Filtering the Internet in the USA: Free Speech Denied? Richard S.Rosenberg.

Slides:



Advertisements
Similar presentations
The IFLA Internet Manifesto Alex Byrne Chair Committee on Free Access to Information and Freedom of Expression International Federation of Library Associations.
Advertisements

The Web of Hate Lance Schwarz Brian Boyd Kevin Callahan.
Children's Online Privacy Protection Act and the Video Privacy Protection Act By: Alana Rushing.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Right to Privacy: The Unwritten Right
Benefits:. Federal Children’s Internet Protection Act states that requires establishments, including schools and public libraries, that receive federal.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
LEARNING OBJECTIVES/ GOALS/ SWBAT
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Final PowerPoint Presentation. The Wide World of Censorship By: Donnia Zack-Williams Sarah D’Orsie Katie Sullivan.
Company LOGO Internet Safety A Community Approach.
Internet Censorship By: Austin Tyler And, Lisa. Introduction  Ever since there has been an Internet, there have been attempts to control it. However,
Censorship Colleen Adam, Laura McCoy, Laura Donhauser-Wymer.
Chapter 5 Freedom of Expression
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Hazelwood v. Kuhlmeier A First Amendment Case © Constitutional Rights Foundation, Los Angeles, 2002 All rights reserved.
1 Filtering - Is This The Answer? Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Information Commission, the Joint.
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Internet Filtering : Should libraries filter internet content? Paul M. Schoenhard ’00 CS 99, 00W 7 March 2000.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Intellectual Freedom vs. Social Responsibility
Intellectual Freedom ABLE: Administering Better Libraries—Educate Module 5.
Online Social Networking and Intellectual Freedom presented by ALA Office for Intellectual Freedom.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
Internet Safety Guide for Teens Don’t give out personal information about yourself, your family situation, your school, your telephone number, or your.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section 15.2 Identify guidelines.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Censorship and Challenges. Before the Challenge Comes  Make sure you have a written Selection Policy –Make sure the principal has a copy, and knows about.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 11 Issues in Implementing Technology in Schools START This multimedia product and its contents are.
LEEDS HIGH SCHOOL Internet Use Policies. Leeds High School Library Media Center “It is the goal of the LMC to help people of all ages make the most of.
Environmental Management System Definitions
Island Trees Union Free School District v. Pico 457 U.S. 853 (1982) Censorship and Free Speech.
The Principles of the U.S. Government Describe the principles of government and the ways American constitutionalism preserves individual rights.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
The Facts About Schoolsite Councils The Roles and Responsibilities of a Schoolsite Council.
Introduction to the Law and Legal System
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
Internet Censorship Amy McCarty and Michelle Weisgerber.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
1 Filtering Web Content for Staff and the Public Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by Resource: The Council for Museums,
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Instructions for using this template. Remember this is Jeopardy, so where I have written “Answer” this is the prompt the students will see, and where.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
The First Amendment and Oregon Student Journalists Allison Marks, Adviser THE FOREST Forest Grove High School.
 Legal Issues-copyright and fair use, privacy, software piracy, acceptable use  Social Issues- digital divide, cyber bullying, online interaction 
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
The 1 st Amendment U.S. Government Ms. Kemp. 1 st Amendment Rights Press Press Religion Religion Petition Petition Assembly Assembly Speech Speech.
Freedom of Expression.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
The Issues with Technology in education
Introduction to Law What are laws written to protect? How does a human right become a legal right?
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Filtering the Internet in the USA: Free Speech Denied? Richard S.Rosenberg

Introduction Much of the motivation for filtering and blocking programs arises from the efforts in the U.S. to defeat the Communications Decency Act of 1996 (CDA) People were trying to control access at a local level, rather than leaving the burden up to the Internet Service Providers (ISP)

Introduction (cont) Those opposed to the CDA thought that these filtering programs would only be used in the privacy of one’s home They soon began to show up in public places such as libraries, schools, and community centers This imposes restrictions on the general public for those that choose not to purchase these filtering programs

Censorship or Not The U.S. Congress suggests that these filtering programs will be made mandatory If these programs are made mandatory, then the individuals using the software must be made aware of the filtering criteria- such as keywords, local or remote lists If these individuals are not made aware then this is a form of censorship

Filtering/Blocking Uses Restrict access to Internet Content: -Based on an internal database -Through an external database -To certain ratings assigned -By scanning content for keywords -Based on the source of information

Who Sets the Filter? Access criteria are preset by the manufacturer and can be altered by downloading updates Some may also by altered by the active user Most users are likely to use the default criteria and therefore have minimal awareness of what sites and newsgroups are unavailable

Rating Programs Rosenberg calls these rating programs, “potentially more dangerous” than filtering programs Two rating systems: -RSACi (Recreational Software Advisory Council on the Internet) -PICS (Platform for Internet Content Selection)

Rating Programs (cont) These two programs are intended to first encourage, and later require, that web site and newsgroups rate themselves along a certain number of dimensions Browsers could then be programmed to return certain results under a certain profile

Problems with Filtering/Blocking Programs The main concern is that the features for blocking access are determined by a criteria that is not the user’s Religious and political conservative groups are urging the government to take action to protect their children from Internet dangers This segment of society has set the agenda for regulation and control with the result that filtering is the only way

Mainstream Loudoun, et. al. v. Board of Trustees of the Loudoun County Library This was a court case in which a group of citizens filed a lawsuit against a library in Virginia because they installed a filtering program, known as X-Stop, on its nine computers (1997) The case was filed because the citizens believed that their first amendment rights had been compromised by restricting the access to sites that had no legal cause to be restricted

The Court’s Decision In 1998, the court ruled that the filtering program was unconstitutional and that it compromised the citizen’s first amendment rights The court also agreed that you can not block free speech information for an adult, simply because the information is unfit for minors

Canadian Library Association (CLA) CLA encourages libraries: -to incorporate Internet use principles into overall policies on access to library resources, including time, place, and manner restrictions -to educate their publics about intellectual freedom principles and the role of libraries in facilitating access to resources in various forms of media, including the Internet

American Library Association (ALA) Immediately following the U.S. Supreme Court’s decision affirming that sections of the CDA were unconstitutional, the ALA issued a statement about the use of filtering programs in libraries “Uphold the First Amendment by establishing and implementing written guidelines and policies on Internet use in your library in keeping with your library’s overall policies on access to library materials”

Where is the Argument? There is little argument about the use of filtering programs in the privacy of one’s own home However, once the software arises in the public domain, such as libraries and schools, then we would hope an informed public would use the software sparingly The argument begins when the software is brought into these public places

Other Library Associations The statements of the ALA are echoed in the recommendations of other national libraries and international library associations Ex: The International Federation of Library Associations and Institutions, (1999) “calls upon libraries and library staff to adhere to the principles of intellectual freedom, uninhibited access to information and freedom of expression and to recognize the privacy of library user”

NCLIS Recommendations National Commission on Libraries and Information Science (NCLIS) Recommendations: -Separate terminals, or multiple profiles, can be provided for adults and children - Libraries can provide Internet training, education, and other awareness programs to parents and teachers

NCLIS Recommendations (cont) Recommendations (cont): -Internet access terminals can be configured with software that can be turned on or off and restricts access to designated web sites of specific internet functions

Discussions The commitment of librarians to the basic principle of free and open access to information, whether in hard copy or in electronic form, must be supported by the population at large For public agencies to restrict access to the internet by means of filtering programs is a dangerous activity that compromises first amendment rights

Discussion (cont) One issue is that we are concerned about what “dangerous” material our children will encounter on the internet, either by choice or accidentally Rosenberg says, “Self-rating is destructive of art, quality, and self-respect”

Conclusions If filtering software is going to be used, then these guidelines should be followed: -The criteria for censoring must be approved by the Library Board -This censorship must be maintained by library staff, not an outside source -The censored web site must be listed with the reason for them being censored -Should be a procedure for members of public to ask library staff to reconsider some web sites

Conclusions (cont) In 1999, the U.S. Congress passed the Consequences for Juvenile Offenders Act, which included an amendment to install technology to screen out material “harmful” to minors, as a condition of receiving a federal Net access subsidy, known as e-rate How will harmful be defined?

Conclusions (cont) This Act was passed because of the murders of the school children in Littleton, Colorado; were they say violence and sex on the internet is to blame However, legislators found it impossible to restrict guns, a more probable factor in the Littleton tragedy than free speech If filtering if the answer, what exactly is the question?