The Protection of Asylum Seekers as Especially Vulnerable Persons in the Case-Law of the European Court of Human Rights.
Keywords:
Asylum Seekers, Refugee, Human Rights, special vulnerability, European Court of Human Rights, Removal, Detention, Effective Remedy.Abstract
Asylum Seekers constitute a group of persons with a special vulnerability because they are aliens, they do not benefit from the protection of the State of their nationality and they are in search of a protection of substitution. The European Court of Human Rights has acknowledged this special vulnerability, either individually or in conjunction with other circumstances, in order to modulate its jurisprudence concerning some rights enshrined in the European Convention of Human Rights (ECHR). The asylum seeker’s quality of victims has been essential to the interpretation of article 3 of the ECHR that deems forbidden certain measures of removal from the territory and unacceptable the material conditions under which in some cases detention in international zones of airports takes place. This quality has been decisive as well to the interpretation of article 5 of the ECHR that allows for the consideration of certain measures that restrict freedom of persons before they are admitted into the territory of one country as detention measures. Finally, the asylum’s seekers quality has been equally important to the interpretation of article 13 in that concerning the requirement for legal systems to provide a remedy with automatic suspensive effect of the removal from the territory of the asylum seekers in cases where there is a risk of violation of rights enshrined in the ECHR in the destination country.Downloads
Download data is not yet available.
Downloads
Published
2011-03-04
How to Cite
SÍLVIA MORGADES GIL. (2011). The Protection of Asylum Seekers as Especially Vulnerable Persons in the Case-Law of the European Court of Human Rights. Revista De Derecho Comunitario Europeo, (37). Retrieved from https://recyt.fecyt.es/index.php/RDCE/article/view/45658
Issue
Section
STUDIES
License
Copyright
Submission of a manuscript to the RDCE implies having read and accepted the journal's editorial guidelines and instructions for authors. When a work is accepted for publication, it is understood that the author grants the RDCE exclusive rights of reproduction, distribution and, where appropriate, sale of his manuscript for exploitation in all countries of the world in printed version, as well as any other magnetic, optical and digital media.
Authors shall transfer the publishing rights of their manuscript to RDCE so that it may be disseminated and capitalised on Intranets, the Internet and any web portals and wireless devices that the publisher may decide, by placing it at the disposal of users so that the latter may consult it online and extract content from it, print it and/or download and save it. These activities must comply with the terms and conditions outlined on the website hosting the work. However, the RDCE authorises authors of papers published in the journal to include a copy of these papers, once published, on their personal websites and/or other open access digital repositories. Copies must include a specific mention of RDCE, citing the year and issue of the journal in which the article was published, and adding a link to the RDCE website(s).
A year after its publication, the works of the RDCE will be under the Creative Commons Attribution-Noncommercial-NoDerivative 4.0 International license (CC BY-NC-ND 4.0), which allows third parties to share the work as long as its author and its first publication is indicated, without the right to commercial exploitation and the elaboration of derivative works.
Plagiarism and scientific fraud
The publication of work that infringes on intellectual property rights is the sole responsibility of the authors, including any conflicts that may occur regarding infringement of copyright. This includes, most importantly, conflicts related to the commission of plagiarism and/or scientific fraud.
Practices constituting scientific plagiarism are as follows:
1. Presenting the work of others as your own.
2. Adopting words or ideas from other authors without due recognition.
3. Not using quotation marks or another distinctive format to distinguish literal quotations.
4. Giving incorrect information about the true source of a citation.
5. The paraphrasing of a source without mentioning the source.
6. Excessive paraphrasing, even if the source is mentioned.
Practices constituting scientific fraud are as follows:
1. Fabrication, falsification or omission of data and plagiarism.
2. Duplicate publication.
3. Conflicts of authorship.
Warning
Any breach of these Rules shall constitute a ground for rejection of the manuscript submitted.