The Great Firewall of China INTRODUCTION Gisela Torrentí, Judith Martín & Julia Mabrey.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

New Mexico Broadband Program Internet Tools for Small Business Success Module 5 E-Newsletters.
U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
American Government/Civics Review
Euforbia Commercial Exploitation. The Players The audience to be barred / protected Parents Officials / Institutions ISPs Content Owners / Distributors.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Enterprise Security A Framework For Tomorrow Christopher P. Buse, CPA, CISA, CISSP Chief Information Security Officer State of Minnesota.
Self-Censorship in China Eric Schabel & Fahad Pervaiz.
But What About the Profits?
Free Speech and Censorship Sherwin Siy Staff Counsel Electronic Privacy Information Center.
Raising Private Capital Today  The Private Capital Market Solution for Private Growth Companies Conducting A Private Placement.  Integrating Marketing,
Censorship Traditionally: Deletion of materials that the gorvernment or media considers to be objectionable Internet censorship often just blocks access.
Network Neutrality Professor: Robert J. Irwin Computer Science 101 Spring Semester 2007 Describe The Concept: Brandon Niezgoda, class of 2010 Arguments.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Freedom of Speech Cutting Edge Homework Development.
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Internet Censorship Sri Reddy Internet and Web Systems 2 Presentation.
Xiaodan Dong April 3 rd, 2008 in China. Search Engine Market Share in China Baidu Retrieved from:
By Monique & Mati. My partner and I want to find out who owns and who controls the Internet. We will look at, what the internet is made of, (hardware,
Internet Filtering : Should libraries filter internet content? Paul M. Schoenhard ’00 CS 99, 00W 7 March 2000.
Internet Censorship Ann Lee, Gregory Fillios, Hugo Ponte, Kathryn Wells, Malcolm Greaves.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
Chinese internet control: Corporate collaboration Rebecca MacKinnon 4/20/2006
Johnson Tang Period 1. Introduction  The methods of protest in China have many different types of things that could be use. The way that method in China.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Corporate Governance in the Caribbean Environment “The Caribbean Corporate Governance Forum” Trevor E Blake General Manager – ECSE.
CHAPTER 4: THE BILL OF RIGHTS Integrated Government.
Our Freedoms – Expression: Speech and Information.
Restrictions of Internet Use Jeremiah Jones Rodney Dowdy Pablo Gonzalez Pers 2730 Internet Technologies Dr. Chunlei Liu Jeremiah.
PIME 2004 Workshop Sustainable Development and Corporate Social Responsibility >> Report.
Social Networking Problem by: Pattamon Aksharanugraha Section1 ITCS486 Multimedia Data Technologies China'sChina's.
CHINA reaches for freedom 1976 to The Death of Mao In 1976, Mao Tse Tung died. His reign of terror had ended. In 1976, Mao Tse Tung died. His reign.
Internet Censorship Alex Lipp. The Bills in Congress PIPA — the Senate bill originally called the Protect IP Act. SOPA — the Stop Online Piracy Act —
Overview of Issues and Interests in Standards and Interoperability Mary Saunders Chief, Standards Services Division NIST.
Google & Industry Best practices BY: ANAHITA ZAMANI ITMGMT 550 – INSTRUCTOR: TONY WOLF SEP
KEY CONSTITUTIONAL CLAUSES. COMMERCE CLAUSE  Congress has power “to regulate commerce with foreign nations, and among the several states, and with the.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Presentation by: Jennifer Collins Roldan Padilla.
China vs. China Presented by: Kyle Pearson & Alyssa Currie.
Chapter 8: Search, Privacy, Government, and Evil By: Marissa Gittelman Tuesday, March CPS 49:Google, the Computer Science within and its Impact.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Chapter 5 Content and Academic Vocabulary Test Review TEST TOMORROW!
LEGALITY OF OBJECT AND CONSIDERATION.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
5 - 1 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Year 12: Unit 2, living in the digital world. 1. What is ICT? ICT is the use of technology to convert data to information. It covers many areas, especially.
Do-First: Day 9 Answer the following question with someone next to you. After you chose an answer, explain why country 1 is what you selected and when.
. 信息政策 Information Policy. Government ’ s Two Information Roles 政府的两个信息角色 Government as regulator of information flow in society 信息监管者:政府对信息在社会中的流动规则.
 In Ned law are a company that provides strategic consulting and management, composed of a team of high academic and social esteem, focused on optimization,
Think / Pair / Share What are Human Rights?
CONFLICTS AND CONFIDENTIALITY
China & Censorship.
Think / Pair / Share What are Human Rights?
Web 2.0 and Internet Safety for Educators
PART III Ethical Issues in Business
International Business
International Business
Afef Abrougui and Koliwe Majama Internet Freedom Festival, March 2017
MODEL OF DEMOCRACY WESTERN VS. COMMUNIST.
The Great Firewall of China
Think / Pair / Share What are Human Rights?
A Gift of Fire Third edition Sara Baase
Government Data Practices & Open Meeting Law Overview
A Multi-stakeholder Approach to Emergency Telecommunications
Shandong University of Finance and Economics, China
Government Data Practices & Open Meeting Law Overview
A Gift of Fire Third edition Sara Baase
Presentation transcript:

The Great Firewall of China INTRODUCTION Gisela Torrentí, Judith Martín & Julia Mabrey

The Great Firewall of China  China is known to have a “Great Firewall” because of governmental efforts to control the free flow of information on the internet  Chinese goverment violates human rights (Amnesty International)  Internet companies help the Chinese government’s censorship: e.g. Yahoo!, Microsoft and Google

The Great Firewall of China  These three companies colaborated with Chinese censorship because they are looking for big new markets like China.  For this reason:  Yahoo!: provided Chinese authorities with private and confidential information about its users  Microsoft: shut down a blog on the basis of a government request.  Google: launched a censored version of its international search engine in China.

The Great Firewall of China  These companies have demonstrated a disregard for their own internally driven and proclaimed policies. McLaughlin, Google director said that “to remove results is not compatible with the Google mission” but he also said that “if we want to operate in China we have to remove some results from China.cn in order to carry out local laws”.

The Great Firewall in China  This is the main reason the companies give to explain their activity in China. They argue that although it’s not an ideal situation, their presence in China is a force for good in the end.  Instead of helping bring the Internet to China, their activities are facilitating and sanctioning government censorship rather than challenging it. These companies accept the limitations imposed on them by the government. With their collaboration they provide necessary technology and legitimize the actions of the government.

Amnesty International states:  „local law“ = Constitution!  Internet is being used as a tool to deny FoX: ChineseCorporations governementcomplicit suppresses in those HR dissentabuses

Yahoo! Journalist Shi Tao imprisoned for 10 years for sending an signed a ‘Public Pledge on Self-discipline for the Chinese Internet Industry’ “…refrain from producing, posting or disseminating harmful information that may jeopardise state security…”

Reactions: Yahoo vs. Google?  Companies all act against their proclaimed values & stated policies of ethical responsibility  Yahoo! denies all responsibility  Google admitted double standards & promises to restrict further collaboration

The Great Firewall in China  Amnesty International made some recomendations to those and other Internet companies operating in China: 1. Publicly commit to honouring the freedom of expression provision in the Chinese constitution. 2. Be transparent about the filtering process used by the company in China. 3. Make publicly avaliable all agreements between the company and the Chinese government with implications for censorship of information and suppression of dissent.

The Great Firewall in China 4. Exhaust all judicial remedies and appeals in China and the internationally before complying with state directives where these have human rights implications. 5. Develop and explicit human rights policy. 6. Clarify to what extent human rights consideration are taken into account. 7. Exercise leadership in promoting human rights in China. 8. Participate in and support the outcomes of a multi-stakeholder process.

Some practical examples… By Marianne Davril

 In China people have different search engines: - Google.com - Google.cn created in january Baidu.com, a chinese engine

Google.cn  Searches on key words as « Tienanmen », « Dalaï Lama », « revolution », « faith », are blocked  Western news websites are not available  Lets see: comparision between google.com and google.cn

Baidu.com  Example with the date of tiananmen events: 4 june 1989  The search engine crashes, it is not available anymore

Bypassing the firewall…  An american journalist found some artifices to get access to information -example on google.cn with the right and the wrong spelling of « Tiananmen » o Today, chinese people know how to get «free» access to information. For them it is better to have something than nothing. -reactions of chinese people:

Solutions?  Should we boycott these internet companies in order to encourage the chinese govern  ment to improve freedom of expression?  Is money more important than liberty?  Should we boycott the Olympics Games?

Discussion  What about the many other companies that currently collaborate with China? Is one companie „worse“ than the other (Yahoo vs. Google)?  Do we need to put more pressure on companies to take up ethical responsibility? How do we perceive the power of lobbying?