ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet.

Slides:



Advertisements
Similar presentations
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Advertisements

Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Obscenity – is anything that treats sex or nudity in an offensive or lewd manner, violates recognized standards of decency, and lacks serious literary,
Ethics in Information Technology, Fourth Edition
CIPA Update. FOR SCHOOLS – By July 1, 2012, amend your existing Internet safety policy (if you have not already done so) to provide for the education.
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 4 Constitutional Authority to Regulate Business.
Ethics in Information Technology, Second Edition
Benefits:. Federal Children’s Internet Protection Act states that requires establishments, including schools and public libraries, that receive federal.
1 Freedom of Expression Prepared By Joseph Leung.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
Internet Legal Issues (Management 447) Professor Charles H. Smith Obscenity (Chapter 10) Spring 2006.
8 - Free Speech Harvard CSCI E-2a November 17, 2008 Harvard CSCI E-2a November 17, 2008.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
WHEN FILTERS AND THE FIRST AMENDMENT CLASH: POLICIES FOR STUDENT ACCESS Texas Library Association Conference April 13, 2011 Helen Adams, Lea Bailey, and.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Chapter 7.6 Content Regulation. 2 History of Censorship Legal source of American speech protection is the 1791 First Amendment to the U.S. Constitution:
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Chapter 5 Freedom of Expression
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Internet Filtering : Should libraries filter internet content? Paul M. Schoenhard ’00 CS 99, 00W 7 March 2000.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Ethics in Information Technology
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Terri Bassett and Susan Stilwell CT Can Censorship be Reconciled with the Bill of Rights? The Children’s Internet Protection Act: Legal and.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CHILDREN’S INTERNET PROTECTION ACT (CIPA) A Short History Washington State Library Fall 2003.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Understanding CIPA to Fight the Filter Mark E. Moran CEO, Dulcinea Media.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
Filtering the Internet in the USA: Free Speech Denied? Richard S.Rosenberg.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3
The Internet, Freedom of Speech, and the CDA Mike Holmes CS 99 February 29, 2000.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Thinking about tech challenges to free speech New technologies always challenge old regulatory regimes—print, telegraph, telephone, radio, internet Why.
Public Communications Law Lecture 11 Slide 1 Obscenity and Indecency For the most part, the rules of both of these, and when these materials can be disseminated,
Chapter 14 How Universal is access to Computers and the Web.
Laws and Rules That Govern Internet Safety Ashley Martin.
School Accounts Presented by: Mrs. Mazzola.
Comparative Telecommunications Law Spring, 2007 Prof. Karl Manheim 17: Internet IV (Content Regulation) Copyright © 2007.
Chapter 5 Constitutional Authority To Regulate Business.
Freedom of Expression.
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
Chapter 6.1 Regulating the Internet
A Gift of Fire Third edition Sara Baase
The First Amendment and the Internet
A Gift of Fire Third edition Sara Baase
Presentation transcript:

ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet

Introduction  Advantage of the Internet  Free flow of information  Uncontrolled by any central agency or government  Necessarily  Some of that information  Will be objectionable to someone  Hate sites, pornography, political sites

Introduction  Availability of information  Leads to attempts to control that information  Typical argument:  The children should not be exposed to…  Why children?  Lack of judgment  Unformed ideas that could be easily swayed

Introduction  Number of efforts over the years to ban or control certain content  Communications Decency Act of 1996  1: Attempted to regulate both indecency & obscenity  2: Operators of Internet services were not to be considered as publishers

CDA  Most controversy was around indecency on the Internet  FCC had controlled TV & radio for years  Offensive speech restricted to certain times of the day (minors less likely to be exposed)  10 PM and 6 AM  Violators could lose licenses & be fined  Lenny Bruce  George Carlin’s Seven Dirty Words

CDA  Internet had only become public in 1992  Not covered under previous laws  CDA was 1 st attempt to cover both  Internet  Cable TV  Congress passed Feb 1, 1996  President Clinton signed into law Feb 8

CDA knowingly (A) uses an interactive computer service to send to a specific person or persons under 18 years of age, or (B) uses any interactive computer service to display in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs.

CDA  June 1996 federal panel in PA overturned part of CDA  Infringed on free speech rights of adults  July 1996 federal court in NY overturned part protecting children as too broad  June 1997 Supreme Court upheld PA decision  Reno vs. American Civil Liberties Union

CDA  Reno vs. ACLU: Indecency provisions of CDA were an unconstitutional abridgement of the First Amendment right to free speech because  They did not permit parents to decide for themselves what material was acceptable for their children  Extended to non-commercial speech, and  Did not define "patently offensive," a term with no prior legal meaning

CDA  2003 Congress removed those portions of CDA that had been struck down  Separate challenge by Nitke v. Gonzales in 2005 Nitke v. GonzalesNitke v. Gonzales  Internet does not permit publishers to restrict destinations based on geography  Act in effect restricted the entire Internet to the standards of the most restrictive community online

CDA  Unfairly restricted her freedom of speech  Struck down by NY federal court in 2005  Plaintiffs had not presented sufficient evidence  Decision affirmed by Supreme Court in 2006

Other efforts  Child Online Protection Act of 1998  Purpose was to protect minors from harmful sexual material on the Internet  Required commercial distributors of “material harmful to minors” to restrict minors access to their sites

Other efforts  Material harmful defined to mean  By contemporary community standards  Appealed to prurient interest  Showed sexual acts or nudity (included topless women)  In 1999 Third Circuit Court of Appeals struck down the law  Using “community standards” was too broad

Other efforts  Supreme Court found this reasoning insufficient & returned to lower court  2003, Third Circuit struck down again  Finding hindered protected speech among adults  2004 Supreme Court upheld this ruling  Noted that filtering software had improved  As not taken into account

Other efforts  March 2007 COPA struck down again  Government permanently enjoined from enforcing it saying “… perhaps we do the minors of this country harm if First Amendment protections, which they will with age inherit fully, are chipped away in the name of their protection.”

Other efforts  Children’s Internet Protection Act of 2000  Introduced by John McCain in 1999  Passed both houses in December 2000  Signed by President Clinton on Dec 21, 2000  Challenged in 2001 by American Library Assoc

Other efforts  Previous challenges lost on 1 st Amendment grounds  CIPA represented a change of strategy  Federal government has no direct means of controlling local school/library boards  HOWEVER, normally, telecommunications users pay a universal service tax  Libraries receive an “e-rate” discount to purchase Internet access and computers

Other efforts  CIPA required libraries and schools using these discounts to  Purchase and use a “technology protection measure”  On every computer connected to the Internet

Other efforts “ … a technology protection measure with respect to any of its computers with Internet access that protects against access through such computers to visual depictions that are obscene, child pornography, or harmful to minors … “

Other efforts  Further, CIPA required that these measures be in effect during any use by minors  For adults the same provisions applied except the harmful to minors part was deleted  Measures could be disabled during use by an adult for research or other lawful purposes

Other efforts  ALA challenged on grounds that CIPA required libraries to block access to constitutionally protected speech  Enforcement involved removing federal funds intended to assist disadvantaged minorities  “Digital Divide”  No filtering software could accurately differentiate between illegal and protected speech on the Internet

Other efforts  PA Court of Appeals agreed  Supreme Court overturned  Legal for federal government to include conditions imposed on receipt of funding  Further, CIPA is constitutional if the library will unblock at an adult’s request  Some libraries did choose to forego federal funding

Parental Controls On the Internet  Is the answer in  Legislation?  Technology?  Textbook suggests technology  Software that permits parents to control access

Parental Controls On the Internet  SurfWatch SurfWatch  CyberPatrol  Net Nanny Net Nanny Net Nanny  Platform for Internet Content Selection  PICS PICS

Parental Controls On the Internet  AOL also filters content and blocks access  PICS is working with industry to  Develop standards to rate all Internet content  Software could be developed to block access for children based on these suitability ratings  Business also into the fray  Lost productivity  Liability for harassment, hostile workplace suits

How Parental Controls Work  SurfWatch consists of a module that scans input from the Internet  Intercepts it before it reaches the TCP/IP stack  Checks URLS most likely to contain offensive content  HTTP  NNTP (news)  FTP  Gopher (distributed document search and retrieval network protocol designed for the Internet )  IRC

How Parental Controls Work  Content from these URLS is isolated  1 st check: objectionable URLS  Checked against a database of URLS from objectionable sites  Content not permitted thru to TCP/IP stack  User notified that site has been blocked

How Parental Controls Work  2 nd check: Pattern matching  Words in URL indicative of offensive content  Content not permitted thru to TCP/IP stack  User notified that site has been blocked  3 rd check: PICS  Information about content embedded in Web documents  Content not permitted thru to TCP/IP stack  User notified that site has been blocked

How Parental Controls Work  If content passes all checks it is permitted through  Process is very fast so user sees no delay  Database updated monthly to keep up with new developments  Businesses use SurfWatch on a server to protect their business network

Problems with SurfWatch  Early efforts had some amusing moments  1996  White House page about Bill & Hillary, Al & Tipper  Page named “couples.html”  Renamed “principles.html”  Archie R. Dykes Medical Library  Library blocked from browsing their own site

Problems with SurfWatch  University of Kansas Medical Center  Library Library