Otwarty dostęp

Protection of (Personal) Data in Armed Conflicts


Zacytuj

Costa Rica’ Position on the Application of International Law in Cyberpsace. (2021) // https://docs-library.unoda.org/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)/Costa_Rica_-_Position_Paper_-_International_Law_in_Cyberspace.pdf Search in Google Scholar

“International humanitarian law and cyber operations during armed conflicts. ICRC position paper submitted to the Open-Ended Working Group on Developments in the Field of Information and Telecommunications in the Context of International Security and the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security, November 2019.” International Review of the Red Cross Vol. 102, No. 1 (March 2021): 481–492. // DOI: doi.org/10.1017/S1816383120000478 Search in Google Scholar

International law and cyberspace. Finland’s national positions. (2020) // https://um.fi/documents/35732/0/KyberkannatPDF_EN.pdf/12bbbbde-623b-9f86-b254-07d5af3c6d85?t=1603097522727 Search in Google Scholar

Italian Position Paper on ‘International Law and Cyberspace’. (2021) // https://www.esteri.it/mae/resource/doc/2021/11/italian_position_paper_on_international_law_and_cyberspace.pdf Search in Google Scholar

Manual of the Law of Armed Conflict. Norway: The Chief of Defence, 2013. Search in Google Scholar

Military Manual on International Law Relevant to the Danish Armed Forces in International Operations. Denmark: Danish Ministry of Defence – Defence Command Denmark, 2016. Search in Google Scholar

Pakistan’s Position on the Application of International Law in Cyberspace. (March 2023) // https://docs-library.unoda.org/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)/UNODA.pdf Search in Google Scholar

Report of the Inter-American Juridical Committee. Second Report: International Law Applicable to Cyberspace. CJI/doc. 671/22, rev. 2, corr. 1 (October 2022). Search in Google Scholar

Akende, Dapo, Coco, Antonio and de Souza Dias, Talita. “Drawing the Cyber Baseline: The Applicability of Existing International Law to the Governance of Information and Communication Technologies.” International Law Studies 99 (2022): 5–25. Search in Google Scholar

Australian Government. Annex B: Australia’s position on how international law applies to State conduct in cyberspace. (2020) // https://www.internationalcybertech.gov.au/our-work/annexes/annex-b Search in Google Scholar

Bannelier, Karine. “Is the principle of differentiation still relevant in cyberwarfare? From doctrinal discource to State’s practice”: 426–455. In: Nicholas Tsagourias and Russell Buchan, eds., Research Handbook on International Law and Cyberspace. Cheltenham: Edward Elgar Publishing, 2021. Search in Google Scholar

Benvenisti, Eyal. “The Birth and Life of the Definition of Military Objectives.” International & Comparative Law Quarterly Vol. 71, No. 2 (May 2022): 269–295 // DOI:10.1017/S0020589322000100 Search in Google Scholar

Boothby, William H. “Cyber Capabilities”: 85–136. In: William H. Boothby, ed., New Technologies and the Law in War and Peace. Cambridge: Cambridge University Press, 2019. Search in Google Scholar

Čengić, Amir. “Spies”: 656–658. In: Dražan Dukić and Niccolò Pons, eds., The Companion to International Humanitarian Law. Leiden and Boston: Brill-Nijhoff, 2018. Search in Google Scholar

Droege, Cordula. “Get off my cloud: cyber warfare, humanitarian law, and the protection of civilians.” International Review of the Red Cross Vol. 94, No. 2 (June 2013): 533–578. // DOI:10.1017/S1816383113000246 Search in Google Scholar

Ega, Brian J. International Law and Stability in Cyberspace, Berkeley Law, 10 November 2016. (November 2016) // https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdf Search in Google Scholar

Federal Department of Foreign Affairs. Switzerland’s position paper on the application of international law in cyberspace. (2021) // https://www.eda.admin.ch/dam/eda/en/documents/aussenpolitik/voelkerrecht/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdf Search in Google Scholar

Geiß, Robin, and Lahmann, Henning. “Protection of Data in Armed Conflict.” International Law Studies 97 (2021): 557–572. Search in Google Scholar

Gill, Terry D. “International humanitarian law applied to cyber-warfare: precautions, proportionality and the notion of ’attack’ under the humanitarian law of armed conflict”: 456–469. In: Nicholas Tsagourias and Russell Buchan, eds., Research Handbook on International Law and Cyberspace. Cheltenham: Edward Elgar Publishing, 2021. Search in Google Scholar

Gisel, Laurent, Rodenhäuser, Tilman and Dörmann, Knut. “Twenty years on: International humanitarian law and the protection of civilians against effects of cyber operations during armed conflicts.” International Review Of Red Cross Vol. 102, No. 1 (April 2020): 287–334 // DOI:10.1017/S1816383120000387 Search in Google Scholar

Government of Canada. International Law applicable in cyberspace. (2022) // https://www.international.gc.ca/world-monde/issues_development-enjeux_developpement/peace_security-paix_securite/cyberspace_law-cyberespace_droit.aspx?lang=eng#a14 Search in Google Scholar

Government of United Kingdom, Foreign Commonwealth & Development Office. Policy Paper. Application of international law to states’ conduct in cyberspace: UK statement. (2021) // https://www.gov.uk/government/publications/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement#international-humanitarian-law-ihl Search in Google Scholar

Harrison Dinniss, Heather A. “The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives.” Israel Law Review Vol. 48, No. 1 (January 2015): 39–54 // DOI: doi.org/10.1017/S0021223714000272 Search in Google Scholar

Henckaerts, Jean-Marie and Doswald-Beck, Louise. Customary International Humanitarian Law – Volume I: Rules. New York: International Committee of the Red Cross – Cambridge University Press, 2005. Search in Google Scholar

ICRC. International humanitarian law and the challenges of contemporary armed conflicts report. Geneva: International Committee of the Red Cross, 2015, 32IC/15/11. Search in Google Scholar

ICRC. Protecting Civilians against Digital Threats during Armed Conflict. Recommendations to States, Belligerents, Tech Companies, and Humanitarian Organizations. Geneva: International Committee of the Red Cross, 2023. Search in Google Scholar

Ireland Department of Foreign Affairs. Position Paper on the Application of International Law in Cyberspace. (2023) // https://www.dfa.ie/media/dfa/ourrolepolicies/internationallaw/Ireland---National-Position-Paper.pdf Search in Google Scholar

Jančárková, Tatiana and Mačák, Kubo. Regional Consultation of Central and Eastern European States, 8 December 2021, International Humanitarian Law and Cyber Operations During Armed Conflicts. Geneva: International Committee of the Red Cross, 2022. Search in Google Scholar

Mejer Kjelgaard Jeppe and Melgaard, Ulf. “Denmark’s Position Paper on the Application of International Law in Cyberspace.” Nordic Journal of International Law Vol. 94, No. 3, 9–10 // DOI: https://doi.org/10.1163/15718107-20230001 Search in Google Scholar

Kis Kelemen, Bence. Célzott likvidálás a nemzetközi jogban – különös tekintettel a felfegyverzett pilóta nélküli repülőgépek alkalmazására (Targeted Killing in International Law with special attention to the use of unmanned aerial vehicles). Pécs: Publikon, 2023. Search in Google Scholar

Kittichaisaree, Kriangsak. Public International Law of Cyberspace. Cham: Springer, 2017. Search in Google Scholar

Lubell, Noam. “Lawful Targets in Cyber Operations: What the Principle of distinction Apply?” International Law Studies 89 (2013): 250–275. Search in Google Scholar

Lumiste, Liina. “Russian Approaches to Regulation Use of Force in Cyberspace.” Baltic Yearbook of International Law Online Vol. 20, No. 1 (December 2022): 109–132 // DOI: doi.org/10.1163/22115897_02001_007 Search in Google Scholar

Mačák, Kubo. “Military Objective 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law.” Israeli Law Review Vol. 48, No. 1 (January 2015): 55–80 // DOI: doi.org/10.1017/S0021223714000260 Search in Google Scholar

Mačák, Kubo. “Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law.” Israel Law Review Vol. 48, No. 1 (January 2015): 55–80 // DOI: doi.org/10.1017/S0021223714000260 Search in Google Scholar

Macák, Kubo. “This is Cyber: 1 + 3 Challenges for the Application of International Humanitarian Law in Cyberspace.” Exeter Centre for International Law Working Paper Series 2/2019 (2019): 1–17. Search in Google Scholar

Mačák, Kubo. “Regional Consultation of Latin American States, 9–10 November 2021, International Humanitarian Law and Cyber Operations During Armed Conflicts.” Geneva: International Committee of the Red Cross, 2022. Search in Google Scholar

McCormack, Tim. “International Humanitarian Law and the Targeting of Data.” International Law Studies 94 (2018): 220–240. Search in Google Scholar

Melzer, Nils. International Humanitarian Law. A Comprehensive Introduction. Geneva: International Committee of the Red Cross, 2016. Search in Google Scholar

Melzer, Nils. Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law. Geneva: International Committee of the Red Cross, 2009. Search in Google Scholar

Melzer, Nils. Targeted Killing in International Law. New York: Oxford University Press, 2008. Search in Google Scholar

Mimran, Tal. “Between Israel and Iran: Middle-East Attitudes to the Role of International Law in the Cyber-Sphere.” Baltic Yearbook of International Law Online Vol. 20, No. 1 (December 2022): 209–235 // DOI: doi.org/10.1163/22115897_02001_011 Search in Google Scholar

Ministrè re des Armées. Droit International appliqué aux Opérations dans le Cyberspace. (2019) // https://www.justsecurity.org/wp-content/uploads/2019/09/droit-internat-appliqu%C3%A9-aux-op%C3%A9rations-cyberespace-france.pdf Search in Google Scholar

Ministry of Foreign Affairs of Japan. Basic Position of the Government of Japan on International Law Applicable to Cyber Operations. (2021) // https://www.mofa.go.jp/files/100200935.pdf Search in Google Scholar

New Zealand Foreign Affairs & Trade. The Application of International Law to State Activity in Cyberspace. (2020) // https://dpmc.govt.nz/sites/default/files/2020-12/The%20Application%20of%20International%20Law%20to%20State%20Activity%20in%20Cyberspace.pdf Search in Google Scholar

Pomson, Ori. “’Objects’? The Legal Status of Computer Data under International Humanitarian Law.” Journal of Conflict & Security Law Vol. 28, No. 2 (January 2023): 349–387 // DOI:doi.org/10.1093/jcsl/krad002 Search in Google Scholar

Representaciones Diplomáticas de Cuba en El Exterior. 71 UNGA: Cuba at the final session of Group of Governmental Experts on developments in the field of information and telecommunications in the context of international security. (June 2017) // https://misiones.cubaminrex.cu/en/un/statements/71-unga-cuba-final-session-group-governmental-experts-developments-field-information Search in Google Scholar

Roscini, Marco. Cyber Operations and the Use of Force in International Law. Cambridge: Cambridge University Press, 2014. Search in Google Scholar

Sandoz, Yves, Swinarski, Christophe and Zimmermann. Bruno. Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949. Geneva: International Committee of the Red Cross, 1987. Search in Google Scholar

Schmitt, Michael N. “International cyber norms: reflections on the path ahead.” Netherlands Military Law Review 111 (2018): 1–12. Search in Google Scholar

Schmitt, Michael N. “The Notion of ‘Objects‘ during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision.” Israel Law Review Vol. 48, No. 1 (March 2015): 81–109 // DOI:10.1017/S0021223714000314 Search in Google Scholar

Schmitt, Michael N. “Wired warfare 3.0: Protecting the civilian population during cyber operations.” International Review of Red Cross Vol. 101, No. 1 (April 2019): 333–355 // DOI:10.1017/S1816383119000018 Search in Google Scholar

Schmitt, Michael N. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017. Search in Google Scholar

Schöndorf, Roy. Israel’s perspective on Key Legal and Practical Issues Concerning the Application of International Law to Cyber Operations. (December 2022) // https://www.ejiltalk.org/israels-perspective-on-key-legal-and-practical-issues-concerning-the-application-of-international-law-to-cyber-operations/ Search in Google Scholar

Shany, Yuval and Mimran, Tal. “International Regulation of Cyber Operations.” Hebrew University of Jerusalem Legal Studies Research Paper Series 5/2021, (November 2021): 1–24. Search in Google Scholar

The Federal Government of Germany. On the Application of International Law in Cyberspace. Position Paper. (March 2021) // https://www.auswaertiges-amt.de/blob/2446304/32e7b2498e10b74fb17204c54665bdf0/on-the-application-of-international-law-in-cyberspace-data.pdf Search in Google Scholar

UNGA. Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. (24 June 2013), UN Doc A/68/98. Search in Google Scholar

UNGA. Official compendium of voluntary national contributions on the subject of how international law apply to the use of information and communication technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly 73/266. (13 July 2021), A/76/136*. Search in Google Scholar

Watt, Eliza. State Sponsored Cyber Surveillance. The Right to Privacy of Communications and International Law. London: Edward Elgar, 2021. Search in Google Scholar

Yoo, Christopher S. “Cyber Espionage or Cyberwar? International Law, Domestic Law, and Self-Protective Measures”: 175–194. In: Jens David Ohlin, Kevin Govern and Claire Finkelstein, eds., Cyberwar. Law and Ethics for Virtual Conflicts. Oxford: Oxford University Press, 2015. Search in Google Scholar

Zhu, Lixin and Chen, Wei. “Chinese Approach to International Law with Regard to Cyberspace Governance and Cyber Operation: From the Perspective of the Five Principles of Peaceful Coexistance.” Baltic Yearbook of International Law Online Vol. 20, No. 1 (December 2022): 187–208 // DOI: doi.org/10.1163/22115897_02001_010 Search in Google Scholar

Charter of Fundamental Rights of the European Union (adopted 7 December 2000, entered into force 1 December 2009), OJ C 326. Search in Google Scholar

Convention for the Protection of Human Rights and Fundamental Freedoms (adopted 4 November 1950, entered into force 3 September 1953), ETS 005. Search in Google Scholar

Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (adopted 28 January 1981, entered into force 1 October 1985), ETS 108. Search in Google Scholar

International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976), 999 UNTS 171 (ICCPR). Search in Google Scholar

Legality of the Threat or Use of Nuclear Weapons. Advisory Opinion, I.C.J. Reports 1996, p. 226. Search in Google Scholar

North Sea Continental Shelf. Judgement, I.C.J. Reports 1969, p. 3. Search in Google Scholar

Protocol additional to the Geneva Conventions of 12 August 1949, and relating to the protection of victims of international armed conflicts (Protocol I) (adopted 8 June 1977, entered into force 7 December 1979), UNTS 1125 3. Search in Google Scholar

Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal, 2016, no. L 119. Search in Google Scholar

Vienna Convention on the Law of Treaties (adopted 23 May 1969, entered into force 27 January 1980), 115 UNTS 331. Search in Google Scholar

eISSN:
2029-0454
Język:
Angielski
Częstotliwość wydawania:
2 razy w roku
Dziedziny czasopisma:
Law, other, Social Sciences, Political Science