Free Speech and Censorship Sherwin Siy Staff Counsel Electronic Privacy Information Center.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

Northside I.S.D. Acceptable Use Policy
The Great Firewall of China INTRODUCTION Gisela Torrentí, Judith Martín & Julia Mabrey.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Self-Censorship in China Eric Schabel & Fahad Pervaiz.
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
But What About the Profits?
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Right to Privacy: The Unwritten Right
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
E-Commerce: Regulatory, Ethical, and Social Environments
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Data Protection Act. Lesson Objectives To understand the data protection act.
Internet Censorship Ann Lee, Gregory Fillios, Hugo Ponte, Kathryn Wells, Malcolm Greaves.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
Chinese internet control: Corporate collaboration Rebecca MacKinnon 4/20/2006
Chapter 3: Freedom of Speech.
Censorship Thomas Morrissy and Sam Joiner. Individual rights as determined by the government o Adults should be able to read see and hear what they.
Internet regulation National limits of Internet Content.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Stephanie Muchai ARTICLE 19 KENYA Presentation for: “Bloggers Responsible And Ethical Use Of Online Freedom In The Election Period”
Criticism Of Google By: Kyle Singler. Privacy Policies One of the main concerns regarding online search is that an individual’s information is kept private.
Wiki Training: Introduction to Instructor: Zach Silveira (415)
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
Data Protection Act AS Module Heathcote Ch. 12.
Policy Considerations RUCUS BOF IETF 71 - Philadelphia March 10, 2005 John Morris.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Internet Censorship Alex Lipp. The Bills in Congress PIPA — the Senate bill originally called the Protect IP Act. SOPA — the Stop Online Piracy Act —
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Google & Industry Best practices BY: ANAHITA ZAMANI ITMGMT 550 – INSTRUCTOR: TONY WOLF SEP
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
The First Amendment.  Write down the five freedoms granted by the First Amendment of the U.S. Constitution. Don’t cheat. Go off memory alone. Congress.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Issues Related to Global Information Systems A business can’t just worry about its home- country laws, rules and regulations. If a business has global.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Edmodo- Creating a Collaborative Online Classroom Environment BCPS – Office of Instructional Technology.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
Data Protection Act INFO2009 A film and a quiz 5/ DPA, BBC Test Bite + Barry's Bad Data Day.
INTERNET INVESTIGATIONS. GOAL:  Identify different people by using online tools / information  Gather information about different people  Gather information.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
Think / Pair / Share What are Human Rights?
Making the Connection ISO Master Class An Overview.
E-Safety Briefing
2016 Cybersecurity Law If any one of these describes your company
Discussion 2 Forum 7 Name Question # Group Task Lawrence Spencer 2
PART III Ethical Issues in Business
E-Commerce: Regulatory, Ethical, and Social Environments
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
The Great Firewall of China
Think / Pair / Share What are Human Rights?
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
FIVE BLOCKS SPECIAL REPORT 5/7/2019
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Free Speech and Censorship Sherwin Siy Staff Counsel Electronic Privacy Information Center

U.S. Tech Companies in China-Dilemmas Censorship (search results, blog takedowns) Disclosing Personal Information Providing Equipment Used in Censorship

Censorship Search Results--Yahoo, Google remove certain links Blogs--Microsoft removes blogs posting criticism

Disclosing Personal Information Yahoo Disclosures linked accounts and online postings with: –Shi Tao: 10 years for reporting “state secrets” –Li Zhi:8 years for “inciting subversion” –Jiang Lijun: 4 years for “subversion”

Providing Equipment Used in Censorship Cisco –Providing Chinese government with network infrastructure that can be used for blocking/filtering –Marketing to, training police forces in their use

Company Responses Bringing the Internet to China The Internet is a tool against repression Must obey local laws and customs

Congressional Response Global Online Freedom Act –H.R –Introduced Feb. 16, 2004 –Introduced by Chris Smith (R-NJ)

Components of GOFA Reports on Internet freedom Creates Office of Global Internet Freedom Prohibits altering search results at behest of “Internet-restricting country” Must report filter requests

Components of GOFA (cont’d) U.S.-supported content can’t be blocked Must report blocked info and takedown requests. Cannot turn over personally identifying information to a restrictive country unless OK’d by DOJ Export Controls on censorship equipment

Issues with GOFA Restrictive / non-restrictive list –Should it matter what country does the filtering, blocking, or takedown request?

Issues with GOFA Transparency: –Both transparency provisions require reporting of filtering and takedowns to OGIF, not to users

Issues with GOFA Special protections for US content –Why privilege US gov’t speech?

Issues with GOFA Integrity of User Information –Department of Justice has final word on turning over information –Transparency issues to begin with –Again, is the distinction necessary?

Principles Transparency –For users, not just government. If must remove results, say how many, under what authority, according to what complaint. Notice of Requests –Users should know what information kept, what requested, have a chance to object Abide by International Law –Interpret and argue under local laws Limitation –If you can’t protect it, don’t collect it

Principles Should be Universally Applied Transparency: DMCA, hate speech filtering Notice of requests: John Doe suits Data limitation: DoJ/ Google requests Don’t just roll over: see above

What to Do? Legislation is a blunt instrument Pressure from companies can make a difference Company incentives to acquiesce to China demands--profit Pressures against censorship that affect bottom line might alter incentive structure Fighting censorship starts at home

Issues to Watch Data retention-in EU, US Regulation of disfavored content and disfavored means-pornography, file sharing Thin end of the wedge (child pornography campaign) Mission creep