Chapter 5 Freedom of Expression

Slides:



Advertisements
Similar presentations
Law & Ethics, Policies & Guidelines, and Security Awareness
Advertisements

Microsoft Visual Basic 2005: Reloaded Second Edition Chapter 10 Creating Classes and Objects.
An Introduction to Programming with C++ Fifth Edition
An Introduction to Programming with C++ Fifth Edition Chapter 3 Completing the Problem-Solving Process and Getting Started with C++
Internet Filtering Requirements: CIPA and PA 212.
Freedom of Expression Prepared By Najib sani & Muhammad Tajuddeen M.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Freedom of Speech Chapter 37.
Ethics in Information Technology, Fourth Edition
CIPA Update. FOR SCHOOLS – By July 1, 2012, amend your existing Internet safety policy (if you have not already done so) to provide for the education.
Freedom of Speech. Purpose for Freedom of Speech: To guarantee to each person a right of Free expression, in the Spoken and the Written word, and by all.
Ethics in Information Technology, Second Edition
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
INTERNET and CODE OF CONDUCT
Chapter 5 Freedom of Expression
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
CIVIL LIBERTIES. THE POLITICS OF CIVIL LIBERTIES Civil liberties: protections the Constitution provides individuals against the abuse of government power.
Civil Liberties. The Politics of Civil Liberties Civil liberties: protections the Constitution provides against the abuse of government power State ratifying.
Ethics in Information Technology
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
1. What are some freedoms that we have in our daily lives as US citizens? 2. Can your freedoms ever be taken away or limited? (explain!)
Freedom of Speech  Seems like a dumb question, but why is it so important to a democratic government?  Ability to debate actions and policies of elected.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Chapter Five Civil Liberties. Copyright © Houghton Mifflin Company. All rights reserved.5 | 2 The Politics of Civil Liberties Civil liberties: protections.
Constitutional Review The truth your founding fathers never told you!
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Laws and Rules That Govern Internet Safety Ashley Martin.
School Accounts Presented by: Mrs. Mazzola.
Chapter Five Civil Liberties. Copyright © Houghton Mifflin Company. All rights reserved.5 | 2 The Politics of Civil Liberties Civil liberties: protections.
1. Vagueness and Overbreadth: Laws governing free speech must be clear and specific. > Laws that unnecessarily prohibit too much expression are considered.
LIBS100 March 23, 2005 First Amendment Library Bill of Rights.
Ethics in Information Technology, Fourth Edition Chapter 5 Freedom of Expression.
Presented to The Board of Education September 20, 2016
Presented by Ika Novita Dewi, MCS
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
FREE SPEECH LIMITS.
Bill of Rights- First Amendment Notes
Internet Safety and Acceptable Use Policies.
Chapter Five Civil Liberties.
Presented to The Board of Education September 19, 2017
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Chapter 5 Freedom of Expression Ethics in Information Technology, Second Edition Updates by Carlotta Eaton, NRCC

Objectives What is the legal basis for the protection of freedom of speech in the United States, and what types of speech are not protected under the law? In what ways does the Internet present new challenges in the area of freedom of expression? What key free-speech issues relate to the use of information technology? Ethics in Information Technology, Second Edition

First Amendment Rights … Right to freedom of expression Important right for free people everywhere Guaranteed by the First Amendment Definition of free speech includes Nonverbal, visual, and symbolic forms of expression Right to speak anonymously Ethics in Information Technology, Second Edition

First Amendment Rights Not protected by the First Amendment Obscene speech Defamation Incitement of panic Incitement to crime “Fighting words” Sedition Ethics in Information Technology, Second Edition

Obscene Speech Speech is considered obscene when Average person finds the work appeals to the prurient interest Work depicts or describes sexual conduct in an offensive way Lacks serious literary, artistic, political, or scientific value Ethics in Information Technology, Second Edition

Defamation Publication of a statement of alleged fact that is Slander False Harms another person Harm is often of a financial nature Slander Oral defamatory statement Libel Written defamatory statement Ethics in Information Technology, Second Edition

Freedom of Expression: Key Issues Controlling access to information on the Internet Anonymity Defamation Hate speech Pornography Ethics in Information Technology, Second Edition

Controlling Access to Information on the Internet … Freedom of speech on the Internet is complicated by children’s access Communications Decency Act (CDA) Aimed at protecting children from online pornography Broad language and vague definition of indecency Found unconstitutional in 1997 Ethics in Information Technology, Second Edition

Controlling Access to Information on the Internet … Child Online Protection Act (COPA) Applies to communication for commercial purposes Imposes penalties for exposing minors to harmful material on the Web Found unconstitutional in 2004 Internet filter Software installed with a Web browser Blocks access to certain Web sites that contain inappropriate or offensive material Ethics in Information Technology, Second Edition

Controlling Access to Information on the Internet … URL filtering Blocks URLs or domain names Keyword filtering Blocks key words or phrases Dynamic content filtering Web site’s content is evaluated immediately before being displayed Uses Object analysis Image recognition Ethics in Information Technology, Second Edition

Controlling Access to Information on the Internet … Popular Internet filters ContentProtect CYBERsitter NetNanny CyberPatrol HateFilter Ethics in Information Technology, Second Edition

Controlling Access to Information on the Internet … ICRA rating system Questionnaire for Web authors Generates a content label Uses Platform for Internet Content Selection (PICS) standard Users can configure browsers to read the label to block content Relies on Web authors to rate their site Complement to other filtering techniques Ethics in Information Technology, Second Edition

Controlling Access to Information on the Internet ISP blocking Blocking is performed on the ISP server ClearSail/Family.NET prevents access to certain Web sites Ethics in Information Technology, Second Edition

Legal Overview: Children’s Internet Protection Act … Federally financed schools and libraries must block computer access to Obscene material Pornography Anything considered harmful to minors Schools and libraries subject to CIPA do not receive Internet access discounts unless they certify that Internet safety measures are in place Required to adopt a policy to monitor the online activities of minors Ethics in Information Technology, Second Edition

Legal Overview: Children’s Internet Protection Act (CIPA) … CIPA does not require the tracking of Internet use by minors or adults Acceptable use policy agreement is an essential element of a successful program in schools Signed by Students Parents Employees Ethics in Information Technology, Second Edition

Legal Overview: Children’s Internet Protection Act (CIPA) Difficulty implementing CIPA in libraries because their services are open to people of all ages Including adults with First Amendment rights Ethics in Information Technology, Second Edition

Anonymity … Principle of anonymous expression People can state opinions without revealing their identity In the wrong hands, it can be a tool to commit illegal or unethical activities Anonymous remailer service Computer program that strips the originating address from the e-mail message Forwards the message to the intended recipient Ensures no header information Ethics in Information Technology, Second Edition

Anonymity John Doe lawsuit Identity of the defendant is temporarily unknown Common in Internet libel cases Defendant communicates using a pseudonym or anonymously ISPs subpoenaed to provide the identity By filing a lawsuit, the company gains immediate subpoena power Ethics in Information Technology, Second Edition

National Security Letters … Requires financial institutions to turn over the electronic records of Suspected terrorists Spies USA Patriot Act allows the FBI to use NSLs to obtain records from banks and other financial institutions if they are sought for an intelligence or terrorism investigation Ethics in Information Technology, Second Edition

National Security Letters USA Patriot Act includes a gag provision Firm cannot inform customers of the investigation Intelligence Authorization Act for Fiscal Year 2004 Expanded the scope of discovery beyond financial institutions Now includes ISPs Ethics in Information Technology, Second Edition

Defamation and Hate Speech … Actions that can be prosecuted include Sending threatening private messages over the Internet to a person Displaying public messages on a Web site describing intent to commit acts of hate-motivated violence Libel directed at a particular person Ethics in Information Technology, Second Edition

Defamation and Hate Speech Some ISPs voluntarily agree to prohibit subscribers from sending hate messages Does not violate subscribers’ First Amendment rights ISPs must monitor the use of their service Take action when terms are violated Ethics in Information Technology, Second Edition

Pornography … The Internet has been a boon to the pornography industry More than 60,000 Web sex sites are accessible The sites generate at least $1 billion a year in revenue CAN-SPAM Act Deterrent in fighting the dissemination of pornography Ethics in Information Technology, Second Edition

Pornography Reasonable steps to stop access in the workplace Establishing a computer usage policy Prohibiting access to pornography sites Identifying those who violate the policy Taking action against those users Numerous federal laws address child pornography Federal offense Ethics in Information Technology, Second Edition

Summary Assessment Questions Chapter Page 162 Ethics in Information Technology, Second Edition

Manager’s Checklist for Handling Freedom of Expression in the Workplace Ethics in Information Technology, Second Edition

Summary First Amendment protects the right to Key issues: Freedom of religion Freedom of expression Key issues: Controlling access to Internet information Anonymous communication National Security Letter (NSL) Spread of defamation and hate speech Access to pornography Ethics in Information Technology, Second Edition