiveness is compromised because of their non-binding characteristics. The paper outlines the importance of regulating mass surveillance, secret surveillance, cyber espionage, cyber attacks etc. and has facilitated a discussion of establishing a pattern of standardized norms in line with human rights obligations catalyzed by cyber diplomacy, which can easily be adopted by States. The paper is Analytical and descriptive in nature. The question will always be debatable when it comes to States exercising their right of surveillance for maintaining law and order and upholding the security of the nation being violative of individual rights. So, whether the States are able to strike a balance between State authority and Fundamental rights of the individuals? Whether the proportionality that is exhibited is justifiable? The uncontrollable parasitic attack on digital communications, without reasonable suspicion is excessive, arbitrary and abusive. There is a need not only for a structured legal framework but also procedural safeguards, oversight mechanisms and redressal forums.

Downloads

Download data is not yet available.

References

“America's Global Surveillance Record,” Human Rights 13, no. 5 (September 2014): 30-35

Ajunwa, Ifeoma, Kate Crawford, and Jason Schultz. “Limitless Worker Surveillance.” California Law Review 105, no. 3 (June 2017): 735-750.

Ajunwa, Ifeoma. “Confronting Surveillance.” Jotwell: The Journal of Things We Like (Lots) 2022, no. 5 (May 2022).

Anwar, Oves, Ayesha Malik, Abraze Aqil and Noor Fatima Iftikhar. “Cyber Surveillance and Big Data - Pakistan's Legal Framework and the Need for Safeguards.” RSIL Law Review 2020 (2020): 35-56.

Aziz, Jamal, Ayesha Malik, and Noor Fatima Iftikhar. “Public Health vs. Individual Privacy in the Age of Cyber Surveillance.” RSIL Law Review 2020 (2020): 10-30.

Banks, William C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory Law Journal 66, no. 3 (2017): 513-525.

Carroll, Erin C. “News as Surveillance.” Washburn Law Journal 59, no. 3 (2020): 431-441.

Chan, Anna W. “The Need for a Shared Responsibility Regime between State and Non-State Actors to Prevent Human Rights Violations Caused by Cyber-Surveillance Spyware.” Brooklyn Journal of International Law 44, no. 2 (2019): 795-820.

Cristian, Radu Dan. “Cyber-Terrorism.” Drepturile Omului / Human Rights 2009, no. 2 (2009).

Das, Shubhankar, and Sarthak Patnaik. “Cyber Space Mass Surveillance Programs and Violation of Human Rights: The Way Ahead.” Indian Journal of Law & Public Policy 2, no. 2 (2016).

Dragomir, Andreea. “Cyber Diplomacy.” International Journal of Information Security and Cybercrime 10, no. 2 (2021).

Franks, Mary Anne. “Democratic Surveillance.” Harvard Journal of Law & Technology (Harvard JOLT) 30, no. 2 (2017): 425-465.

Gilmore, Scott A. “Suing the Surveillance States: The (Cyber) Tort Exception to the Foreign Sovereign Immunities Act.” Columbia Human Rights Law Review 46, no. 3 (2015).

Green, Rebecca. “Election Surveillance.” Wake Forest Law Review 57, no. 2 (2022).

Harvey, David J. “Here's the Thing: The Cyber Search Provisions of the Search and Surveillance Act 2012.” Digital Evidence and Electronic Signature Law Review 10 (2013): 39-50.

Huey, Laura, and Richard S. Rosenberg. “Watching the Web: Thoughts on Expanding Police Surveillance Opportunities under the Cyber-Crime Convention.” Canadian Journal of Criminology and Criminal Justice 46, no. 5 (October 2004).

Jose, nandu sam. “Information and Communication Technologies and the Right to Informational Privacy in Health Care: A Comprehensive Analys”. Brawijaya Law Journal 10, no. 1 (2023).

Joshi, Kartikeye. “Cyber Security and Cyber War.” International Journal of Law Management & Humanities 4 (2021).

Jupillat, Nicolas. “From the Cuckoo's Egg to Global Surveillance: Cyber Espionage That Becomes Prohibited Intervention.” North Carolina Journal of International Law 42, no. 4 (2017): 933-968.

Kanetake, Machiko. “The EU's Export Control of Cyber Surveillance Technology: Human Rights Approaches.” Business and Human Rights Journal 4, no. 1 (January 2019): 155-158, http://dx.doi.org/10.1017/bhj.2018.18.

Katyal, Sonia K. “The New Surveillance.” Case Western Reserve Law Review 54, no. 2 (2003).

Kleffner, Jann K., and Heather A. Harrison Dinniss. “Keeping the Cyber Peace: International Legal Aspects of Cyber Activities in Peace Operations.” International Law Studies Series. US Naval War College 89 (2013): 512-535.

Krause, Jason. “Cyber-Libertarians.” ABA Journal 89, no. 11 (November 2003).

Macak, Kubo. “From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers.” Leiden Journal of International Law 30, no. 4 (December 2017): 877-890. http://dx.doi.org/10.1017/S0922156517000358.

Matwyshyn, Andrea M. “CYBER.” Brigham Young University Law Review 2017, no. 5 (2017).

Ncube, Caroline B. “Watching the Watcher: Recent Developments in Privacy Regulation and Cyber-Surveillance in South Africa.” SCRIPTed: A Journal of Law, Technology and Society 3, no. 4 (December 2006): 344-350. http://dx.doi.org/10.2966/scrip.030406.344.

Neutze, Jan, and J. Paul Nicholas. “Cyber Insecurity: Competition, Conflict, and Innovation Demand Effective Cyber Security Norms.” Georgetown Journal of International Affairs 14, no. 3 (2013).

O'Malley, George. “Hacktivism: Cyber Activism or Cyber Crime.” Trinity College Law Review 16 (2013).

Pattnaik, Abhilash, and Soumya Kumar Palo. “Cyber Sovereignty: A Dichotomy.” GNLU Law Review 5 (2018).

Qiang, Xiao. “The Road to Digital Unfreedom: President Xi’s Surveillance State.” Journal of Democracy 30, no. 1 (January 2019): 53-67.

Rodrigues, Viola. “Cyber Stalking Issues of Enforcement in Cyber Space.” International Journal of Law Management & Humanities 3 (2020).

Roy, Anish. “Privacy Issues in Cyber World.” International Journal of Law Management & Humanities 3, no 3 (2020): 1388-1397.

Rozenshtein, Alan Z. “Surveillance Intermediaries.” Stanford Law Review 70, no. 1 (January 2018).

Sales, Nathan Alexander. “Regulating Cyber-Security.” Northwestern University Law Review 107, no. 4 (2013).

Shruti, Ashutosh Kumar, and Priya Ranjan. “Prevailing Cyber Security Law.” Supremo Amicus 29 (2022).

Sihabudin, “Expanding the Limitations of the Protection and Processing of Children’s Personal Data: An Overview of Current Regulations, Challenges, and Recommendations.” Brawijaya Law Journal 10, no. 1, (2023), p.59. DOI: https://doi.org/10.21776/ub.blj.2023.010.01.04

Simpson, Brian, and Maria Murphy. “Cyber-Privacy or Cyber-Surveillance: Legal Responses to Fear in Cyberspace.” Information & Communications Technology Law 23, no. 3 (2014): 189-191. http://dx.doi.org/10.1080/13600834.2014.978551.

Singh, Prabhjot. “Data Encryption and Surveillance.” Supremo Amicus 18 (2020): 639-643.

Solis, Gary D. “Cyber Warfare.” Military Law Review 219 (2014): 1-52.

Tafoya, William L. “Cyber Terror.” FBI Law Enforcement Bulletin 80, no. 11 (November 2011): 1-7.

Tsaugourias, Nicholas, “Borders and the Territorialisation of Cyberspace.” Indonesia Journal of International Law 15, no. 4, (2018) p.545-550

Tsuchiya, Motohiro. “Japan's Response to Cyber Threats in the Surveillance Age.” Seton Hall Journal of Diplomacy and International Relations 17 (2015-2016): 7-20.

Weisburd, Kate. “Punitive Surveillance.” Virginia Law Review 108, no. 1 (March 2022).

Yadin, Gilad. “Virtual Reality Surveillance.” Cardozo Arts & Entertainment Law Journal 35, no. 3 (2017): 707-742.

Zavrsnik, Ales, and Pia Levicnik. “The Public Perception of Cyber-Surveillance before and after Edward Snowden's Surveillance Revelations.” Masaryk University Journal of Law and Technology 9, no. 2 (2015): 35-37. https://doi.org/10.5817/MUJLT2015-2-3.

Downloads

Published

2023-12-28

How to Cite

Walia, Ivneet Kaur. 2023. “Cyber Surveillance and Privacy Issues Vis-à-Vis International Law”. Brawijaya Law Journal 10 (2):219-41. https://doi.org/10.21776/ub.blj.2023.010.02.05.