02.09.2013 Views

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

Child Pornography - Home | National Rapporteur on Trafficking in ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

256<br />

<str<strong>on</strong>g>Child</str<strong>on</strong>g> PornograPhy First report oF the Dutch NatioNal rapporteur<br />

3.8.2 Interplay of forces <strong>in</strong> public-private sector partnerships<br />

Public-private sector partnerships are able to make a substantial c<strong>on</strong>tributi<strong>on</strong> towards the tackl<strong>in</strong>g of<br />

child pornography. As described below, the partnerships can cause tensi<strong>on</strong> between the different forces<br />

at play – compris<strong>in</strong>g the government, private sector, NGOs and Internet community – as these actors<br />

have their own views as to which model of Internet governance should be used to combat child pornography<br />

<strong>on</strong> the Internet.<br />

Internet governance 757<br />

The Internet provides many positive opportunities for users, but can also have negative c<strong>on</strong>sequences,<br />

such as the distributi<strong>on</strong> of child abuse material. Combat<strong>in</strong>g cybercrime and illegal c<strong>on</strong>tent – <strong>in</strong>clud<strong>in</strong>g<br />

child abuse material– is a matter of Internet governance. 758 One of the functi<strong>on</strong>s of Internet governance<br />

is to develop a policy that is focussed <strong>on</strong> the users of the Internet and not <strong>on</strong> the technology as such.<br />

S<strong>in</strong>ce the Internet now has an <strong>in</strong>ternati<strong>on</strong>al, cross-border character, Internet governance takes place via<br />

multilateral actors, <strong>in</strong>clud<strong>in</strong>g <strong>in</strong>ternati<strong>on</strong>al organisati<strong>on</strong>s. 759<br />

Multiple models of Internet governance currently exist side by side. 760 The ‘cyber authority’ model is<br />

based <strong>on</strong> the noti<strong>on</strong> that there need to be central po<strong>in</strong>ts <strong>in</strong> order to keep the Internet clean. These<br />

services could, for example, disc<strong>on</strong>nect <strong>in</strong>dividual computers or parts of the Internet or put these ‘<strong>in</strong>to<br />

quarant<strong>in</strong>e’. 761 Another approach is the ‘self-clean<strong>in</strong>g Internet’ model, which <strong>in</strong>volves a community<br />

of volunteers systematically record<strong>in</strong>g and m<strong>on</strong>itor<strong>in</strong>g threats and vulnerabilities. S<strong>in</strong>ce Internet participants<br />

ga<strong>in</strong> <strong>in</strong>sights – and trouble – <strong>in</strong>to and from these harmful elements, they also develop and<br />

implement countermeasures themselves. 762 In additi<strong>on</strong> to this, the ‘model of ec<strong>on</strong>omic market forces’<br />

exists, based <strong>on</strong> the idea that Internet governance can be best achieved by market mechanisms and<br />

private partners. 763<br />

In additi<strong>on</strong> to legislati<strong>on</strong> and regulati<strong>on</strong>s, a variety of ideas exist with<strong>in</strong> the realm of government, which<br />

l<strong>in</strong>k <strong>in</strong> with the first model, such as block<strong>in</strong>g child abuse material and the (possible) establishment of<br />

757 Mathias<strong>on</strong> et al. (2004, p.8) def<strong>in</strong>es Internet governance as follows: “collective acti<strong>on</strong>, by governments<br />

and/ or the private sector operators of the networks c<strong>on</strong>nected by the Internet, to establish agreements<br />

about the standards, policies, rules, and enforcement and dispute resoluti<strong>on</strong> procedures to apply to<br />

global <strong>in</strong>ternetwork<strong>in</strong>g activities.”<br />

758 Report of the Work<strong>in</strong>g Group <strong>on</strong> Internet Governance, 2005, p.6.<br />

759 Mathias<strong>on</strong> et al., 2004, pp.10-11. A similar formal <strong>in</strong>stituti<strong>on</strong> is the Internet Corporati<strong>on</strong> for Assigned<br />

Names and Numbers (ICANN), which is resp<strong>on</strong>sible for issu<strong>in</strong>g top-level doma<strong>in</strong> names such as.nl and.<br />

com. The issu<strong>in</strong>g of the.xxx doma<strong>in</strong> name by ICANN is directed specifically at (adult) pornographic<br />

websites, so that it is easier to m<strong>on</strong>itor such websites, see ‘Why ICANN’s Approval of the XXX doma<strong>in</strong><br />

is an important precedent’ by Milt<strong>on</strong> Mueller, 19 March 2011, blog.<strong>in</strong>ternetgovernance.org/blog/_archives/2011/3/19/4775146.html<br />

(viewed 7 June 2011).<br />

760 Solum, 2009.<br />

761 www.nligf.nl/<strong>in</strong>dex.php/agenda/P0/publiek_debat_<strong>in</strong>ternet_governance_c<strong>on</strong>troleren_of_vertrouwen<br />

(viewed 24 May 2011).<br />

762 www.nligf.nl/<strong>in</strong>dex.php/agenda/P0/publiek_debat_<strong>in</strong>ternet_governance_c<strong>on</strong>troleren_of_vertrouwen<br />

(viewed 24 May 2011).<br />

763 Solum, 2009, pp.75-86.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!