This is a list of frequently asked questions about using and contributing to the Cyber Law Toolkit.
- 1 General FAQ
- 2 Content FAQ
- 2.1 Which areas of law are covered by the Toolkit?
- 2.2 Why is the Toolkit organized around specific scenarios?
- 2.3 Which scenarios does the Toolkit consist of?
- 2.4 What is the structure of individual scenarios?
- 2.5 How does the analysis in the Toolkit relate to real life?
- 2.6 Does the Toolkit represent the official views of the partner institutions?
- 2.7 Does the Toolkit reflect the approach of a certain country or legal school to international law?
- 3 Usage FAQ
- 4 Project FAQ
- 5 Technical FAQ
- 6 Article FAQ
- 6.1 Why did you choose this example? I don’t think it fits the facts at all!
- 6.2 Why did you structure the analysis in this way? I don’t think attribution/sovereignty/space law is an issue at all in this scenario.
- 6.3 What is the purpose of the checklist at the end of each scenario?
- 6.4 I don’t understand the technical terms or abbreviations used in the texts. What can I do?
- 7 Other
General FAQ[edit | edit source]
What is the Cyber Law Toolkit?[edit | edit source]
The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work with matters at the intersection of international law and cyber operations. At its heart, the Toolkit consists of several hypothetical scenarios, each of which contains a description of cyber incidents inspired by real-world examples accompanied by detailed legal analysis.
Why did you create the Toolkit?[edit | edit source]
The Toolkit addresses a gap between the academia and practice as far as international cyber law is concerned. Although there is a growing body of research in this area of international law, its outputs are often not easily adaptable to the needs of legal practitioners dealing with cyber incidents on a daily basis. The Toolkit attempts to bridge this gap by providing accessible yet precise practical solutions to scenarios based on real-life examples of cyber operations with international law relevance.
Who is the target audience?[edit | edit source]
The Toolkit is primarily addressed to legal practitioners with a working knowledge of international law. However, the language used is comprehensive and explanatory and should be generally accessible to non-lawyers, as well. Each concept that underpins the analysis is explained in detail to provide a complete understanding of the relevant scenario. Whilst the target audience are those with a degree of familiarity with international law and specifically cyber law, it does not preclude those with a general interest in the area, but no relevant expertise, from reading, using and enjoying the content of the Toolkit.
Is the Toolkit applicable to my country?[edit | edit source]
The analytical focus of the Toolkit is on international law applicable to cyber operations. By contrast, it does not specifically address the domestic law of any particular country, nor does it adopt the view of any country or group of countries. As such, it is applicable to all countries in the world – including yours.
Is the Toolkit continuously updated?[edit | edit source]
Yes, it is. You can track the most recent changes to the Toolkit through the Recent changes page.
What is the future of the Toolkit?[edit | edit source]
We aspire to maintain and develop the Toolkit further on an ongoing basis. As technology develops and as international cyber law further grows in prominence, new scenarios and analysis will be added to ensure the Toolkit remains state-of-the-art in terms of both facts and law. If you wish to contribute to the future development of the Toolkit, please feel free to get in touch.
Content FAQ[edit | edit source]
Which areas of law are covered by the Toolkit?[edit | edit source]
The legal areas examined range from general international law to international humanitarian law. Please refer to the full List of articles to find out which specific topics of international law are covered.
Why is the Toolkit organized around specific scenarios?[edit | edit source]
The scenarios reflect the pragmatic approach of the Toolkit. The analysis in individual scenarios is based on actual cyber incidents with some relevance for international law. By gathering the relevant cyber incidents and the applicable law in a single place, the Toolkit offers an organized vision of the main legal issues at stake, while encouraging the development of international cyber law in the future.
Which scenarios does the Toolkit consist of?[edit | edit source]
Please refer to the Main Page, which contains an overview of all scenarios. You may also refer to the List of articles, which places the scenarios in the overall context of all substantive articles in the Toolkit.
What is the structure of individual scenarios?[edit | edit source]
In brief, every scenario consists of the following sections:
- 0 Executive summary (presented without a section header)
- 1 Scenario (keywords, factual description, and real-world examples)
- 2 Legal analysis (the central part of the scenario; see Note on the structure of analysis for its internal structure)
- 3 Checklist (questions for legal advisors facing similar situations in practice)
- 4 Appendixes (further information, such as other relevant articles in the toolkit; endnotes; and bibliography)
How does the analysis in the Toolkit relate to real life?[edit | edit source]
Virtually all scenarios are accompanied by a list of real-world examples. The scenarios are hypothetical, but there are many similarities between the hypothetical facts and the real incidents. The Toolkit aims to make the legal analysis in the individual scenarios easily adaptable to existing and future real-life incidents.
Does the Toolkit represent the official views of the partner institutions?[edit | edit source]
No. The Toolkit does not represent the views of any of the partner institutions. The analysis in the Toolkit only reflects the views of the authors of the relevant content and it does not aspire to represent the views of any of the organizations that the authors are, or have been, affiliated with.
Does the Toolkit reflect the approach of a certain country or legal school to international law?[edit | edit source]
No. The starting point of the Toolkit is that, as a matter of principle, international law does apply to the conduct in cyberspace. This reflects the currently existing broad consensus in the international community as well as in the scholarly writing. Beyond this foundational assumption, the analysis in the Toolkit only reflects the views of the authors of the relevant content and it does not aspire to represent any particular country or school of thought.
Usage FAQ[edit | edit source]
How do I use the Toolkit?[edit | edit source]
The Toolkit may be explored and utilized in a number of different ways. First of all, you may want to browse the hypothetical scenarios (available from the Main Page or at this link), each of which contains a description of cyber incidents inspired by real-world examples, accompanied by detailed legal analysis. The aim of the analysis is to examine the applicability of international law to the scenarios and the issues they raise. In addition, you may explore the Toolkit by looking for keywords you’re interested in; by viewing its overall article structure; or by reading about individual real-world examples that serve as the basis of the Toolkit scenarios. Finally, you may want to use the search function in the top right corner of this page to look for specific words across all of the Toolkit content.
Why is this an online resource, and not simply a book?[edit | edit source]
The online format allows us to continuously update the Toolkit as new incidents arise or new developments in the applicable law emerge. The wiki format allows collaborative work on the Toolkit as well as highlighting interconnections between the various parts of the analysis.
How reliable is the Toolkit?[edit | edit source]
The Toolkit is based on reliable and publicly available sources. The analysis aims to provide a clear guidance, but when the law is unsettled, this is noted and the existing reasonable views are explained. All scenarios have been peer-reviewed. The full list of sources can be found in the Bibliography of the Toolkit.
I am dealing with an actual cyber incident, but none of the scenarios matches the factual situation. What can I do?[edit | edit source]
You may want to browse the existing content by reference to the individual keywords, by reviewing the overall article structure, or through the full-text search function (available in the top-right corner of every page). In addition, it may well be that your cyber incident shares some similarity with one of the real-world examples detailed in this Toolkit. If that is so, you will find links to specific scenarios where aspects of the example in question are analysed from the legal perspective. Finally, you are welcome to contact us to suggest new content for the Toolkit.
How do I cite Toolkit articles?[edit | edit source]
We suggest the following format for citations:
‘Scenario 01: Election Interference’ in Kubo Mačák, Tomáš Minárik and Taťána Jančárková (eds), Cyber Law Toolkit (2019-) <cyberlaw.ccdcoe.org> (revision as of 28 March 2019, at 09:32)
If you require a permanent URL for any specific page in the Toolkit, you may generate one by clicking on the “Cite this page” link on the banner visible on the left-hand side of each content page.
Project FAQ[edit | edit source]
What is the aim of the project?[edit | edit source]
The overarching aim of this project is to promote knowledge and develop expertise among legal advisors and decision-makers confronted by the need to respond efficiently to the challenges posed by modern technology and cyber operations from the perspective of international law. The project strives to achieve this aim by developing, testing, publishing and disseminating an interactive toolkit for the primary benefit of non-academic end users, thus assisting legal advisors and decision-makers in understanding and assessing the law applicable to cyber operations. In short, the aim of the project is to create and maintain the resource that is in front of you right now – the Cyber Law Toolkit.
How is the project financed?[edit | edit source]
The pilot year of the project (2018/19) was financed from a grant from the UK’s Economic and Social Research Council (Impact Acceleration Account). All partner institutions have also provided in-kind contributions to the project.
Can I use the Toolkit in academia for educational purposes?[edit | edit source]
Yes. The Toolkit is made available on an open access basis. You are welcome to use it for educational purposes, as long as appropriate credit is given to the authors of the relevant articles and the project as a whole. For a recommended citation format, please see above under “How do I cite Toolkit articles?”.
I am a journalist. How can I get in touch with the project team?[edit | edit source]
Thank you for your interest in the Toolkit. Please feel free to contact us at the project e-mail (email@example.com) and include the words "Media inquiry" in the subject line of your message.
Technical FAQ[edit | edit source]
Can I edit the articles? How do I do that?[edit | edit source]
Yes you can. The Toolkit is a Wiki, which means that anyone can edit the articles it consists of. Please click on the "Edit" tab at the top of the page you would like to edit. This will bring you to a page with a text box containing the editable text of that page. After you finish editing the page, please include a brief summary of your changes. You are welcome to identify yourself if you wish to do so. All changes go through a moderation process, so please note that they will not appear online immediately. For further information about editing Wiki pages, please refer to the MediaWiki help center.
How do I add a new article?[edit | edit source]
For technical advice, please refer to the MediaWiki help page "Starting a new page". Please note that any new pages will be reviewed by the Toolkit editors and may not appear online for a while. If you want to propose a new content page (such as a new scenario or an example page), it is probably a better idea to contact us before creating the page without consultation.
I have discovered a mistake. How do I report it? And can I fix it myself?[edit | edit source]
You are welcome to contact us to report the mistake. However, if you can fix the mistake yourself by proposing an alternative or new text to the relevant page, please feel free to edit the page in question accordingly. You may also note the problem in the Discussion page associated with the page you are reading (please see below).
What is the “Discussion” feature about and how can I use it?[edit | edit source]
Every content page in the Toolkit has an associated Discussion page, which can be used for discussion and communicating with the Toolkit team and with other users. These pages are accessed by clicking the "Discussion" tab at the top of the relevant page. For technical advice on the functioning of these pages, please refer to the MediaWiki help page "Talk pages".
Article FAQ[edit | edit source]
Why did you choose this example? I don’t think it fits the facts at all![edit | edit source]
Although it is beyond the scope of the Toolkit to provide a detailed analysis of the links between each individual example and the potentially relevant scenarios, you may find more details about the examples by opening their relevant content page (e.g. Stuxnet (2010)). This page then summarizes in a table format the real-world incident(s) and provides links to all scenarios in which these are referred to.
Why did you structure the analysis in this way? I don’t think attribution/sovereignty/space law is an issue at all in this scenario.[edit | edit source]
Please refer to the Note on the structure of articles for a detailed explanation of the structure of the analytical section of the scenarios. The specific legal issues analysed in the individual scenarios were selected in a collaborative process with a group of external experts and the analysis was then reviewed by several independent peer reviewers.
What is the purpose of the checklist at the end of each scenario?[edit | edit source]
The checklist contains questions for legal advisors facing situations similar to those described in the scenario. It provides the user with an overview of the salient issues arising in the scenario and is a quick way of verifying that all such matters have been addressed.
I don’t understand the technical terms or abbreviations used in the texts. What can I do?[edit | edit source]
Please refer to the Glossary.
Other[edit | edit source]
I have a question that is not addressed here. How can I contact you?[edit | edit source]
Please feel free to e-mail us at the project e-mail address (firstname.lastname@example.org).