CHAPTER 5 FREEDOM OF EXPRESSION.

Slides:



Advertisements
Similar presentations
Chapter 5 Freedom of Expression
Advertisements

Freedom of Expression Prepared By Najib sani & Muhammad Tajuddeen M.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Chapter 37.
Ethics in Information Technology, Fourth Edition
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Freedom of Speech. Purpose for Freedom of Speech: To guarantee to each person a right of Free expression, in the Spoken and the Written word, and by all.
Ethics in Information Technology, Second Edition
1 Freedom of Expression Prepared By Joseph Leung.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Chapter 5 Freedom of Expression
Our Basic Rights *note: because you have a legal right to do (or not to do) something does not mean it is the right thing to do. I : 1 st Amendment-R.A.P.P.S.,
Freedom of Speech and Freedom of Assembly. The Purpose of Freedom of Speech 1 to guarantee to each person a right of free expression, in the spoken and.
Ethics in Information Technology
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Freedom of Speech Congress shall make no law… abridging the freedom of speech”.
Chapter 19 Section 3 Objective: To understand the scope of and the limits on free speech and press.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Chapter 37 Freedom of Speech. First Amendment Protects all forms of communicationProtects all forms of communication –Speeches, books, art, newspapers,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Chapter 5.  It creates the three branches of government  Executive  Legislative  Judicial  It allocates powers to these branches  It protects individual.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER FOUR: Freedom of Expression 1Prepared By: Razif Razali.
American Government Chapter 19 Section 3. Freedom of Speech 1 st and 14 th Amendments Guarantees spoken and written word liberty Ensures open discussion.
Interpreting and Applying the First Amendment. What is Speech: Defamation Defamation: intentional, false statements Libel: written statement defaming.
Freedom of Speech and Press. The Big Idea While the 1st and 14th Amendments gives Americans the right to express ideas freely, the Constitution and the.
1. What are some freedoms that we have in our daily lives as US citizens? 2. Can your freedoms ever be taken away or limited? (explain!)
Freedom of Speech First Amendment Expression, Speech and Symbolic Speech.
Freedom of Speech  Seems like a dumb question, but why is it so important to a democratic government?  Ability to debate actions and policies of elected.
 2 Guarantees  freedom to express yourself in the spoken and written word  Access to a variety of ideas on public affairs.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Laws and Rules That Govern Internet Safety Ashley Martin.
Interpreting the Constitution Civil Rights & Civil Liberties US Government. US Government. US Government. US Government.
1 st ten amendments basic freedoms protect citizens from a overly-powerful central gov’t.
The 1 st Amendment U.S. Government Ms. Kemp. 1 st Amendment Rights Press Press Religion Religion Petition Petition Assembly Assembly Speech Speech.
1. Vagueness and Overbreadth: Laws governing free speech must be clear and specific. > Laws that unnecessarily prohibit too much expression are considered.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Essential Questions: How have courts defined (protected/denied) individual rights over time?
Ethics in Information Technology, Fourth Edition Chapter 5 Freedom of Expression.
Civil Rights
The First Amendment ESSENTIAL QUESTION How do societies balance individual and community rights?
1st Amendment Free Speech and Press
Presented by Ika Novita Dewi, MCS
Freedom of Expression.
Freedom of Speech.
Would you rather meet George Washington or Albert Einstein?
FREE SPEECH LIMITS.
Bill of Rights- First Amendment Notes
Chapter 13.3 Freedom of Speech
And how they relate the Judicial Branch
Civil Rights & Liberties
Free Speech and Free Press
Chapter 19 Civil Liberties: 1st Amendment Freedoms Sections 3-4
Limits to the Freedom of Speech
A Gift of Fire Third edition Sara Baase
Theories Behind Freedom of Expression
Freedom of Speech in Cyberspace
Types of Speech Pure Speech- peaceful expression of thoughts & ideas before a willing audience. Protected by the 1st Amendment. Speech Plus- verbal expression.
A Gift of Fire Third edition Sara Baase
Freedom of Speech “Freedom of speech and expression is the heart of a democratic society.”
Presentation transcript:

CHAPTER 5 FREEDOM OF EXPRESSION

FIRST AMENDMENT RIGHTS The 1st Amendment protects “right to freedom of religion and freedom of expression” - the definition of speech includes non verbal, visual, and symbolic forms of expression ex. Flag burning, dance movements, and hand gestures - the 1st amendment protects the right to speak anonymously as part of the guarantee of free speech. - the following are types of speech that are not protected by the 1st amendment: perjury, fraud, defamation, obscene speech, incitement of panic, incitement of crime, fighting words and sedition (rebellion against a government)

OBSCENE SPEECH & DEFAMATION Obsecene Speech Ex. Miller conducted a mass mailing campaign to advertise the sale of adult material (consist of pictures explicitly depicting men and women engaged in sexual activity) Defamation – making either an oral or written statement of alleged fact that is false and harms another person. Slander is a oral defamatory statement Libel is a written defamatory statement

FREEDOM OF EXPRESSION CONTROLLING ACCESS TO INFORMATION ON THE INTERNET ANONYMITY ON THE INTERNET DEFAMATION AND HATE SPEECH CORPORATE BLOGGING PORNOGRAPHY

CONTROLLING ACCESS TO INFORMATION ON THE INTERNET Restricting children’s internet access as well as adults with this the US government has passed laws and software manufacturers have invented special software to block access to objectionable material. Communications Decency Act 1996 - aims to protect children from pornography ($250,000 fines and prison terms of up to 2 years) Child Online Protection Act 1998 - Protects children from online pornography while preserving the right of adults

Internet Filtering An Internet filtering is a software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. URL filtering – a particular URL or doamin name is identified as belonging to anobjectionable site Keyword filtering – uses keywords or phrases to block the Web sites. Dynamic content filtering – each Web site’s content is evaluated immediately before it is displayed Children’s Internet Protection Act 2000 - The act required federally financed schools to use some form of technological protection to block computer access to obscene material, pornography, and anything else considered harmful to minors.

ANONYMITY ON THE INTERNET Anonymous expression is the expression of opinions by people who do not reveal their identity. Anonymous remailer service - it uses a computer program to strip the originating IP number from the message.

DEFAMATION AND HATE SPEECH Speech that is merely annoying, critical, demeaning, or offensive enjoys protection under 1st Amendment. Legal resource is possible only when hate speech turns into clear threats and intimidation against specific citizens. A former student was sentenced to 1 year in prison for sending e-mail death threats to Asian American students at the University of California, Irvine. His e-mail was signed “Asian Hater,” and his letter stated that he would make it his career to find and kill every Asian himself. In 2002, Varian Medical Systems won a $775,000 verdict in a defamation and harassment lawsuit against two former employees who posted thousands of messages to wide variety of online message boards accusing Varian managers of being homophobic and discriminating against pregnant women.

CORPORATE BLOGGING Blogging is a new way to reach out to parents, customers, and other employees and to improve their corporate image. To ask other employees for help w/ work-related problems To share work-related information in a manner that invites conversation To invite others to refine or build on a new idea

PORNOGRAPHY The internet has been a boon to the pornography industry by providing fast, cheep, and convenient access to over 4.2 million porn Web sites worldwide. Adult pornography is a big business with a $4.9 billion in revenue in 2006, it generates traffic and it is estimated that there are 72 million visitors to porn Web sites monthly

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act 2003 - A law that specifies requirements that commercial e-mailers must follow when sending out messages that advertise or promote a commercial product or service. The “From” and “To” field in the e-mail, as well as the originating domain name and e-mail address, must be accurate and identify the person who initiated the e-mail. The subject line of the e-mail cannot mislead the recipient as to the contents or subject matter of the message. The e-mail must be identified as an advertisement and include a valid physical postal address for the sender. The e-mailer must provide a return e-mail address or some other Internet-based response procedure to enable the receipt to request no future e-mails, and the e-mailer must honor such request to opt out.