8 - Free Speech Harvard CSCI E-2a November 17, 2008 Harvard CSCI E-2a November 17, 2008.

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

FCC – Part 4 Law and Policy. Telephone Conversations Station must notify the outside party of its intention to air the conversation before broadcast.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Understanding the impact technology has on you.. Sexting-The act of sending sexually explicit messages or photographs, primarily between mobile phones.
FEDERAL COMMUNCATIONS COMMISSION. ORIGIN AND BACKGROUND Instituted as part of the Communications Act of 1934.
Sexting and Cyber-bullying Legal Issues Deputy Phyllis Applin Livingston County Sheriff’s Office.
Freedom of Speech Chapter 37.
Obscenity – is anything that treats sex or nudity in an offensive or lewd manner, violates recognized standards of decency, and lacks serious literary,
(c) 2004 West Legal Studies in Business A Division of Thomson Learning 1 First Amendment: Freedom of Expression Are obscenity laws a violation of free.
Ethics in Information Technology, Fourth Edition
Cyber Bullying i-SAFE survey of 150,000 high school students 57% said hurtful or angry things to another person, had someone say hurtful or angry.
Freedom of Speech. Purpose for Freedom of Speech: To guarantee to each person a right of Free expression, in the Spoken and the Written word, and by all.
Obscenity. Obscenity: An overview We know it is not protected, but… The problem comes in defining obscenity. What is it? Where is it found? Who should.
REVENGE PORN ROUNDTABLE 5 TH SEPTEMBER WHAT IS REVENGE PORN?  Revenge porn is when a partner or ex-partner shares images of sexual nature without.
Internet Legal Issues (Management 447) Professor Charles H. Smith Obscenity (Chapter 10) Spring 2006.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
Larry Downes March 20, 2006 From the Ox to the Cyberstalker FROM INFORMATION, KNOWLEDGE.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
INTERNET and CODE OF CONDUCT
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
FEBRUARY 18, 2015 DIGITAL SAFETY & AWARENESS. PRE-TEENS & TEENAGERS We need to be aware of the normal cognitive and social development of pre-teens and.
Ethics in Information Technology
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
1 Is it illegal or unsuitable? SID 2013 quiz for parents and carers © e-Safer Suffolk 2013.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
A Gift of Fire Third edition Sara Baase
Digital Citizenship Texting vs. Sexting Cyberbullying.
Obscenity Law Hicklin Test (1868 Common Law) –If a particularly susceptible part of the population when presented with an excerpt finds it offensive, then.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
Chantz Martin.  Put computer in a common place in the house  Use Internet filters and blocks  Talk to children about the dangers of the Internet.
Ch3 Freedom of Speech The US Constitution.
Employee Guidelines for Acceptable Use of Technology Resources.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
The Internet, Freedom of Speech, and the CDA Mike Holmes CS 99 February 29, 2000.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
A near-invisible niche for the vast majority of its existence, computer culture has only recently stepped into the big leagues and has yet to even learn.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Brown v. Entertainment Merchants Association June 27, 2011.
Activity 2 Sharing Images – The Law. Sexting
LANDMARK DECISIONS and STATUTES IN CYBERLAW Business Law I Chapter 2 Angela Creech, Instructor.
Constitutional Review The truth your founding fathers never told you!
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
School Accounts Presented by: Mrs. Mazzola.
1. Vagueness and Overbreadth: Laws governing free speech must be clear and specific. > Laws that unnecessarily prohibit too much expression are considered.
LIBS100 March 23, 2005 First Amendment Library Bill of Rights.
Damage to Reputation: Defamation, slander and libel.
Group Three: Lyli, Jerica, Jen, & Chris. → Petitioners: Two Atlanta, Georgia movie theaters. ― Those involved: The movie theaters owners and managers.
Libel, Privacy, & Decency
FREE SPEECH LIMITS.
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
The First Amendment and the Internet
A Gift of Fire Third edition Sara Baase
Presentation transcript:

8 - Free Speech Harvard CSCI E-2a November 17, 2008 Harvard CSCI E-2a November 17, 2008

RCubby v. Compuserve RStratton Oakmont v. Prodigy RCubby v. Compuserve RStratton Oakmont v. Prodigy

Time Magazine, 7/3/95

Communicatons Decency Act - Display Provisions  “ knowingly (A) uses an interactive computer service to send to a specific person or persons under 18 years of age, or (B) uses any interactive computer service to display in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs. ”  Transmit “ obscene or indecent ” materials to someone known to be under 18  “ knowingly (A) uses an interactive computer service to send to a specific person or persons under 18 years of age, or (B) uses any interactive computer service to display in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs. ”  Transmit “ obscene or indecent ” materials to someone known to be under 18

Justice Stevens’ Opinion  “ Could a speaker confidently assume that a serious discussion about birth control practices, homosexuality, the First Amendment issues raised by the Appendix to our Pacifica opinion, or the consequences of prison rape would not violate the CDA? This uncertainty undermines the likelihood that the CDA has been carefully tailored to the congressional goal of protecting minors from potentially harmful materials. ”

CDA Section 230  "No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider ”  Good Samaritan Provisions  "No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider ”  Good Samaritan Provisions

Harvard professor Harry Lewis commented:

The Siegenthaler Hoax  John Seigenthaler Sr. was the assistant to Attorney General Robert Kennedy in the early 1960s. For a short time, he was thought to have been directly involved in the Kennedy assassinations of both John, and his brother, Bobby. Nothing was ever proven.  John Seigenthaler moved to the Soviet Union in 1972, and returned to the United States in  He started one of the country's largest public relations firms shortly thereafter.  John Seigenthaler Sr. was the assistant to Attorney General Robert Kennedy in the early 1960s. For a short time, he was thought to have been directly involved in the Kennedy assassinations of both John, and his brother, Bobby. Nothing was ever proven.  John Seigenthaler moved to the Soviet Union in 1972, and returned to the United States in  He started one of the country's largest public relations firms shortly thereafter.

2005 Violence Against Women Act  Criminal sanctions to anyone who “utilizes any device or software that can be used to originate telecommunications or other types of communications that are transmitted, in whole or in part, by the Internet without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person”