
The focus of this module:
- The prevalence and severe impacts of online violence against women journalists in SSA calls for concerted and wide-ranging efforts to protect them online and seek accountability for such harms.
- Litigation can be a particularly impactful way of doing so, but comes with particular requirements that warrant careful consideration, such as jurisdiction, standing, and admissibility.
- Alternatively, or in concert with litigation, supporters can consider law reform strategies as well as advocacy campaigns that can build public or targeted support for a particular issue or case.
- Finally, it is vital that journalists take practical steps to protect themselves online and to deal with online violence when it occurs to mitigate against the silencing effect of these attacks.
Introduction
The media, the government, the state, and civil society organisations are struggling to respond effectively to online violence against women journalists. This highlights the urgent need for policy reform and innovative legal, legislative and normative responses, in order to ensure compliance with international human rights law.(1)
Effectively countering online violence against journalists, particularly women journalists,(2) in sub-Saharan Africa (SSA) is a pressing global issue that demands:
- Localised;
- Contextualised;
- Intersectional; and
- Practical strategies.
This module focuses on the practicalities of litigation to protect and defend the rights of women journalists online, providing guidance from the initial phases of consideration of litigation through to the legal requirements. In addition to litigation, this module considers complementary strategies such as advocacy, which can support litigation by building public awareness and support, as well as digital security tacticsand tools for victims and survivors of online violence to protect themselves in the digital sphere.(3)
It is complemented by Module 6 in Media Defence’s Advanced Modules on Digital Rights and Freedom of Expression in sub-Saharan Africa which details how to litigate within several of the key human rights fora on the continent.
Litigation Strategies
- Strategic litigation: Strategic litigation, sometimes also referred to as impact litigation, is a method of seeking broad social change, beyond a remedy for an individual, by carefully selecting and bringing a case to court.4 It has been used extensively around the world, including in SSA, to set progressive jurisprudence and achieve accountability for human rights abuses.
- Challenges and opportunities: While it can be risky — with the potential for a negative judgment or unforeseen externalities — and tends to require significant investments of time and resources, it can be a highly effective way of stimulating law reform, influencing public opinion, and having a real impact on the lives of people affected by rights violations.
- Key considerations: In assessing whether to launch litigation in a case of online violence, one should consider:
- The outcomes sought;
- Whether litigation can reasonably achieve these outcomes;
- Whether the victims, survivors or affected communities will be best served by litigation;
- What various potential paths the litigation could take; and
- How the outcomes of litigation could be leveraged for positive social change.
Strategic litigation in the context of digital rights and online harms poses unique challenges and opportunities that should also be considered when developing litigation strategies.5
The impact of strategic litigation in Sub-Saharan Africa
- Konaté v Burkina Faso (2013): he African Court on Human and Peoples’ Rights held hat criminal defamation laws hat imposed sanctions of imprisonment were incompatible with Article 9 of he African Charter of Human and Peoples’ Rights and other inte ational human rights provisions.
- Media Council of Tanzania v Atto ey-General of he United Republic of Tanzania (2019): he EACJ held hat certain provisions of Tanzania’s Media Services Act relating o fake news and rumours violated he right o freedom of expression by heir broad and vague wording.
- SERAP v Federal Republic of Nigeria (2022): he ECOWAS Court held hat he gove ment’s suspension of Twitter in he country in 2021 violated he rights o freedom of expression, access o information and he media.
- Amnesty Inte ational Togo v he Togolese Republic (2020): The ECOWAS Court held hat he Togolese gove ment violated he right o freedom of expression by shutting down he inte et during protests in September 2017.
Forums
The selection of a suitable forum with jurisdiction is critical to the eventual success of litigation. Lawyers should consider what is effective and available at the national, regional, and international levels. Typically, regional and international fora are only available where national remedies have been exhausted or where non-binding decisions are being sought, although there are some exceptions.
There are a range of such fora to be considered, including:6
- The United Nations Human Rights Council (UNHRC);
- The African Court on Human and Peoples’ Rights (African Court);
- The African Commission on Human and People’s Rights (ACHPR);
- The Economic Community of West African States Community Court of Justice (ECOWAS Court); and
- The East African Court of Justice (EACJ).
Each of these has its own requirements for founding jurisdiction, which must be carefully considered before launching an application or a complaint.
Use of quasi-judicial fora
Jurisdiction
Jurisdiction refers to the ability or competency of a court or forum to consider and decide a particular matter.
Defining jurisdiction
When determining whether a court has jurisdiction, it is important to look at several sub‑components:8
- Jurisdiction ratione personae: whether the court has jurisdiction over the person of both the complainant and the respondent.
- Jurisdiction ratione materiae: whether the subject matter falls within the scope and mandate of the forum concerned.
- Jurisdiction ratione temporis: whether the violations occurred within a time frame that allows the forum to exercise jurisdiction. Temporal jurisdiction usually refers to whether:
– the violation occurred after the relevant treaty establishing or granting the court authority had come into force for a particular country, and
– the victim brought the claim before the forum within a reasonable period after the violation occurred.
For more information on jurisdiction, admissibility and proceedings at regional fora in Africa, please see Module 6 on Litigating Digital Rights in Africa.
Standing
Standing refers to the ability of a party to bring a matter before the court. It involves a potential litigant demonstrating a sufficient connection between the issue and their interest in the issue. Different courts and fora may have different standing requirements, this should be considered and determined early on in strategic litigation.
- In domestic courts, standing is determined by national law and the subject matter of the suit.
- In regional and international courts, standing is determined by the rules of procedure of the forum.
The table below lists some examples of the standing requirements of different fora:
- act in heir own interest;
- act on behalf of another who cannot bring he suit in heir own name,
- act in he interest of a group or class, or
- act in he public interest o institute a suit claiming hat a right or fundamental freedom has been violated, hreatened, or infringed.
- Member states.
- The Executive Secretary (now he President of he ECOWAS Commission).
- The Council of Ministers.
- Community Institutions.
- Individuals.
- Corporate Bodies.
- Staff of any Community Institution.
- a state claiming hat another state party o he African Charter has violated one or more of he provisions in he African Charter;
- CSOs (which do not need o be registered with he AU or have observer status);
- victims of abuse; or
- interested individuals acting on behalf of victims of abuse. The matter can also be brought for he public good, as class or representative actions, under he actio popularis approach.9
Considerations on standing: When considering whether a party has standing, it is important to consider and assess:
- Whether an individual, community or civil society organisation is best placed to bring the matter to the court or forum?
- Would a combination of different applicants be strategic?
- What are the different interests in the matter?
- What are the different risks of instituting a matter on behalf of certain parties?
- What is in the best interest of the case and the affected parties?
- What are the resources or capacity constraints?10
Value of broader standing requirements
Representation and Expertise
Different courts have their own rules on representation, and in some cases, legal representation may not be mandatory. It should be kept in mind that there are a range of organisations working to provide technical and legal support to legal efforts to protect journalists’ safety and freedom of expression, which can be drawn on if needed, particularly by providing access to experienced senior digital rights lawyers. These include, for example:
- The International Press Institute;
Admissibility
- Admissibility: This refers to the process applied by international human rights fora to ensure that only cases that need international adjudication are brought before them.
- Requirements: Usually, it is required that all local remedies have been exhausted, that consideration be given to whether there are rules relating to prescription, and whether the forum recognises the concept of ongoing harm.
- Exceptions: There are exceptions to the local remedies requirement, such as if local remedies are non-existent, unreasonably prolonged or inaccessible, etc.11 Notably, the ECOWAS Court and the EACJ do not require local remedies to have been exhausted before bringing a matter,12 although the ECOWAS Court does require that the matter has not been determined on the merits by domestic courts.13
Identifying the parties
It is important to consciously reflect on and identify the most appropriate respondent in a matter, especially in cases involving anonymous or pseudonymous users or multi-national technology companies based in foreign jurisdictions. To assist in this, a litigant may seek an order from the court for an intermediary to disclose the identity of the user or to provide clarity on business structures. Law enforcement officers may also send a legal request to an intermediary requesting them to disclose the identity of the user.
Case law examples
Amici curiae
Amicus curiae are friends of the court who, while not a main party to the litigation, instead offer advice to the court to assist in the determination of the matter. An amicus may petition the court to be granted leave to serve as an amicus or may be invited by the court to offer expertise. Thus, serving as an amicus can be an influential way to support strategic and impact litigation and to provide relevant guidance to the court, particularly on international human rights standards and comparative law, as well as by providing technical expertise on digital or technological questions.
Each court or forum will usually have its own rules regarding the admission of amici, but often this involves proving that one’s submission will be unique and additive to the litigation.
- It must have an interest in he proceedings;
- The submissions o be advanced must be relevant o he proceedings; and.
- It must raise new contentions hat may be useful o he court.
- A description of he parties.
- The name and address of he amicus curiae.
- A description of he claim or reference.
- The order in respect of which he amicus curiae is applying for leave o intervene.
- Individuals or organizations interested in acting as amicus curiae must submit a request o he African Court, specifying heir intended contribution o he matter.
- If he request is granted by he African Court, he requester will be notified by he Registrar and invited o submit heir contributions, along with all relevant pleadings.
- It’s important o note hat he decision o grant a request o act as amicus curiae rests solely with he discretion of he African Court.
Administrative considerations
Litigation is costly, with implications for both the victim/affected party, relevant third parties, and lawyers themselves. It is important to ensure that any litigation that is pursued is adequately funded. This includes funding for all future potential stages of appeal and review.
Litigants should also, at an early stage, consider the most effective timing for launching litigation or important milestones in the case and evaluate the staff and capacity needs — both in terms of legal support and otherwise — to ensure the case can be managed effectively to its end.
Choice of remedy
Another key element for consideration, particularly in terms of evaluating the substantive goals of litigation, is the choice of remedy. Depending on a country’s legal framework, online violence can be both a criminal and civil offence, which would influence the practicalities of litigation.
Online Violence under Criminal Law
- In Ethiopia: article 13 of he Computer Crime Proclamation, No. 958 of 2016 criminalises online activities hat intimidate; hreaten, or cause fear, hreat, or psychological strain.17
- In Kenya: section 27 of he Computer Misuse and Cybercrime Act, 2018 provides for he offence of cyber harassment and imprisonment for up o 10 years.
- In Uganda: the Computer Misuse Act, 2011 prescribes offences such as cyber harassment, cyber stalking and offensive communications hat can be used o prosecute online violence.
Online Violence under Criminal Law
- A civil suit for defamation;
- An order for he payment of compensation;
- A declaration of rights;
- A declaration of invalidity of any law hat denies, violates, infringes, or hreatens a right or fundamental freedom; or
- A protection order hat restrains an abuser from certain behaviour.
Several factors influence the appropriate relief to be pursued for an online violence case, including:
- Standard of proof: the standard of proof in criminal cases is beyond reasonable doubt, much higher than that in civil law, in which it is a balance of probabilities.
- Responsibility of the prosecution: Depending on national law, the responsibility to prosecute is usually placed on the state, state agency or independent institution created by national law. This means that criminal prosecution may be out of reach for would-be litigants. However, one can consider whether the country provides mechanisms for private prosecution or can act for a client either by watching brief or advancing a defence in the case of an accused person.
- Defences offered by the respondent/defendant: The available defences to the respondent or defendant will have an important impact on the prospects of success of the litigation. One should, therefore, consider the context and facts of a case to determine which defences might impact the relief being sought.
Defence of Innocent Publication
- the statement is defamatory, and
- the defendant has no defence o he action hat is reasonably likely o succeed.
Gathering evidence
A central challenge facing proponents of safer digital spaces is the collection of admissible evidence. In sub-Saharan Africa, the ICT Policy Centre for Eastern and Southern Africa (CIPESA) reports that the quantification of instances of online GBV remains a challenge “due to several inhibitions, including the culture of silence.”18
Documenting abuse
- Open Global Rights has listed an array of modules, apps and ools hat seek o assist human rights activists with he collection, preservation, and verification of online evidence of human rights violations.
Key considerations around evidence gathering include:20
- Balancing exercise: Lawyers must balance victims’ rights to digital anonymity with the anonymity of perpetrators while ensuring that evidence is admissible and collected legally.
- Domestic laws: Gathering evidence is crucial for litigating online violence, necessitating an understanding of domestic laws on electronic evidence to tender relevant and admissible evidence to the court.
- Experts: Obtaining specialist technical assistance may be necessary to gather and interpret digital information effectively.
- Requirements: Legal and technical requirements must be considered by litigants and courts when assessing the admissibility of evidence, including the digital forensics procedures and tools used, the digital laboratories where analyses occur, and the qualifications of digital forensics analysts and expert witnesses.
Gathering Electronic Evidence
- In Uganda, for example, in addition o he Evidence Act, one must also consider he Computer Misuse Act of 2011, he Electronic Signatures Act of 2011, and he Electronic Transactions Act of 2011. Section 9 of he Computer Misuse Act, 2011 allows an investigating officer o apply o court for a preservation order for he expeditious preservation of data hat has been stored or processed by means of a computer system or any other information and communication echnologies, where here are reasonable grounds o believe hat such data is vulnerable o loss or modification.21
- In Kenya, section 78A of he Evidence Act provides requirements for how he probative value of he evidence must be determined,22 which includes assessing he reliability of he manner in which he electronic and digital evidence was generated, stored or communicated and he manner in which he originator of he electronic and digital evidence was identified.
Safety and security considerations
Potential litigants also need to consider the virtual and physical risks associated with litigating issues of online GBV, including the risk of attracting negative attention from perpetrators and their supporters. Based on this, the protection of victims/survivors of online GBV, their family members, witnesses, and any other relevant third parties, such as colleagues, should be carefully dispensed with before a matter is instituted.23
This may require lawyers to deploy solutions to address safety and security concerns, deal with issues around anonymity and confidentiality, and take steps to prevent the potential re-traumatisation of the victim/survivor and other third parties.
Example: seeking accountability for NCII
- Check whether your country has a specialised legal framework on NCII or cyber harassment more broadly;
- Check whether your country has harassment or stalking laws which could be applied o he situation, such as hose regarding protection orders or cybercrime laws;
- Determine whether domestic violence or family violence regulations could be applied o your situation;
- Check your country’s laws on requiring electronic service providers o identify individuals responsible for online crimes, which would allow for suing he perpetrator for damages.
Advocacy Strategies
Developing advocacy strategies
The potential impact of litigation can often be augmented and supported by accompanying advocacy campaigns that seek to bolster public support and awareness around the relevant issues. This may be particularly true in matters of online violence which involve technical elements and with which stakeholders, including magistrates or judges, may be unfamiliar.
Advocacy design and impact
- Researching particular issues o shed greater light on he case;
- Aiming o educate specific or general audiences;
- Seeking o build public support for he case or an issue more broadly;
- Attempting o influence public perceptions of an issue;
- Instigating public protests or other forms of support;
- Advocating for policy or law reform; or
- Aiming o better understand he public’s position on a opic.
Keep in mind that advocacy campaigns typically require a different skillset from litigation and require building a compelling narrative or story that will resonate with large numbers of people.
Further, lawyers can refer to, and tailor, the guidance provided by the UN Women regarding the development of an advocacy strategy to tackle violence against women.25 This strategy can be tailored with support from country-based individuals and groups to ensure that intersectionality guides the strategy development.
Literacy for the courts and media
Numerous commentators note that online GBV is still a relatively nascent area of consideration in the SSA region. There is a need for efforts to engage judicial officers, as well as the media, to sensitise them on the impact of digital security attacks on journalists’ human rights, media freedom, and democratic values.
Litigating online violence: South Africa
- Digital landscape: The SAHRC, in bringing forward he case, had o make use of a racing agent o link he Twitter account o Matumba, as well as request information from Twitter hrough its legal representatives o link he account o Matumba’s cell phone number. An amicussubmission by media organisation Media Monitoring Africa provided extensive submissions on he context presented by social media platforms, including how hat context affects he spread of he information, who constitutes he hypothetical reasonable reader on Twitter, and how o craft effective remedies in such a situation where harassment has been perpetrated online.27
- Terminology: Due o he contemporary nature of he mode of harassment, it was necessary for he parties o assist with court with definitions, guidance, and examples of erms associated with he online world such as “post”, “like”, “retweet”, “bitly”, and “account owner”.
Legislative/policy reform
In addition to instituting litigation, efforts to seek legislative and policy reform can be simultaneously pursued as a measure to ensure that legal provisions are put in place to provide meaningful protection to women journalists online.28
The Organisation for Security and Co-operation in Europe (OSCE) provides guidance on how to ensure that legislative frameworks, most notably pre-existing harassment laws, can appropriately respond to the new challenges of online violence against women journalists. It recommends that these laws should be amended to explicitly apply to online harassment, so as not to create room for doubt as to the extension of their application, and that they should:
- Include indirect communication, such as the creation of fake social media accounts or photoshopped images of victims shared with third parties;
- Target online harassment that is sexual and/or sexist;
- Include language that addresses harassment campaigns perpetrated by multiple individuals; and
- Adopt tiered responses to punish online harassment of varying levels.29
Engaging with lawmakers to enhance protection
- The expanded definition of harassment now encompasses various forms of online harassment, including repeated electronic communication, unauthorized access o electronic devices or accounts, monitoring or racking of individuals without consent, sending abusive or degrading messages, sharing private information or abusive content with others, and unwelcome sexual communications.
- The definition of sexual harassment includes sending unwanted electronic communications of a sexual nature and protects against “outing” individuals based on heir sexual orientation, gender, or gender expression.
- The revised definition of electronic communications in he context of harassment now encompasses digital audio, ext, video, and images, as well as simulated and manipulated information. This expansion enables protection against he dissemination of non-consensual manipulated and deep fake images—videos or images altered o appear authentic.
Digital Security
Personal protective techniques31
While no journalist should be responsible for preventing online violence or harassment against them, taking steps to manage one’s digital profiles and making it more difficult for perpetrators to act against them can be an effective way to protect against such harms before they occur
- Be conscious and cautious regarding the information you share with others
- Be careful not to give out your phone number, personal email address, identity numbers or location in both online and offline fora which could spread beyond your control and reach unintended audiences.
- Be careful about not tagging your location in social media posts, at least until you have left it, and closely monitoring followers on personal accounts on which you may share more personal information.
- Speaking to friends and family about not sharing images, videos, or other content online that provides sensitive information such as your location or your children’s school.
- Consider the legal terms and conditions of the content you share: Some social media and online platforms have conditions that enable the free use of any content posted online, enabling would-be attackers to reproduce or modify photos or other content you have shared online. Check the terms and conditions of the platforms you use and whether the settings on your account can be changed to prevent this kind of usage.
- Secure all your accounts: Online violence can sometimes take place through hacking or unauthorised access to your own accounts:
- Protecting against these risks requires you to always use secure passwords which are regularly changed and saved in a secure password manager, use two-factor authentication (2FA) whenever possible, and be careful about sharing passwords with others.
- Journalists should also educate themselves on phishing and malware to be able to identify such attempts and be careful to keep all software up to date, including browsers. Consider exploring encrypted email and document-sharing services as well as using encrypted messaging platforms.
- One can also consider using Virtual Private Networks (VPNs) to mask your physical location and encrypt your connection to the internet, particularly when using public WiFi networks or networks shared with other people.
Know what is out there and how to remove it
- The Inte ational Women’s Media Foundation course, Keep it Private, which provides further guidance on how o protect one’s data online.
- The Committee o Protect Jou alists’ (CPJ) detailed guide on how o remove data from he inte et.
Account security tips
Dealing with online violence
- It is important to emphasise the need to document the messages and communications you are receiving, both to share with others as well as in case of potential future legal action.
- Consider reporting the abuse to your employer, family, friends, and others who can provide support. Although this might be hard, it can be helpful to have others to lean on as well as to get advice from colleagues or others who may have experienced something similar.
- Consider blocking the perpetrator, logging off temporarily, or even closing your account in order to protect yourself from further violence.
- Do not hesitate to seek psycho-social support however it may be available. It is important to emphasise that although perpetrated online, such violence has very real and damaging real-world effects for its victims/survivors, and it is normal to experience these effects. Check whether your employer provides access to psycho-social support and consider reaching out to a professional who can assist.
Reporting to online platforms
Another critical step in managing online violence which deserves further attention is reporting to the online platforms on which the content is shared. All platforms have standard terms of use, and if you can show that someone has violated those terms, you can have the content removed and/or the person’s account suspended or deleted, which prevents additional harm in future.
Support tips
- See PEN America’s guide o reporting o platforms and Deconstruct: Online Gender Based Violence guidance on reporting o intermediaries for more detailed information about he requirements and steps for reporting content on each platform.
The difficulties of reporting o platforms
Unfortunately, many women jou alists affected by his online violence report experiencing wholly ineffective responses from he digital platforms. Ferial Haffajee, an editor in South Africa, reported o UNESCO hat she was “stonewalled” by Twitter (now X) when attempting o use he automated reporting system o report her abuse.32 Criticism has also gone further han individual cases o note hat responses by he platforms are uneven, with proactive content moderation being notably poorer in countries outside of heir major markets and in less prioritised languages due o a lack of contextual understanding and investment in content moderation capacity in heir languages.33For further guidance, as well as a list of other digital security resources, see the Practical Guide for Women Journalists on How to Respond to Online Harassment published by UNESCO, TrustLaw, the Thomson Reuters Foundation and the International Women’s Media Foundation.
Conclusion
Digital attacks on journalists can occur in a wide range of formats, all with extensive impacts on a wide range of human rights that are protected and promoted by international human rights law. This module provides lawyers with a practical but introductory guide to considering strategies to counter and seek accountability for online violence against journalists, including through litigation, advocacy, and pre-emptive digital security tactics. Litigation can be a highly impactful way of security progressive jurisprudence and real remedies but is also most likely to be effective and successful when coupled with non-legal strategies such as public advocacy campaigns and efforts to improve the responsiveness of online platforms to such violence.
References
-
UNESCO ‘The Chilling: Global trends in online violence against women journalists’ (2021) (accessible at https://en.unesco.org/sites/default/files/the-chilling.pdf”). ↩
-
For conciseness, we refer hereafter to “women” to include all those who identify as women and those with marginalised or at-risk identities including members of the LGBTQI community, except where specific instruments or documents referenced refer explicitly to “women” or some other grouping. ↩
-
The terms “victim” and “survivor” may be used interchangeably and refer to those who have experienced GBV and/or OGBV. These terms have different connotations and implications and do not intend to, by any means, impose a definition or response on any persons who have experienced some of the severe violations to their dignity and safety. ↩
-
Child Rights International Network, ‘What is strategic litigation?’ (accessible at https://archive.crin.org/en/guides/legal/guide-strategic-litigation/what-strategic-litigation.html”). ↩
-
Digital Freedom Fund, ‘Strategic Litigation Toolkit’ (2022) (accessible at https://digitalfreedomfund.org/support/strategic-litigation-toolkit/”). ↩
-
See International Press Institute, ‘A resource toolkit of laws, commitments, and mechanisms protecting press freedom in Africa’ (2023) (accessible at https://ipi.media/wp-content/uploads/2023/08/Africa-resource-toolkit-2023.pdf”) for high-level guidance on international, regional, and sub-regional treaties, protocols, mechanisms, and commitments that comprise the frameworks for media freedom, the right to access information, and the safety of journalists in Africa. See further the Pan African Lawyers Union, ‘Manual for litigating when accessing the ECOWAS Court of Justice’ (2022) (accessible at https://www.lawyersofafrica.org/wp-content/uploads/20231203_Manual-For-Litigants-Before-The-Ecowas-Court-Of-Justice.pdf”) for technical guidance on litigating before the ECOWAS Court of Justice. ↩
-
United Nations, ‘Opinions adopted by the Working Group on Arbitrary Detention,’ (accessible at https://www.ohchr.org/en/special-procedures/wg-arbitrary-detention/opinions-adopted-working-group-arbitrary-detention”). ↩
-
Media Defence, ‘Digital Rights Litigation Guide, Litigating Digital Rights and Freedom of Expression in East, West and Southern Africa’ (2020) (accessible at https://www.mediadefence.org/wp-content/uploads/2020/06/MLDI-Digital-Rights-Litigation-Guide.pdf”). ↩
-
For more on standing see Pedersen, ‘Standing and the African Commission on Human and Peoples’ Rights’ African Human Rights Law Journal (2006) (accessible at https://www.ahrlj.up.ac.za/pedersen-m-p”) and Mayer, ‘NGO Standing and Influence in Regional Human Rights Courts and Commissions’ Notre Dame Law School (2011) (accessible at https://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=1053&context=law_faculty_scholarship”). ↩
-
Media Defence, ‘Module 6: Litigating Digital Rights Cases in Africa,’ (2020) (accessible at https://www.mediadefence.org/ereader/wp-content/uploads/sites/2/2020/06/Module-6-Litigating-digital-rights-in-Africa.pdf”). ↩
-
Media Defence, ‘Digital Rights Litigation Guide, Litigating Digital Rights and Freedom of Expression in East, West and Southern Africa’, June 2020 (accessible at https://www.mediadefence.org/wp-content/uploads/2020/06/MLDI-Digital-Rights-Litigation-Guide.pdf”). ↩
-
Id. ↩
-
Media Defence, ‘Digital Rights Litigation Guide, Litigating Digital Rights and Freedom of Expression in East, West and Southern Africa’ (2020) (accessible at https://www.mediadefence.org/wp-content/uploads/2020/06/MLDI-Digital-Rights-Litigation-Guide.pdf”). ↩
-
Id. ↩
-
Tania Broughton, ‘Joburg teen sues Facebook for name of Insta stalker who threatened rape & murder’ (2020) (accessible at https://www.timeslive.co.za/news/south-africa/2020-07-27-joburg-teen-sues-facebook-for-name-of-insta-stalker-who-threatened-rape-murder/”). ↩
-
See for example Hoffman v South African Airways [2000] ZACC 17 (accessible at https://www.saflii.org/za/cases/ZACC/2000/17.html”) and In Re: Certain Amicus Curiae Applications; Minister of Health v Treatment Action Campaign [2002] ZACC 13 (accessible at https://www.saflii.org/za/cases/ZACC/2002/13.html”). ↩
-
Computer Crime Proclamation 958 of 2016 of the Federal Democratic Republic of Ethiopia (accessible at https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/103967/126636/F1922468791/ETH103967.pdf”). ↩
-
CIPESA, ‘In Search of Safe Spaces Online: A Research Summary’ (2020) (accessible at https://cipesa.org/?wpfb_dl=404″). ↩
-
PEN America, ‘Online Harassment Field Manual: Documenting Online Harassment’ (accessible at https://onlineharassmentfieldmanual.pen.org/documenting-online-harassment/”). ↩
-
Media Defence, ‘Module 6, Litigating Digital Rights in Africa’, (2020) (accessible at https://www.mediadefence.org/ereader/wp-content/uploads/sites/2/2020/06/Module-6-Litigating-digital-rights-in-Africa.pdf”). ↩
-
KTA Advocates, ‘Electronic Evidence, Legal Alert’, (2020) (accessible at https://www.ktaadvocates.com/wp-content/uploads/2020/10/ELECTRONIC-EVIDENCE-LEGAL-ALERT-KTA.pdf).”). ↩
-
Rutenberg, Kiptiness & Sugow, ‘Admission of Electronic Evidence: Contradictions in the Kenyan evidence Act’, 2021 (accessible at https://cipit.strathmore.edu/wp-content/uploads/2021/05/Admission-of-Electronic-Evidence-Contradictions-in-the-Kenyan-Evidence-Act.pdf”). ↩
-
European Human Rights Advocacy Centre (EHRAC) & Middlesex University London, ‘EHRAC Guide to Litigating Cases of Online Violence against Women, Domestic & Sexual Violence’, (2020) (accessible at https://ehrac.org.uk/wp-content/uploads/2021/09/EHRAC-Guide-to-Litigating-Cases-of-Violence-Against-Women-ENG.pdf”). ↩
-
Digital Freedom Fund, 51, accessible at https://digitalfreedomfund.org/support/strategic-litigation-toolkit/. ↩
-
UN Women, ‘Developing an Advocacy Strategy’ (2010) (accessible at https://www.endvawnow.org/en/articles/104-developing-an-advocacy-strategy.html).”). ↩
-
SAHRC, ‘Trial of EFF councillor who allegedly masqueraded as a white woman on Twitter gets underway,’ (2022) (accessible at https://www.sahrc.org.za/index.php/sahrc-media/news/item/2946-trial-of-eff-councilor-who-allegedly-masqueraded-as-a-white-woman-on-twitter-gets-underway”). ↩
-
Power & Associates, ‘South African Human Rights Commission v Matumba: Written Submissions,’ (2021) (accessible at https://powerlaw.africa/2022/03/16/south-african-human-rights-commission-v-matumba/”). ↩
-
Mariana Valante, ‘Do we need laws to address non-consensual circulation of intimate images: the case of Brazil’, 17 June 2018 (accessible at https://genderit.org/articles/do-we-need-new-laws-address-non-consensual-circulation-intimate-images-case-brazil/”). ↩
-
Dart Centre for Journalism & Trauma, ‘Journalism and Online Harassment’ (2020) (accessible at https://dartcenter.org/resources/journalists-and-online-harassment”). ↩
-
See T Power, New law protects women against online abuse’ (2022) (accessible at https://groundup.org.za/article/new-laws-extend-protections-against-gender-based-violence-online-spaces/”). ↩
-
Much of the guidance provided here is courtesy of the Practical Guide for Women Journalists on How to Respond to Online Harassment, published by UNESCO, TrustLaw, the Thomson Reuters Foundation and the International Women’s Media Foundation (accessible at https://trustdnsmanaging.com/wp-content/uploads/2023/10/TRFPracticalGuideJUL2021V15.pdf”). ↩
-
UNESCO, accessible at https://en.unesco.org/sites/default/files/the-chilling.pdf. ↩
-
Id. ↩