Comparative Telecommunications Law Spring, 2007 Prof. Karl Manheim 17: Internet IV (Content Regulation) Copyright © 2007.

Slides:



Advertisements
Similar presentations
Lets take a closer look at: -Obscenity -Prior Restraint -The Media -Symbolic Speech -Commercial Speech.
Advertisements

FCC – Part 4 Law and Policy. Telephone Conversations Station must notify the outside party of its intention to air the conversation before broadcast.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Freedom of Speech Chapter 37.
Obscenity – is anything that treats sex or nudity in an offensive or lewd manner, violates recognized standards of decency, and lacks serious literary,
Ethics in Information Technology, Fourth Edition
Miller vs. California By tyler bundies. What freedom was uestioned? Is obscenity protected by the first amendment? Does the first amendment give you the.
Ethics in Information Technology, Second Edition
Obscenity. Obscenity: An overview We know it is not protected, but… The problem comes in defining obscenity. What is it? Where is it found? Who should.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
Internet Legal Issues (Management 447) Professor Charles H. Smith Obscenity (Chapter 10) Spring 2006.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Chapter 5 Freedom of Expression
Ioannis Iglezakis Domain Names. The Domain Name System A domain name is an electronic address of a computer connected to the Internet. The actual address.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Ethics in Information Technology
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
Terri Bassett and Susan Stilwell CT Can Censorship be Reconciled with the Bill of Rights? The Children’s Internet Protection Act: Legal and.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Understanding CIPA to Fight the Filter Mark E. Moran CEO, Dulcinea Media.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Early Definitions of Obscenity Roth v. United States (1957) - Does the average person, applying contemporary community standards, find the dominant theme.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
Summary of Part V Freedom of Expression Constitutional Law Mr. Morrison Spring 2006.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Public Communications Law Lecture 11 Slide 1 Obscenity and Indecency For the most part, the rules of both of these, and when these materials can be disseminated,
Laws and Rules That Govern Internet Safety Ashley Martin.
Constitutional Rights Chp. 2 Civil Rights – Bill of Rights and other amendments to the Constitution have become a shield for the personal, natural rights.
School Accounts Presented by: Mrs. Mazzola.
Comparative Telecommunications Law Spring, 2007 Prof. Karl Manheim 15: Internet II (Regulation) Copyright © 2007.
What is Obscenity?. What is your Definition? Are These Obscene?
LIBS100 March 23, 2005 First Amendment Library Bill of Rights.
To Filter By Law, But How Much? Sally Hawkes Arkansas State Library.
Presented by Ika Novita Dewi, MCS
Children’s Internet Protection Act (CIPA)
What is Obscenity?.
What is Obscenity?.
Boundaries of Free Expression III (Obscenity II and Violence/Cruelty)
Limits to the Freedom of Speech
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
The First Amendment and the Internet
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Comparative Telecommunications Law Spring, 2007 Prof. Karl Manheim 17: Internet IV (Content Regulation) Copyright © 2007

Spring, 2007CTL2 Content Regulation Communications Decency Act (CDA) Part of 1996 TCA Invalidated in Reno v. ACLU (1997) Child Online Protection Act (COPA) Invalidated in Ashcroft v. ACLU (2004) Obscenity Covered under existing state and federal laws Interesting jurisdictional issues  Passive vs. Active web sites

Spring, 2007CTL3 Miller v. California (1973) Standards for unprotected obscenity Works that depict or describe sexual conduct Taken as a whole, appeals to the prurient interest in sex (contemporary community standards) Portray sex in patently offensive way (hard core)  intercourse, masturbation, excretion, lewd exhibition of genitals Taken as a whole Taken as a whole, do not have serious literary, political, or scientific value  objective national standards

Spring, 2007CTL4 Reno v. ACLU (1997) Communications Decency Act (CDA/TCA) prohibits "knowing" transmission of "obscene or indecent" messages to any recipient under 18y Held: CDA violates the 1 st amendment  Gov’t has compelling interest in protecting children  But, CDA swept too broadly In operation, it suppressed speech that adults had const’l right to send and receive  Less restrictive means were available E.g., filtering software Giving parents the choice to allow access

Spring, 2007CTL5 Ashcroft v. ACLU (2004) Child Online Protection Act (COPA) Prohibits online material harmful to minors  Grafts “to minors” on to Miller standard trying to expand this category of unprotected speech Didn’t work: obscene “to minors” isn’t unprotected  Exception: material made unavailable to minors to address overbreadth problem in Reno ok, but less restrictive alternative test still applies filters, school/library restrictions, etc. may work better COPA exacerbates problem by driving industry offshore COPA applies only to web, not other Internet uses Stevens: community standards test incompatible with the Internet worked for Breyer, Rehnquist, O’Connor

Spring, 2007CTL6 United States v. ALA (US SCt 2003) Children’s Internet Protection Act (CIPA) Requires libraries and schools to install filters on computers to retain federal funding CIPA is constitutional for children, but may not be for adults. Adults must be able to request filters are turned off if they are using a terminal.

Spring, 2007CTL7 LICRA/UEJF v. Yahoo! (TGI, 2000) Sale of Nazi memorabilia on auction site French Criminal Code Article R645-1  Prohibits insignias and emblems which "recall those used" by an organization declared illegal by Art. 9 of the Nuremberg Statute (e.g., Nazis) Yahoo! is a Delaware Corp. Web sites hosted somewhere in US Viewable in France; caused “public nuisance”

Spring, 2007CTL8 LICRA/UEJF v. Yahoo! (TGI, 2000) Judgment of TGI: Ordered to exclude French Internet users  Technologically feasible?  Court-appointed expert report: roughly 70% of French internet users could be identified as such by the use of DNS databases Result: Yahoo! was required to Monitor / remove offending items from website Pay appropriate fines to France.

Spring, 2007CTL9 Yahoo! v. LICRA/UEJF (9th Cir, 2006) Yahoo! Sought to bar enforcement in US Holding Yahoo! Has no 1st Amendment right in France Exercise of French jurisdiction was consistent with requirements of "minimum contacts"  (1) the non-resident defendant has purposefully availed himself of the privileges of conducting activities in the forum, thereby invoking the benefits and protections of its laws;  (2) the claim arises out of or relates to the defendant ユ s forum-related activities; and  (3) the exercise of jurisdiction is reasonable.

Spring, 2007CTL10 Internet Censorship in China “Provisional Directive on the Management of International Connections by Computer Information Networks in the PRC” “Government in charge of planning & protocols for all international computer connections” All international networked computer communications must go through network channels provided by Ministry of Posts & Telecommunications Computer networks may not be used for any activities that might endanger state security or disseminate pornographic or obscene materials “All networks are subject to administration and monitoring by one of four major state agencies”

Spring, 2007CTL11 Internet Censorship in China What is prohibited? Information on Taiwan, Tibet, Tianamen Square, Falun Gong, and the biographies of most of its political leaders. Pornography Weak on enforcing copyright and trademark laws (except as regards the symbols of the 2008 Olympics)

Spring, 2007CTL12 Internet Censorship in China “The Great Firewall of China” Filtering on the basis of web server IP address On the basis of domain name server IP address DNS redirection Filtering on the basis of keywords in URL  Search Engine searches Filtering on the basis of keywords or phrases in HTML response  Search engine responses

Spring, 2007CTL13 OpenNet Initiative Consortium U of Toronto, Harvard, Cambridge University Case Studies: Internet Filtering in Burma in 2005 Internet Filtering in Singapore in Internet Filtering in Iran Internet Filtering in China Internet Filtering in Bahrain in Internet Filtering in UAE in Internet Filtering in Saudi Arabia in 2004

Spring, 2007CTL14 Coverage for Remaining Classes 1. Cybersquatting 2. Digital Rights Management / DMCA 3. Regulating Broadcast TV & Radio 4. Rollout of Digital and HDTV 5. MVDS (Cable & Satellite) 6. Other?