Workplace Monitoring Store & review email messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Northside I.S.D. Acceptable Use Policy
Internet Filtering Requirements: CIPA and PA 212.
Children’s Internet Protection Act
Woodland Hills School District Computer Network Acceptable Use Policy.
Ethics in Information Technology, Fourth Edition
CIPA Update. FOR SCHOOLS – By July 1, 2012, amend your existing Internet safety policy (if you have not already done so) to provide for the education.
Boyertown Area School District Acceptable Use Policy.
Benefits:. Federal Children’s Internet Protection Act states that requires establishments, including schools and public libraries, that receive federal.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
WHEN FILTERS AND THE FIRST AMENDMENT CLASH: POLICIES FOR STUDENT ACCESS Texas Library Association Conference April 13, 2011 Helen Adams, Lea Bailey, and.
1 Children and Families. 2 Children & Families Focus on the Internet Children’s Needs –Education –Entertainment Families’ Needs –Education –Protection.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
INTERNET and CODE OF CONDUCT
Chapter 5 Freedom of Expression
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Ethics in Information Technology
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
CHILDREN’S INTERNET PROTECTION ACT (CIPA) A Short History Washington State Library Fall 2003.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
00870B2F.0/Internet%20Safety.jpg.
Understanding CIPA to Fight the Filter Mark E. Moran CEO, Dulcinea Media.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
ARE YOUR POLICIES GETTING IN THE WAY OF YOUR PROGRESS? Scott McLeod, J.D., Ph.D.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
ARE YOUR POLICIES GETTING IN THE WAY OF YOUR PROGRESS? Scott McLeod, J.D., Ph.D.
INTERNET SAFETY.
Chapter 14 How Universal is access to Computers and the Web.
Children’s Internet Protection Act of 2000 (updated 2012) Public Presentation PTSA, November 4 th, 2013.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
CIPA (Children’s Internet Protection Act) Helping You Succeed Schools and Libraries Division Washington, DC Newark Atlanta Chicago Orlando.
Woodland Hills School District Computer Network Acceptable Use Policy.
Laws and Rules That Govern Internet Safety Ashley Martin.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
School Accounts Presented by: Mrs. Mazzola.
Tech in my placement survey and legal Issues Jan 27 th 2011.
To Filter By Law, But How Much? Sally Hawkes Arkansas State Library.
Access to Electronic Media Acceptable Use Policy August 8, 2016 Somerset Independent Schools.
Presented to The Board of Education September 20, 2016
The Acceptable Use of Technology
Ogletree, Deakins, Nash, Smoak & Stewart PC
Presented to The Board of Education September 6, 2011
The E-Rate Program CIPA Update Fall 2011 Applicant Trainings.
Children’s Internet Protection Act (CIPA)
Being CyberSmart! About Online Safety and Security At Schools
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
© 2017 Universal Service Administrative Co.
Presented to The Board of Education September 19, 2017
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
Student User Agreement and Policy 2022
A Gift of Fire Third edition Sara Baase
Woodland Hills School District
WORKING ON FUNDING YEAR (FY) 2019
Presentation transcript:

Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections: 62.8% Computer use (time logged on, keystroke counts): 18.9% American Management Assoc., 2001 Survey of 1,627 companies

Workplace monitoring most important reasons Legal liability (8.3% of companies have battled sex discrimination claims due to or Internet use) Security concerns Productivity measurement Legal compliance (10% of companies have court orders to produce employee ) Performance review AMA, 2001

Workplace monitoring reasons for disciplinary actions Sending sexually-oriented % Downloading, uploading, viewing pornography: 36.3% Connecting to unauthorized, restricted, or non- business related sites: 34.5% Sending harassing, discriminatory or objectionable 28% Illegally downloading or duplicating copyrighted software: 14.3% Participating in adults-only chatrooms: 12.6% AMA, 2001

Workplace monitoring Invasion of privacy? Employer right to ensure productivity and security? Employer right to limit liability? Is there another way?

Filtering and children Child Online Protection Act – Prohibits transmission of material over the Internet “harmful to minors” if made for commercial purpose – Third Circuit Court found law unconstitutional because “contemporary community standards” made it overbroad – Supreme Court returned case to Third Circuit for fuller consideration, found “community standards” did not in itself make it unconstitutional

Filtering and children Children’s Internet Protection Act (CIPA) – Requires libraries and schools to use filters on Internet computers to retain federal funding & discounts for access Block visual depictions that are obscene, child porn, harmful to minors Filter may be disabled for “bona fide research or other lawful purposes” – Eastern District of PA found it unconstitutional (violation of 1 st Amendment rights) – Appealed by Justice Dept & FCC, to be heard by Supreme Court

Why unconstitutional? Filters overblock and underblock Alternatives exist – Filters offered as a choice for individuals – Education and training – Enforcement of policies by staff – Placement of terminals, use of privacy screens

Why filtering doesn’t work Underblocking: can’t block everything Overblocking: blocks legitimate information in addition to “offensive” Subjective—can’t be customized to meet individual needs Censorship Discrimination? Technology solution to a human problem

What is the effect of censorship/filtering/blocking on information access and use? What are the consequences?