“For the internet to remain global and open, it is imperative that countries, including those currently lacking capacity to adequately deal with security concerns, to adopt a growth- and freedom-oriented, participative, bottom-up perspective on security that has human rights at its core.” (Joint Governmental Statement at UN Human Rights Council in June 2013)
Arguably, the internet poses severe challenges to state sovereignty and governmental legitimacy. Governments around the world find it increasingly difficult to control, regulate or monitor the massive flow of data within the cyber-world and uphold human rights and fundamental freedoms at the same time. Nevertheless, the world wide web is one of the main prerequisites for economic growth and democracy. It enables citizen participation , engagements and inter-action on all levels that can lead to social transformation and political change. Radical groups, democracy movements, development organizations and human rights NGOs all use the internet to further their goals.
Since the former NSA contractor, Edward Snowden, released a variety of confidential documents we all know of PRISM, TEMPORA and other programs and their massive privacy infringements. These programs were primarily designed to collect user data to increase the capability of intelligence services to protect societies from internal and external threats. But are those programs not undermining essential citizen freedoms and fundamental human rights?
This course systematically examines the compliance between international human rights norms, standards and mechanism within legal and political frameworks and the growing cyber security regime. Debates about the loss of state sovereignty over cyber security, paired with the idea of internet freedom and users’ and citizens’ responsibility lead to the question, whether individual and state responsibility based on reciprocity and human rights compliance are reconcilable.
Students taking this course will learn:
• how human rights are used in the debate about Public Privacy
• how individual, societal, political and governmental actors interact in this context
• what cyber security in consistency with human rights is about.
Using this information, students will practice assessing and analyzing cyber security issues based on international human rights norms, standards and regimes.