Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.

Slides:



Advertisements
Similar presentations
Children’s Internet Protection Act
Advertisements

FCC – Part 4 Law and Policy. Telephone Conversations Station must notify the outside party of its intention to air the conversation before broadcast.
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Freedom of Speech Chapter 37.
Obscenity – is anything that treats sex or nudity in an offensive or lewd manner, violates recognized standards of decency, and lacks serious literary,
(c) 2004 West Legal Studies in Business A Division of Thomson Learning 1 First Amendment: Freedom of Expression Are obscenity laws a violation of free.
Ethics in Information Technology, Fourth Edition
Miller and Pacifica: From Obscenity to Indecency November 2, 2004 The beginning of the end or the end of the beginning?
Miller vs. California By tyler bundies. What freedom was uestioned? Is obscenity protected by the first amendment? Does the first amendment give you the.
Ethics in Information Technology, Second Edition
Obscenity. Obscenity: An overview We know it is not protected, but… The problem comes in defining obscenity. What is it? Where is it found? Who should.
1:6 Speech that is not protected by the First Amendment.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
Internet Legal Issues (Management 447) Professor Charles H. Smith Obscenity (Chapter 10) Spring 2006.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Obscenity and Indecency. Controlling / Regulating obscenity, pornography, indecency FCC regulations of broadcast Local, state, and federal governments’
Chapter 5 Freedom of Expression
Obscenity is not protected by the 1 st amendment.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
SPEECH & CONTENT REGULATION IN CYBERSPACE: Ashcroft v. ACLU Ashcroft v. Free Speech Coalition American Library Association, Inc. v. US BY ERIC IAN SHANK.
Ethics in Information Technology
Freedom of Speech in Cyberspace
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Terri Bassett and Susan Stilwell CT Can Censorship be Reconciled with the Bill of Rights? The Children’s Internet Protection Act: Legal and.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
CHILDREN’S INTERNET PROTECTION ACT (CIPA) A Short History Washington State Library Fall 2003.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Understanding CIPA to Fight the Filter Mark E. Moran CEO, Dulcinea Media.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Early Definitions of Obscenity Roth v. United States (1957) - Does the average person, applying contemporary community standards, find the dominant theme.
MEDIA LAW Obscenity – Pornography and Censorship.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
MILLER VS CALIFORNIA By Justin Lacks. THE ISSUE Marvin Miller worked for a company that dealt with "adult" material In an attempt to advertise their product,
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
New York Times v. Sullivan (1963) By: Carmen Vaca.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
June 29, 2003 Used with permission. CIPA Update Mary Minow, J.D., A.M.L.S. LibraryLaw.com Infopeople Webcast Series 2: Third Thursday.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Children’s Internet Protection Act of 2000 (updated 2012) Public Presentation PTSA, November 4 th, 2013.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
Laws and Rules That Govern Internet Safety Ashley Martin.
School Accounts Presented by: Mrs. Mazzola.
Obscenity. Defining Obscenity Obscenity = Indecent, Lewd, or Licentious Licentious =Lewd, Lascivious Lascivious =Lewd or Lustful Lewd =Indecent or obscene.
What is Obscenity?. What is your Definition? Are These Obscene?
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
1 ST AMENDMENT; FREE SPEECH AND FREEDOM OF THE PRESS ELIZABETH MANWILL MIA MAY RAMI KHALAF MATT MARTY.
Comparative Telecommunications Law Spring, 2007 Prof. Karl Manheim 17: Internet IV (Content Regulation) Copyright © 2007.
To Filter By Law, But How Much? Sally Hawkes Arkansas State Library.
The Law of Journalism & Mass Communication
What is Obscenity?.
What is Obscenity?.
Limits to the Freedom of Speech
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
The First Amendment and the Internet
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Brandon Hall CSC 540

 The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the sexually explicit material on the internet.  The US Government had a hard time coming up with a law that wouldn’t get struck down as unconstitutional due to the First Amendment.

Based on a study conducted by Joan Ganz Cooney Center and Sesame Workshop.

 CIPA (Children’s Internet Protection Act)  CDA (Communications Decency Act)  COPA (Child Online Protection Act)

 Signed into law in  This Act was the first attempt by US Congress to regulate both indecency and obscenity on the Internet.  Portions of this act was declared unconstitutional in 1997 with the case of Reno V. ACLU.

 Supreme Court found that the “Indecency” portion of the act was unconstitutional.  Justice John Paul Stevens stated that "the CDA places an unacceptably heavy burden on protected speech“  "safe harbor" section protecting ISPs from being liable for the words of others, was not affected by this decision and remains law.

 Drafted in  This act attempted to restrict to any material defined as harmful to such minors on the Internet.  COPA required all commercial distributors of "material harmful to minors" to restrict their sites from access by minors.  "Material harmful to minors" was defined as material that by "contemporary community standards" was judged to appeal to the "prurient interest" and that showed sexual acts or nudity.  The act was never signed into law, and a permanent injunction was granted in 2009.

 In 1999 the Third Circuit Court of Appeals quickly struck down this law as unconstitutional.  They stated that act was too broad in using "community standards" as part of the definition of harmful materials.  However in 2002 the Supreme Court Reviewed the case and sent it back to the Third Circuit.

 In 2003 the Third Circuit struck down the law again as unconstitutional this time stating that it would hinder protected speech among adults.  In 2004 the case of in Ashcroft v. American Civil Liberties Union (ACLU) the Supreme court upheld the injunction.  Finally in 2007 US District Judge Lowell A. Reed, Jr. Stated that the act violated first amendment and fifth amendment rights.

 Signed into law in  Found to be constitutional by the Supreme court in  This act targeted schools and libraries.

 Adopt an internet safety policy.  The use of internet filters and blocking software for images that may be considered obscene or harmful to minors.  Allow the filter to be disable for use by Adults.  Enforce monitoring the use of the internet by minors.

 Miller V. California (1973)  whether the average person, applying contemporary community standards (not national standards, as some prior tests required), would find that the work, taken as a whole, appeals to the prurient interest;  whether the work depicts or describes, in a patently offensive way, sexual conduct or excretory functions specifically defined by applicable state law;  whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value. (Miller V. California)

 Harmful to minors was defined in the act itself.  Harmful minors was defined as Any picture, image, graphic image file, or other visual depiction that taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion; depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors” (CIPA)

 Client side filters  Browser based filters  Content – limited ISP filters  Server side filters  Search engine filters

 Client Side filters are installed as software, and need to be installed on each computer.  Client Side filters can be customized using a username and password.  Server Side filters are the most common type of filters for schools and libraries.  These type of filters are installed on a server, and are the same for all computers on that server.

 Content – limited ISP filters can limit the users interaction to other users with the same kind of filters. This filter is implemented by the ISP.  Browser Based filters – Google Chrome does not offer browser based filters.

 Over filtering is the main issue with filtering software. They filter key words, so searches like “Breast Cancer”, “Summa Cum Laude” don’t make it through the filters.  These filters will also block an entire site based on sexuality, even if only a page on the site has this material.

 What are the consequences if a school or library doesn’t remain CIPA compliant?  They can lose their E-Rate Funding and other government funding.  The E-Rate program provides discounts to public K-12 schools and libraries purchasing telecommunications services, Internet access, Internet connections and basic maintenance of internal connections.  Can lose federal education funding to schools for purchase of computers used to access the Internet, or to pay for direct costs associated with accessing the Internet.

 (n.d.). Retrieved from FCC:  (n.d.). Retrieved from Washington Post: dyn?pagename=article&node=&contentId=A Jun23&notFound=true  (n.d.). Retrieved from Library Student Journal:  (n.d.). Retrieved from ENotes: schools-and-libraries  (n.d.). Retrieved from Net Safe Kids:  (n.d.). Retrieved from 2-power:  (n.d.). Retrieved from Department of information resources:  (n.d.). Retrieved from E-Rate Central:  (n.d.). Retrieved from Gizmodo: the-internet  CDA. (n.d.). Retrieved from WIKI:  CIPA. (n.d.). Retrieved from WIKI:  Content Control. (n.d.). Retrieved from WIKI: control_software  COPA. (n.d.). Retrieved from WIKI:  Hitchcock, L. (n.d.). Retrieved from  Info People. (n.d.). Retrieved from  Miller V. California. (n.d.). Retrieved from WIKI: