School of Information - The University of Texas at Austin LIS 386.13, Information Technologies & the Information Professions LIS 386.13 Information Technologies.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Chapter 4: Federalism.
LAPSI 4th Thematic Seminar Muenster, January 27, 2011 Should the information held by research institutions be included in the EU Directive on PSI Re-use?
Street Law Chapter 1.
Whistle-Blowing Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
DEFAMATION Torts protecting the reputation. Traditional role of the courts Protection of individuals from the damage that can be caused to the reputation.
The Federal Courts Chapter 16. The Nature of the Judicial System Introduction: – Two types of cases: Criminal Law: The government charges and individual.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 4
Street Law Chapter 1.
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
INTRODUCTION An ICT policy is in the final stages of being adopted; Provisions in the policy and related strategies which are meant to facilitate policy.
Censorship Knowledge is powerful, dangerous, and deadly!
Your Rights Under the Internet Law By: Sannita S. Lam.
Law for Business and Personal Use
HSC: All My Own Work Copyright.
An Introduction to Copyright Central Michigan University Libraries January, 2013.
Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law Image courtesy of privacy-please/
Criminal and Civil. Jurisdiction over the court system is divided between federal and provincial governments. The provinces organize and maintain their.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 3
Security Services Constitutional Issues in Private Security.
Due Process and Equal Protection
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
Newsgathering: Access to Meetings & Records. Access and the First Amendment How has the U.S. Supreme Court responded to claims that the First Amendment.
Privacy After Nixon's resignation, the govt took control of all of his presidential records, including the tapes, in the Presidential Recordings and Materials.
Introduction to Family Law Divorce and division of property.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
What is Law? Jurisprudence is devoted to answering this question!
The Meaning of Citizenship
What are the rights and responsibilities of citizenship
Jennifer Oglesby MEDT 8464 Fall, Public Domain  “The public domain is an enormous mass of intellectual property which includes songs, books, movies,
Section 12.2 You and the Legal System Back to Table of Contents.
Chapter 4: Federalism Section 2
LAW AND POLITICS The aim of this tutorial is to help you learn to identify and evaluate the foundations of the American legal and political system.
New Global Media and the Role of the State Book review of “ The handbook of new media” Qiong Tang Course: Internet and New Media.
Business Ethics Lecture Rights and Duties 1.
Censorship Knowledge is powerful, dangerous, and deadly!
Chapter 20: Civil Liberties: Protecting Individual Rights Section 3.
Chapter 5.  It creates the three branches of government  Executive  Legislative  Judicial  It allocates powers to these branches  It protects individual.
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
Legal Issues in Digital Media Basic Concepts. Legal Issues in Digital Media Ethics: Values relating to human conduct, with respect to the rightness and.
The Judicial Branch The main job of the Judicial Branch is to interpret the laws!
1 LIS 205: Introduction to Information Sources & Services Unit 7: Ethical Reference Service Kevin Rioux, PhD Division of Library and Information Science.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
HSC: All My Own Work What is copyright and what does it protect? How does it relate to me?
When young people go online:  13% received unwanted sexual solicitations  34% communicate with individuals they never met  11% establish close personal.
Internet Research Law and Ethics. Consider the Law Legal and ethical issues help us broaden considerably our study of Internet research. Even relatively.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Categories of Law. The Law The broadest categories of law are International Law and Domestic Law.
What does it mean to be a citizen of the United States?
THE JUDICIAL BRANCH Today’s Objective: C-3 To gather information on the structure of the judicial branch and the ideological tendencies of the Supreme.
Basic Principles: Ethics and Business
UNITS 4:3-4:4 Patients’ Rights and Legal Directives for Health Care.
100 The Judicial Branch Kinds Of Courts Court Terms The Supreme Court Decisions Round 2.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Types of Courts Unit A Objective Dual Court System Federal Court System State Court System.
What is Law?  Jurisprudence – the study of law and legal philosophy  Law can be defined as the rules and regulations made and enforced by government.
CHAPTER 2 LEGAL INSTITUTIONS
Bell Work: List 5 things that you did this morning.
LIS Information Technologies and the Information Professions Introduction to Information Policy Philip Doty and R. E. Wyllys Copyright © 2001.
Lesson 27: What Are Bills of Rights and What Kinds of Rights Does the US Bill of Rights Protect?
PART III Ethical Issues in Business
The Federal Court System
Lessons Learned, Now and Later
Information management and communication
What Would You Do? Ethics in Travel and Tourism Management.
Chapter 4 Dental Ethics.
Presentation transcript:

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions LIS Information Technologies and the Information Professions Introduction to Information Policy Philip Doty and R. E. Wyllys Copyright © 2001 by Philip Doty and R. E. Wyllys Last revised 2003 Mar 23

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Lesson Objectives You will –Acquire an introductory understanding of Information Policy and its areas of concern

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions What Is Information Policy? Information policy is –The rules and procedures, both formal and informal, both de jure and de facto, that affect, both positively and negatively, the flow of information in society Information policy concerns us all because –Information has value--often very high value –Many people and organizations come into conflict over rights, both real and claimed, to various pieces and various domains of information –Information is inextricably entwined with many public concerns

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions What Does Information Policy Study? As an area of study, information policy is concerned with such matters as –Censorship –Freedom of access to government information –Limitations on access to private information –Copyright and other rights to intellectual property –Dissemination of government information –Literacy

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions What Does Information Policy Study? (cont'd) Information policy is also concerned with the development of standards to –Facilitate access to public information –Guard the privacy of private information –Assist in the management of records and the selective preservation of information Many difficult questions arise when we examine carefully the issues on this and the preceding slide, especially from the standpoint of writing laws to deal with them.

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Censorship Most people applaud freedom of speech and oppose censorship--except in certain areas, such as –Information about their own private and personal matters, such as How much money do you have in the bank? What do you sometimes do when no one is looking? –Obscene materials What is obscenity? How can it be defined? Should there be different rights of access to obscene materials for adults vs. for children?

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Censorship (cont'd) Obscene materials raise some especially difficult issues. For example: Should child pornography be banned outright? –My answer is that I agree with the long-standing legal argument that it should be banned, on the grounds that, using photography, an item of child pornography can exist only as the result of sexual abuse of a child. –But digital-image techniques have now developed to such a degree that artists can create wholly fictional images that are indistinguishable from photographs. What does this fact do to the argument for banning child pornography? And how could legislators write a law banning child pornography but not pictures created wholly by the imaginations of artists?

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Access to Government Information In the U.S., freedom of information laws at the Federal level and in most states guarantee the right of the public to have access to most, but not all, of the information that the governments have. –Exceptions include: Personnel records Military and diplomatic information –To what extent are such exceptions justified? What limits should be placed on such exceptions?

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Rights to Private Information? What rights do private individuals have to keep information private? to conceal information? –If you know that a defendant in a murder trial is innocent, should you be forced to reveal that information? Even if doing so would embarrass you? Even if doing so would harm you or a member of your family?

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Rights to Private Information? Most people tend to consider privacy as a right to which they attach high value, and they fear invasions of their privacy by other individuals and by government and private agencies and organizations.

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Rights to Private Information? But there are people who argue that the value of privacy is overrated and that certain losses of privacy serve a beneficial purpose. For example: –Declan McCullagh, in "Why Internet Privacy Is Overrated," argues that "Compiling personal information lets businesses become more efficient and produce only products that people want. It reduces waste... [and] helps in customization."Why Internet Privacy Is Overrated –David Plotz, in "Privacy Is Overrated" (Reader's Digest, March 2003, ), declares similarly that "surveillance cameras reduce shoplifting and stop ATM robberies.... Lack of privacy actually tends to fight crime, not cause it." Further, "One wonderful, terrible thing about modern capitalism is that companies don't care. You are not a person. You are a wallet." And finally, "The Internet allows people who have peculiar interests, social awkwardness or debilitating health problems to create communities that never could have existed before."

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Copyright Concerns Copyright originated as the right of an author to earn money from his or her work. It has been extended so that organizations can hold copyright, and the period of copyright has been extended to the life of the author plus 70 years. –Though a "life + 70" period may be justifiable for a human author, can it really be justified for a corporate author? Note that an analogous right, a patent, carries a maximum period of only 20 years. How can copyright be exerted meaningfully in an era of electronic copying, e.g., Napster?

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Dissemination of Government Information What obligations do governments have to make access to their information –Available readily to all? –Available only to qualified persons and organizations? Qualified how? –To make reasonable charges for supplying information? After all, supplying information does cost money that must come either from the user(s) of the information or from taxpayers in general?

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Literacy What obligations do governments have to ensure literacy among their publics? –We can all agree that democracies, in their own self-interest, must promote literacy among their citizens. –But what constitutes an "adequate" level of literacy? An eighth-grade reading level? –And what should governments ensure in the areas of literacy with respect to Numbers ("numeracy") The use of computers (computer literacy)? The use of media tools?

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Information Policy The questions we have been asking illustrate why every concerned citizen of a democracy should--and, even more so, every member of the library and information professions needs--to –Be aware of Information Policy studies –To participate in society's efforts to answer such questions

School of Information - The University of Texas at Austin LIS , Information Technologies & the Information Professions Information Policy Deals with Many Difficult Questions and Divisive Social Issues