A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet

Similar documents
Chapter 6 The Constitution and Business. Laws that govern business have their origin in the lawmaking authority granted by the federal constitution.

How To Protect Free Speech At A College

PROGRAM 2361/Page 1 of 5 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

Acceptable Use Policy

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS

RIVERVIEW SCHOOL DISTRICT

STUDENTS Children s Internet Protection Act, Pub. Law , codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250

North Clackamas School District 12

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

Acceptable Use and Publishing Policy

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

firstamendmentcenter.org Your First Freedoms A Basic Guide to the First Amendment

Minor, for the purposes of this policy, is an individual who has not attained the age of 17.

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

SOUTH CAROLINA STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES

THE SCHOOL DISTRICT OF PHILADELPHIA

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT , INTERNET AND COMPUTER USE

ACCEPTABLE USE AND INTERNET SAFETY FOR INFORMATIONAL AND EDUCATIONAL TECHNOLOGY

Ocean County Library policies concerning Computer and Internet Use and Rules of Conduct apply to guest users as well as library card holders.

CRS Report for Congress

The Use of Internet Filters

Chapter 3: Networking

U.S. Utilities And Preventing Obscure - Internet By Users

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Computer, Network, and Internet Use Student Policy (As of 8/1/09)

PROGRAM CONTENT REGULATIONS Q:

STATEMENT OF COMPLIANCE

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

Internet Safety Policies and CIPA: An E-Rate Primer for Schools and Libraries

Forrestville Valley School District #221

COMPUTER, NETWORK AND INTERNET USE POLICY

Descriptor Code: EFE-P

CENTRAL CAMBRIA SCHOOL DISTRICT

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

CT Communications Internet Handbook

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

APPROPRIATE USE OF DIGITAL COMMUNICATIONS AND TECHNOLOGIES POLICY

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

1801 North Main Street Phone: Mitchell, SD Office Hours: M-F 8am-5pm Fax:

Electronic Communications System

BOARD OF EDUCATION Cherry Hill, New Jersey

Technology Department 1350 Main Street Cambria, CA 93428

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Acceptable Use Policy Holy Spirit Catholic School

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

POLICY TITLE: Computer and Network Services: POLICY NO. 698 Acceptable Internet Use Policy

IN THE UNITED STATES DISTRICT COURT DISTRICT OF UTAH, CENTRAL DIVISION

The Top Ten Of Public Computers And Their Perpetuation

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

CYBRARIAN Corporation. CYBRARIAN Software. Creating Library Policies Governing PC and Internet Use

Red Cloud Community Schools Acceptable Use and Internet Safety Policy

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

IT1. Acceptable Use of Information Technology Resources. Policies and Procedures

Cablelynx Acceptable Use Policy

Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

PERSONNEL - Certified and Noncertified

WYANDOTTE ONLINE ACCEPTABLE USE POLICY

SUMMARY OF PUBLIC LAW THE CAN-SPAM ACT OF 2003

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO REFERENCE: Board Rule 2.16 PAGE 1 OF 6

INTERNET AND POLICY

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)

Marion County School District Computer Acceptable Use Policy

Acceptable Use and Internet Safety Policy. Bloom Vernon Local School District

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Guidelines Applicability Guidelines Statements Guidelines Administration Management Responsibility... 4

RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES

Instruction. Neoga Community Unit School District #3 Page 1 of 5

Executive Memorandum No. 16

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6

Acceptable Use Policy

BOBCAT COMPUTING POLICY

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

POLICIES AND STANDARDS FOR ADVERTISING ON METRO TRANSIT FACILITIES

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

TRIPLE PLAY SERVICES ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

RAMPART HOSTING, LLC ACCEPTABLE USE POLICY ("AUP")

District Regulation ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES

Policy No: 2-B8. Originally Released: Date for Review: 2016

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

Code of Virginia, 1950, as amended, Sections , :1, , , and

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks

Acceptable Use Policy ("AUP")

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

JHSPH Acceptable Use Policy

A. OBSTACLES TO ACCESS (0-25 POINTS)

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

YOUR AGENCY EMS Computer, Software, Network, and Internet Policy with Appropriateness of Use Guidelines

Minors First Amendment Rights:

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Transcription:

PowerPoint Slides to Accompany A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet (2nd Edition) by Sara Baase San Diego State University PowerPoint slides created by Sherry Clark Copyright 2003 Prentice Hall A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 1

A Gift of Fire Freedom of Speech In Cyberspace Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace Anonymity Spam Ensuring Valuable and Diverse Content A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 2

Changing Communications Paradigms Regulatory Paradigms Communication technologies differ with respect to their degree of First Amendment protection and government regulation. Print Media: Strongest First Amendment protection. Broadcast Media: Less First Amendment protection than print media. Common Carrier: Content not controlled and the carrier is not responsible for content. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 3

Changing Communications Paradigms Regulatory Paradigms (cont d) Internet, BBSs, commercial online services, and the WWW: Not exactly print media. Not exactly broadcast media. Not exactly common carrier. Q: Who controls the distribution of news, information, and opinion at the online service you use? at the Web sites you frequent? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 4

Changing Communications Paradigms The First Amendment Protects Citizens From Government Prohibits restriction ti of speech, press, peaceful assembly, and religion. i Subsequent Interpretations Address: Offensive and/or controversial speech and ideas, Spoken and written words, Pictures, art, and other forms of expression and opinion, and Commercial speech (e.g. advertising). Q: Should all speech be constitutionally protected? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 5

Speech Might Include: Offensive Speech and Censorship in Cyberspace Political or religious speech. Pornography. Sexual or racial slurs. Nazi materials. Libelous statements. Abortion information. Alcohol ads. Q: Identify other forms of speech found in cyberspace that some consider offensive. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 6

Miller v. California Offensive Speech and Censorship in Cyberspace Material is considered obscene if all three parts are met: 1. It depicts sexual (or excretory) acts whose depiction is specifically prohibited by state law, and 2. It depicts these acts in a patently offensive manner, appealing to the prurient interest as judged by a reasonable person using community standards, and 3. It has no serious literary, artistic, social, political, or scientific value. Q: Historically, how have local community standards affected censorship of speech in cyberspace? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 7

Offensive Speech and Censorship in Cyberspace Material Inappropriate for Children Technology Changes the Context On the Web, children have access to the same adult text, t images, videos, etc. as adults. Online proprietors don t know the customer is not an adult. Protecting Children Regardless of the medium: It is illegal to create, possess or distribute child pornography. It is illegal to lure children into sexual activity. Q: How should children be protected from access in cyberspace to adult material? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 8

Censorship Laws Offensive Speech and Censorship in Cyberspace Communications Decency Act (CDA, 1996) Publicity it and public pressure lead Congress to pass this act. Anyone who made available to anyone under 18 any communication that is obscene or indecent would be subject to a $100,000 fine and two years in prison. In 1997, the CDA was ruled unconstitutional because it was too vague and too broad in protecting children online and because less restrictive means are available. Q: Should content on the Internet have as much First Amendment protection as printed material? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 9

Censorship Laws (cont d) Offensive Speech and Censorship in Cyberspace Child Online Protection Act (COPA, 1998) Commercial Web sites that t make available to minors materials harmful to minors, as judged by community standards would be subject to a $50,000 fine and six months in jail. In 2000 and 2003, COPA was ruled unconstitutional by a federal court. Q: How are children protected from harmful material outside of Cyberspace? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 10

Censorship Laws (cont d) Offensive Speech and Censorship in Cyberspace Children s Internet Protection Act (CIPA) Any school or library receiving i federal Internet t funds must install filtering software on all Internet terminals. Filters must block sites containing child pornography, obscene material, and any material deemed harmful to minors. A federal appeals court ruled a major part of CIPA unconstitutional in 2002 but the Supreme Court upheld the law in 2003. Q: How does CIPA affect adults accessing online material at a public library that uses filtering software? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 11

Offensive Speech and Censorship in Cyberspace Limiting Internet Access in Libraries and Schools Filtering Software Benefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. Problems: can be ineffective kids get around the filters; the words, phrases, rating systems, etc. are subjective; banned keywords can be overly restrictive for adult users and for legitimate use by minors. Q: What has been your experience with filtering software? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 12

Offensive Speech and Censorship in Cyberspace Challenging Old Regulatory Paradigms and Special Interests License required: To practice law. To publish traditional newsletters about commodities and futures investing (prior to 2000). No license required: To create downloadable, self-help legal software. To publish newsletters about, developing software for, and operating Web sites concerning commodities and futures investing (since 2000). Q: Q Is online advertising of wine free speech or disregard for the regulatory rights of state governments? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 13

Offensive Speech and Censorship in Cyberspace Censorship On the Global Net Global Impact Avoiding censorship: the global l nature of the Net allows restrictions ti (or barriers) in one country to be circumvented by using networks in other, less restrictive countries. Creating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. Q: Why are online gambling sites established offshore? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 14

Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers were published under pseudonyms. Today, there are publications on the Net that are posted anonymously. Q: What are the drawbacks of anonymous Web postings? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 15

Anonymity Is Anonymity Protected? Conflicts between political freedom of speech and campaign regulations: Anonymity protects against retaliation and embarrassment. Anonymity violates rules established by the Federal Elections Commission (FEC) Q: Should anonymous political speech on the Web be regulated? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 16

Anonymity Anonymity vs. Community Supporters of anonymity: Say it is necessary to protect t privacy and free speech. Opponents of anonymity: Believe it is anti-social and allows criminals to hide from law enforcement. Q: How is the practice of anonymity online similar/dissimilar to strong encryption? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 17

Spam What Is the Problem? Unsolicited, mass e-mail: is cheap to senders but may impose costs on the recipient s i time and/or the recipient s online account. may contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). may contain a disguised return address. may pass through filters. invades privacy. creates a financial i and managerial burden on ISPs. Q: How do you handle spam? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 18

Spam Cases and Free Speech Issues AOL v. Cyber Promotions AOL and other service providers have successfully sued spammers because of the cost burden imposed. Disgruntled Intel Employee Initially, a court ruled that non-commercial spam to Intel employees at their Intel e-mail accounts was a form of trespass. The CA Supreme Court ruled that it was not. Q: Is the forwarding of pre-written observations or opinions from human-rights groups spam or expressions of free speech? (Or both?) A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 19

Spam Solutions Technology: filters that screen out spam. Market Pressure: services that list spammers. Business Policy: at the discretion of the recipient, all e-mail would be charged a microfee. Law: create restrictions that are consistent with the First Amendment. Vigilantism: punish spammers by hacking into their phone or computer systems. Q: Which solution above, or others, do you support? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 20

Points to Consider: Ensuring Valuable and Diverse Content Is there a balance between commercial and educational information on the Web? Should diverse content on the Web be subsidized with taxes? Should valuable content on the Web be regulated? Do we need to ensure the existence of sites containing civic information? Are more sites that promote the arts and culture needed? Q: How do we ensure valuable and diverse content in traditional forms of media? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 21