Media Law and Ethics 1. Media Law and Ethics Obscenity in the Media. Maggie Miller

Size: px
Start display at page:

Download "Media Law and Ethics 1. Media Law and Ethics Obscenity in the Media. Maggie Miller"

Transcription

1 Media Law and Ethics 1 Media Law and Ethics Obscenity in the Media Maggie Miller COMM 400 Jason McKahan October 31, 2008

2 Media Law and Ethics 2 Media Law and Ethics Obscenity in the Media Over the past 50 years the rules and regulations on obscenity and indecency have changed significantly. Congress has given the Federal Communications Commission (FCC) the responsibility for administratively enforcing the law that governs these types of broadcasts. There are three great court cases that changed the way the FCC looks at obscenity and indecency. These three main cases are: 1. Roth v. United States 2. Memoirs v. Massachusetts 3. Miller v. California. Before we talk about any cases we much clarify the difference between obscenity and indecency. Obscene material is material which deals with sex in a manner appealing to prurient interest. According to It is a violation of federal law to air obscene programming at any time. It is also a violation of federal law to air indecent programming or profane language during certain hours. Indecency can most easily be described as what makes a PG-rated movie PG instead of G. Indecency is material that is

3 Media Law and Ethics 3 protected under the First Amendment, even though some people find it offensive to one degree or another. Roth v. United States The first important case is Roth v. United States. Samuel Roth operated a business in New York in the publication and selling of books, photographs and magazines. He was convicted by a jury in the District court for the Southern District of New York upon 4 counts of a 26-count indictment (Brennan 1957) of mailing obscene circulars and an obscene book in violation of a federal obscenity law. Roth questioned the constitutionality of obscenity laws which he said conflicted with First Amendment guarantees of free speech and a free press (Ray 69). The main cause Roth was convicted was because the obscenity is not protected by the First Amendment. In response to the case the Supreme Court has observed that obscenity is serves such little good to society that it is not part of the freedom of speech protected by the First Amendment. The FCC website also states that The courts have held that indecent material is protected by the First Amendment and cannot be banned entirely. It may, however, be restricted in order to avoid its broadcast during times of the day when there is a reasonable risk that children may be in the audience. Memoirs v. Massachusetts The second important case in regulations on obscenity and indecency is Memoirs v. Massachusetts. This was a United States Supreme Court decision that attempted to clarify a holding made in Roth v. United States. This case included a book Memoirs of a

4 Media Law and Ethics 4 Woman in Pleasure, commonly known as Fanny Hill, written by John Cleland. The Memoirs test has three elements: a) The dominant theme of the material taken as a whole appeals to the prurient interest in sex; b) The material is patently offensive because it affronts contemporary community standards relating to the description or representation of sexual matters; and c) The material is utterly without redeeming social value. The Court, applying the test for obscenity established in Roth v. United States, held that the book was not "utterly without redeeming social value." The Court reaffirmed that books could not be deemed obscene unless they were unqualifiedly worthless, even if the books possessed prurient appeal and were "patently offensive (Brennan 1966). Miller v. California The third case is Miller v. California and remains the court s current definition of obscenity (Ray 69). In this case the accuser knowingly distributing obscene matter. Miller s conviction mainly conducted in Causing five unsolicited advertising brochures to be sent through the mail in an envelope addressed to a restaurant in Newport Beach, California. (Mill v. cal court case) The envelope was opened without knowledge of the content inside. Four of the books enclosed were entitled Intercourse, Man-Woman, Sex Orgies Illustrated, and An Illustrated History of Pornography. As you can guess

5 Media Law and Ethics 5 from the titles, the brochures were very explicit. In a 5-to-4 decision, the Court held that obscene materials did not enjoy First Amendment protection. The Court then modified the test for obscenity established in Roth v. United States and Memoirs v. Massachusetts. a) Whether the average person, applying contemporary community standards, would find that the work, taken as a whole appeals to the prurient interest b) Whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by applicable state law; and, c) Whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value. As you can see Roth v. United States, Memoirs v. Massachusetts and Miller v. California have changed the way the FCC has regulated obscenity and indecency. They have set the standards for what is obscene and indecent in media. A hard fact is that as much as the FCC regulates obscenity it will always cause controversy in the lives of everyday Americans.

6 Media Law and Ethics 6 References BRENNAN, J (1957). Cornell University Law School. Retrieved October 28, 2008, from Supreme Court Collection Web site: #354_US_476n22ref Brennan, J (1966). US Supreme Court Media. Retrieved October 28, 2008, from Memoirs v. Massachusetts Web site: Federal Communications Commission. (2008). Regulation of Obscenity, Indecency and Profanity. Retrieved October, From Miller v. California. 413 U.S 15 (1973) Ray, W (1990). FCC: The Ups and Downs of Radio-TV Regulations. Iowa State: Iowa State University Press.

RIVERVIEW SCHOOL DISTRICT

RIVERVIEW SCHOOL DISTRICT No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK

More information

KENTUCKY STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES

KENTUCKY STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES KRS KRS 531.010. Definitions. As used in this chapter: (1) "Distribute" means to transfer possession of, whether with or without consideration. (2) "Matter" means any book, magazine, newspaper, or other

More information

SOUTH CAROLINA STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES

SOUTH CAROLINA STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES SC Code Ann 16-15-305 Disseminating, procuring or promoting obscenity unlawful; definitions; penalties; obscene material designated contraband (A) It is unlawful for any person knowingly to disseminate

More information

PROGRAM CONTENT REGULATIONS Q:

PROGRAM CONTENT REGULATIONS Q: FEDERAL COMMUNICATIONS COMMISSION FACT SHEET PROGRAM CONTENT REGULATIONS Q: Does the FCC regulate the content of cable programming? July 2000 A: Cable television system operators generally make their own

More information

Minor, for the purposes of this policy, is an individual who has not attained the age of 17.

Minor, for the purposes of this policy, is an individual who has not attained the age of 17. POLICY TITLE: Computer and Network Services: Acceptable Internet Use Policy POLICY NO: 698 PAGE 1 of 9 GENERAL Internet access is a service provided for students and staff members by this school district.

More information

STUDENTS 5118.5. Children s Internet Protection Act, Pub. Law 106-554, codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250

STUDENTS 5118.5. Children s Internet Protection Act, Pub. Law 106-554, codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250 STUDENTS 5118.5 Student Use of Computer Systems and Internet Safety Computers, computer networks, Internet Access, and e-mail are effective and important technological resources in today s educational

More information

STATEMENT OF COMPLIANCE

STATEMENT OF COMPLIANCE STATEMENT OF COMPLIANCE A. I have read and agree to comply with the CMAC Policies and Procedures. I acknowledge that the Policies and Procedures may be amended from time to time by CMAC All such amendments

More information

How To Protect Free Speech At A College

How To Protect Free Speech At A College Student Press Law Center Model Guidelines for College Student Media Copyright 2009 Student Press Law Center, Inc. I. STATEMENT OF POLICY [Name of institution] recognizes the educational and societal value

More information

PERSONNEL - Certified and Noncertified 4118.5

PERSONNEL - Certified and Noncertified 4118.5 PERSONNEL - Certified and Noncertified 4118.5 Acceptable Use of Computer Systems Computers, computer networks, Internet access, and e-mail are effective and important technological resources in today s

More information

PROGRAM 2361/Page 1 of 5 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

PROGRAM 2361/Page 1 of 5 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES 2361/Page 1 of 5 M 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The Board of Education recognizes as new technologies shift the manner in which information is accessed, communicated

More information

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014. Purpose.

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014. Purpose. System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014 1 2 3 4 5 6 7 8 9 Purpose The purpose of this policy is to define expectations

More information

BOARD OF EDUCATION Cherry Hill, New Jersey

BOARD OF EDUCATION Cherry Hill, New Jersey BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to

More information

North Clackamas School District 12

North Clackamas School District 12 North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology

More information

ACCEPTABLE USE AND INTERNET SAFETY FOR INFORMATIONAL AND EDUCATIONAL TECHNOLOGY

ACCEPTABLE USE AND INTERNET SAFETY FOR INFORMATIONAL AND EDUCATIONAL TECHNOLOGY ACCEPTABLE USE AND INTERNET SAFETY FOR INFORMATIONAL AND EDUCATIONAL TECHNOLOGY The Dayton Public School District realizes that technology can greatly enhance the instructional program, as well as the

More information

H-1128.1 HOUSE BILL 2286. State of Washington 61st Legislature 2009 Regular Session

H-1128.1 HOUSE BILL 2286. State of Washington 61st Legislature 2009 Regular Session H-1128.1 HOUSE BILL 2286 State of Washington 61st Legislature 2009 Regular Session By Representatives Bailey, O'Brien, Campbell, Kristiansen, Miloscia, Crouse, Hope, Chandler, Shea, McCune, Hinkle, Warnick,

More information

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Internet Safety Policies and CIPA: An E-Rate Primer for Schools and Libraries

Internet Safety Policies and CIPA: An E-Rate Primer for Schools and Libraries Internet Safety Policies and CIPA: An E-Rate Primer for Schools and Libraries Prepared by E-Rate Central The Children s Internet Protection Act ( CIPA ), enacted December 21, 2000, requires recipients

More information

firstamendmentcenter.org Your First Freedoms A Basic Guide to the First Amendment

firstamendmentcenter.org Your First Freedoms A Basic Guide to the First Amendment firstamendmentcenter.org Your First Freedoms A Basic Guide to the First Amendment Q: What is the First Amendment and where does it come from? A: The First Amendment consists of 45 words added to the Constitution

More information

Electronic Communications System

Electronic Communications System Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as

More information

KIDS.US TAKEDOWN PROCEDURES. NeuStar, Inc.

KIDS.US TAKEDOWN PROCEDURES. NeuStar, Inc. SM KIDS.US TAKEDOWN PROCEDURES NeuStar, Inc. I. PROCEDURES FOR REMOVING INAPPROPRIATE CONTENT FROM THE KIDS.US DOMAIN Introduction The Dot Kids Implementation and Efficiency Act of 2002 1 requires that

More information

THE SCHOOL DISTRICT OF PHILADELPHIA

THE SCHOOL DISTRICT OF PHILADELPHIA No. 815 SECTION: OPERATIONS THE SCHOOL DISTRICT OF PHILADELPHIA TITLE: ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES ADOPTED: March 15, 2012 REVISED: August 21, 2014 815. ACCEPTABLE USE OF

More information

POLICY TITLE: Computer and Network Services: POLICY NO. 698 Acceptable Internet Use Policy

POLICY TITLE: Computer and Network Services: POLICY NO. 698 Acceptable Internet Use Policy POLICY TITLE: Computer and Network Services: POLICY NO. 698 Acceptable Internet Use Policy GENERAL Internet access is a service provided for students and staff members by this school district. Use of this

More information

SUPREME COURT OF LOUISIANA

SUPREME COURT OF LOUISIANA SUPREME COURT OF LOUISIANA No. 99-KA-3511 STATE OF LOUISIANA VERSUS MICHAEL GRANIER ON APPEAL FROM THE TWENTY-FOURTH JUDICIAL DISTRICT COURT, PARISH OF JEFFERSON, HONORABLE ROBERT A. PITRE, JR., JUDGE

More information

COMPUTER, NETWORK AND INTERNET USE POLICY

COMPUTER, NETWORK AND INTERNET USE POLICY 4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

This title may be cited as the ``Children's Internet Protection Act''. SEC. 1703. STUDY OF TECHNOLOGY PROTECTION MEASURES.

This title may be cited as the ``Children's Internet Protection Act''. SEC. 1703. STUDY OF TECHNOLOGY PROTECTION MEASURES. TITLE XVII--CHILDREN'S INTERNET PROTECTION SEC. 1701. SHORT TITLE. This title may be cited as the ``Children's Internet Protection Act''. SEC. 1702. DISCLAIMERS. (a) DISCLAIMER REGARDING CONTENT.--Nothing

More information

GEORGIA STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES

GEORGIA STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES O.C.G.A. O.C.G.A 16-12-80. Distributing obscene material; obscene material defined; penalty (a) A person commits the offense of distributing obscene material when he sells, lends, rents, leases, gives,

More information

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing

More information

GCSU. Information Security Operational Procedures. General Acceptable Use of Technology Resources Policy

GCSU. Information Security Operational Procedures. General Acceptable Use of Technology Resources Policy GCSU Information Security Operational Procedures General Acceptable Use of Technology Resources Policy INTRODUCTION This document constitutes a university-wide policy intended to provide guidelines for

More information

The Top Ten Of Public Computers And Their Perpetuation

The Top Ten Of Public Computers And Their Perpetuation 2.10 PUBLIC COMPUTER USE POLICY The Library offers public computers that patrons may use to access the Internet or perform computer-assisted tasks using basic applications software for word processing,

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

VIRTUAL CHILD PORNOGRAPHY ON THE INTERNET: A VIRTUAL VICTIM?

VIRTUAL CHILD PORNOGRAPHY ON THE INTERNET: A VIRTUAL VICTIM? VIRTUAL CHILD PORNOGRAPHY ON THE INTERNET: A VIRTUAL VICTIM? Child pornography is an exception to First Amendment freedoms because it exploits and abuses our nation s youth. 1 The latest trend in that

More information

Red Cloud Community Schools Acceptable Use and Internet Safety Policy

Red Cloud Community Schools Acceptable Use and Internet Safety Policy Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing

More information

PRODUCER- A producer is the person who creates a program and therefore is responsible for the content of the program.

PRODUCER- A producer is the person who creates a program and therefore is responsible for the content of the program. REQUEST TO CABLECAST PROGRAMMING ON NORTHWEST PEG-TV, CHANNELS 15 & 16 4 Academy Drive St. Albans, VT 05478 (802) 527-6474 ch15stalbans@omcast.net INSTRUCTIONS: If you are a local producer or a local provider,

More information

IN THE UNITED STATES DISTRICT COURT DISTRICT OF UTAH, CENTRAL DIVISION

IN THE UNITED STATES DISTRICT COURT DISTRICT OF UTAH, CENTRAL DIVISION JERROLD S. JENSEN (#1678) MARK E. BURNS (#6706) Assistant Attorneys General MARK L. SHURTLEFF (#4666) Utah Attorney General Attorneys for Defendants 160 East 300 South, 5th Floor P.O. Box 140857 Salt Lake

More information

CT Communications Internet Handbook

CT Communications Internet Handbook CT Communications Internet Handbook CT Communications Network Acceptable Use Policy Introduction: Protection of our Customers and our resources, the ability to provide quality service to our Customers,

More information

The Communications Decency Act of 1996: Keeping On-Line Providers on the Hook

The Communications Decency Act of 1996: Keeping On-Line Providers on the Hook Journal of Civil Rights and Economic Development Volume 11 Issue 3 Volume 11, Summer 1996, Issue 3 Article 20 June 1996 The Communications Decency Act of 1996: Keeping On-Line Providers on the Hook Paul

More information

An Act To Implement the Recommendations of the Human Trafficking Task Force Be it enacted by the People of the State of Maine as follows: PART A

An Act To Implement the Recommendations of the Human Trafficking Task Force Be it enacted by the People of the State of Maine as follows: PART A PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret Maine law. For legal assistance, please contact a qualified attorney. An Act To Implement the Recommendations

More information

Criminal Code (Child Pornography and Abuse) Amendment Bill 2004

Criminal Code (Child Pornography and Abuse) Amendment Bill 2004 1 Criminal Code (Child Pornography and Abuse) Explanatory Notes General Outline Short Title The short title of the Bill is the Criminal Code (Child Pornography and Abuse). Policy Objectives of the Legislation

More information

Chapter 6 The Constitution and Business. Laws that govern business have their origin in the lawmaking authority granted by the federal constitution.

Chapter 6 The Constitution and Business. Laws that govern business have their origin in the lawmaking authority granted by the federal constitution. Chapter 6 The Constitution and Business Laws that govern business have their origin in the lawmaking authority granted by the federal constitution. The Constitutional Powers of Government The Constitution

More information

MINNETONKA PUBLIC SCHOOLS

MINNETONKA PUBLIC SCHOOLS MINNETONKA PUBLIC SCHOOLS POLICY #524: ELECTRONIC TECHNOLOGIES ACCEPTABLE USE POLICY I. PURPOSE The purpose of this policy is to set forth guidelines for access to acceptable and safe use of the District

More information

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students

More information

NEW JERSEY TRADEMARK COUNTERFEITING ACT (N.J.S.A. 2C:21-32c) of the indictment charges the defendant with violating the New Jersey

NEW JERSEY TRADEMARK COUNTERFEITING ACT (N.J.S.A. 2C:21-32c) of the indictment charges the defendant with violating the New Jersey Approved 5/7/07 Count of the indictment charges the defendant with violating the New Jersey Trademark Counterfeiting Act. [READ COUNT OF THE INDICTMENT] The statute provides in pertinent part: A person

More information

POLICIES AND STANDARDS FOR ADVERTISING ON METRO TRANSIT FACILITIES

POLICIES AND STANDARDS FOR ADVERTISING ON METRO TRANSIT FACILITIES POLICIES AND STANDARDS FOR ADVERTISING ON METRO TRANSIT FACILITIES The Metropolitan Council ( Council ) is a political subdivision of the State of Minnesota and operates a regional transit system through

More information

CENTRAL CAMBRIA SCHOOL DISTRICT

CENTRAL CAMBRIA SCHOOL DISTRICT No. 815 SECTION: OPERATIONS CENTRAL CAMBRIA SCHOOL DISTRICT TITLE: NETWORK USAGE AND SAFETY ADOPTED: March 2, 2009 REVISED: 815. NETWORK USAGE AND SAFETY ENCOMPASSING LOCAL, INTRANET AND INTERNET NETWORKS

More information

COMPUTER/ONLINE SERVICES (Acceptable Use and Internet Safety)

COMPUTER/ONLINE SERVICES (Acceptable Use and Internet Safety) File: EDE COMPUTER/ONLINE SERVICES (Acceptable Use and Internet Safety) Technology can greatly enhance the instructional program, as well as the efficiency of the District. The Board recognizes that careful

More information

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Haddon Township School District Acceptable Use of Information and Communication Technology for Students Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.

More information

CRS Report for Congress

CRS Report for Congress CRS Report for Congress Received through the CRS Web Order Code RS21328 Updated May 26, 2004 Internet: Status Report on Legislative Attempts to Protect Children from Unsuitable Material on the Web Summary

More information

Computer, Network, and Internet Use Student Policy (As of 8/1/09)

Computer, Network, and Internet Use Student Policy (As of 8/1/09) Computer, Network, and Internet Use Student Policy (As of 8/1/09) I. Overview a. Purpose The intent of this regulation is to provide students with general requirements for utilizing Buffalo Valley Public

More information

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellee, v. DANNY TEAGUE, Defendant-Appellant. No. 10-10276 D.C. No. 1:05-cr-00495- LJO-1 OPINION

More information

Chapter 3: Networking

Chapter 3: Networking Chapter 3: Networking Ethics for the Information Age Third Edition by Michael J. Quinn Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter Overview (1/2) Introduction Email

More information

HIGH SCHOOL MASS MEDIA AND MEDIA LITERACY STANDARDS

HIGH SCHOOL MASS MEDIA AND MEDIA LITERACY STANDARDS Guidelines for Syllabus Development of Mass Media Course (1084) DRAFT 1 of 7 HIGH SCHOOL MASS MEDIA AND MEDIA LITERACY STANDARDS Students study the importance of mass media as pervasive in modern life

More information

Running Head: INDECENCY RESTRICTIONS ON BROADCAST TELEVISION 1

Running Head: INDECENCY RESTRICTIONS ON BROADCAST TELEVISION 1 Running Head: INDECENCY RESTRICTIONS ON BROADCAST TELEVISION 1 Unconstitutionality of Indecency Restrictions on Broadcast Television Fall 2012 Rachael Lehman November 20 th, 2012 Submitted to Dr. Wilfred

More information

MUSIC SYNCHRONIZATION AND MASTER USE LICENSE AGREEMENT

MUSIC SYNCHRONIZATION AND MASTER USE LICENSE AGREEMENT MUSIC SYNCHRONIZATION AND MASTER USE LICENSE AGREEMENT This Music Synchronization and Master Use License Agreement ( Agreement ) is made and entered into this day of, 200_ ( Effective Date ) by and between

More information

D R A F T SENATE/HOUSE FILE BY (PROPOSED ATTORNEY GENERAL BILL)

D R A F T SENATE/HOUSE FILE BY (PROPOSED ATTORNEY GENERAL BILL) SENATE/HOUSE FILE BY (PROPOSED ATTORNEY GENERAL BILL) A BILL FOR An Act relating to the possession, distribution, and reporting of obscene material, and making penalties applicable. BE IT ENACTED BY THE

More information

Executive Memorandum No. 16

Executive Memorandum No. 16 OFFICE OF THE PRESIDENT Policy for Responsible Use of University Computers and Information Systems 1. Purpose It is the purpose of this Executive Memorandum to set forth the University's administrative

More information

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems. VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

INTERNET ACCEPTABLE USE AND SAFETY POLICY

INTERNET ACCEPTABLE USE AND SAFETY POLICY POLICY #524 INTERNET ACCEPTABLE USE AND SAFETY POLICY I. PURPOSE The purpose of this policy is to set forth policies and guidelines for access to the school district computer system and acceptable and

More information

IT1. Acceptable Use of Information Technology Resources. Policies and Procedures

IT1. Acceptable Use of Information Technology Resources. Policies and Procedures IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:

More information

Acceptable Use and Internet Safety Policy. Bloom Vernon Local School District

Acceptable Use and Internet Safety Policy. Bloom Vernon Local School District Acceptable Use and Internet Safety Policy FOR THE COMPUTER NETWORK OF THE Bloom Vernon Local School District (Read and retain this document for future reference. Sign and return page 7 ONLY.) The Bloom

More information

NEW JERSEY STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES (Last Updated Summer 2012)

NEW JERSEY STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES (Last Updated Summer 2012) N.J. Stat. N.J. Stat. 2C:34-2. Obscenity for persons 18 years of age or older 2C:34-2. Obscenity for Persons 18 Years of Age or Older. a. Definitions for purpose of this section: (1) "Obscene material"

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

R. 3783 IN THE HOUSE OF REPRESENTATIVES

R. 3783 IN THE HOUSE OF REPRESENTATIVES I TH CONGRESS D SESSION H. R. To amend section of the Communications Act of 1 to require persons who are engaged in the business of selling or transferring, by means of the World Wide Web, material that

More information

Cable Television in the United States: Trends and Challenges Commissioner Kevin J. Martin Federal Communications Commission August 26, 2004 Beijing,

Cable Television in the United States: Trends and Challenges Commissioner Kevin J. Martin Federal Communications Commission August 26, 2004 Beijing, Cable Television in the United States: Trends and Challenges Commissioner Kevin J. Martin Federal Communications Commission August 26, 2004 Beijing, China 1 The Federal Communications Commission Created

More information

TRIPLE PLAY SERVICES ACCEPTABLE USE POLICY

TRIPLE PLAY SERVICES ACCEPTABLE USE POLICY TRIPLE PLAY SERVICES ACCEPTABLE USE POLICY 1. INTRODUCTION 2. GENERAL 3. USENET POSTINGS 4. ACCOUNT AND NETWORK SECURITY 5. ELECTRONIC MAIL 6. PROTECTION OF NETWORK PERFORMANCE 7 PERSONAL HOME PAGES 8.

More information

Ocean County Library policies concerning Computer and Internet Use and Rules of Conduct apply to guest users as well as library card holders.

Ocean County Library policies concerning Computer and Internet Use and Rules of Conduct apply to guest users as well as library card holders. Overview The Ocean County Library provides computers and internet access as a means to enhance information, learning, recreational and cultural opportunities for the residents of Ocean County. As information

More information

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained

More information

1801 North Main Street www.mitchelltelecom.com Phone: 605-990-1000 Mitchell, SD 57301 Office Hours: M-F 8am-5pm Fax: 605-990-1010

1801 North Main Street www.mitchelltelecom.com Phone: 605-990-1000 Mitchell, SD 57301 Office Hours: M-F 8am-5pm Fax: 605-990-1010 1801 North Main Street www.mitchelltelecom.com Phone: 605-990-1000 Mitchell, SD 57301 Office Hours: M-F 8am-5pm Fax: 605-990-1010 ACCEPTABLE USE POLICY Mitchell Telecom provides to business and consumer

More information

Beaumont Public Library Computer Usage Policies

Beaumont Public Library Computer Usage Policies Beaumont Public Library Computer Usage Policies Information contained in this document is on internet safety, use guidelines, internet filtering, and wireless internet. The Beaumont Public Library, in

More information

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography

More information

INDUSTRIAL AND INTELECTUAL PROPERTY REGULATIONS OF THE PONTIFICIA UNIVERSIDAD CATÓLICA DE CHILE

INDUSTRIAL AND INTELECTUAL PROPERTY REGULATIONS OF THE PONTIFICIA UNIVERSIDAD CATÓLICA DE CHILE INDUSTRIAL AND INTELECTUAL PROPERTY REGULATIONS OF THE PONTIFICIA UNIVERSIDAD CATÓLICA DE CHILE Title I General Norms 1. Objective of these Regulations 1 The present Regulations aim to regulate rights

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

(Internet) for students, staff and, if requested, members of the Board of Education. All computer 4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

Minors First Amendment Rights:

Minors First Amendment Rights: FEATURE All materials in this journal subject to copyright by the American Library Association Minors First Amendment Rights: CIPA ANd School libraries 16 Knowledge Quest Intellectual Freedom Online Volume

More information

Briefing on Laws Related to Campaign Advertising Disclaimers in Other States For the State Administration and Veterans' Affairs Interim Committee

Briefing on Laws Related to Campaign Advertising Disclaimers in Other States For the State Administration and Veterans' Affairs Interim Committee Briefing on Laws Related to Campaign Advertising Disclaimers in Other States For the State Administration and Veterans' Affairs Interim Committee Prepared by Megan Moore, Legislative Services April 10,

More information

CHAPTER 7 BUSINESS CODE ARTICLE I ADULT USE LICENSING AND REGULATION

CHAPTER 7 BUSINESS CODE ARTICLE I ADULT USE LICENSING AND REGULATION BUSINESS CODE 7-1-1 CHAPTER 7 BUSINESS CODE ARTICLE I ADULT USE LICENSING AND REGULATION 7-1-1 PURPOSE. The purpose of this Article is to regulate adult uses to protect the community from the many types

More information

Elite Estate Agents general terms and conditions

Elite Estate Agents general terms and conditions Elite Estate Agents general terms and conditions Last updated 15 July 2015 In these terms and conditions, "us", "we" or "our" means Elite Estate Agent Pty Ltd (ABN 29 604 882 813). It is important to us

More information

VIRGINIA JOURNAL of LAW and TECHNOLOGY

VIRGINIA JOURNAL of LAW and TECHNOLOGY 1 Va. J.L. & Tech. 7 (Spring 1997) 1522-1687 / 1997 Virginia Journal of Law and Technology Association VIRGINIA JOURNAL of LAW and TECHNOLOGY UNIVERSITY OF VIRGINIA

More information

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Internet Crimes Against Children: A Matrix of Federal

More information

SLIP OPINION NO. 2015-OHIO-2340 DISCIPLINARY COUNSEL

SLIP OPINION NO. 2015-OHIO-2340 DISCIPLINARY COUNSEL [Until this opinion appears in the Ohio Official Reports advance sheets, it may be cited as Disciplinary Counsel v. Grossman, Slip Opinion No. 2015-Ohio-2340.] NOTICE This slip opinion is subject to formal

More information

IN THE FLORIDA SUPREME COURT DISCRETIONARY REVIEW OF THE DECISION OF THE DISTRICT COURT OF APPEAL SECOND DISTRICT OF FLORIDA

IN THE FLORIDA SUPREME COURT DISCRETIONARY REVIEW OF THE DECISION OF THE DISTRICT COURT OF APPEAL SECOND DISTRICT OF FLORIDA IN THE FLORIDA SUPREME COURT STATE OF FLORIDA, Petitioner, vs. Case No. 74,251 ROBERT L. JOHNSON, Respondent. I DISCRETIONARY REVIEW OF THE DECISION OF THE DISTRICT COURT OF APPEAL SECOND DISTRICT OF FLORIDA

More information

Privacy, Data Collection and Information Management Practice Team November 13, 2003

Privacy, Data Collection and Information Management Practice Team November 13, 2003 Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted

More information

SORNA Substantial Implementation Review State of Tennessee

SORNA Substantial Implementation Review State of Tennessee September 2011 SORNA Substantial Implementation Review State of Tennessee The U.S. Department of Justice, Office of Justice Programs, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering,

More information

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS 1. WHY CAN T THE GOVERNMENT BAN USE OF THE INTERNET TO SPREAD HATEFUL AND RACIST IDEOLOGY IN THE UNITED STATES? The Internet is probably

More information

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000

More information

Australian Government Attorney-General's Department. Criminal Justice Division. Parliament of Victoria Law Reform Committee. Inquiry into Sexting

Australian Government Attorney-General's Department. Criminal Justice Division. Parliament of Victoria Law Reform Committee. Inquiry into Sexting Submission No. 56 0s) 2012 Received j0 1 Law Reform Committee Australian Government Attorney-General's Department Criminal Justice Division Parliament of Victoria Law Reform Committee Inquiry into Sexting

More information

The Judiciary Quiz. A) I and IV B) II and III C) I and II D) I, II, and III E) I, II, III, and IV

The Judiciary Quiz. A) I and IV B) II and III C) I and II D) I, II, and III E) I, II, III, and IV The Judiciary Quiz 1) Why did the Framers include life tenure for federal judges? A) To attract candidates for the positions B) To make it more difficult for the president and Congress to agree on good

More information

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access

More information

Queensland. Classification of Computer Games and Images and Other Legislation Amendment Act 2013

Queensland. Classification of Computer Games and Images and Other Legislation Amendment Act 2013 Queensland Classification of Computer Games and Images and Other Legislation Amendment Act 2013 Act No. 3 of 2013 Queensland Classification of Computer Games and Images and Other Legislation Amendment

More information

District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES

District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES Section: Program Date Created: March, 2007 Date Edited: October, 2014 The school district provides computer equipment,

More information

A PETITION for Enforcement of the Second Amendment to the Constitution of the United States

A PETITION for Enforcement of the Second Amendment to the Constitution of the United States A PETITION for Enforcement of the Second Amendment to the Constitution of the United States To: John Ashcroft, Attorney General of the United States of America WHEREAS: 1. The Second Amendment to the U.S.

More information

Co-regulatory scheme for Internet content:

Co-regulatory scheme for Internet content: Joint meeting of Council of Australian University Directors (CAUDIT) and Council of Australian University Librarians (CAUL) Adelaide 10 March 2000 Co-regulatory scheme for Internet content: Operation of

More information

Contra Costa Community College District Business Procedure 10.06 ACCEPTABLE TECHNOLOGY USE

Contra Costa Community College District Business Procedure 10.06 ACCEPTABLE TECHNOLOGY USE Contra Costa Community College District Business Procedure 10.06 ACCEPTABLE TECHNOLOGY USE SECTION 1. PREAMBLE With the advent of powerful hardware and software, the Internet and the World Wide Web, computers

More information

ICE/DRO DETENTION STANDARD

ICE/DRO DETENTION STANDARD ICE/DRO DETENTION STANDARD CORRESPONDENCE AND OTHER MAIL I. PURPOSE AND SCOPE. This Detention Standard ensures that detainees will be able to correspond with their families, the community, legal representatives,

More information

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students. POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive

More information

RIGHT TO COUNSEL State v. Langley, 351 Or. 652 (2012) Oregon Supreme Court

RIGHT TO COUNSEL State v. Langley, 351 Or. 652 (2012) Oregon Supreme Court RIGHT TO COUNSEL State v. Langley, 351 Or. 652 (2012) Oregon Supreme Court FACTS In December 1989, a jury found defendant Langley guilty of murdering a woman named Ann Gray. A few months later, Langley

More information

Telkom Internet Acceptable Use Policy

Telkom Internet Acceptable Use Policy Telkom Internet Acceptable Use Policy Version Date: 19 April 2013 Important Note: This Acceptable Use Policy ( AUP ) will be updated frequently. Please make a habit of reviewing it from time to time to

More information

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information