National Law School of India University Bangalore Applicant Memorial

download National Law School of India University Bangalore Applicant Memorial

of 69

description

Sample Moot Memorial - Applicant

Transcript of National Law School of India University Bangalore Applicant Memorial

  • 32A

    2012

    THE UNIVERSAL FREEDOM OF EXPRESSION COURT

    IN

    THE UNIVERSAL COURT OF HUMAN RIGHTS

    THE 2012 OXFORD PRICE MEDIA LAW MOOT COURT COMPETITION

    OPENBEMIDIA & ORS.

    (APPLICANTS)

    V.

    REPUBLIC OF BEMIDIA

    (RESPONDENT)

    MEMORIAL FOR THE APPLICANT

    4940 WORDS

  • II

    TABLE OF CONTENTS

    LIST OF ABBREVIATIONS ______________________________________________ IV

    INDEX OF AUTHORITIES _______________________________________________ VI

    STATEMENT OF RELEVANT FACTS ___________________________________ XXVI

    STATEMENT OF JURISDICTION _______________________________________ XXXI

    QUESTIONS PRESENTED ____________________________________________ XXXII

    SUMMARY OF ARGUMENTS ________________________________________ XXXIII

    ARGUMENTS ____________________________________________________________ 1

    A. THE REQUIREMENT OF COLLECTION AND VERIFICATION OF USER INFORMATION

    CONTRAVENES PROVISIONS OF UDHR _________________________________________ 1

    I. The requirement restricts Article 19, UDHR ________________________________ 1

    II. The requirement imposes a restriction on Article 20, UDHR ___________________ 6

    III. The requirement imposes a restriction on Article 12, UDHR __________________ 7

    IV. The requirement violates Article 17, UDHR _______________________________ 9

    V. The restriction is not permissible under Article 29(2), UDHR __________________ 9

    B. THE REQUIREMENT TO DISCLOSE IDENTITY, FOLLOWING, AND HISTORICAL LOCATION

    INFORMATION CONTRAVENES PROVISIONS OF UDHR _____________________________ 15

    I. The requirement imposes a restriction on Article 19, UDHR ___________________ 15

    II. The requirement restricts Article 20, UDHR _______________________________ 16

    III. The requirement imposes a restriction on Article 12, UDHR _________________ 16

    IV. The requirement violates Article 8, UDHR _______________________________ 19

    V. The restriction is not permissible under Article 29(2), UDHR _________________ 20

  • III

    C. THE REQUIREMENT TO REPORT LOCATION INFORMATION ABOUT USERS OF THE MLM

    FORUM IN REAL TIME CONTRAVENES PROVISIONS OF UDHR ______________________ 21

    I. The requirement is a restriction on Article 12, UDHR ________________________ 22

    II. The requirement restricts Article 13, UDHR _______________________________ 26

    III. The requirement contravenes Article 8, UDHR ____________________________ 27

    IV. The restriction is not permissible under Article 29(2), UDHR ________________ 27

    D. THE REQUIREMENT TO DELETE THE CONTENTS OF THE CARLA TRACKER, TALIA TRACKER

    AND DARIA TRACKER FORUMS CONTRAVENES ARTICLE 19, UDHR _________________ 28

    I. The requirement imposes a restriction on Article 19, UDHR ___________________ 29

    II. The restriction is not permissible under Article 29(2), UDHR. _________________ 30

    PRAYER ________________________________________________________________ 34

  • IV

    LIST OF ABBREVIATIONS

    Paragraph

    AfCHR African Convention on Human and Peoples Rights

    ACtHPR African Court of Human and Peoples Rights

    ACHR American Convention on Human Rights

    AIR All India Reporter

    App no Application Number

    art Article

    cl Clause

    EC European Council

    EU European Union

    ECHR European Convention on Human Rights

    ECtHR European Court of Human Rights

    ECmHr European Commission of Human Rights

    EHRR European Human Rights Reports

    FFPA First Family Privacy Act

    HRC Human Rights Committee

    IACHR Inter American Court of Human Rights

  • V

    ICCPR International Covenant on Civil and Political Rights

    IRA Internet Responsibility Act

    NJ New Jersey

    prin Principle

    s Section

    UDHR Universal Declaration of Human Rights

    UK United Kingdom

    UN United Nations

    US United States of America

  • VI

    INDEX OF AUTHORITIES

    CASES OF THE AFRICAN COURT OF HUMAN AND PEOPLES RIGHTS

    Referred to in:

    Article19 v Eritrea (2007) AHRLR 73 (ACtHPR 2007) 6

    Jawara v Gambia (2000) AHRLR 107 (ACtHPR 2000) 6

    Marques de Morais v Angola (2005) AHRLR 3 (2005) 14

    Media Rights Agenda and Others v Nigeria (2000) AHRLR 200 (ACtHPR 1998)

    2, 3

    Scanlen and Holderness v Zimbabwe (2009) AHRLR 289 (ACtHPR 2009) 5

    CASES OF THE INTER-AMERICAN COURT OF HUMAN RIGHTS

    Referred to in:

    Compulsory Membership in an Association Prescribed by Law for the Practice of Journalism, Advisory Opinion OC-5/85, Inter-American Court of Human Rights Series A No 5 (13 November 2003)

    5, 6

    Herrera-Ulloa v Costa Rica Petition no 12367 (IACtHR, 2 July 2004) 9

    Ricardo Canese v Paraguay Inter-American Court of Human Rights Series C No 111 (31 August 2004)

    32

  • VII

    CASES OF THE EUROPEAN COURT OF HUMAN RIGHTS

    Referred to in:

    Amann v Switzerland [2000] ECHR 87 9, 11, 27

    App no 14661/81 (ECtHR, 9 July 1991) 8

    App no 9804/82 (ECtHR, 7 December 1982) 8

    Association for European Integration and Human Rights and Ekimdzhiev v Bulgaria [2007] ECHR 533

    11

    Autronic AG v Switzerland App no 12726/87 (ECtHR, 22 May 1990) 2

    Busuioc v Moldova App no 61513/00 (ECtHR, 21 December 2004) 29

    Dudgeon v United Kingdom App no 7525/76 (ECtHR, 23 September 1981)

    33

    Eerikinen & Ors v Finland App no 3514/02 (ECtHR, 10 February 2009) 29

    Ekin v France (2001) ECHR 473 5, 10

    Evans v United Kingdom App no 6339/05 (ECtHR, 7 March 2006) 14

    Gaweda v Poland App no 26229/95 (ECtHR, 14 March 2002) 2, 10

    Gillan and. Quinton v United Kingdom App no 4158/05 (ECtHR, 12 January 2010)

    10

    Giorgi Nikolaishvili v Georgia App no 37048/04 (ECtHR, 13 January 2009)

    29

    Goodwin v United Kingdom [2002] 35 EHRR 447 10

    Hachette Filipacchi Associs v France App no 71111/01 (ECtHR, 23 July 2009)

    32

  • VIII

    Handyside v United Kingdom [1976] ECHR 5 13, 14

    Herczegfalvy v Austria (1993) 15 EHRR 437 20

    Hinczewski v Poland App no 34907/05 (ECtHR, 5 October 2010) 10

    Hirst v United Kingdom [2005] ECHR 681 15

    Iatridis v Greece App no 31107/96 (ECtHR, 25 March 1999) 9

    Incal v Turkey ECHR 1998-IV 1547 12, 13

    Karhuvaara and Iltalehti v Finland App no 53678/00 (ECtHR, 16 November 2004)

    31

    Kennedy v United Kingdom [2010] ECHR 682 4, 26

    Klass v Germany (1979-80) 2 EHRR 214 14, 19

    Kopp v Switzerland App no 23224/94 (ECtHR, 25 March 1998) 9

    Krone Verlag GmbH & Co KG v Austria (2006) 42 EHRR 28 30

    Kruslin v France (1990) 12 EHRR 547 10, 11, 20

    KU v Finland App no 2872/02 (ECtHR 2 March 2009) 8

    Leander v Sweden (1987) 9 EHRR 433 9, 19

    Liberty and Others v the United Kingdom [2008] ECHR 568 11, 20

    Lingens v Austria App no 9815/82 (ECtHR, 8 July 1986) 30

    Malone v United Kingdom (1984) 7 EHRR 14 10, 17, 19, 20

    Moseley v United Kingdom [2011] ECHR 774 29, 32, 33

  • IX

    National Association of Teachers in Further and Higher Education v United Kingdom App no 28910/95 (ECtHR, 16 April 1998)

    7

    Peck v United Kingdom (2003) 36 EHRR 41 31

    PG and JH v UK App no 44787/98 (ECtHR, 25 September 2001) 17, 19

    Rekvnyi v Hungary App no 25390/94 (ECtHR, 20 May 1999) 10

    Republican Party of Russia v Russia App no 12976/07 (ECtHR, 12 April 2011)

    15

    Rotaru v Romania (2000) 8 BHRC 449 (ECtHR) 8, 9

    S and Marper v United Kingdom [2008] ECHR 1581 8, 14

    Silver and Others v United Kingdom (1983) 5 EHRR 347 10

    Surek v Turkey App no 24122/94 (ECtHR, 8 July 1999) 9

    The Observer and The Guardian v United Kingdom App no 13585/88 (ECtHR, 26 November 1991)

    5, 13, 29

    The Sunday Times v United Kingdom App no 13166/87 (ECtHR, 26 November 1991)

    5, 6, 9, 10, 13

    The Sunday Times v United Kingdom (1979-80) 2 EHRR 245 10

    Thorgeirson v Iceland (1992) 14 EHRR 843 12

    Uzun v Germany App no 35623/05 (ECtHR, 2 September 2010) 22, 27, 28

    Van der Velden v The Netherlands App no 29514/05 (ECtHR, 7 December 2006)

    8

    Von Hannover v Germany ECHR 2004-VI 54 29, 32

  • X

    Weber and Saravia v Germany App no 54934/00 (ECtHR, 29 June 2006) 11, 27

    Worm v Austria (1997) 25 EHRR 454 9

    X v Iceland [1967] ECHR 24 22

    X v United Kingdom App no 9072/82 (ECtHR, 6 October 1982) 8

    Zana v Turkey (1997) 27 EHRR 667 14

    CASES OF THE EUROPEAN COMMISSION OF HUMAN RIGHTS

    Referred to in:

    Denev v Sweden (1989) 59 DR 127 (ECmHR) 9

    CASES OF THE EUROPEAN COURT OF JUSTICE

    Referred to in:

    The Queen v Minister of Agriculture, Fisheries and Food and Secretary of Health, ex parte Fedesa and Ors [1990] ECR I-4023 (ECJ)

    14

    AMERICAN CASES

    Referred to in:

    Al-Haramain Islamic Foundation et al v Bush et al 451 F Supp 2d 1215 (NDCA 2009)

    19

    Amnesty International et al v John McConnell et al, 646 F Supp 2d 633 (SDNY 2009)

    19

  • XI

    Anderson v Hale 159 F Supp 2d 1116 (ND Ill 2001) 7

    Application for Order of a Pen Register 402 F Supp 2d (SDNY 2005) 17

    Baird v State Bar of Arizona 401 US 1 (1971) 7

    Bantam Books Inc et al v Sullivan 372 US 58 (1963) 5

    Bates v Little Rock 361 US 516 (1960) 7

    Berlin Democratic Club v Rumsfeld 410 F Supp 144 (Dist of Columbia 1976)

    4

    Board of Trustees of State Univ of NY v Fox 492 US 469 (1989) 10

    Bret Michaels v Internet Entertainment Group Inc and Ors Lexsee 5 F Supp 2d 823 (CD Cal 1998)

    30, 32

    Burrows v Superior Court 529 P 2d 596 (Cal 1974) 17

    Cantwell v Connecticut 310 US 296 (1940) 13

    Columbia Ins Co v Seescandy.com 185 FRD 573 (ND Cal. 1999) 3, 5

    Daily Times Democrat v Graham 162 So 2d 474 (Ala 1964) 31

    Dendrite Int'l Inc v Doe No 3 775 A 2d 756 (NJ 2001) 1, 4, 20

    Denver Area Educational Telecommunications Consortium Inc v FCC 518 US 727 (1996)

    6

    Doe v Cahill 884 A 2d 451 (Del 2005) 6, 20

    Dow Chemical v United States 476 US 227 (1986) 23, 24

    Farmers Educational and Co-operative Union, North Dakota Division v WDAY Inc 360 US 525 (1959)

    29

  • XII

    Gertz v Robert Welch Inc 418 US 323 (1974) 31

    Gibson v Florida Legislative Investigation Committee 372 US 539 (1963) 7

    Grosjean v American Press Co 297 US 233 (1936) 3, 5

    In the Matter of the 2703(d) Order relating to Twitter Accounts: wikileaks, rop_g; ioerror; and birgittaj Misc No 10GJ3793 (Eastern District of Virginia)

    19

    Internet Archive et al v Michael B Mukasey No C 4:07-06346 CW (ND Cal 2007)

    19, 20

    Katz v United States 389 US 347 (1967) 8, 16, 18, 22, 25

    Kingsley International Pictures Corp v Regents 360 US 684 (1959) 20

    Kyllo v United States 533 US 27 (2001) 24, 25

    Laird v Tatum 408 US 1 (1972) 4

    Lamont v Postmaster General 381 US 301 (1965) 4, 6

    Lubin v Agora Inc 882 A 2d 833 (Md Ct App 2005) 5

    McIntyre v Ohio Elections Commission 514 US 334 (1995) 1, 3

    Meeropol v Nizer 560 F 2d 1061 (2nd Cir 1977) 31

    NAACP v Alabama 357 US 449 (1958) 7

    NAACP v Button 371 US 415 (1963) 4

    Near v Minnesota 283 US 697 (1931) 5, 12, 29

    Nebraska Press Association v Stuart 427 US 539 (1976) 5, 14

  • XIII

    New York Times Co v United States 403 US 713 (1971) 11, 12

    New York Times Co v Sullivan 376 US 254 (1964) 30

    Ontario v Quon 560 US ___ (2010) 18

    People v Weaver 12 NY 3d 433 (2009) 23, 24

    Reno v ACLU 521 US 844 (1997) 1, 29

    Ronald Galella v Jacqueline Onassis 487 F 2d 986 (2nd Cir 1973) 24, 31

    Schneider v Smith 390 US 17 (1968) 6

    Shelton v Tucker 364 US 479 (1960) 7, 14

    Silverman v United States 365 US 505 (1961) 25

    Smith v California 361 US 147 (1959) 29

    Smith v Maryland 442 US 735 (1979) 17, 23

    Southeastern Promotions Ltd v Conrad 420 US 546 (1975) 4

    State v Jackson 76 P 3d 217 (Wash 2003) 23, 24

    Talley v California 362 US 60 (1960) 1

    Tattered Cover Inc v City of Thornton 44 P.3d 1044 (Colo 2002) 1, 5

    United States v Forrester 512 F 3d 500 (9th Cir 2007) 23

    United States v Chadwick 433 US 1 (1977) 22

    United States v Jacobson 466 US 109 (1984) 22

  • XIV

    United States v Karo 468 US 705 (1984) 25, 28

    United States v Kennedy 81 F Supp 2d 1103 (D Kan 2000) 16

    United States v Knotts 460 US 276 (1983) 23

    United States v Maynard 615 F 3d 544 (2010) 22, 23, 24

    United States v Miller 307 US 174 (1939) 16

    United States v Rumely 345 US 41 (1953) 7

    United States v Torres 523 US 224 (1998) 27

    Virginia State Pharmacy Board v Virginia Citizens Consumer Council 425 US 748 (1976)

    14

    Woodard v Hutchins 464 US 377 (1984) 30

    Zeran v America Online Inc 524 US 937 (1998) 29

    Zupnik v Associated Press 31 F Supp 2d 20 (D Conn 1998) 31

    ENGLISH CASES

    Referred to in:

    A v B and Anr [2002] EWCA Civ 337 (UK) 30, 31, 32

    Reynolds v Times Newspapers [1999] 4 All ER 609 (UK) 32

    Sir Elton John v Associated Newspapers [2006] EMLR 27 (UK) 31

    Theakston v Mirror Group Newspapers Ltd. [2002] EWHC 137(QB) (UK) 30

  • XV

    HUMAN RIGHTS COMMITTEE

    Referred to in:

    Albert Womah Mukong v Cameroon Communication No 458/1991, UN Doc CCPR/C/51/D/458/1991 (10 August 1994)

    9

    Coeriel et al v The Netherlands Communication No 453/1991, UN Doc CCPR/C/52/D/453/1991 (1994) (HRC)

    8

    Hak-Chul Shin v Republic of Korea Communication No 926/2000, UN Doc CCPR/C/80/D/926/2000 (2004) (HRC)

    12

    Keun-Tae Kim v Republic of Korea Communication No 574/1994, UN Doc CCPR/C/64/D/574/1994 (1999) (HRC)

    12

    Tae Hoon Park v Republic of Korea Communication No 628/1995, UN Doc CCPR/C/64/D/628/1995 (1998) (HRC)

    12

    Vladimir Petrovich Laptsevich v Belarus Communication No 780/1997, UN Doc CCPR/C/68/D/780/1997 (2000) (HRC)

    11

    Vladimir Velichkin v Belarus Communication No 1022/2001, UN Doc CCPR/C/85/D/1022/2001 (2005) (HRC)

    11

    Zeljko Bodrozic v Serbia and Montenegro Communication No 1180/2003, UN Doc CCPR/C/85/D/1180/2003 (2006) (HRC)

    30

    CANADIAN CASES

    Referred to in:

    Gauthier v Canada [1931] SCR 416 (Canada) 5

  • XVI

    GERMAN CASES

    Referred to in:

    Vorratsdatenspeicherung [Data Retention] BVerfG 2 March 2010, 1 BvR 256/08 (Germany)

    14

    INDIAN CASES

    Referred to in:

    Bennett Coleman & Co v Union of India AIR 1973 SC 106 (India) 3

    District Registrar and Collector, Hyderabad v Canara Bank 2005 (1) SCC 496 (India)

    17

    ROMANIAN CASES

    Referred to in:

    Decision no. 1258, 8 October 2009 (Romania) 14

    NEW ZEALAND CASES

    Referred to in:

    Hosking v Runting [2004] NZCA 34 (NZ) 31

  • XVII

    STATUTES

    Referred to in:

    Reader Privacy Act 2011 (California) 1, 5

    Electronic Communications Privacy Act 1986 (US) 20, 28

    Pen Register Act 1986 (US) 21

    Personal Information Protection and Electronic Documents Act 2001 (Canada)

    18

    Right to Financial Privacy Act 1978 (US) 21

    Telecommunications (Interception and Access) Act 1979 (Australia) 20, 28

    USA PATRIOT Act 2001 (US) 8

    REGIONAL AND INTERNATIONAL INSTRUMENTS

    Referred to in:

    African Charter on Human and Peoples Rights (adopted 27 June 1981, entered into force 21 October 1986) (1982) 21 ILM 58

    6, 19, 26

    American Convention on Human Rights (adopted 22 November 1969, entered into force 18 July 1978)

    5, 6, 7, 19

    European Convention on Human Rights (adopted 4 November 1950, entered into force 3 September 1953)

    5, 6,7, 9, 18, 19

    International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171

    5, 8, 19, 26

    Universal Declaration of Human Rights (adopted 10 December 1948 5, 6, 9, 18, 26

  • XVIII

    UNGA Res 217 A(III)

    ARTICLES

    Referred to in:

    Alekhya Prakasha and P Pallavi, No End of Trouble?: Intermediary Liability after Perfect 10 v. Visa International (2008) 1 IJIPL 74

    3

    Amber Melville-Brown, Private Lives [2010] European Lawyer 30

    Andrew J DeFilippis, Securing Informationships: Recognizing a Right to Privity in Fourth Amendment Jurisprudence (2006) 115 Yale LJ 1086

    17

    Casey Holland, Neither Big Brother Nor Dead Brother: The Need for a New Fourth Amendment Standard Applying to Emerging Technologies (2005-06) 94 Ky LJ 393

    18

    Christopher S Yoo, Free Speech and the Myth of the Internet as an Unintermediated Experience (2009) Scholarship at Penn Law Paper 289 accessed 9 November 2011

    2

    Christopher Slobogin and Joseph E Schumacher, Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at Understandings Recognized and Permitted by Society (1993) 42 Duke LJ 727

    17

    Christopher Slobogin, Subpoenas and Privacy (2005) 54 DePaul L Rev 805

    17

    Daniel J Solove, Digital Dossiers and the Dissipation of Fourth Amendment Privacy (2002) 75 S Cal L Rev 1083

    17

    Daniel J Solove, A Taxonomy of Privacy (2006) 154 U Pa L Rev 477 26

    David Cole, The Poverty of Posner's Pragmatism: Balancing Away Liberty After 9/11 (2007) 59 Stan L Rev 1735

    15

  • XIX

    Deborah Buckner, Internet Search and Seizure in United States v. Forrester: New Problems in the New Age of Pen Registers (2008) 22 BYU J Pub L 499

    19

    Diane L Zimmerman, Requiem for a Heavyweight: a farewell to Warren and Brandeiss Privacy Tort (1983) 68 Cornell Law Review 291

    32

    Gavin Phillipson, The right of privacy in England and Strasbourg compared in Andrew T Kenyon and Megan Richardson (eds), New Dimensions in Privacy Law: International and Comparative Perspectives (CUP 2006) 226

    32

    Gerald G Ashdown, The Fourth Amendment and the Legitimate Expectation of Privacy (1981) 34 V and L Rev 1289

    17

    Hal Roberts and John Palfrey, The EU Data Retention Directive in an Era of Internet Surveillance in Ronald J. Deibert and others (eds), Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (MIT Press 2010)

    8

    Ian Brown and Douwe Korff, Terrorism and the Proportionality of Internet Surveillance, [2009] Eur J Criminology 8 accessed 20 January 2012

    11

    J Beckwith Burr, The Electronic Communications Privacy Act of 1986: Principles for Reform (2010) accessed 9 November 2011

    18, 19

    James C White, People, Not Places: A Policy Framework for Analyzing Location Privacy Issues (Electronic Privacy Information Center, 2003) accessed 9 November 2011

    22

    Julie Cohen, A Right to Read Anonymously: A Closer Look at Copyright Management In Cyberspace [1996] 28 Conn L Rev 981

    5

    Kevin McLaughlin, The Fourth Amendment and Cell Phone Tracking: Where are we? (2006-07) 29 Hastings Comm & Ent LJ 421

    17, 28

  • XX

    Lilian Edwards and Charlotte Waelde, Online Intermediaries and Liability for Copyright Infringement (2005) WIPO Workshop Keynote Paper accessed 9 November 2011

    2, 3

    M Kim, The Right to Anonymous Association in Cyberspace: US Legal Protection for Anonymity in Name, in Face, and in Action, (2010) 7:1 SCRIPTed 51 accessed 20 January 2012

    7

    MA Sanderson, Is Von Hannover v Germany a step backward for the substantive analysis of speech and privacy rights? (2004) 6 European Human Rights Law Review 631

    32

    Mark A Lemley, Rationalising Internet Safe Harbours (2007-08) 6 J on Telecomm. & High Tech L 101

    2

    Mathias Vermeulen, Unilateral Exceptions to Fundamental Rights in the Use of Detection Technologies in the Fight against Terrorism: Permissible Limitations of the Right to Privacy (2011) European University Institute Working Paper

    26

    Matthew D Lawless, The Third Party Doctrine Redux: Internet Search Records and the Case for a Crazy Quilt of Fourth Amendment Protection (2007) UCLA J L & Tech 1

    17

    Matthew Mazzotta, Balancing Act: Finding Consensus on Standards for Unmasking Anonymous Internet Speakers (2010) 51 BCL Rev 833

    20

    NA Moreham, Privacy in public places (2006) 65(3) Cambridge Law Journal 606

    31

    NANM van Eijk and others, Moving Towards Balance: A Study into Duties of Care on the Internet, Institute for Information Law (Liebniz Centre for Law, University of Amsterdam, 2010) 53 accessed 9 November 2011

    2

    Patrick Breyer, Telecommunications Data Retention and Human Rights: 2, 3, 9, 14

  • XXI

    The Compatibility of Blanket Traffic Data Retention with the ECHR (2005) 11(3) ELJ 365

    Paul M Schwartz, Beyond Lessigs Code for Internet Privacy: Cyberspace Filters, Privacy-control and Fair Information Practices (2000) Wisc L Rev 743

    9

    Ronald Deibert, Black Code: Censorship, Surveillance and the Militarization of Cyberspace (2003) 32 J Intl Stud 501

    8

    Ryan Singel, Twitters Response to the WikiLeaks Subpoena Should Be the Industry Standard (Wired, 10 January 2011) accessed 9 November 2011

    20

    Seth F Kreimer, Censorship by Proxy: The First Amendment, Internet Intermediaries and the Problem of the Weakest Link [2006-07] 155(11) U Pa L Rev 31

    29

    Sherry F Colb, What Is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy (2002) 55 Stan L Rev 119

    17

    SJ Edgett, Double-Clicking on Fourth Amendment Protection: Encryption Creates Reasonable Expectation of Privacy (2002) 30 Pepp L Rev 339

    22

    Stephen E Henderson Learning from All fifty states: how to apply the fourth amendment and its state analogs to protect third party information from unreasonable search (2006) 55 Catholic University Law Review 373 available at accessed 20 January 2012

    17, 23

    Steven J Murdoch and Ross Anderson, Tools and Technology of Internet Filtering in Ronald Deibert and others (eds), Access Denied: Practice and Policy of Global Internet Filtering (MIT Press 2008)

    9

    Thomas I Emerson, The Doctrine of Prior Restraint (1955) Faculty Scholarship Series Paper 2804 accessed on 9

    5, 29

  • XXII

    November 2011

    Thomas R Litwack, The Doctrine of Prior Restraint [1977] Harv CR-CL L Rev 519

    4

    W Wat Hopkins, The Involuntary Public Figure: Not So Dead After All, (2003) 21 Cardozo Arts and Entertainment Law Journal 1

    Warren and Brandeis, The Right to Privacy (1890) 4 Harv L Rev 193 8, 32

    BOOKS AND TREATISES

    Referred to in:

    Lessig, Code: Version 2.0 (Perseus Books 2006) 8

    Christopher Slobogin, Privacy at Risk: The New Government Surveillance and the Fourth Amendment (2007)

    17

    Helen Fenwick and Gavin Phillipson, Media Freedom under the Human Rights Act (2006)

    32

    Nihal Jayawickrama, The Judicial Application of Human Rights Law: National, Regional and International Jurisprudence (1st edn, CUP 2002)

    6, 22

    Richard A Posner, Not A Suicide Pact: The Constitution in a Time of National Emergency (OUP 2006)

    17

    Richard Clayton and Hugh Tomlinson, The Law of Human Rights (1st edn, OUP 2000)

    1, 29

    Sarah Joseph and others, The International Covenant on Civil and Political Rights: Cases, Materials and Commentary (2nd edn, OUP 2005)

    6, 16

    Wayne R Lafave, Search and Seizure: A Treatise on the Fourth Amendment (2004)

    17

  • XXIII

    CONSTITUTIONS

    Referred to in:

    Constitution of Sweden 1991 1, 3

    MISCELLANEOUS

    Referred to in:

    Constitutional Law. Freedom of Speech. State Police Intelligence System Focusing on Public Protesters Declared Unconstitutional. Anderson v. Sills, 106 NJ Super 545, 256 A. 2d 298 (Ch. 1969), Appeal Docketed, No. A-150-69 (Super. Ct., App. Div. 1969) 1970 83(2) HLR 935.

    4

    Article 19: Global Campaign for Free Expression, Statement on the Right to Communicate (London, 2003) accessed 9 November 2011

    1

    Brief of Amici Curiae Electronic Frontier Foundation and American Civil Liberties Union of the National Capital Area in Support of Appellant Jones in United States v Lawrence Maynard and Antoine Jones No 08-3030/08-3034 (US)

    25

    Brief of Center for Democracy & Technology, Electronic Frontier Foundation, Matt Blaze, Andrew J Blumberg, Roger L Easton, and Norman M Sadeh as Amici Curiae in Support of Respondent in United States v Antoine Jones No 10-1259 (US)

    23, 24, 25, 29

    Center for Democracy & Technology, Intermediary Liability: Protecting Internet Platforms for Expression and Innovation (2010) accessed 9 November 2011

    3

    Council Directive 2002/58/EC of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic

    12

  • XXIV

    communications sector [2002] OJ L201/37

    Council Directive 2006/24/EC of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC [2006] OJ L105/54

    8

    Council Directive 95/46/EC of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data [1995] OJ L281/31

    12, 18, 19

    Council of Europe, Declaration on Freedom of Communication on the Internet (2003)

    1, 3, 5

    European Commission, 'Report from the Commission to the Council and the European Parliament: Evaluation report on the Data Retention Directive (Directive 2006/24/EC)' COM(2011) 225 final (Brussels 18 April 2011) accessed 20 January 2012

    3

    European Digital Rights, What the European Commission owes 500 million Europeans (2010) accessed 9 November 2011

    16

    Johannesburg Principles on National Security, Freedom of Expression and Access to Information, UN Doc E/CN 4/1996/39 (1996)

    11, 12

    Organisation for Economic Co-operation and Development, Workshop Summary: The Role of Internet Intermediaries in Advancing Public Policy Objectives (Paris, 2010) 9 accessed 9 November 2011

    3

    Privacy International, Memorandum of laws concerning the legality of data retention with regard to the rights guaranteed by the European Convention on Human Rights (2010) accessed 9 November 2011

    14

  • XXV

    Siracusa Principles on the Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights, UN Doc E/CN 4/1985/4

    12, 13, 14

    UNCHR Final Report of Special Rapporteurs on Right to Freedom of Opinion and Expressions (1992) UN Doc E/CN.4/Sub.2/1992/9

    5

    UNCHR General Comment 10 in Article 19 (Freedom of Opinion) (1983) UN Doc CCPR/C/GC/10

    10, 11

    UNCHR General Comment 34 in Article 19 (Freedom of Opinion and Expression) (2011) UN Doc CCPR/C/GC/34

    9

    UNCHR, Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression (2011) UN Doc A/HRC/17/27

    1, 29

    UNHRC, Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism (2009) UN Doc A/HRC/13/37

    19, 20, 26

  • XXVI

    STATEMENT OF RELEVANT FACTS

    POLITICAL SCENARIO IN BEMIDIA

    1. The Respondent country, Republic of Bemidia, is populated with two ethnic groups the

    Diryens of the North (70% of the population) and the Mondahis of the South (about 25% of

    the population). While the Diryens enjoy significant political power, the lack of it was source

    of disgruntlement for the Mondahis. However, the Mondahis were affluent by virtue of their

    economic development and their interactions with developed countries. In contrast, the

    Diryens remain underdeveloped and envy the Mondahis for their prosperity. The ethnic,

    political and economic disparities have resulted in tension between the two groups.

    2. Two years ago, the Bemidian government, controlled by the Diryen-based Nationalist

    Party, completely overhauled the taxation system and centralised the governments spending.

    This way, considerable resources were transferred from the flourishing south to the

    languishing north. Dissatisfaction erupted in the form of protests from Mondahi leadership as

    well as the general public, leading to discussions on independence for the south.

    MONDAHI LIBERATION MOVEMENT

    3. At this point, a small militant group named the Mondahi Liberation Movement (MLM)

    carried out bombings in many places. The mainstream Mondahis, largely represented by the

    Federalist Party, immediately distanced themselves from the activities of MLM. The

    inexperienced military forces of Bemidia were unsuccessful in combating the guerrilla

    warfare employed by the MLM. Instead, reports of killings and kidnapping of the Mondahis

    residing in the north and mistreatment of those brought in for interrogation by the military

    surfaced.

  • XXVII

    OPENBEMIDIA AND TRACKER FORUMS

    4. In the midst of this unrest, a group of Mondahis started a website called OpenBemidia,

    built on the Ushahidi platform. OpenBemidia facilitates the creation of Tracker forums,

    which are designed to collect specific posts (either text or images) on a topic of interest. In

    order to post to these forums, the users were required to register by simply providing an email

    address. The disclosure of any other information such as name or address was optional.

    5. The username is the only means of identification of a user of the website. Users may

    follow other users or forums. Users may restrict who can follow them and make their posts

    private to their followers.

    6. Each post in OpenBemidia is tagged with a geographic location by way of GPS tracking

    on mobile phones, or mobile phone towers, or other such technologies like geo-locating

    laptops. The time and location information of each post is displayed with the post. Forum

    posts may be viewed in the regular reverse chronological order or as plotted on a map.

    TRACKER FORUMS ON OPENBEMIDIA

    7. Started by a user FreeBemidia, Military Tracker is one such popular Tracker forum. It

    collects posts related to the military. Sometimes, the posts note the location of the military at

    a given point in time. With the passage of time, Military Tracker has developed into a very

    good source of information about the military forces. When two bombings took place in areas

    from where military forces had just exited, the government, with no direct proof in this

    regard, suspected that MLM might be using Military Tracker to facilitate its illegal activities.

    Subsequently, the military secrets law was amended to protect the location information of

    military personnel on duty.

  • XXVIII

    8. Another forum in the website is named MLM which appears to be empty. The

    government suspected that this was being used by the members of Mondahi Liberation

    Movement who had kept their posts private.

    INTERNET RESPONSIBILITY ACT

    9. The Bemidian government recently enacted the Internet Responsibility Act (IRA) that

    imposes the following regulations on websites:

    a. Name and contact information of users of a website should be collected and verified

    prior to allowing such user to register for an account, post to a forum, or otherwise

    make content available to one or more persons other than the website itself, or access

    information that is not generally available to the public.

    b. At any time, the website may be called upon to disclose such name and contact

    information, geographic location information, and any other information about any

    user of the website.

    c. The existence of any request and/or fulfilment thereof may be required to be kept

    secret for up to 180 days.

    d. Any knowing violation of any provision of this law will invite criminal sanctions.

    10. Under the authority of the IRA, the Bemidian government issued an order demanding

    OpenBemidia to obtain and report the identities, as well as following information of several

    users and forums. These users figure on a secret watch list, compiled by the government.

    They include FreeBemidia along with other regular participants on Military Tracker. Similar

    demands were imposed for the MLM forum, where the government sought the complete

    details of all followers, their historical location information and real-time location of any post

  • XXIX

    made in the future by any user of the forum. A gag order was imposed on OpenBemidia to

    keep all such disclosures secret.

    FIRST FAMILY PRIVACY ACT

    11. The Prime Minister of Bemidia, Vislio Luscon is revered by a large number of

    Bemidians and treated like a monarch. His family, consisting of wife Carla and daughters

    Talia and Daria, attract significant media coverage, both nationally and internationally.

    OpenBemidia has a separate Tracker forum dedicated to each member of the First Family.

    These Tracker forums have posts that record the activities of the Family that occur in public

    places. These posts, made from different accounts, contain low resolution photographs of the

    subject along with a geolocation tag. Some posts show the First Lady dining with prominent

    Mondahis.

    12. Citing security reasons, the Bemidian government recently enacted the First Family

    Privacy Act (FFPA). The Act prohibits the publication of private information of any

    member of the First Family (excluding the Prime Minister). Such private information

    includes any photograph of the person regardless of where it was taken and any information

    divulging the location of the person. Further, such private information could not be published

    without the persons (or the guardians) prior written consent. Under the authority of the

    FFPA, the Bemidian government has ordered OpenBemidia to take down every post in the

    Carla, Talia and Daria Tracker forums.

    13. OpenBemidia, on behalf of itself and its users, has challenged all of the above

    requirements under, but not limited to, Articles 12, 19 and 20 of the Universal Declaration of

    Human Rights (UDHR). So far, OpenBemidias claims have been rejected on merits, and

  • XXX

    all domestic legal remedies have been exhausted. Further, OpenBemidias standing to bring

    the instant suit is not barred by any law.

  • XXXI

    STATEMENT OF JURISDICTION

    OpenBemidia, on its own behalf and on behalf of its users, has approached the Universal

    Freedom of Expression Court, the special chamber of the Universal Court of Human Rights

    hearing issues relating to the right of freedom of expression under Article 19, under the

    enabling Preamble of the UN Charter.

  • XXXII

    QUESTIONS PRESENTED

    A. Whether the requirement to collect and verify name and contact information before

    allowing a user to register for an account and post to a forum is consistent with the provisions

    of the UDHR?

    B. Whether the requirement to disclose to the government identity information,

    following information, and historical location information about OpenBemidias users is

    consistent with the provisions of the UDHR?

    C. Whether the requirement to report location information about the users of the MLM

    forum in real time is consistent with the provisions of the UDHR?

    D. Whether the requirement to delete the contents of the Carla Tracker, Talia Tracker,

    and Daria Tracker forums is consistent with the provisions of the UDHR?

  • XXXIII

    SUMMARY OF ARGUMENTS

    A. The IRA requires websites to collect and verify the name and contact information of

    all users, before allowing them to use the website. This infringes on the freedom of speech

    and expression, enshrined in Article 19 of the UDHR, of both the Applicant website and its

    users. The website has an onerous burden of collection and verification imposed upon it,

    curtailing its growth. The users are forced to identify themselves as a prerequisite to using the

    website this creates a chilling effect on their speech, constitutes a prior restraint and also

    restricts the right to receive without interference. The various Tracker Forums constitute

    assemblies in cyberspace. The right to anonymity extends to assemblies as well. Therefore a

    requirement such as this, which effectively compels disclosure of the membership of Tracker

    Forums, restricts the right to assembly under Article 20. Moreover, the right to privacy,

    guaranteed by Article 12, protects personal information such as name and contact

    information. The collection of such information involves a possibility of monitoring of data

    a form of surveillance and violates this right. Furthermore, the requirement contravenes the

    right to property enshrined in Article 17 as it compels website to expend their resources and

    risk losing clientele.

    Finally, the restriction on the aforesaid rights is not permissible under Article 29(2) of the

    UDHR. The restriction is not prescribed by law and does not pursue legitimate aims like

    national security and public order. Further, it is not necessary in a democratic society to

    collect every users details as the link between the posts and the alleged threats to national

    security and public order has not been established.

    B. The requirement to disclose identity, following and historical location information

    contravenes the freedom of speech and expression. Seen in conjunction with the reports of

  • XXXIV

    governmental atrocities on Mondahis, the possibility of disclosure of personal information to

    the government creates a chilling effect on speech. Moreover, it also violates the users right

    to read anonymously. A Tracker forum or a user, together with their followers are

    cyberspace assemblies as they share a common purpose. Consequently, disclosure of

    following information infringes the right to private expressive association. The right to

    privacy of the users is infringed as the users enjoy a reasonable expectation of privacy in the

    identity information submitted to OpenBemidia. The requirement to disclose the list of users

    in the MLM forum infringes their right to privacy of correspondence, as transactional non-

    content records are protected. Further, the gag order on such disclosure contravenes the right

    to remedy enshrined in Article 8.

    The restriction on the aforesaid rights is not permissible under Article 29(2). It is not

    prescribed by law as it vests unfettered discretion with the executive. It does not pursue

    legitimate aims, and is not necessary in a democratic society.

    C. The requirement to report location information about users of the MLM forum in real-

    time contravenes the right to privacy, right to freedom of movement and right to remedy. The

    right to privacy is infringed as: first, the users possess a reasonable expectation of privacy in

    their real-time location information; secondly, the location information acquired through GPS

    technology is fundamentally different from that obtained through human observation.

    Arguendo, the real-time location tracking still contravenes the right to privacy as procurement

    of such information cannot be easily duplicated. Further, reasonable expectation of privacy in

    such information continues to exist, irrespective of the fact that it can be obtained through

    human observation. Moreover, the right to freedom of movement guaranteed under Article 13

    is also violated, as the real-time location tracking causes a chilling effect on movement.

  • XXXV

    Lastly, the gag order preventing notification to the users deprives them the opportunity to

    seek an effective remedy, thereby violating Article 8.

    The restriction does not satisfy the test for valid limitations prescription by law, pursuit of

    legitimate aims and necessity.

    D. The requirement to delete the contents of the Carla Tracker, Talia Tracker and Daria

    Tracker Forums under the FFPA restricts the right to freedom of speech and expression

    enshrined in Article 19. These Tracker Forums have information of public interest which the

    public has a right to receive. Further, the website may self-censor and delete even borderline

    contents that do not violate any law, out of the fear of sanctions. The requirement of

    obtaining prior written consent under the FFPA is a prior restraint on free speech.

    Such a restriction on Article 19 is not permissible under Article 29(2). The restriction is not

    prescribed by law as it is made by unfettered executive discretion. It does not follow the

    legitimate aim of protection of rights of others, as the First Family does not possess a

    reasonable expectation of privacy in the published contents. Further, the restriction is not

    necessary in a democratic society as these are matters of public interest.

  • 1

    ARGUMENTS

    A. THE REQUIREMENT OF COLLECTION AND VERIFICATION OF USER INFORMATION

    CONTRAVENES PROVISIONS OF UDHR

    1. The IRA mandates all websites to collect and verify name and contact details of all users.

    Applicants submit that this requirement contravenes the rights to freedom of speech and

    expression under Article 19 [I], peaceful assembly and association under Article 20 [II],

    privacy under Article 12 [III], and property under Article 17 [IV]. Moreover, the restriction

    is not permissible under Article 29(2) [V].

    I. The requirement restricts Article 19, UDHR

    2. The right to freedom of speech and expression extends to the Internet1 and includes the

    rights to anonymous speech2 and its reception.3 Applicants submit that the requirement

    violates the freedom of expression of OpenBemidia [a], and that of its users [b].

    a. The requirement violates the freedom of expression of OpenBemidia

    3. The right to freedom of expression protects means of communication,4 such as websites.

    The impugned requirement infringes Article 19 by imposing an onerous burden on

    1 Reno v ACLU 521 US 844 (1997); UNCHR, Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression (2011) UN Doc A/HRC/17/27; Richard Clayton and Hugh Tomlinson, The Law of Human Rights (1st edn, OUP 2000) 1059.

    2 Talley v California 362 US 60 (1960); McIntyre v Ohio Elections Commission 514 US 334 (1995); Dendrite Int'l Inc v Doe No 3 775 A 2d 756 (NJ 2001); Council of Europe, Declaration on Freedom of Communication on the Internet (2003) prin 7; Article 19: Global Campaign for Free Expression, Statement on the Right to Communicate (London, 2003) accessed 9 November 2011. See also Constitution of Sweden 1991, ch 2.

    3 Reader Privacy Act 2011 (California); Tattered Cover Inc v City of Thornton 44 P.3d 1044 (Colo 2002).

  • 2

    OpenBemidia, thereby inhibiting its growth and outreach. First, the requirement to collect

    identity and contact data of all users demands an exponential increase in storage facility.5

    Such measures ought to be reasonable and proportional to the economic, technical and

    personnel constraints of the intermediary.6 As OpenBemidia is a nascent enterprise, it would

    be crippled by the substantial costs incurred in securing additional storage.7 This would be

    unreasonably restrictive of OpenBemidias ability to freely and effectively disseminate

    information.8

    4. Secondly, it is not feasible for OpenBemidia to determine the veracity of the name and

    contact information of every user so provided. Such a measure would necessitate significant

    human intervention, adding to personnel costs.9 Indeed, Internet freedom is premised on a

    healthy, cheap and competitive environment.10 Subjecting OpenBemidia to such high burden

    is detrimental to its freedom of expression.

    4 Autronic AG v Switzerland App no 12726/87 (ECtHR, 22 May 1990); Media Rights Agenda and Others v Nigeria (2000) AHRLR 200 (ACtHPR 1998); Gaweda v Poland App no 26229/95 (ECtHR, 14 March 2002).

    5 Lilian Edwards and Charlotte Waelde, Online Intermediaries and Liability for Copyright Infringement (2005) WIPO Workshop Keynote Paper 15 accessed 9 November 2011.

    6 NANM van Eijk and others, Moving Towards Balance: A Study into Duties of Care on the Internet, Institute for Information Law (Liebniz Centre for Law, University of Amsterdam, 2010) 53 accessed 9 November 2011.

    7 Patrick Breyer, Telecommunications Data Retention and Human Rights: The Compatibility of Blanket Traffic Data Retention with the ECHR (2005) 11(3) ELJ 365, 373.

    8 Patrick Breyer, Telecommunications Data Retention and Human Rights: The Compatibility of Blanket Traffic Data Retention with the ECHR (2005) 11(3) ELJ 365, 373; Christopher S Yoo, Free Speech and the Myth of the Internet as an Unintermediated Experience (2009) Scholarship at Penn Law Paper 289, 8 accessed 9 November 2011.

    9 Mark A Lemley, Rationalising Internet Safe Harbours (2007-08) 6 J on Telecomm. & High Tech L 101, 110.

    10 Lilian Edwards and Charlotte Waelde, Online Intermediaries and Liability for Copyright Infringement (2005) WIPO Workshop Keynote Paper 17 accessed 9 November 2011; Patrick Breyer, Telecommunications Data Retention and

  • 3

    5. Various courts have recognised that imposition of onerous conditions on newspapers has

    a negative impact on the exercise of freedom of expression.11 It is submitted that this would

    extend to websites. The prohibitive effect of such a measure, sans monetary aid by the

    government, directly and inevitably exposes OpenBemidia to financial losses.12 This hampers

    its growth,13 thereby curtailing its freedom of expression.14

    b. The requirement infringes the right to anonymous free speech of the users

    6. The right to freedom of speech protects anonymous speech.15 The requirement that users

    part with their identity and contact information before using the website compromises their

    anonymity. Applicants submit that the impugned requirement violates Article 19 as it causes

    Human Rights: The Compatibility of Blanket Traffic Data Retention with the ECHR (2005) 11(3) ELJ 365, 373.

    11 Grosjean v American Press Co 297 US 233 (1936); Bennett Coleman & Co v Union of India AIR 1973 SC 106 (India); Media Rights Agenda and Others v Nigeria (2000) AHRLR 200 (ACtHPR 1998).

    12 Organisation for Economic Co-operation and Development, Workshop Summary: The Role of Internet Intermediaries in Advancing Public Policy Objectives (Paris, 2010) 9 accessed 9 November 2011; European Commission, 'Report from the Commission to the Council and the European Parliament: Evaluation report on the Data Retention Directive (Directive 2006/24/EC)' COM(2011) 225 final (Brussels 18 April 2011) .

    13 Lilian Edwards and Charlotte Waelde, Online Intermediaries and Liability for Copyright Infringement (2005) WIPO Workshop Keynote Paper 17 accessed 9 November 2011; Alekhya Prakasha and P. Pallavi, No End of Trouble?: Intermediary Liability after Perfect 10 v. Visa International (2008) 1 IJIPL 74, 74; Center for Democracy & Technology, Intermediary Liability: Protecting Internet Platforms for Expression and Innovation (2010) accessed 9 November 2011.

    14 Center for Democracy & Technology, Intermediary Liability: Protecting Internet Platforms for Expression and Innovation (2010) accessed 9 November 2011.

    15 McIntyre v Ohio Elections Commission 514 US 334 (1995); Columbia Ins Co v Seescandy.com 185 FRD 573 (ND Cal 1999); Council of Europe, Declaration on Freedom of Communication on the Internet (2003) prin 7. See also Constitution of Sweden 1991, ch 2.

  • 4

    a chilling effect [i], imposes a prior restraint on free speech [ii], and restricts the right to

    receive without interference [iii].

    i. The requirement causes a chilling effect on expression

    7. A chilling effect occurs when an act inhibits full utilisation of the freedom of

    expression.16 It is acknowledged that mere knowledge of the means of information access

    available to the government creates a chilling effect.17 In this case, the public is aware that the

    collected user information can be accessed by the government at any time.18 Further, reports

    of targeted governmental violence against the Mondahis19 raise a reasonable inference that

    such information would be adversely used to harass users in future.20 Therefore, the

    collection of personal information creates a significant chilling effect on their speech by

    inducing self-censorship.21

    ii. The requirement imposes a prior restraint

    8. Prior restraints are imposed by subjecting the expression to prior governmental control,22

    directly23 or indirectly.24 They bear a presumption of invalidity,25 call for careful scrutiny,26

    16 Lamont v Postmaster General 381 US 301 (1965).

    17 Constitutional Law. Freedom of Speech. State Police Intelligence System Focusing on Public Protesters Declared Unconstitutional. Anderson v. Sills, 106 NJ Super 545, 256 A. 2d 298 (Ch. 1969), Appeal Docketed, No A-150-69 (Super. Ct., App. Div. 1969) 1970 83(2) HLR 935, 938.

    18 14(b),The Case.

    19 7, The Case.

    20 NAACP v Button 371 US 415 (1963); Laird v Tatum 408 US 1 (1972); Berlin Democratic Club v Rumsfeld 410 F Supp 144 (Dist of Columbia 1976); Dendrite Int'l Inc v Doe No 3 775 A 2d 756 (NJ 2001); Kennedy v United Kingdom App no 26839/05 (ECtHR, 18 May 2010).

    21 NAACP v Button 371 US 415 (1963); Lamont v Postmaster General 381 US 301 (1965).

    22 Southeastern Promotions, Ltd v Conrad 420 US 546 (1975); Thomas R Litwack, The Doctrine of Prior Restraint [1977] Harv CR-CL L Rev 519, 520.

  • 5

    and in some cases are completely prohibited.27 Crucially, the requirement of compulsory

    registration as a condition to expression has been recognised as a prior restraint.28

    Consequently, mandatory compliance with specific conditions before publication of posts29

    imposes a prior restraint on the exercise of the freedom of expression.

    iii. The requirement restricts the right to receive without interference

    9. The right to freedom of expression includes the right to receive information

    anonymously30 from accessible sources without interference by public authorities.31 The

    23 Near v Minnesota 283 US 697 (1931); Nebraska Press Association v Stuart 427 US 539 (1976); The Sunday Times v The United Kingdom App no 13166/87 (ECtHR, 26 November 1991); The Observer and The Guardian v United Kingdom App no 13585/88 (ECtHR, 26 November 1991).

    24 Grosjean v American Press Co 297 US 233 (1936); Compulsory Membership in an Association Prescribed by Law for the Practice of Journalism, Advisory Opinion OC-5/85, Inter-American Court of Human Rights Series A No 5 (13 November 2003); Scanlen and Holderness v Zimbabwe (2009) AHRLR 289 (ACtHPR 2009); Thomas R Litwack, The Doctrine of Prior Restraint [1977] Harv CR-CL L Rev 519, 520,

    25 UNCHR Final Report of Special Rapporteurs on Right to Freedom of Opinion and Expressions (1992) UN Doc. E/CN.4/Sub.2/1992/9; Bantam Books Inc et al v Sullivan 372 US 58 (1963); Nebraska Press Association v Stuart 427 US 539 (1976).

    26 The Sunday Times v United Kingdom App no 13166/87 (ECtHR, 26 November 1991); Observer and Guardian v United Kingdom App no 13585/88 (ECtHR, 26 November 1991); Ekin v France (2001) ECHR 473.

    27American Convention on Human Rights (adopted 22 November 1969, entered into force 18 July 1978) (ACHR) art 13(2); Gauthier v Canada [1931] SCR 416 (Canada); Compulsory Membership in an Association Prescribed by Law for the Practice of Journalism, Advisory Opinion OC-5/85, Inter-American Court of Human Rights Series A No 5 (13 November 2003).

    28 Compulsory Membership in an Association Prescribed by Law for the Practice of Journalism, Advisory Opinion OC-5/85, Inter-American Court of Human Rights Series A No 5 (13 November 2003).

    29 Thomas I. Emerson, The Doctrine of Prior Restraint (1955) Faculty Scholarship Series Paper 2804 accessed 9 November 2011; Council of Europe, Declaration on Freedom of Communication on the Internet (2003) prin 7.

    30 California Reader Privacy Act 2011 (CA); Columbia Ins Co v Seescandy.com 185 FRD 573 (ND Cal 1999); Tattered Cover Inc v City of Thornton 44 P.3d 1044 (Colo 2002); Lubin v Agora Inc 882 A 2d 833 (Md Ct App 2005); Julie Cohen, A Right to Read Anonymously: A Closer Look at Copyright Management In Cyberspace (1996) 28 Conn L Rev 981.

    31 Universal Declaration of Human Rights (adopted 10 December 1948 UNGA Res 217 A(III) (UDHR) art 19; American Convention on Human Rights (adopted 22 November 1969, entered into force 18 July 1978) (ACHR) art 13(1); European Convention on Human Rights (adopted 4 November 1950, entered into force 3 September

  • 6

    impugned requirement would expose the users reading preferences. Consequently,

    information gathering activities which usually precede expression are hindered,32 causing a

    chilling effect.33 Thus, the removal of anonymity constitutes an unacceptable restriction on

    the right to receive information.

    II. The requirement imposes a restriction on Article 20, UDHR

    10. The right to assemble34 enables persons to gather intentionally and temporarily for a

    specific purpose.35 Applicants submit that the Tracker forums on OpenBemidia constitute

    assemblies within the scope of Article 20. They stimulate discussion on particular topics36 by

    bringing together individuals who express their opinions.37

    1953) (ECHR) art 10(1); Lamont v Postmaster General 381 US 301 (1965); Schneider v Smith 390 US 17 (1968); The Sunday Times v United Kingdom App no 13166/87 (ECtHR, 26 November 1991); Jawara v Gambia (2000) AHRLR 107 (ACtHPR 2000); Compulsory Membership in an Association Prescribed by Law for the Practice of Journalism, Advisory Opinion OC-5/85, Inter-American Court of Human Rights Series A No 5 (13 November 2003); Article19 v Eritrea (2007) AHRLR 73 (ACtHPR 2007).

    32 Lamont v Postmaster General 381 US 301 (1965); Denver Area Educational Telecommunications Consortium Inc v FCC 518 US 727 (1996); Julie Cohen, A Right to Read Anonymously: A Closer Look at Copyright Management In Cyberspace [1996] 28 Conn L Rev 981.

    33 Denver Area Educational Telecommunications Consortium Inc v FCC 518 US 727 (1996).

    34 Universal Declaration of Human Rights (adopted 10 December 1948 UNGA Res 217 A(III) (UDHR) art 20; International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171 (ICCPR) arts 21 and 22; African Charter on Human and Peoples Rights (adopted 27 June 1981, entered into force 21 October 1986) (1982) 21 ILM 58 (AfCHR) arts 10 and 11; American Convention on Human Rights (adopted 22 November 1969, entered into force 18 July 1978) (ACHR) arts 15 and 16; European Convention on Human Rights (adopted 4 November 1950, entered into force 3 September 1953) (ECHR) art 11.

    35 Sarah Joseph and others, The International Covenant on Civil and Political Rights: Cases, Materials and Commentary (2nd edn, OUP 2005) 568.

    36 8, The Case.

    37 Nihal Jayawickrama, The Judicial Application of Human Rights Law: National, Regional and International Jurisprudence (1st edn, CUP 2002) 723.

  • 7

    11. Furthermore, the compelled disclosure of identity and contact information of users of

    Military Tracker and MLM Tracker forums contravenes their associational rights. Anonymity

    of an individual in an association is essential to avoid the social stigma of overt

    membership,38 particularly where a group espouses dissident beliefs.39

    12. Moreover, in NAACP v Alabama,40 the US Supreme Court held that an order mandating

    disclosure of membership rolls contravenes the collective right of an association,41 as it

    undermines its ability to recruit and retain members.42 Significantly, the right of anonymous

    membership extends to online communities.43 Therefore, it is submitted that the order

    mandating disclosure of membership of Tracker forums on OpenBemidia contravenes Article

    20.

    III. The requirement imposes a restriction on Article 12, UDHR

    13. The right to privacy44 is the right to be let alone.45 As noted in Katz,46 there must exist an

    actual, subjective expectation of privacy which is objectively reasonable. Clearly, it extends

    38 United States v Rumely 345 US 41 (1953); NAACP v Alabama 357 US 449 (1958); Shelton v Tucker 364 US 479 (1960); Gibson v Florida Legislative Investigation Committee 372 US 539 (1963); Baird v State Bar of Arizona, 401 US 1 (1971).

    39 NAACP v Alabama 357 US 449 (1958).

    40 NAACP v Alabama 357 US 449 (1958).

    41 NAACP v Alabama 357 US 449 (1958); Bates v Little Rock 361 US 516 (1960); Gibson v Florida Legislative Investigation Committee 372 US 539 (1963); National Association of Teachers in Further and Higher Education v United Kingdom App no 28910/95 (ECtHR, 16 April 1998).

    42 M Kim, The Right to Anonymous Association in Cyberspace: US Legal Protection for Anonymity in Name, in Face, and in Action, (2010) 7(1) SCRIPTed 51 accessed 20 January 2012.

    43 Anderson v Hale 159 F Supp 2d 1116 (ND Ill 2001).

    44 International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171 (ICCPR) arts 17; European Convention on Human Rights (adopted 4 November 1950, entered into force 3 September 1953) (ECHR) art 8; American Convention on Human Rights (adopted 22 November 1969, entered into force 18 July 1978) (ACHR) arts 11.

  • 8

    to personal information such as the persons name,47 contact details,48 medical records49 and

    details of personal expenditure.50

    14. The presence of data in the public sphere does not annul this right, if the information has

    been collected and stored systematically in files held by the authorities;51 or if sufficient

    possibility of misuse can be shown.52 The mandatory requirement to collect and verify the

    name and contact information of users necessarily implies storage of data.53 Further, it

    involves the possibility of misuse54 and monitoring of data by websites.55 Indeed, this

    constitutes a form of surveillance.56 In any event, the mere storage of personal information

    45 Warren and Brandeis, The Right to Privacy [1890] 4 HLR 193, 195.

    46 Katz v United States 389 US 347 (1967).

    47 Coeriel et al v The Netherlands Communication No 453/1991, UN Doc CCPR/C/52/D/453/1991 (1994) (HRC).

    48 X v United Kingdom App no 9072/82 (ECtHR, 6 October 1982).

    49 App no 14661/81 (ECtHR, 9 July 1991).

    50 App no 9804/82 (ECtHR, 7 December 1982).

    51 Rotaru v Romania (2000) 8 BHRC 449 (ECtHR); Van der Velden v The Netherlands App no 29514/05 (ECtHR, 7 December 2006); S and Marper v United Kingdom App no 30562/04 (ECtHR, 4 December 2008).

    52 Lessig, Code: Version 2.0 (Perseus Books 2006) 215.

    53 Council Directive 2006/24/EC of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC [2006] OJ L105/54; Hal Roberts and John Palfrey, The EU Data Retention Directive in an Era of Internet Surveillance in Ronald J. Deibert and others (eds), Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (MIT Press 2010).

    54 USA PATRIOT Act 2001 (US); KU v Finland App no 2872/02 (ECtHR 2 March 2009); Lessig, Code: Version 2.0 (Perseus Books 2006) 215.

    55 Paul M Schwartz, Beyond Lessigs Code for Internet Privacy: Cyberspace Filters, Privacy-control and Fair Information Practices (2000) Wisc L Rev 743, 747; Steven J Murdoch and Ross Anderson, Tools and Technology of Internet Filtering in Ronald Deibert and others (eds), Access Denied: Practice and Policy of Global Internet Filtering (MIT Press 2008) 64.

    56 Ronald Deibert, Black Code: Censorship, Surveillance and the Militarization of Cyberspace (2003) 32 J. Intl Stud. 501; Steven J. Murdoch and Ross Anderson, Tools and Technology of Internet Filtering in Ronald Deibert and others (eds), Access Denied: Practice and Policy of Global Internet Filtering (MIT Press 2008) 64.

  • 9

    constitutes an interference with the right to privacy, regardless of the possible subsequent

    use.57 Therefore, the impugned requirement restricts their right to privacy.

    IV. The requirement violates Article 17, UDHR

    15. The right to enjoy property58 includes the goodwill and clientele of a company.59 The

    requirement imposes a burden on OpenBemidia to obtain technical capabilities for collection,

    verification and storage of large volumes of data.60 Presumably, the website would be forced

    to utilize considerable resources. Further, the website may suffer the loss of many users, who

    fear a violation of their rights. Consequently, there is an infringement of Article 17.61

    V. The restriction is not permissible under Article 29(2), UDHR

    16. Applicants submit that the restriction is not permissible under Article 29(2) as it does not

    conform to the three-tiered test:62 First, the restriction is not prescribed by law [a]; secondly,

    it does not pursue legitimate aims [b]; and thirdly, it is not necessary in a democratic

    society63 [c].

    57 Leander v Sweden (1987) 9 EHRR 433; Kopp v Switzerland App no 23224/94 (ECtHR, 25 March 1998); Amann v Switzerland [2000] ECHR 87; Rotaru v Romania (2000) 8 BHRC 449 (ECtHR).

    58Universal Declaration of Human Rights (adopted 10 December 1948 UNGA Res 217 A(III) (UDHR) art 19; European Convention on Human Rights (adopted 4 November 1950, entered into force 3 September 1953) (ECHR) art 1.

    59 Iatridis v Greece App no 31107/96 (ECtHR, 25 March 1999).

    60 Patrick Breyer, Telecommunications Data Retention and Human Rights: The Compatibility of Blanket Traffic Data Retention with the ECHR (2005) 11(3) ELJ 365, 374.

    61 Denev v Sweden (1989) 59 DR 127 (ECmHR).

    62 Worm v Austria (1997) 25 EHRR 454.

    63 The Sunday Times v United Kingdom App no 6538/74 (ECtHR, 26 April 1979); Albert Womah Mukong v Cameroon Communication No 458/1991, UN Doc CCPR/C/51/D/458/1991 (10 August 1994); Surek v Turkey App no 24122/94 (ECtHR, 8 July 1999); Herrera-Ulloa v Costa Rica Petition no 12367 (IACtHR, 2 July 2004); UNCHR General Comment 34 in Article 19 (Freedom of Opinion and Expression) (2011) UN Doc

  • 10

    a. The restriction is not prescribed by law

    17. A restriction is prescribed by law if it has a basis in domestic law,64 and is foreseeable

    and precise.65 Applicants submit that the restriction is not prescribed by law as it is not

    foreseeable. A law is foreseeable if it is formulated with sufficient precision to enable the

    citizen to regulate his conduct.66 The IRA prescribes collection and verification of personal

    information of all users. In Malone,67 the ECtHR observed that a restriction, which does not

    specify the categories of people under its application, leaves citizens vulnerable to a risk of

    surveillance. The blanket restriction is not foreseeable as it subjects all users to the certainty

    of interference, thereby leaving no scope for regulation of conduct. Further, the law is void

    for overbreadth because it infringes the rights of all persons, irrespective of whether they are

    suspected of a crime.68

    18. Admittedly, in cases of surveillance, an expectation on part of the persons to be informed

    in advance does not exist. Nevertheless, the law must prescribe adequate safeguards to

    protect against arbitrary interference.69 These safeguards include, inter alia, a definition of

    the categories of people whose rights may be interfered with, circumstances which could lead

    CCPR/C/GC/34; UNCHR General Comment 10 in Article 19 (Freedom of Opinion) (1983) UN Doc CCPR/C/GC/10.

    64 Hinczewski v Poland App no 34907/05 (ECtHR, 5 October 2010).

    65 The Sunday Times v United Kingdom (1979-80) 2 EHRR 245; Silver and Others v United Kingdom (1983) 5 EHRR 347; Malone v United Kingdom (1984) 7 EHRR 14; Rekvnyi v Hungary App no 25390/94 (ECtHR, 20 May 1999); Ekin v France (2001) ECHR 473; Gaweda v Poland App no 26229/95 (ECtHR, 14 March 2002); Gillan and. Quinton v United Kingdom App no 4158/05 (ECtHR, 12 January 2010).

    66 The Sunday Times v United Kingdom App no 13166/87 (ECtHR, 26 November 1991).

    67 Malone v United Kingdom (1984) 7 EHRR 14.

    68 Board of Trustees of State Univ of NY v Fox 492 US 469 (1989).

    69 Kruslin v France (1990) 12 EHRR 547.

  • 11

    to such interference, and the time period during which such interference would continue.70 In

    this case, IRA does not specify any safeguards,71 even for those persons whose details are

    being collected fortuitously.72 Therefore, the restriction is not prescribed by law.

    b. The restriction does not pursue a legitimate aim

    19. Applicants contend that the restriction is not in pursuance of any legitimate aim, as the

    IRA does not state any express aim.73 This principle has been particularly stressed in cases of

    data collection and retention.74 In any event, the aims of national security and public order are

    not satisfied.

    20. First, Applicants submit that the aim of national security75 is inapplicable. The term

    national security being broad and vague, must be interpreted narrowly.76 It may be invoked

    only if its genuine purpose and demonstrable effect is to protect the countrys existence or

    70 Kruslin v France (1990) 12 EHRR 547; Weber and Saravia v Germany App no 54934/00 (ECtHR, 29 June 2006); Association for European Integration and Human Rights and Ekimdzhiev v Bulgaria [2007] ECHR 533; Liberty and Others v the United Kingdom [2008] ECHR 568; Ian Brown and Douwe Korff, Terrorism and the Proportionality of Internet Surveillance, [2009] Eur J Criminology 8 accessed 20 January 2012.

    71 Clarification #5, #14, #15.

    72 Amann v Switzerland [2000] ECHR 87.

    73 UNCHR General Comment 10 in Article 19 (Freedom of Opinion) (1983) UN Doc CCPR/C/GC/10; ladimir Petrovich Laptsevich v Belarus Communication No 780/1997, 8.5, UN Doc CCPR/C/68/D/780/1997 (2000) (HRC); Vladimir Velichkin v Belarus Communication No 1022/2001, 7.3, UN Doc CCPR/C/85/D/1022/2001 (2005) (HRC).

    74 Council Directive 2002/58/EC of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector [2002] OJ L201/37; Council Directive 95/46/EC of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data [1995] OJ L281/31.

    75 Johannesburg Principles on National Security, Freedom of Expression and Access to Information, UN Doc E/CN 4/1996/39 (1996), prin 6.

    76 New York Times Co v United States 403 US 713 (1971).

  • 12

    its territorial integrity against the use or threat of force.77 The prevention of merely local or

    relatively isolated threats to law and order78 are excluded. In the present case, there is no

    evidence of threat of violent overthrow of the government. On the contrary, the government

    is alleged to have links to armed militias perpetrating ethnic violence.79

    21. For the freedom to be constricted, the expression must constitute a precise and imminent

    threat to national security.80 Moreover, there must be a direct and immediate connection

    between the two,81 such that the absence of the restriction will necessarily lead to imminent

    violence.82 Besides, expressions that disseminate information about alleged violation of

    human rights standards are protected.83 The contents of the posts in this case do not intend or

    seem likely to incite violence, but simply inform the public about the location of the

    military84 and instances of atrocities.85 In the absence of clear evidence linking the posts on

    77 Johannesburg Principles on National Security, Freedom of Expression and Access to Information, UN Doc E/CN 4/1996/39 (1996), prin 2(a) (emphasis added).

    78 Siracusa Principles on the Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights, UN Doc E/CN.4/1985/4, cl I(B)(30).

    79 7, The Case.

    80 Incal v Turkey ECHR 1998-IV 1547; Tae Hoon Park v Republic of Korea Communication No 628/1995, UN Doc CCPR/C/64/D/628/1995 (1998) (HRC); Keun-Tae Kim v Republic of Korea Communication No 574/1994, UN Doc CCPR/C/64/D/574/1994 (1999) (HRC); Hak-Chul Shin v Republic of Korea Communication No 926/2000,UN Doc CCPR/C/80/D/926/2000 (2004) (HRC).

    81 Johannesburg Principles on National Security, Freedom of Expression and Access to Information, UN Doc E/CN 4/1996/39 (1996), prin 6(c).

    82 Near v Minnesota 283 US 697 (1931); New York Times Co v United States 403 US 713 (1971).

    83 Siracusa Principles on the Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights, UN Doc E/CN 4/1985/4, cl I(B)(vi)(32); Thorgeirson v Iceland (1992) 14 EHRR 843.

    84 11, The Case.

    85 11, The Case.

  • 13

    Military Tracker with the bombings,86 any other inference is merely speculative. Therefore,

    these posts cannot be construed as a threat to national security.

    22. Secondly, the aim of public order does not apply in this case. In order to invoke this aim,

    there must be an immediate threat to public safety, peace, or order.87 Further, there must be a

    proximate relationship between the restriction and the achievement of public order.88 Speech

    cannot be unduly restricted under the guise of conserving desirable conditions.89 Here, there

    is no proven causal link between the posts on OpenBemidia and the incidents of violence.90

    Further, the mandatory collection of personal information of all users is not likely to prevent

    the instances of disorder.

    c. The restriction is not necessary in a democratic society

    23. Applicants submit that the restriction is not necessary in a democratic society. First,

    there is no pressing social need; and secondly, the restriction is not proportionate to the

    legitimate aim.91

    24. First, determining a pressing social need requires a fair balance between the fundamental

    rights of individuals and the right of a democratic society to protect itself.92 In this case, the

    86 12, The Case.

    87 Siracusa Principles on the Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights, UN Doc E/CN 4/1985/4, cl I(C)(54); Cantwell v Connecticut 310 US 296 (1940).

    88 Siracusa Principles on the Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights, UN Doc E/CN 4/1985/4, cl I(C)(54); Incal v Turkey ECHR 1998-IV 1547.

    89 Siracusa Principles on the Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights, UN Doc E/CN 4/1985/4, cl I(B)(vii)(34); Cantwell v Connecticut 310 US 296 (1940).

    90 12, The Case.

    91 Handyside v United Kingdom [1976] ECHR 5; The Sunday Times v United Kingdom App no 13166/87 (ECtHR, 26 November 1991); The Observer and The Guardian v United Kingdom App no 13585/88 (ECtHR, 26 November 1991); Siracusa Principles on the Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights, UN Doc E/CN 4/1985/4, cl 10(b) and (d).

  • 14

    posts have not directly led to violence. Further, as noted in Evans,93 the margin of

    appreciation in determining necessity is narrow when an important facet of individual identity

    is at stake. Moreover, the adoption of data retention policies by a few regimes has been

    subject to wide criticism94 and declared unconstitutional by several courts.95 Therefore, there

    is no pressing social need to collect personal information of all users.

    25. Secondly, the restriction is not proportionate to the legitimate aim.96 The test of

    proportionality is satisfied only when the least onerous restriction is imposed.97 In this case,

    the indiscriminate collection of personal information of all users is not qualified by any

    timeframe or safeguards against abuse.98 In addition, the requirement would raise a suspicion

    against the users innocence99 and expose them to a possible violation of rights in future.100

    92 Zana v Turkey (1997) 27 EHRR 667.

    93 Evans v United Kingdom App no 6339/05 (ECtHR, 7 March 2006).

    94 Patrick Breyer, Telecommunications Data Retention and Human Rights: The Compatibility of Blanket Traffic Data Retention with the ECHR (2005) 11(3) ELJ 373.

    95 Decision no. 1258, 8 October 2009 (Romania); Vorratsdatenspeicherung [Data Retention] BVerfG 2 March 2010, 1 BvR 256/08 (Germany).

    96 Handyside v United Kingdom [1976] ECHR 5; Goodwin v United Kingdom [2002] 35 EHRR 447; Marques de Morais v Angola (2005) AHRLR 3 (HRC 2005); Siracusa Principles on the Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights, UN Doc E/CN 4/1985/4, cl 10(c).

    97 Shelton v Tucker 364 US 479 (1960); Virginia State Pharmacy Board v Virginia Citizens Consumer Council 425 US 748 (1976); Nebraska Press Association v Stuart 427 US 539 (1976); Klass v Germany (1979-80) 2 EHRR 214; The Queen v Minister of Agriculture, Fisheries and Food and Secretary of Health, ex parte Fedesa and Ors [1990] ECR I-4023 (ECJ).

    98 S and Marper v United Kingdom App no 30562/04 (ECtHR, 4 December 2008); Clarification #14.

    99 S and Marper v United Kingdom App no 30562/04 (ECtHR, 4 December 2008); Patrick Breyer, Telecommunications Data Retention and Human Rights: The Compatibility of Blanket Traffic Data Retention with the ECHR (2005) 11(3) ELJ 365, 373.

    100 Privacy International, Memorandum of laws concerning the legality of data retention with regard to the rights guaranteed by the European Convention on Human Rights (2010) accessed 9 November 2011.

  • 15

    Such a sweeping restriction without classification is disproportionate.101 In contrast, a less

    onerous restriction, such as applying the requirement to a specific class of forums, could have

    been adopted. Moreover, the imposition of a heavy burden on the website,102 accompanied by

    criminal sanctions for non-fulfilment103 is disproportionate to the legitimate aims.

    B. THE REQUIREMENT TO DISCLOSE IDENTITY, FOLLOWING, AND HISTORICAL LOCATION

    INFORMATION CONTRAVENES PROVISIONS OF UDHR

    26. Under the authority of IRA, the government has demanded OpenBemidia to disclose

    identity, following and historical location information of certain users. Applicants submit that

    this requirement restricts the rights to freedom of speech and expression under Article 19 [I],

    peaceful assembly and association under Article 20 [II], privacy under Article 12 [III], and

    remedy under Article 8 [IV]. The restriction is not permissible under Article 29(2) [V].

    I. The requirement imposes a restriction on Article 19, UDHR

    27. Applicants suggest that the impugned requirement violates Article 19 by causing a

    chilling effect104 on the freedom of speech and expression of the users. Although Respondent

    may contend that the users are unaware of the disclosure order, it is submitted that the mere

    existence of such a system restrains protected speech on the Internet.105 Furthermore, the

    101 Hirst v United Kingdom [2005] ECHR 681; Republican Party of Russia v Russia App no 12976/07 (ECtHR, 12 April 2011).

    102 3-5, Memorial for the Applicant.

    103 14(d), The Case.

    104 7, Memorial for the Applicant.

    105 David Cole, The Poverty of Posner's Pragmatism: Balancing Away Liberty After 9/11 (2007) 59 Stan L Rev 1735; European Digital Rights, What the European Commission owes 500 million Europeans (2010) accessed 9 November 2011.

  • 16

    disclosure violates the right of users to read anonymously106 as their interests are being

    monitored by the government.

    II. The requirement restricts Article 20, UDHR

    28. The following capability of the Applicant website permits the follower to receive real-

    time notifications of activity on the forum or by a user, so followed.107 Applicants submit that

    the followers of a particular idea/individual constitute an assembly as the pre-requisite of

    common purpose is satisfied. The requirement to disclose sensitive following information of

    users infringes their right to freely and anonymously associate with individuals and areas of

    interest.108 Consequently, the requirement infringes the right to private expressive

    association.

    III. The requirement imposes a restriction on Article 12, UDHR

    29. As per the universally accepted dictum in Katz,109a reasonable expectation of privacy

    exists when there is a subjective expectation of privacy, which is objectively reasonable.

    Admittedly, in Miller,110 the US Supreme Court held that individuals lose an expectation of

    privacy in information voluntarily disclosed to third parties.111 However, this reasoning has

    106 9, Memorial for the Applicant.

    107 10, The Case.

    108 Sarah Joseph and others, The International Covenant on Civil and Political Rights: Cases, Materials and Commentary (2nd edn, OUP 2005) 568.

    109 Katz v United States 389 US 347 (1967).

    110 United States v Miller 307 US 174 (1939).

    111 United States v Miller 307 US 174 (1939); United States v Kennedy 81 F Supp 2d 1103 (D. Kan 2000).

  • 17

    been subject to severe criticism.112 It is submitted that the third-party doctrine is based on an

    incorrect property-based conception of privacy,113 as mere disclosure of private information

    to one entity does not render it public.114 Indeed, the ECtHR in Malone115 and PG and JH116

    impliedly rejected the third party doctrine by upholding a right to privacy in dialled telephone

    numbers. Thus, the information sought by the government is protected by a reasonable

    expectation of privacy of the users.

    30. Further, Applicants contend that the following and historical location information was

    not voluntarily disclosed by the users. Instead, it was automatically known to OpenBemidia

    by virtue of its technical capabilities.117 As noted in Justice Brennans opinion in Smith,118 it

    is idle to speak of assuming risks in contexts where, as a practical matter, individuals have

    112 Smith v Maryland 442 US 735 (1979) (Brennan J); Wayne R Lafave, Search and Seizure: A Treatise on the Fourth Amendment (2004) 2.7; Stephen E Henderson Learning from All fifty states: how to apply the fourth amendment and its state analogs to protect third party information from unreasonable search (2006) 55 Catholic University Law Review 373 available at accessed 20 January 2012; Andrew J DeFilippis, Securing Informationships: Recognizing a Right to Privity in Fourth Amendment Jurisprudence (2006) 115 Yale LJ 1086, 1092; Matthew D Lawless, The Third Party Doctrine Redux: Internet Search Records and the Case for a Crazy Quilt of Fourth Amendment Protection (2007) UCLA J L & Tech 1, 3; Christopher Slobogin, Privacy at Risk: The New Government Surveillance and the Fourth Amendment (2007) 151.

    113 District Registrar and Collector, Hyderabad v Canara Bank 2005 (1) SCC 496 (India); Daniel J Solove, Digital Dossiers and the Dissipation of Fourth Amendment Privacy (2002) 75 S Cal L Rev 1083, 1086; Richard A Posner, Not A Suicide Pact: The Constitution in a Time of National Emergency (OUP 2006).

    114 Gerald G Ashdown, The Fourth Amendment and the Legitimate Expectation of Privacy [1981] 34 V and L Rev 1289, 1315; Christopher Slobogin and Joseph E Schumacher, Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at Understandings Recognized and Permitted by Society (1993) 42 Duke LJ 727, 732; Sherry F Colb, What Is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy (2002) 55 Stan L Rev 119, 122.

    115 Malone v United Kingdom (1984) 7 EHRR 14.

    116 PG and JH v UK App no 44787/98 (ECtHR, 25 September 2001).

    117 Clarification #25.

    118 Smith v Maryland 442 US 735 (1979) (Brennan J) (emphasis added). See also Burrows v Superior Court 529 P 2d 596 (Cal 1974); Application for Order of a Pen Register 402 F Supp 2d (SDNY 2005); Gerald G Ashdown, The Fourth Amendment and the Legitimate Expectation of Privacy (1981) 34 Vand L Rev 1289, 1315; Christopher Slobogin, Subpoenas and Privacy (2005) 54 DePaul L Rev 805, 829; Kevin McLaughlin, The Fourth Amendment and Cell Phone Tracking: Where are we? (2006-07) 29 Hastings Comm & Ent LJ 421, 441.

  • 18

    no realistic alternative. In this respect, this information is analogous to traffic data, which is

    protected against third-party disclosures by numerous data protection policies.119

    31. Moreover, Applicants submit that the requirement to disclose the identities of all users of

    MLM forum restricts their right to privacy of correspondence.120 It has been acknowledged

    that clearly communicated employer policies regarding communications shape the

    reasonable expectations of privacy of employees.121 Here, the users of MLM forum were

    provided with a private setting option. The exercise of this choice was an express act creating

    an expectation of privacy in all details of the posts.122

    32. Secondly, Applicants suggest that the MLM forum, comprising users with private

    settings, is a system of private communication analogous to an e-mail. Thus, the disclosure of

    their identities is comparable to disclosure of e-mail addresses. Although transactional non-

    content records such as email addresses and time of posts123 are exposed to third-party service

    providers, they are as intrusive as content information.124 Therefore, their disclosure restricts

    the right to privacy of the users.125

    119 Data Protection Act 1998 (UK); Personal Information Protection and Electronic Documents Act 2001 (Canada); Council Directive 2002/58/EC of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector [2002] OJ L201/37; Council Directive 95/46/EC of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data [1995] OJ L281/31.

    120 Universal Declaration of Human Rights (adopted 10 December 1948 UNGA Res 217 A(III) (UDHR) art 12; European Convention on Human Rights (adopted 4 November 1950, entered into force 3 September 1953) (ECHR) art 8.

    121 Ontario v Quon 560 US ___ (2010) (emphasis added).

    122 Katz v United States 389 US 347 (1967).

    123 J Beckwith Burr, The Electronic Communications Privacy Act of 1986: Principles for Reform (2010) accessed 9 November 2011.

    124 Casey Holland, Neither Big Brother Nor Dead Brother: The Need for a New Fourth Amendment Standard Applying to Emerging Technologies (2005-06) 94 Ky LJ 393, 40809; Deborah Buckner, Internet Search and Seizure in United States v. Forrester: New Problems in the New Age of Pen Registers (2008) 22 BYU J Pub L

  • 19

    IV. The requirement violates Article 8, UDHR

    33. The requirement of disclosure of personal data is accompanied by a gag order, mandating

    that such request be kept secret for a period upto 180 days.126 Applicants contend that the gag

    order prevents the users from seeking an effective remedy.127 The secretive nature of

    disclosure requests adversely affects the standing of subjects to invoke the judicial process.128

    In fact, notification to data subjects is a prescribed norm for data disclosure.129 Although

    notification requirements are relaxed in cases of surveillance,130 the IRA lacks the minimum

    safeguards requisite in surveillance legislations. Further, recent precedents such as Twitter131

    499; J Beckwith Burr, The Electronic Communications Privacy Act of 1986: Principles for Reform (2010) accessed 9 November 2011.

    125Malone v United Kingdom (1984) 7 EHRR 14; PG and JH v UK App no 44787/98 (ECtHR, 25 September 2001).

    126 14(c), The Case.

    127 European Convention on Human Rights (adopted 4 November 1950, entered into force 3 September 1953) (ECHR) art 13; International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171 (ICCPR) art 2(3); American Convention on Human Rights (adopted 22 November 1969, entered into force 18 July 1978) (ACHR) art 25; African Charter on Human and Peoples Rights (adopted 27 June 1981, entered into force 21 October 1986) (1982) 21 ILM 58 (AfCHR) art 7.

    128 Amnesty International et al v John McConnell et al 646 F Supp 2d 633 (SDNY 2009); Al-Haramain Islamic Foundation et al v Bush et al 451 F Supp 2d 1215 (NDCA 2009); UNHRC, Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism (2009) UN Doc A/HRC/13/37.

    129 Council Directive 95/46/EC of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data [1995] OJ L281/31; Council Directive 2002/58/EC of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector [2002] OJ L201/37.

    130 Klass v Germany (1979-80) 2 EHRR 214; Leander v Sweden (1987) 9 EHRR 433.

    131 In the Matter of the 2703(d) Order relating to Twitter Accounts: wikileaks, rop_g; ioerror; and birgittaj Misc No 10GJ3793 (Eastern District of Virginia).

  • 20

    and Internet Archive132 emphasise the role of the Internet intermediary as a torch-bearer.133

    Hence, the gag order violates Article 8.