Download presentation
Presentation is loading. Please wait.
Published byNathan Noel Pearson Modified over 9 years ago
1
Freedom of Speech
2
http://usinfo.state.gov/usa/infousa/f acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.” “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.”
3
Part 1 Changing Communications Paradigms
4
Regulatory Paradigms Internet Internet Technology has advanced since the time when the Constitution was written Technology has advanced since the time when the Constitution was written 3 specific categories the First Amendment protects within the U.S. communication technologies: 3 specific categories the First Amendment protects within the U.S. communication technologies: Print media Print media Broadcast Broadcast Common Carriers Common Carriers
5
Regulations Telecommunications Act of 1996 Telecommunications Act of 1996 What is it? What is it? Importance? Importance? Communications Decency Act (CDA) Communications Decency Act (CDA) “…uses any interactive computer service to display in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs, regardless of whether the user of such service placed the call or initiated the communication…” “…uses any interactive computer service to display in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs, regardless of whether the user of such service placed the call or initiated the communication…”(http://www.epic.org/free_speech/CDA/cda.html)
6
Part 2 Offensive Speech and Censorship in Cyberspace
7
What is out there? Pornography Pornography What about it is illegal? What about it is illegal? Controversial technological laws Controversial technological laws Attempts to protect children Attempts to protect children
8
First Attempts Federal Censorship Laws Federal Censorship Laws Federal agents monitoring people by any means necessary Federal agents monitoring people by any means necessary Cooperation from commercial services Cooperation from commercial services Software filtering Software filtering
9
Censorship Laws CDA CDA Child Online Protection Act (COPA) Child Online Protection Act (COPA) “…to obtain verifiable parental consent for the collection, use, or disclosure of personal information from children;” (http://www.ftc.gov/ogc/coppa1.htm) “…to obtain verifiable parental consent for the collection, use, or disclosure of personal information from children;” (http://www.ftc.gov/ogc/coppa1.htm) 2000 rejection; 2001 appeal; 2007 second rejection 2000 rejection; 2001 appeal; 2007 second rejection
10
Child Online Protection Commission Child Online Protection Commission COPA COPA Reports yet no proposals Reports yet no proposals Children’s Internet Protection Act (CIPA) Children’s Internet Protection Act (CIPA) “imposes certain types of requirements on any school or library that receives funding support for Internet access or internal connections from the “E-rate” program…” (http://www.fcc.gov/cgb/consumerfacts/cipa.html) “imposes certain types of requirements on any school or library that receives funding support for Internet access or internal connections from the “E-rate” program…” (http://www.fcc.gov/cgb/consumerfacts/cipa.html) Deleting Online Predators Act of 2006 Deleting Online Predators Act of 2006
11
Libaries & Schools: Filtering Filter’s Problems Filter’s Problems Controversial and Unconstitutional Controversial and Unconstitutional Perfection? Perfection? Weaknesses Weaknesses Problems in Libraries Problems in Libraries What are people accessing? What are people accessing? Some solutions to the problems Some solutions to the problems
12
Other Issues Bombs Away!!! Bombs Away!!! http://youtube.com/watch?v=h8V9u_0qzBA http://youtube.com/watch?v=h8V9u_0qzBA http://youtube.com/watch?v=h8V9u_0qzBA Federal law steps in… Federal law steps in… (http://thomas.loc.gov/cgi- bin/cpquery/T?&report=sr141&dbname=106&)
13
Censorship…really!? Government finding new ways to regulate citizens on the web Government finding new ways to regulate citizens on the web What other nations are doing What other nations are doing
14
Part 3 Anonymity
15
Issues “Anonymity on the Internet Must be Protected” “Anonymity on the Internet Must be Protected” Hide criminal activities Hide criminal activities Distribution of child pornography Distribution of child pornography Posting and downloading copyrighted material without authorization Posting and downloading copyrighted material without authorization Hard to track terrorists and criminals Hard to track terrorists and criminals Discussion on socially sensitive topics Discussion on socially sensitive topics Open discussions Open discussions
16
Models Society (Journal), “Internet and Anonymity” Society (Journal), “Internet and Anonymity” Libertarian Model Libertarian Model Private Enterprise Model Private Enterprise Model Statist Model Statist Model
17
Libertarian Model Minimal to no govt. regulation Minimal to no govt. regulation Peer pressure prevents abusive posts Peer pressure prevents abusive posts Site Administrators can delete or remove accounts Site Administrators can delete or remove accounts
18
Private Enterprise Model E-commerce based E-commerce based Customer privacy and information can be compromised Customer privacy and information can be compromised
19
Statist Model Internet should be regulated by government Internet should be regulated by government Citizens are always subordinate to the government Citizens are always subordinate to the government
20
Anonymous Browsing Businesses Businesses Businesses cannot get demographic characteristics of frequent viewers Businesses cannot get demographic characteristics of frequent viewers Statists Statists Fear communication between criminals with each other and with victims Fear communication between criminals with each other and with victims Libertarians Libertarians Individuals have a choice whether they want to be anonymous or not Individuals have a choice whether they want to be anonymous or not
21
Laws against Anonymity Require ISPs to maintain records of true identity of users and records of online activity for a specified period of time Require ISPs to maintain records of true identity of users and records of online activity for a specified period of time We can send hardcopy mail without a return address; should there be more restrictions on anonymity on the Net than in other contexts? We can send hardcopy mail without a return address; should there be more restrictions on anonymity on the Net than in other contexts?
22
Part 4 Spam
23
Development Definition Definition Unsolicited mass e-mail; mostly commercial Unsolicited mass e-mail; mostly commercial Cost Cost Much cheaper than printed direct-mail advertising Much cheaper than printed direct-mail advertising First case of spamming First case of spamming Advertising messages sent by a law firm to over 6000 bulletin boards and newsgroups in 1994 Advertising messages sent by a law firm to over 6000 bulletin boards and newsgroups in 1994
24
Issues Content Content Advertisement, pornography, “get rich quick” schemes Advertisement, pornography, “get rich quick” schemes “Junk Mail” “Junk Mail” Cost users money Cost users money
25
Cases AOL vs. Cyber Promotions AOL vs. Cyber Promotions 1996, half the e-mails received at AOL was spam – mostly from Cyber Promotions 1996, half the e-mails received at AOL was spam – mostly from Cyber Promotions AOL filtered out their e-mails. AOL filtered out their e-mails. Cyber Promotions obtained injunction against AOL from its use of filters, claiming it’s First Amendment rights were violated Cyber Promotions obtained injunction against AOL from its use of filters, claiming it’s First Amendment rights were violated
26
Cases (2) Intel Employee Intel Employee Ken Hamidi sent mass mailings to over 30,000 Intel Employees. Ken Hamidi sent mass mailings to over 30,000 Intel Employees. He disguised return address to avoid filters He disguised return address to avoid filters Not commercial e-mail, but is it still spam? Not commercial e-mail, but is it still spam?
27
Cases (3) Human Rights and Political Organizations Human Rights and Political Organizations Amnesty International use thousands of volunteers to send mass mail to countries when a political prisoner was being tortured or executed. Amnesty International use thousands of volunteers to send mass mail to countries when a political prisoner was being tortured or executed. Now, volunteers can go online and send pre- written mail to government officials. Now, volunteers can go online and send pre- written mail to government officials.
28
Cases (4) Harris Interactive (Harris polls) Harris Interactive (Harris polls) Sued Mail Abuse Prevention System (MAPS) for putting them on their blacklist Sued Mail Abuse Prevention System (MAPS) for putting them on their blacklist Harris claimed people signed up to receive it Harris claimed people signed up to receive it
29
Suggested Solutions Increase cost of sending e-mails Increase cost of sending e-mails Anti-Spam laws Anti-Spam laws Spam must include valid email reply address Spam must include valid email reply address False, misleading subject lines prohibited False, misleading subject lines prohibited Issues with anti-spam laws Issues with anti-spam laws CAN-SPAM Act of 2003 CAN-SPAM Act of 2003 Who determines what spam is? Who determines what spam is? What happens in other countries? What happens in other countries?
30
Part 5 Ensuring Valuable and Diverse Content
31
Ensuring Content Diversity Importance of ensuring valuable content on web Importance of ensuring valuable content on web 1990, if left to big companies, then web will be filled with advertisements and shopping malls 1990, if left to big companies, then web will be filled with advertisements and shopping malls “Public spaces” “Public spaces” Issues with tax-funded content Issues with tax-funded content
32
Other Information Media Parallels between Internet and printing press Parallels between Internet and printing press Worried about printing junk fiction, magazines filled with advertisements and no good educational books Worried about printing junk fiction, magazines filled with advertisements and no good educational books Who controls the printing press? Who controls the printing press?
33
Who prevents diversity? Mergers Mergers AOL and Time Warner AOL and Time Warner Commercial Interests Commercial Interests Large companies Large companies TV networks vs. cable TV networks vs. cable Small radio stations Small radio stations
34
Discussion To what extent is violence on the Web and in computer games responsible for shootings in school? What should be done about it, without violating the First Amendment? To what extent is violence on the Web and in computer games responsible for shootings in school? What should be done about it, without violating the First Amendment? Should ISPs be required by law to keep records on the real identity of all users? Should ISPs be required by law to keep records on the real identity of all users? Should spam be considered a form of trespass? Restaurants are open to the public but can exclude rowdy people. What rules or laws does that analogy suggest about sending spam to subscribers of an ISP? Is the First Amendment more relevant in one case than in the other? Should spam be considered a form of trespass? Restaurants are open to the public but can exclude rowdy people. What rules or laws does that analogy suggest about sending spam to subscribers of an ISP? Is the First Amendment more relevant in one case than in the other?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.