Chapter 3: Networking

Size: px
Start display at page:

Download "Chapter 3: Networking"

Transcription

1 Chapter 3: Networking Ethics for the Information Age Third Edition by Michael J. Quinn Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

2 Chapter Overview (1/2) Introduction and spam Fighting spam World Wide Web Ethical perspectives on pornography 1-2 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-2

3 Chapter Overview (2/2) Censorship Freedom of expression Children and the Web Breaking trust on the Internet Internet addiction 1-3 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-3

4 Introduction Networking increases computer s utility Internet connects millions of computers Powerful computational resource Even more powerful communication medium Network utility grows as number of users squared 10 users 90 sender-receiver combinations 100 users 9900 sender-receiver combinations 1-4 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-4

5 How Works Messages embedded in files transferred between computers address: Uniquely identifies cyberspace mailbox Messages broken into packets Routers transfer packets from sender s mail server to receiver s mail server 1-5 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-5

6 The Spam Epidemic (1/2) Spam: Unsolicited, bulk Amount of that is spam has increased 8% in % in % in 2007 Spam is effective More than 100 times cheaper than junk mail Profitable even if only 1 in 100,000 buys product 1-6 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-6

7 The Spam Epidemic (2/2) How firms get addresses Opt-in lists Dictionary attacks Spammers seek anonymity Change and IP addresses to disguise sending machine Hijack another system as a spam launch pad Spam blockers Attempt to screen out spam Have led to more picture-based spam 1-7 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-7

8 Ethical Evaluations of Spamming Kantian evaluation Act utilitarian evaluation Rule utilitarian evaluation Social contract theory evaluation From all these perspectives, it is wrong to send spam 1-8 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-8

9 Fighting Spam Real-Time Blackhole List run by Trend Micro Ethical evaluations of blacklisting by Trend Micro Proposed solutions to the spam epidemic CAN SPAM Act of 2003 Emergence of spim Need for socio-technical solutions 1-9 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-9

10 Real-Time Blackhole List Trend Micro contacts marketers who violate standards for bulk It puts marketers who violate standards on the Real-Time Blackhole List (RBL) Some mail relays refer to RBL list Looks up host name on RBL list If name on list, the gets bounced back All from blacklisted hosts gets bounced, even from non-spammers 1-10 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-10

11 Ethical Evaluations of Publishing Blacklist Social contract theory evaluation Utilitarian evaluation Kantian evaluation 1-11 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-11

12 Proposed Solutions to Spam Epidemic Require an explicit opt-in of subscribers Require labeling of advertising Add a cost to every that is sent Ban unsolicited Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-12

13 CAN SPAM Act of 2003 Took effect January 1, 2004 Consumers have right to opt out Sexually explicit messages must contain subject line notice Prohibits dictionary attacks and falsifying header information Critics call it You CAN Spam Act Spam still legal, as long as regulations followed Opting out can have harmful consequences Federal law weaker than state laws it preempted Spammers can avoid prosecution by locating outside United States 1-13 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-13

14 Emergence of Spim Spim is an unsolicited, bulk instant message People combat spim by accepting messages only from friends or buddies 1-14 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-14

15 Need for Socio-Technical Solutions New technologies sometimes cause new social situations to emerge Calculators feminization of bookkeeping Telephones blurred work/home boundaries Spam an example of this phenomenon messages practically free Profits increase with number of messages sent Strong motivation to send more messages Internet design allows unfair, one-way communications 1-15 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-15

16 Attributes of the Web It is decentralized Every Web object has a unique address It is based on the Internet 1-16 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-16

17 How We Use the Web Shopping Contributing content (wikis, blogs) Promoting business Learning Exploring our roots Entering virtual worlds Paying taxes Gambling Lots more! 1-17 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-17

18 Too Much Control or Too Little? Not everyone in world has Internet access Saudi Arabia: centralized control center People s Republic of China: ISPs sign self-discipline agreement Germany: Forbids access to neo-nazi sites United States: Repeated efforts to limit access of minors to pornography 1-18 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-18

19 Pornography Is Immoral Kant Loved person an object of sexual appetite Sexual desire focuses on body, not complete person All sexual gratification outside marriage wrong Utilitarianism Pornography reduces dignity of human life Pornography increases crimes such as rape Pornography reduces sympathy for rape victims Pornography is like pollution Pornography industry diverts resources from more socially redeeming activities 1-19 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-19

20 Adult Pornography Is Moral Utilitarianism Those who produce pornography make money Consumers of pornography derive physical pleasure Pornography is a harmless outlet for exploring sexual fantasies 1-20 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-20

21 Commentary Performing utilitarian calculus is difficult How to deal with contradictory facts by experts? How to quantify harms/benefits, such as harm done to people who find pornography offensive? 1-21 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-21

22 Direct Censorship Government monopolization Prepublication review Licensing and registration 1-22 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-22

23 Self-censorship Most common form of censorship Group decides for itself not to publish Reasons Avoid subsequent persecution Maintain good relations with government officials (sources of information) Ratings systems Movies, TVs, CDs, video games Not the Web 1-23 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-23

24 Challenges Posed by the Internet Many-to-many communication Dynamic connections Huge numbers of Web sites Extends beyond national borders, laws Can t determine age of users 1-24 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-24

25 Ethical Perspectives on Censorship Kant opposed censorship Enlightenment thinker Have courage to use your own reason Mill opposed censorship No one is infallible Any opinion may contain a kernel of truth Truth revealed in class of ideas Ideas resulting from discourse are more influential 1-25 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-25

26 Mill s Principle of Harm The only ground on which intervention is justified is to prevent harm to others; the individual s own good is not a sufficient condition Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-26

27 Freedom of Expression: History De Scandalis Magnatum (England, 1275) Court of Star Chamber 18 th century No prior restraints on publication People could be punished for sedition or libel American states adopted bills of rights including freedom of expression Freedom of expression in 1 st amendment to U.S. Constitution 1-27 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-27

28 1 st Amendment to U.S. Constitution Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-28

29 Freedom of Expression Not an Absolute Right 1 st Amendment covers political and nonpolitical speech Right to freedom of expression must be balanced against the public good Various restrictions on freedom of expression exist 1-29 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-29

30 FCC v. Pacifica Foundation et al. George Carlin records Filthy Words WBAI in New York airs Filthy Words (1973) FCC issues declaratory order to Pacifica Pacifica sues U.S. Supreme Court ruled FCC did not violate 1 st Amendment (5-4 decision) Broadcast media uniquely pervasive Broadcasting uniquely accessible to children 1-30 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-30

31 Web Filters Web filter: software that prevents display of certain Web pages May be installed on an individual PC ISP may provide service for customers Methodologies Maintain black list of objectionable sites Examine content for objectionable words/phrases 1-31 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-31

32 Child Internet Protection Act Libraries receiving federal networking funds must filter pages containing obscenity or child pornography U.S. Supreme Court ruled CIPA did not violate 1 st Amendment guarantees (6-3 decision in June 2003) 1-32 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-32

33 Ethical Evaluations of CIPA Kantian evaluation: CIPA is wrong Act utilitarian evaluation: depends on how benefits and harms are weighed Social contract theory: freedom of conscience should be given precedence 1-33 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-33

34 Identity Theft Identity theft: when a person uses another person s electronic identity Leading form: credit card fraud (more about this in Chapter 5) Many victims are experienced computer users comfortable with typing credit card number online 1-34 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-34

35 Chat Room Predators Chat room: supports real-time discussions among many people connected to network Instant messaging and chat rooms replacing telephone for many people Some pedophiles meeting children through chat rooms Police countering with sting operations 1-35 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-35

36 Ethical Evaluations of Stings Utilitarian evaluation Kantian evaluation Social contract theory evaluation 1-36 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-36

37 False Information Quality of Web-based information varies widely Other media also have information of varying quality The New York Times v. The National Enquirer 60 Minutes v. Conspiracy Theory Google attempts to reward quality Ranking uses voting algorithm If many links point to a page, Google search engine ranks that page higher 1-37 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-37

38 Is Internet Addiction Real? Some liken compulsive computer use to pathological gambling Traditional definition of addiction: Compulsive use of harmful substance or drug Knowledge of its long-term harm Kimberly Young created test for Internet addiction Her test is controversial 1-38 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-38

39 Contributing Factors Social factors Peer groups Situational factors Stress Lack of social support and intimacy Limited opportunities for productive activity Individual factors Tendency to pursue activities to excess Lack of achievement Fear of failure 1-39 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-39

40 Ethical Evaluation Enlightenment view Individuals can and should govern their lives People are responsible for their choices Jeffrey Reiman s view Addict s behavior makes sense if addict has no hope for a better future Society bears responsibility for putting people in hopeless situations 1-40 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 3-40

China s Anti-Spam Works

China s Anti-Spam Works China s Anti-Spam Works Jingguang FU Ministry of Information Industry, China Geneva 7-9 July 2004 China s current situation of spam problem China is a serious victim of spam problem. A survey shows that

More information

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography

More information

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS 1. WHY CAN T THE GOVERNMENT BAN USE OF THE INTERNET TO SPREAD HATEFUL AND RACIST IDEOLOGY IN THE UNITED STATES? The Internet is probably

More information

The DMA s Analysis of Can Spam Act of 2003

The DMA s Analysis of Can Spam Act of 2003 The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Dr. Jehad Al Amri and Dr. Salha Al Zahrani 02/12/2013. Computing Ethics. Lecture 7 Privacy. Dr. Jehad Al Amri and Dr. Salha Al Zahrani 1

Dr. Jehad Al Amri and Dr. Salha Al Zahrani 02/12/2013. Computing Ethics. Lecture 7 Privacy. Dr. Jehad Al Amri and Dr. Salha Al Zahrani 1 Computing Ethics Lecture 7 Privacy Dr. Jehad Al Amri and Dr. Salha Al Zahrani 1 1 2 Outline Learning Outcomes Computer Revolution and Ethics TheConcept of Privacy Privacy concepts in different cultures

More information

Congress Passes New Anti-Spam Legislation

Congress Passes New Anti-Spam Legislation DECEMBER 2003 Congress Passes New Anti-Spam Legislation On December 16, 2003, President Bush signed into law the Controlling the Assault of Non-Solicited Pornography and Marketing Act (the CAN-SPAM Act

More information

FKCC AUP/LOCAL AUTHORITY

FKCC AUP/LOCAL AUTHORITY FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and

More information

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

(Internet) for students, staff and, if requested, members of the Board of Education. All computer 4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance

More information

A Survey on Spam Filtering for Online Social Networks

A Survey on Spam Filtering for Online Social Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Privacy, Data Collection and Information Management Practice Team November 13, 2003

Privacy, Data Collection and Information Management Practice Team November 13, 2003 Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted

More information

Communications and Information Technology Commission. Suggested SPAM Monitoring Framework for CITC

Communications and Information Technology Commission. Suggested SPAM Monitoring Framework for CITC Communications and Information Technology Commission Suggested SPAM Monitoring Framework for CITC 23/02/2008 Submitted to: Submitted By: Suggested SPAM Monitoring Framework Identification of Legal Domains

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Social Media Legal Issues: To Friend or Not to Friend

Social Media Legal Issues: To Friend or Not to Friend Social Networking Social Media Legal Issues: To Friend or Not to Friend New town square. The law as developed is being applied to a totally new medium. Mark Hagemeier, Associate General Counsel University

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

Spam DNA Filtering System

Spam DNA Filtering System The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,

More information

Anti-Spam Methodologies: A Comparative Study

Anti-Spam Methodologies: A Comparative Study Anti-Spam Methodologies: A Comparative Study Saima Hasib, Mahak Motwani, Amit Saxena Truba Institute of Engineering and Information Technology Bhopal (M.P),India Abstract: E-mail is an essential communication

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

WYANDOTTE ONLINE ACCEPTABLE USE POLICY

WYANDOTTE ONLINE ACCEPTABLE USE POLICY WYANDOTTE ONLINE ACCEPTABLE USE POLICY Wyandotte Online may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Online High Speed Internet users should

More information

Acceptable Use Policy of UNWIRED Ltd.

Acceptable Use Policy of UNWIRED Ltd. Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network

More information

escan Anti-Spam White Paper

escan Anti-Spam White Paper escan Anti-Spam White Paper Document Version (esnas 14.0.0.1) Creation Date: 19 th Feb, 2013 Preface The purpose of this document is to discuss issues and problems associated with spam email, describe

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6 LAKE-SUMTER COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06 REFERENCE: Board Rule 2.16 PAGE 1 OF 6 1. General Information a. LSCC Information Systems (IS)

More information

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

Chapter 6 The Constitution and Business. Laws that govern business have their origin in the lawmaking authority granted by the federal constitution.

Chapter 6 The Constitution and Business. Laws that govern business have their origin in the lawmaking authority granted by the federal constitution. Chapter 6 The Constitution and Business Laws that govern business have their origin in the lawmaking authority granted by the federal constitution. The Constitutional Powers of Government The Constitution

More information

firstamendmentcenter.org Your First Freedoms A Basic Guide to the First Amendment

firstamendmentcenter.org Your First Freedoms A Basic Guide to the First Amendment firstamendmentcenter.org Your First Freedoms A Basic Guide to the First Amendment Q: What is the First Amendment and where does it come from? A: The First Amendment consists of 45 words added to the Constitution

More information

LCC xdsl Usage Policy

LCC xdsl Usage Policy LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These

More information

Fusion Acceptable Use Policy. Effective Feb 2, 2015

Fusion Acceptable Use Policy. Effective Feb 2, 2015 Fusion Acceptable Use Policy Effective Feb 2, 2015 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer or Customer s end users) the ability to learn about Fusion and

More information

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Service Protection Under The Provider's Acceptable Use Policy

Service Protection Under The Provider's Acceptable Use Policy Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the

More information

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used? TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

JPC 313 Movies and the First Amendment Fall 2006 Online course

JPC 313 Movies and the First Amendment Fall 2006 Online course Online at http://jpc.uaa.alaska.edu/~crich/movies/syllabus.html Mirrored on Blackboard Home Syllabus Assignments Readings JPC 313 Movies and the First Amendment Fall 2006 Online course Professor Carole

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its

More information

E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP

E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP This Practice Note is published by Practical Law Company on its PLC Law Department web

More information

DoSPOT (Free Internet Connection Service) - Terms of Use

DoSPOT (Free Internet Connection Service) - Terms of Use DoSPOT (Free Internet Connection Service) - Terms of Use (Purpose) Article 1 The DoSPOT Terms of Use (hereinafter referred to as the "Rules") define the conditions of use that apply to users of DoSPOT

More information

Email Spam and the Ethics of An3spam measures

Email Spam and the Ethics of An3spam measures Email Spam and the Ethics of An3spam measures Behrooz Sangchoolie Chalmers PhD Course in Ethics and Philosophy of Compu3ng 2015 What is an Email Spam? Emails that are sent to someone without that person

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Ocean County Library policies concerning Computer and Internet Use and Rules of Conduct apply to guest users as well as library card holders.

Ocean County Library policies concerning Computer and Internet Use and Rules of Conduct apply to guest users as well as library card holders. Overview The Ocean County Library provides computers and internet access as a means to enhance information, learning, recreational and cultural opportunities for the residents of Ocean County. As information

More information

ARE YOU DOING E-MAIL MARKETING? LEGALLY?

ARE YOU DOING E-MAIL MARKETING? LEGALLY? ARE YOU DOING E-MAIL MARKETING? LEGALLY? Copyright 2008, Michael D. Jenkins, J.D., CPA All Rights Reserved Since so many small businesses now do a substantial part of their marketing on the Internet, it

More information

Spam: What Consumers Really Think

Spam: What Consumers Really Think From First Click to Lifetime Customer WHITE PAPER Spam: What Consumers Really Think Survey Finds Growing Anger; Advice for Avoiding Recipients Wrath SPAM: WHAT CONSUMERS REALLY THINK Survey finds growing

More information

Professional Ethics for Computer Science

Professional Ethics for Computer Science Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:

More information

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,

More information

b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way. 1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the

More information

Tagged s AdWords

Tagged s AdWords Tagged s advertising inventory is available on the Google Display Network. Using the Google Display Network (GDN), you can specify Tagged for your ad campaign. In addition, GDN offers you the ability to

More information

Dauphin County Technical School

Dauphin County Technical School Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,

More information

1801 North Main Street www.mitchelltelecom.com Phone: 605-990-1000 Mitchell, SD 57301 Office Hours: M-F 8am-5pm Fax: 605-990-1010

1801 North Main Street www.mitchelltelecom.com Phone: 605-990-1000 Mitchell, SD 57301 Office Hours: M-F 8am-5pm Fax: 605-990-1010 1801 North Main Street www.mitchelltelecom.com Phone: 605-990-1000 Mitchell, SD 57301 Office Hours: M-F 8am-5pm Fax: 605-990-1010 ACCEPTABLE USE POLICY Mitchell Telecom provides to business and consumer

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Computing, Python and Robots Net Neutrality

Computing, Python and Robots Net Neutrality Department of Computer Science University of San Francisco p. 1/? Computing, Python and Robots Net Neutrality Chris Brooks Department of Computer Science University of San Francisco Department of Computer

More information

RAMPART HOSTING, LLC ACCEPTABLE USE POLICY ("AUP")

RAMPART HOSTING, LLC ACCEPTABLE USE POLICY (AUP) RAMPART HOSTING, LLC ACCEPTABLE USE POLICY ("AUP") 1. General Information. As a provider of Internet/World Wide Web access, web site hosting, and other Internet-related Services, Rampart Hosting, LLC.

More information

Mandatory Internet Censorship in Australia?

Mandatory Internet Censorship in Australia? Mandatory Internet Censorship in Australia? Introduction In December 2009, the Australian Federal Government released the results of a trial of Internet filtering technology and announced its intention

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

BOARD OF EDUCATION POLICY

BOARD OF EDUCATION POLICY BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate

More information

Webnet s Acceptable Use Policy ("AUP")

Webnet s Acceptable Use Policy (AUP) Webnet s Acceptable Use Policy ("AUP") General Statement Webnet is dedicated to the unrestricted free transmission of information via the internet and its many resources. Our goal is to deliver enterprise

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

2015 STATE OF THE FIRST AMENDMENT SURVEY A Project Sponsored by the Newseum Institute

2015 STATE OF THE FIRST AMENDMENT SURVEY A Project Sponsored by the Newseum Institute 2015 STATE OF THE FIRST AMENDMENT SURVEY A Project Sponsored by the Newseum Institute The Newseum Institute has supported an annual national survey of American attitudes about the First Amendment since

More information

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology

More information

Is Spam Bad For Your Mailbox?

Is Spam Bad For Your Mailbox? Whitepaper Spam and Ham Spam and Ham A Simple Guide Fauzi Yunos 12 Page2 Executive Summary People tend to be much less bothered by spam slipping through filters into their mail box (false negatives), than

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

Users and customers of Services provided by RakaHost must accept the terms and conditions of business set out below.

Users and customers of Services provided by RakaHost must accept the terms and conditions of business set out below. Users and customers of Services provided by RakaHost must accept the terms and conditions of business set out below. We make no representation that the domain name you wish to register is capable of being

More information

Heart of Iowa Communications Cooperative. Acceptable Use and Network Management Policy

Heart of Iowa Communications Cooperative. Acceptable Use and Network Management Policy Heart of Iowa Communications Cooperative Acceptable Use and Network Management Policy Heart of Iowa Communications Cooperative (hereinafter Heart of Iowa ) inclusive of its affiliates, Heart of Iowa Ventures,

More information

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224 COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist

More information

The Japanese Experience Countering Spam ITU TELECOM WORLD 2006

The Japanese Experience Countering Spam ITU TELECOM WORLD 2006 The Japanese Experience Countering Spam ITU TELECOM WORLD 2006 8th December 2006 Shuji Sakuraba Copyright 2006 Present condition of spam in Japan - I 2004 Media Sent to mobiles 66 % Sent to PCs 34 % 2005

More information

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks MAINE COMMUNITY COLLEGE SYSTEM GENERAL ADMINISTRATION Section 203 SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks As with any college

More information

Lyndale Neighborhood Association List Serve Policy Adopted on: 5/14/07 Last Amended on:

Lyndale Neighborhood Association List Serve Policy Adopted on: 5/14/07 Last Amended on: Lyndale Neighborhood Association List Serve Policy Adopted on: 5/14/07 Last Amended on: The purpose of this policy is to promote civil dialogue between Lyndale Residents and the Lyndale Neighborhood Association

More information

ACCEPTABLE USE POLICY. General Notice

ACCEPTABLE USE POLICY. General Notice ACCEPTABLE USE POLICY General Notice Thank you for reading NetDay Association s Acceptable Use Policy (AUP). By accessing this website, or by contracting with us for service, you agree, without limitation

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY As a provider of web site hosting and other Internet-related services, ConstantVPS offers its customer (also known as Subscribers ) and their customers and users the means to acquire

More information

white paper Glossary of Spam Terms The jargon of the spam industry

white paper Glossary of Spam Terms The jargon of the spam industry white paper Glossary of Spam Terms The jargon of the spam industry Table of Contents A Acceptable Use Policy (AUP)..................................................... 5 Alias...........................................................................

More information

ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON

ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON PRB 09-24E ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON Alysia Davies Legal and Legislative Affairs Division 18 January 2010 PARLIAMENTARY INFORMATION AND RESEARCH SERVICE SERVICE D INFORMATION ET

More information

INFORMATION AND COMMUNICATION TECHNOLOGY REGULATIONS (Acceptable Use and Internet Safety)

INFORMATION AND COMMUNICATION TECHNOLOGY REGULATIONS (Acceptable Use and Internet Safety) INFORMATION AND COMMUNICATION TECHNOLOGY REGULATIONS (Acceptable Use and Internet Safety) Purpose The Information and Communication Technology (ICT) systems of the District are limited to an educational

More information

Legal - Acceptable Use Policy. AOLC On-line Acceptable Use Policy (AUP) Introduction

Legal - Acceptable Use Policy. AOLC On-line Acceptable Use Policy (AUP) Introduction Legal - Acceptable Use Policy AOLC On-line Acceptable Use Policy (AUP) Introduction Thank you for reading AOLC On-line's Acceptable Use Policy (AUP). By accessing this website, or by contracting with us

More information

The Use of Internet Filters

The Use of Internet Filters The Use of Internet Filters Introduction The use of internet filters as a method to block offensive internet content in schools and universities is very delicate question, especially because it involves

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Communications Internet Acceptable Use Policy

Communications Internet Acceptable Use Policy Communications Internet Acceptable Use Policy Introduction Xact Associates, LLC dba Xact Communications and its affiliates and subsidiaries ("Xact," "we," or "us") appreciate the opportunity to provide

More information

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Beaumont Public Library Computer Usage Policies

Beaumont Public Library Computer Usage Policies Beaumont Public Library Computer Usage Policies Information contained in this document is on internet safety, use guidelines, internet filtering, and wireless internet. The Beaumont Public Library, in

More information

Anti-SPAM Policy v.3 06-01-2011

Anti-SPAM Policy v.3 06-01-2011 Anti-SPAM Policy v.3 06-01-2011 Each user must agree to this policy. comf5 has a no tolerance policy for the sending of spam and unsolicited email, and we prohibit the use of third-party, purchased, rented,

More information

Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014

Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Plymouth School of Creative Arts Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) 1 st Sep 2014 Why Bring Your Own Device? Technology is now an essential part of education. To be able to live,

More information

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network

More information

Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools

Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools Students should use technology and the Internet in an appropriate manner. Technology is an integral part of a student s educational

More information

E-Commerce Strategy. Electronic Commerce

E-Commerce Strategy. Electronic Commerce E-Commerce Strategy Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 02.

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

Kingdom of Saudi Arabia Communication and Information Technology Commission. Public Consultation Document On the Anti-SPAM Policy Framework

Kingdom of Saudi Arabia Communication and Information Technology Commission. Public Consultation Document On the Anti-SPAM Policy Framework Kingdom of Saudi Arabia Communication and Information Technology Commission Public Consultation Document On the Anti-SPAM Policy Framework Rajab 1428 H (July 2007) 1. Introduction SPAM 1 represents a major

More information

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence!

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence! Getting Your Email Delivered Beware: If you send out spam mail (unsolicited emails), whether it be knowingly or not, you will put your business and your reputation at risk. Consequences for spamming have

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

Ipswitch IMail Server with Integrated Technology

Ipswitch IMail Server with Integrated Technology Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these

More information