Professional Documents
Culture Documents
Dr Karen Mc Cullagh
• Evidence you can answer the question posed i.e. identify the
relevant issues, create logical arguments, sustain arguments
using appropriate authorities (i.e. academic opinions from
journal articles & books; court decisions), and an ability to
critically analyse and reach well-reasoned conclusions.
Instruction Words
• Critically analyse: break the subject into its main ideas and evaluate
them
When asked to critically analyse or evaluate .
• Advise: explain the applicability of the law to a particular factual
situation. Evaluate the significance of the results.
• Discuss: investigate a question, going into the pros and cons.
• Discuss Critically: As with discuss but you are expected to undertake
more reflective thinking focused on a quote, comment or court
decision.
• Meaning of different instruction words:
https://www.bangor.ac.uk/studyskills/study-guides/essay-terms.php.en
Instruction words
Topic words
Focus words
If it is not a criminal case then it is a civil suit and one party will ‘sue’
the other party for breach of x law. (a variety of remedies depending on
the legal issue e.g. damages (financial compensation)
• Show and tell should be your mantra for gaining more marks i.e.
show the what you have learned by telling the examiner what you’ve
read and providing references so that they can go check what you’ve
read.
In-text references & List of references (i.e. 2 step process). Below
is step 1
• You are welcome to use in-text references e.g.,
References
Books
Akdeniz, Y. (2000). Chapter 13: Governance of Pornography and Child
Pornography on the Global Internet: A Multi-Layered Approach: Law
and the Internet: Regulating Cyberspace eds. Lilian Edwards and
Charlotte Waelde (pp. 223-241 https://www.cyber-
rights.org/reports/governan.htm).
Journal articles
Pippen, A. & Bond, E. “Why is placing the child at the centre of online
OR: Option 2: footnotes (UK law graduates know how to do this already)
What may be considered pornographic in one section of the society and
shunned upon from the public discourse may be perfectly legal in
another section of the society. Akdeniz[12]
List of topics
• Net Neutrality
• Fake News, Disinformation & Conspiracy theories
• Data Protection
• Computer Misuse
• Robotics
• Artificial Intelligence.
• What did the CJEU decide in Joined Cases C-807/18 and C-39/19
Telenor Magyarország Zrt. v Nemzeti Média- és Hírközlési Hatóság
Elnöke?
http://curia.europa.eu/juris/document/document.jsf;jsessionid=8A94A1417C44745823A1BE1011844B12?
text=&docid=233749&pageIndex=0&doclang=EN&mode=req&dir=&occ=first&part=1&cid=14107369
Any more recent cases you could discuss?
Note: we looked at NN in the EU law and in developing countries in class i.. Facebook basics. Is it a
good offer? If not, should developing countries seek to copy the EU experience? If so, why?
- What is: fake news, disinformation & conspiracy theories? i.e. how do
scholars define these terms.
- Why are they a problem? Can you provide an example of each?
- What potential solutions could we use – do they have strengths and
weaknesses?
- Have scholars identified a single effective solution? If not, why not?
- Note: it might be a good idea to consider Lessig’s four modalities of
regulation too - week 1 reading.
Data Protection - recap
• Tension between Privacy and data processing: the privacy paradox
• GDPR and UK GDPR - which is applicable?
• Data subject is in an EU member state: GDPR + national data protection law
of x member state (e.g. fixing age of consent)
• Data subject is in the UK – UK GDPR + Data Protection Act 2018
Application: R. v Bow Street Magistrates Court and Allison , House of Lords 05/08/1999 (belongs in in-text reference or
footnote)
Rule: ss.57-58 of the Terrorism Act 2000 and/or Part I of the Terrorism
Act 2006.
Also, once informed by a police officer, Darlene, would also commit the
David: recently developed the online personality WelshLibertas and claims to be a freedom fighter for
an independent Wales. He has built a website which contains a considerable amount of rhetoric about
English oppression of the Welsh. The website has a section entitled “strike back”. In this he exhorts
fellow Welsh people to attack symbols of English imperialism such as the Palace of Westminster,
Windsor Castle and the Bank of England. The website also contains excerpts from publications such
as the Anarchists Cookbook showing how to make explosives.
• Do David’s acts have/lack the ideological motivation required for terrorist activity? (need to know how terrorism is
defined)
• Section 57 deals with possessing articles for the purpose of terrorist acts. Section 57 includes a specific intention.
Section 58 deals with collecting or holding information that is of a kind likely to be useful to those involved in acts
of terrorism. Section 58 does not include a specific intention. Also, collecting information (without making a record
of it) falls with s.58 only s 59 deals with incitement terrorism overseas; Terrorism Act 2000.
• Could he be charged under s.1(2) of the Terrorism Act 2006.? See s34 for definition of terrorism. For s.1(2) to apply
David would first have to be given notice by a constable under s.3 of the TA 2006.
• Could the excerpts from the Anarchist Cookbook be described as possession of “an article in circumstances which
give rise to a reasonable suspicion that possession is for a purpose connected with the commission, preparation, or
instigation of an act of terrorism.” This is an offence under s.57 of the Terrorism Act 2000.
• Is it also an offence under s.2 of the Terrorism Act 2006 (dissemination of terrorist publications)? Note: s.3 CMA
19990 as amended would also apply.
• Relevant cases to consider: R v Rahman and Mohammed, R v Zafar and R v Brown [re a free speech defence in
relation to the publication The Anarchists Cookbook]
(a) Is hacktvism too grey an area for the application of strict rules as are
found in ss 1-3 of the CMA 1990?
(b) Should the CMA 1990 include a defence for those involved in hacktivist
activity?
(c) Would Art 5 of the Budapest Convention on Cybercrime allow for a
• Firstly what is the scope of s.3 of the Computer Misuse Act? This
defence?
occurs when an individual carries out any act which is intended to
impair the operation of a computer, to prevent access to data or to
hinder the operation of a program. This seems clearly to cover acts
such as DDoS often used by Anonymous.
• What about intent? Surely if Anonymous intend some form of civil
disobedience they should have a defence? This is the Klang argument
as seen in Civil Disobedience Online and Virtual Sit Ins, Civil
Disobedience and Cyberterrorism however there is no such defence
under the Computer Misuse Act – see DPP v Lennon and R v
Cuthbert (in relation to s.1).
• Students can point to cases where arrests and prosecutions have been
Finding relevant cases
Supreme Court decisions can be accessed here:
https://www.supremecourt.uk/decided-cases/
• BAILII https://www.bailii.org
Autonomous vehicles
Automated and Electric Vehicles Act 2018, Read the Explanatory note:
11. Automated vehicles are those that have the capability of driving
themselves without human oversight or intervention for some, or all, of a
journey. In an automated vehicle the driver can, in at least some circumstances
or situations, hand all control and responsibility to the vehicle and effectively
become a passenger, using it in automated mode. United Kingdom law on
compulsory motor insurance has focused historically on ensuring that victims
of road traffic collisions are compensated quickly and fairly. In the case of an
automated vehicle being operated in automated mode, however, accidents
could take place not as a result of human fault, but because of a failure in the
vehicle itself, for which the only recourse available to an otherwise uninsured
victim might be to sue the manufacturer through the courts. This Part extends
compulsory motor vehicle insurance to cover the use of automated vehicles in
automated mode, so that victims (including the ‘driver’) of an accident caused
by a fault in the automated vehicle itself will be covered by the compulsory
Automated and Electric Vehicles Act 2018
Explanatory note
Section 3: Contributory negligence etc.
• This Section applies contributory negligence principles to the
apportioning of liability in relation to accidents involving automated
vehicles, where the injured party to some extent caused the accident or
the damage resulting from it.
Artificial Intelligence