Freedom of Speech Professor Matt Thatcher. 2 Last Class l Workplace privacy –how is electronic monitoring different from traditional monitoring? –types.

Slides:



Advertisements
Similar presentations
Chapter 5 Freedom of Expression
Advertisements

Impact of Computers on Society 5. Freedom of Speech.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Freedom of Speech Chapter 37.
Ethics in Information Technology, Fourth Edition
Civil Liberties and Public Policy Chapter 4. The Bill of Rights– Then and Now Civil Liberties – Definition: The legal constitutional protections against.
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Freedom of Speech. Purpose for Freedom of Speech: To guarantee to each person a right of Free expression, in the Spoken and the Written word, and by all.
Ethics in Information Technology, Second Edition
1 Freedom of Expression Prepared By Joseph Leung.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Chapter Jacob Niedermier Keith Miller Changing Communications Paradigms The Internet gave us many more chances to voice our opinions.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
SECTION 1 Freedom of Speech and Press Discuss the meaning and importance of each of the rights guaranteed under the Bill of Rights and how each is secured.
Chapter 5 Freedom of Expression
Freedom of Speech and Freedom of Assembly. The Purpose of Freedom of Speech 1 to guarantee to each person a right of free expression, in the spoken and.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Ethics in Information Technology
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
Chapter 3: Freedom of Speech.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
CS 4001Mary Jean Harrold1 Class 23 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due 11/13 ŸTerm paper—due 11/20.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Civil Liberties and Public Policy
Ch3 Freedom of Speech The US Constitution.
Internet regulation US. The cornerstone of American political process The consequence of the protestant revolution The right to interpret the LAW (God’s.
IS 490 Notes for Baase Textbook, Chapter 3. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3
Chapter 3: 1st Amendment.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
Freedom of Speech and Press. The Big Idea While the 1st and 14th Amendments gives Americans the right to express ideas freely, the Constitution and the.
1. What are some freedoms that we have in our daily lives as US citizens? 2. Can your freedoms ever be taken away or limited? (explain!)
Freedom of Speech First Amendment Expression, Speech and Symbolic Speech.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
1. Vagueness and Overbreadth: Laws governing free speech must be clear and specific. > Laws that unnecessarily prohibit too much expression are considered.
LIBS100 March 23, 2005 First Amendment Library Bill of Rights.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3.
Ethics in Information Technology, Fourth Edition Chapter 5 Freedom of Expression.
Media Regulation GOVT 2305, Module 7.
Presented by Ika Novita Dewi, MCS
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
FREE SPEECH LIMITS.
Bill of Rights- First Amendment Notes
The First amendment Speech Press Religion Petition Assembly.
Media Regulation October 19, 2017.
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Freedom of Speech Professor Matt Thatcher

2 Last Class l Workplace privacy –how is electronic monitoring different from traditional monitoring? –types of electronic monitoring –U.S. vs. European laws on workplace privacy –benefits and criticisms of electronic monitoring –electronic monitoring guidelines for management

3 Today l Administrative –turn in Case Report (3) –return Term Paper Proposals –return Case Report (2) –thank you for the feedback l Freedom of Speech –what is the First Amendment? –what types of speech are not protected? –offensive speech and censorship in cyberspace »U.S. laws vs. technology solutions –hate speech –SPAM

4 The First Amendment l Protects citizens from government –prohibits restriction of speech, press, peaceful assembly, and religion by government –1st Amendment is a restriction on the power of government, not individuals or companies l Subsequent interpretations address: –offensive and/or controversial speech and ideas –spoken and written words –pictures, art, and other forms of expression and opinion (flag burning, hand gestures, dance movements) –commercial speech (e.g. advertising)

5 The First Amendment l Supreme Court has held that the following types of speech are not protected by the 1 st Amendment –obscene speech –defamation –incitement of panic –incitement of crime (threats) –inciting rebellion against the government (sedition)

6 Obscene Speech l Miller v. California (1973) –established a test to determine if material is considered obscene – material is obscene if: 1.It depicts sexual (or excretory) acts whose depiction is specifically prohibited by state law, and 2. It depicts these acts in a patently offensive manner, appealing to the prurient interest as judged by a reasonable person using community standards, and 3. It has no serious literary, artistic, social, political, or scientific value. –who is a reasonable person? what are community standards? what does this imply for potentially obscene material posted on the internet?

7 Defamation l Freedom of expression is restricted when the speech is: –untrue and causes harm to another person l Slander –oral defamatory statement l Libel –written oral defamatory statement

8 The First Amendment: Changing Communications Paradigms l Regulatory Paradigms –communication technologies differ with respect to their degree of First Amendment protection and government regulation. –print media (newspapers, books, magazines) »strongest First Amendment protection –broadcast media (television, radio) »less First Amendment protection than print media (why?) »cigarette ads, FCC violations, the “seven dirty words”, warning labels for music –common carrier (telephone, telegraph, postal system) »content not controlled and the carrier is not responsible for content

9 What about the Internet? l Internet infrastructure –lacks content controls and censorship –is oblivious to geographic boundaries –is about free speech on a very large scale »it empowers the individual to send anything anywhere l Courts have suggested that: –“As the most participatory form of mass communication yet developed, the Internet deserves the highest protection from government intrusion.” [ACLU v. Reno] l But efforts to censor speech on the internet continue

10 Offensive Speech and Censorship in Cyberspace l Material inappropriate for children –pornography can be regulated and banned, but only for minors –technology changes the context »on the Web, children have access to the same ‘adult’ text, images, videos, etc. as adults. »online proprietors don’t know the customer is not an adult. –protecting children »regardless of the medium: u it is illegal to create, possess or distribute child pornography. u it is illegal to lure children into sexual activity.

11 Offensive Speech and Censorship in Cyberspace l Censorship Laws –Communications Decency Act (CDA, 1996) »publicity and public pressure lead Congress to pass this act. »anyone who made available to anyone under 18 any communication that is obscene or indecent would be subject to a $250,000 fine and two years in prison. »In 1997, the CDA was ruled unconstitutional because it was too vague and too broad in protecting children online and because less restrictive means are available [ACLU v. Reno (Feb 1996)]

12 Offensive Speech and Censorship in Cyberspace l Censorship Laws (cont’d) –Child Online Protection Act (COPA, 1998) »commercial Web sites that make available to minors materials “harmful to minors”, as judged by community standards would be subject to a $50,000 fine and six months in jail »used Miller v. California (1973) definition of obscene »In 2000 and 2003, COPA was ruled unconstitutional by a federal court (definition of obscene speech still to broad) »In 2004, COPA was ruled unconstitutional by the Supreme Court

13 Offensive Speech and Censorship in Cyberspace l Censorship Laws (cont’d) –Children’s Internet Protection Act (CHIPA, 2000) »any school or library receiving federal Internet funds must install filtering software on all Internet terminals »filters must block sites containing child pornography, obscene material, and any material deemed “harmful to minors” »A federal appeals court ruled a major part of CHIPA unconstitutional in 2002 but the Supreme Court upheld the law in 2003 –problems »does this hand power of education to software companies? »filter company can track and sell web surfing data »disproportionately hurts poor schools that need e-rate

14 Offensive Speech and Censorship in Cyberspace l Limiting Internet Access in Libraries and Schools –Filtering Software »Benefits: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. »Problems: can be ineffective—kids get around the filters; the words, phrases, rating systems, etc. are subjective; “banned” keywords can be overly restrictive for adult users and for legitimate use by minors, not transparent

15 Offensive Speech and Censorship in Cyberspace l Types of filtering –URL filtering –keyword filtering –dynamic content filtering l Popular Filters –ConnectProtect, CYBERsitter, CyberPatrol l Internet Content Rating Association (ICRA) – –self-rating of content via an ICRA questionnaire (essentially self-regulation)

16 Spinello Cases l Multnomah Public Library et al. v. U.S. l Censorship at New England University

17 Hate Speech l U.S. perspective –hate speech is completely protected (unless direct threat that will result in “imminent lawless action”) –Jake Baker (Spinello), Nuremberg Files (Planned Parenthood v. ACLA) l European perspective –stringent anti-hate laws (so where do you think most hate websites are hosted?) –Germany »ISPs must block hate sites or face prosecution »illegal for firms in other countries to make hate speech available to Germans [Compuserv Deutschland (Spinello)] –France »illegal to display or sell objects that represent racism or ethnic hatred ( including WWII Nazi memorabilia) »e.g., Yahoo and the auction on the American Website –Saudi Arabia [Veil of Censorship (Spinello)]

18 Student Websites l Schools can control –school newspapers –issues related to extracurricular activities –profane speech within school –can curtail off campus speech if it causes a “material and substantial” disruption in the classroom »school may restrict speech and expel students if a student has a site that threatens a teacher or student at the school l The case of Sean O’Brien

19 SPAM l What Is the Problem? –Unsolicited, mass »is cheap to senders but may impose costs on the recipient’s time and/or the recipient’s online account. »may contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). »may contain a disguised return address. »may pass through filters. »invades privacy. »creates a financial and managerial burden on ISPs. l How do you handle spam?

20 SPAM l Cases and Free Speech Issues –AOL v. Cyber Promotions »AOL and other service providers have successfully sued spammers because of the cost burden imposed. –Disgruntled Intel Employee »initially, a court ruled that non-commercial spam to Intel employees at their Intel accounts was a form of trespass – seen as junk mail that disrupted Intel employees’ work »the CA Supreme Court ruled that it was not.

21 SPAM l Can firms filter spam? –of course l Solutions –technology: filters that screen out spam –market Pressure: services that list spammers –business Policy: at the discretion of the recipient, all would be charged a microfee –law: create restrictions that are consistent with the First Amendment »CAN-SPAM

Exam 1 Professor Matt Thatcher

23 Instructions for Exam 1 l This exam will be closed-note and closed-book. l You will be given 120 minutes to complete it. l All exams must be turned in at the end of the exam period. l Do not discuss any aspects of the exam with other students until after they have taken it. Doing so is considered cheating. l The exam will have 6-10 questions and is worth a total of 100 points. Point allocations are provided after each question. Manage your time accordingly. Remember that you cannot receive partial credit if you leave the answers blank. l Please put your answers in the spaces provided. If you need more space for an answer please use the three (3) extra pages provided at the end of the exam.

24 Format of Exam 1 l Short answer (very few) l Short essay (6 – 10 questions) –compare and contrast –explain course concepts –constructing examples of course concepts »case examples, personal experiences –example situations »analyze the situation similar to case reports u what is the moral dilemma? u who are the stakeholders? u what are some possible actions and their consequences for each stakeholder? u what is the “right” action in this situation?

25 Tips for Preparation l Before the exam –review readings and notes –list concepts –group similar concepts together –make up exam questions »why is this concept important? »how does it fit into the big picture? »can I compare this concept to other similar ones? If so, then how is it different? »what is a real world example of this concept? »what are some potential solutions to a given moral dilemma? What stakeholder would support each solution? Why? l During the exam –read questions carefully –manage your time carefully

26 Exam 1: Topic List l Frameworks for Ethical Analysis (Class 1) –slides »compare and contrast the teleological and deontological perspectives »how does each perspective determine the “right” action? »what are the problems with applying each perspective to a situation? l Newly Vulnerable Markets (Class 2) –slides 4-5, –what are the 3 characteristics of a newly vulnerable market? –what is the customer profitability gradient? –the case of Capital One Financial »good idea to read back through the “Capital One” case »what happened? why did it happen? can it keep happening? where else can it happen? –recording industry, newspaper industry

27 Exam 1: Topic List l Consumer Information Privacy (Class 3) –how would you write a website’s privacy policy? »FTC Consumer Fair Information Practices »notice, choice, integrity, access, enforcement, (not accountability) –compare and contrast European and U.S. approaches to consumer privacy »European Data Protection Directive: Directive 95/46/EC and the Safe Harbor Program »E-Privacy Directive: Directive 2002/58/EC »industry solutions (e.g., privacy seal programs) »technology solutions (e.g., P3P) »privacy norms (industry) vs. privacy policies (firm) vs. law (govt) vs. technology and education (consumer)

28 Exam 1: Topic List l Workplace Privacy (Class 4) –how has IT changed employee monitoring? –identify and describe various electronic monitoring applications. –discuss the advantages and disadvantages of electronic monitoring of employees in the workplace –U.S. Workplace Privacy Laws »Electronic Communications Privacy Act of 1986 (ECPA) –what are some good guidelines to follow when setting an electronic monitoring policy in the workplace

29 Exam 1: Topic List l Freedom of Speech (Class 5) –what is the First Amendment? –what types of speech are protected and which are not protected? –offensive speech and censorship in cyberspace »U.S. laws vs. technology solutions –hate speech

30 Next Time l Exam 1