Editing FAQ

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 25: Line 25:
 
The scenarios reflect the pragmatic approach of the Toolkit. The analysis in individual scenarios is based on actual cyber incidents with some relevance for international law. By gathering the relevant cyber incidents and the applicable law in a single place, the Toolkit offers an organized vision of the main legal issues at stake, while encouraging the development of international cyber law in the future.
 
The scenarios reflect the pragmatic approach of the Toolkit. The analysis in individual scenarios is based on actual cyber incidents with some relevance for international law. By gathering the relevant cyber incidents and the applicable law in a single place, the Toolkit offers an organized vision of the main legal issues at stake, while encouraging the development of international cyber law in the future.
 
=== Which scenarios does the Toolkit consist of? ===
 
=== Which scenarios does the Toolkit consist of? ===
Please refer to the [[Main Page]], which contains an overview of all scenarios. You may also refer to the [[List of articles]], which places the scenarios in the overall context of all substantive articles in the Toolkit. Also, when reading about a specific real-world example, you will find cross-references to the scenarios, which analyse legal issues that arise from the example in question.
+
Please refer to the [[Main Page]], which contains an overview of all scenarios. You may also refer to the [[List of articles]], which places the scenarios in the overall context of all substantive articles in the Toolkit. Also, when reading about a specific real-world example, you will find cross-references to the scenarios, which analyse legal issues that arise from the example in question.
 
The Toolkit is continuously updated and new scenarios and other content are being added on an ongoing basis.
 
 
 
=== What is the structure of individual scenarios? ===
 
=== What is the structure of individual scenarios? ===
 
In brief, every scenario consists of the following sections:
 
In brief, every scenario consists of the following sections:
Line 40: Line 37:
 
=== Does the Toolkit reflect the approach of a certain country or legal school to international law? ===
 
=== Does the Toolkit reflect the approach of a certain country or legal school to international law? ===
 
No. The starting point of the Toolkit is that, as a matter of principle, international law does apply to the conduct in cyberspace. This reflects the currently existing broad consensus in the international community as well as in the scholarly writing. Beyond this foundational assumption, the analysis in the Toolkit only reflects the views of the authors of the relevant content and it does not aspire to represent any particular country or school of thought.
 
No. The starting point of the Toolkit is that, as a matter of principle, international law does apply to the conduct in cyberspace. This reflects the currently existing broad consensus in the international community as well as in the scholarly writing. Beyond this foundational assumption, the analysis in the Toolkit only reflects the views of the authors of the relevant content and it does not aspire to represent any particular country or school of thought.
 
=== Where can I find further resources about the application of international law in cyberspace? ===
 
Although non-exhaustive, each scenario provides a list of relevant bibliography and further readings. In addition, a consolidated list of sources used in the creation of the Toolkit can be found in the general [[Bibliography]] section.
 
   
 
== Usage FAQ ==
 
== Usage FAQ ==
Line 51: Line 45:
   
 
=== How reliable is the Toolkit? ===
 
=== How reliable is the Toolkit? ===
The Toolkit is based on reliable and publicly available sources. A continuously updated list of sources can be found in the [[Bibliography]] of the Toolkit.
+
The Toolkit is based on reliable and publicly available sources. The analysis aims to provide a clear guidance, but when the law is unsettled, this is noted and the existing reasonable views are explained. All scenarios have been [[Peer reviewers|peer-reviewed]]. The full list of sources can be found in the [[Bibliography]] of the Toolkit.
 
The analysis aims to provide a clear guidance, but when the law is unsettled, this is noted and the existing reasonable views are explained. All scenarios have been [[Peer reviewers|peer-reviewed]]. The real-life examples in the Toolkit are based on a variety of public and primary sources aiming at including the different available views on each reported incident.
 
 
 
=== I am dealing with an actual cyber incident, but none of the scenarios matches the factual situation. What can I do? ===
 
=== I am dealing with an actual cyber incident, but none of the scenarios matches the factual situation. What can I do? ===
 
You may want to browse the existing content by reference to the individual [[Keywords|keywords]], by reviewing the overall [[List of articles|article structure]], or through the full-text search function (available in the top-right corner of every page). In addition, it may well be that your cyber incident shares some similarity with one of the [[List_of_articles#Real-world_examples|real-world examples]] detailed in this Toolkit. If that is so, you will find links to specific scenarios where aspects of the example in question are analysed from the legal perspective. Finally, you are welcome to contact us to suggest new content for the Toolkit.
 
You may want to browse the existing content by reference to the individual [[Keywords|keywords]], by reviewing the overall [[List of articles|article structure]], or through the full-text search function (available in the top-right corner of every page). In addition, it may well be that your cyber incident shares some similarity with one of the [[List_of_articles#Real-world_examples|real-world examples]] detailed in this Toolkit. If that is so, you will find links to specific scenarios where aspects of the example in question are analysed from the legal perspective. Finally, you are welcome to contact us to suggest new content for the Toolkit.
Line 82: Line 73:
 
=== How do I add a new article? ===
 
=== How do I add a new article? ===
 
For technical advice, please refer to the MediaWiki help page "[https://www.mediawiki.org/wiki/Help:Starting_a_new_page Starting a new page]". Please note that any new pages will be reviewed by the Toolkit editors and may not appear online for a while. If you want to propose a new content page (such as a new scenario or an example page), it is probably a better idea to [[#Contact|contact us]] before creating the page without consultation.
 
For technical advice, please refer to the MediaWiki help page "[https://www.mediawiki.org/wiki/Help:Starting_a_new_page Starting a new page]". Please note that any new pages will be reviewed by the Toolkit editors and may not appear online for a while. If you want to propose a new content page (such as a new scenario or an example page), it is probably a better idea to [[#Contact|contact us]] before creating the page without consultation.
 
Every year, we issue a call for submission of new scenario proposals to be considered for the next annual update of the Toolkit. You can see an example from 2021/22 at [https://ccdcoe.org/uploads/2021/09/Cyber-Law-Toolkit-call-for-submissions-2021-22.docx.pdf this link].
 
 
 
=== I have discovered a mistake. How do I report it? And can I fix it myself? ===
 
=== I have discovered a mistake. How do I report it? And can I fix it myself? ===
 
You are welcome to [[#Contact|contact us]] to report the mistake. However, if you can fix the mistake yourself by proposing an alternative or new text to the relevant page, please feel free to [[#Editing|edit]] the page in question accordingly. You may also note the problem in the Discussion page associated with the page you are reading (please see below).
 
You are welcome to [[#Contact|contact us]] to report the mistake. However, if you can fix the mistake yourself by proposing an alternative or new text to the relevant page, please feel free to [[#Editing|edit]] the page in question accordingly. You may also note the problem in the Discussion page associated with the page you are reading (please see below).
Line 91: Line 79:
   
 
== Article FAQ ==
 
== Article FAQ ==
=== Why did you choose the included examples? ===
+
=== Why did you choose this example? I don’t think it fits the facts at all! ===
Although it is beyond the scope of the Toolkit to provide a detailed analysis of the links between each individual example and the potentially relevant scenarios, you may find more details about the examples by opening their relevant content page (e.g. [[Stuxnet (2010)]]). Each page summarizes in a table format the real-world incident(s) and provides links to all scenarios in which these are referred to.
+
Although it is beyond the scope of the Toolkit to provide a detailed analysis of the links between each individual example and the potentially relevant scenarios, you may find more details about the examples by opening their relevant content page (e.g. [[Stuxnet (2010)]]). This page then summarizes in a table format the real-world incident(s) and provides links to all scenarios in which these are referred to.
=== Why did you structure the analysis of the scenarios in this way? ===
+
=== Why did you structure the analysis in this way? I don’t think attribution/sovereignty/space law is an issue at all in this scenario. ===
 
Please refer to the [[Note on the structure of articles]] for a detailed explanation of the structure of the analytical section of the scenarios. The specific legal issues analysed in the individual scenarios were selected in a collaborative process with a group of external experts and the analysis was then reviewed by several independent [[Peer reviewers|peer reviewers]].
 
Please refer to the [[Note on the structure of articles]] for a detailed explanation of the structure of the analytical section of the scenarios. The specific legal issues analysed in the individual scenarios were selected in a collaborative process with a group of external experts and the analysis was then reviewed by several independent [[Peer reviewers|peer reviewers]].
 
=== What is the purpose of the checklist at the end of each scenario? ===
 
=== What is the purpose of the checklist at the end of each scenario? ===
Please note that all contributions to International cyber law: interactive toolkit are considered to be released under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) (see International cyber law: interactive toolkit:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!
Cancel Editing help (opens in new window)