SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Emily Ward

LIS 502

28 March 2011

                             Policy Tracking Paper: Internet Filtering in Libraries

Background: Development of CIPA and Supreme Court Decision

          On December 21, 2000, President Clinton signed a law that would require libraries receiving

certain federal funding to disregard nearly every tenet of the American Library Association’s Bill of

Rights. This law was known as the Children’s Internet Protection Act (CIPA), and kicked off the major

controversy surrounding Internet filtering in libraries.


          The Act was first proposed by Sen. John McCain in 1999 and would require that any school or

library receiving federal funding would have to install filtering software on any computers that can

access the Internet. This bill, and several others with similar intention, was dropped before any action

was taken. However, by the close of 2000, supporters of the Act finally found the support they needed

and the bill became law. The final wording of CIPA was more specific than originally proposed by McCain

in 1999. According to the language of Public Law 106-554, any libraries or schools that use E-rate

funding to provide Internet access to patrons or that receive certain federal funding under the Library

Services and Technology Act or the Elementary and Secondary Education Act must now develop Internet

safety policies that include filtering software on computers that can access the Internet. This software

must filter images that are 1) obscene; 2) child pornography; and/or 3) harmful to minors (when viewed

by minors) (Susman).


          This legislation was particularly worrisome to public and school librarians alike for multiple

reasons. As noted above, the basic implications of the law go against many of the gut instincts of

librarians and library services. Filtering information that is otherwise freely accessible opposes many

principles that librarians use to guide their service, as is laid out in the Library Bill of Rights, including
that “materials should not be proscribed or removed because of partisan or doctrinal disapproval”, that

libraries should resist “abridgment of free expression and free access to ideas”, and that “a person’s

right to use a library should not be denied or abridged because of origin, age, background, or views”

(Library Bill of Rights).


         Perhaps even more troubling, however, are the deficiencies of the available filtering software.

Software is yet to be developed that will block only the images required to be blocked by the Public Law.

Instead, filters are blocking many legitimate, information-rich sources that students, educators, and

public patrons are thus missing out on. In a report published by the Free Expression Policy Project

summarizing some 70 studies testing the effectiveness of filtering software, it was found that filters

were significantly over-blocking websites, mostly due to the “broad and vague blocking categories” used

by software manufacturers (Heins, et al. i). Other problems librarians encounter include filters causing a

false sense of security (when users assume that if a website got through the filter, it is a reliable source),

and the fact that filtering software manufacturers are not held accountable, meaning their

discriminations and biases can affect the blocking (Willard 58). Libraries now had to make the choice of

whether to forgo federal funding (and thus find funding to support certain programs elsewhere), or risk

censoring information from their patrons.


         Understandably, many libraries were unhappy with the position in which this law placed them.

Filtering websites, no matter the good intentions, is an active form of censorship that libraries are

supposed to fight, and fight they did. In a civil action suit the American Library Association brought

against the United States, et al., the U.S. District Court for the Eastern District of Pennsylvania found that

CIPA “is facially invalid, since it will induce public libraries, as state actors, to violate the First

Amendment” (188). It seemed as if the ALA had won, and that filtering software would no longer be
legally required. However, the case was appealed and then appeared before the U.S. Supreme Court,

which met with a different conclusion.


        According to the June 23, 2003 decision, six of nine Supreme Court Justices found that requiring

filtering software on computers supported by federal funding was not a violation of the First

Amendment because adult patrons are able to request that the filters be turned off. Justice Kennedy

wrote that librarians should unblock any site or disable the filter at an adult patron’s request “without

significant delay” and without requiring an explanation from the patron (U.S., et al. v. ALA, Inc.).

Requiring Internet filters to receive certain federal funds would remain law.


Recent Developments


        The decision upheld by the Supreme Court not only placed libraries back in the position they

were when the law was first written, but also introduced a new potential problem. By specifying that

librarians have the responsibility to disable filters quickly and at any time, the door was left open for

“additional challenges if libraries do not adopt an adequate unblocking system” (American Civil Liberties

Union). Libraries can now risk facing challenges from the federal government and unsatisfied patrons

alike. Indeed, in 2006 in the case Sarah Bradburn et al. v. North Central Regional Library District, a

patron sued her library for not adequately responding to her requests for disabling the filter. The

defendants argued that the library’s policy for filtering was in line with their collection development

policy and limited confrontation between patrons and staff. They argued that unblocking websites for

each and every individual request is inefficient and costly. Although the decision made on May 6, 2010,

favored the library, ruling that the policy was not unconstitutional, three justices dissented, arguing that

the ruling went against the 2003 U.S. Supreme Court decision (Oliver, et al. 42-43).


        Although there have been no additional federal laws regarding Internet filtering in libraries and

schools since Public Law 106-554, twenty-five states now have Internet filtering laws for organizations
that are publicly funded, like libraries and schools. While the majority of these state laws only require

the adoption of Internet safety policies that will protect minors from obscene or harmful materials,

some states do require filters to be installed to receive public funds. Arizona, Pennsylvania, and Ohio are

among those states that require filtering software to be used on all public school computers. To date,

Illinois does not have a law detailing the use of Internet filtering software on publicly-funded computers

(State Internet Filtering Laws).


        Although CIPA was signed into law in 2000 and upheld by the Supreme Court in 2003, the issue

is still hot at hand, and continues to be of importance as our dependency on the Internet for

educational, informational, and entertainment purposes grows. As the ISTE National Educational

Technology Standards encourage our teachers to “collaborate using digital tools and resources” and

“participate in local and global learning communities”, educators are attempting to embrace Web 2.0

technologies, many of which are inaccessible with installed filtering software (Willard 56). Even the U.S.

Department of Education admits in the National Educational Technology Plan 2010 that filtering

“creates barriers to the rich learning experiences that in-school Internet access should afford students”

(54). Until filtering software becomes more effective or Public Law 106-554 and state laws requiring

Internet filtering are repealed, students and patrons will continue to meet barriers preventing their use

of more modern technologies.


Staying Current on the Issue


         Librarians wanting to stay informed on developing issues surrounding Internet filtering in

schools and libraries should regularly review various library and technology periodicals, as well as

watching for new updates on relevant organizational websites. The following sources can be referenced

to stay current:


American Civil Liberties Union website: http://www.aclu.org/
The ACLU takes an active role in protecting citizens’ rights, particularly those upheld in the First
Amendment. As such, issues of censorship (like Internet filtering), is a major concern of the ACLU. To
find information on this issue specifically, users can search for “Internet filtering” in the search bar on
the home page, and will be shown thousands of initiatives, blog posts, and articles the ACLU has put
forth. These results can be sorted by relevance or date, so users can access the most recent information
easily.

American Library Association—Children’s Internet Protection Act website:
http://ala.org/ala/issuesadvocacy/advocacy/federallegislation/cipa/index.cfm

The ALA has an entire section of their website devoted to resources librarians can access to learn more
about CIPA and its implications, including ideas for how to adhere to the law, while keeping as much
information as possible available to patrons. Users can also search the ALA website for “Internet
filtering” to find current memorandums and articles related to the issue.

Knowledge Quest: Journal of the American Association for School Librarians

This bimonthly journal provides information relevant to school librarians and librarian educators. The
recent September/October 2010 issue focuses entirely on issues of online intellectual freedom.
Members of the AASL have full access to the journal, as well as those with access to EBSCO and Wilson
Library Lit databases.

Library Journal: http://www.libraryjournal.com/csp/cms/sites/LJ/Home/index.csp

Library Journal is the oldest and arguably most respected journal covering issues related to libraries and
librarians. Past issues, articles, and blog posts are easily searchable by “Internet filtering” or “CIPA” and
will allow access to recent and relevant information. Although the print version of Library Journal costs,
nearly everything is accessible for free online.

Library Lit & Information Science Full-Text alerts

For those that have access to Wilson’s Library Lit, an alert tool is available to let the user know
whenever a new article has been posted related to a specific search term. Once the user has a personal
account (which is easily set up), an alert can be created by searching for “Internet filtering software”,
clicking “Create Alert”, and filling in the resulting form. E-mails will then be sent to the account you
entered whenever a new article is available.



Bibliography


American Civil Liberties Union. “ACLU Disappointed in Ruling on Internet Censorship in Libraries, But
       Sees Limited Impact for Adults.” 23 June 2003. Web. 26 March 2011. Accessed from
       http://www.aclu.org/technology-and-liberty/aclu-disappointed-ruling-internet-censorship-
       libraries-sees-limited-impact-ad
American Library Association, Inc. v. United States, et al. No. 01-1303. US District Court for the Eastern
       District of Pennsylvania. 31 May 2002. Web. 26 March 2011. Accessed from
       http://www.ala.org/ala/issuesadvocacy/advocacy/federallegislation/cipa/internet.pdf

The Children’s Internet Protection Act (CIPA). American Library Association. Web. 24 March 2011.
        Accessed from
        http://www.ala.org/ala/issuesadvocacy/advocacy/federallegislation/cipa/index.cfm

Heins, Marjorie, Christina Cho, and Ariel Feldman. “Internet Filters: A Public Policy Report.” Free
        Expression Policy Project. New York: Brennan Center of Justice at NYU School of Law, 2006. Web.
        24 March 2011. Accessed from http://www.fepproject.org/policyreports/filters2.pdf

Library Bill of Rights. American Library Association. 23 January 1996. Web. 24 March 2001. Accessed
        from http://www.ala.org/ala/issuesadvocacy/intfreedom/librarybill/index.cfm

State Internet Filtering Laws. National Conference of State Legislators. 13 January 2011. Web. 26 March
         2011. Accessed from http://www.ncsl.org/default.aspx?tabid=13491

Oliver, Kent, June Pinnell-Stephens, and Barbara Jones. “All or Nothing: Hardly the Facts.” Library
         Journal 136.1 (2011): 42-43. Web. 23 March 2011. Accessed via Library Lit,
         http://www.library.illinois.edu/lsx/

Susman, Thomas. “Children’s Internet Protection: A Summary.” American Library Association. 13 January
      2001. Web. 24 March 2011. Accessed from
      http://www.ala.org/ala/issuesadvocacy/advocacy/federallegislation/cipa/cipasummary.pdf

United States, et al. v. American Library Association, Inc. No. 02-361. US Supreme Court. 23 June 2003.
        Web. Accessed from http://www.supremecourt.gov/opinions/boundvolumes/539bv.pdf

U.S. Department of Education. “Transforming American Education: Learning Powered by Technology
        [Draft].” National Educational Technology Plan 2010. 5 March 2010. Web. 26 March 2011.
        Accessed from http://www.ed.gov/sites/default/files/NETP-2010-final-report.pdf

Willard, Nancy. “Teaching Them to Swim.” Knowledge Quest 39.1 (2010). Web. 26 March 2011: 54-61.
        Accessed via Library Lit, http://www.library.illinois.edu/lsx/

Weitere ähnliche Inhalte

Was ist angesagt?

Intellectual Freedom poster
Intellectual Freedom posterIntellectual Freedom poster
Intellectual Freedom postermartamagnuson
 
Mobile Learning & Digital Literacy
Mobile Learning & Digital LiteracyMobile Learning & Digital Literacy
Mobile Learning & Digital LiteracyFrançois Guité
 
Aup Critique
Aup CritiqueAup Critique
Aup Critiquerwhite83
 
Let the trumpet sound 2007 version
Let the trumpet sound 2007 versionLet the trumpet sound 2007 version
Let the trumpet sound 2007 versionJohan Koren
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil DoersJazayer
 
Mobile Technology and Learning: Information Literacy Beyond the Classroom
Mobile Technology and Learning: Information Literacy Beyond the Classroom Mobile Technology and Learning: Information Literacy Beyond the Classroom
Mobile Technology and Learning: Information Literacy Beyond the Classroom robincanuel
 
Makerspaces Workshop Handout
Makerspaces Workshop HandoutMakerspaces Workshop Handout
Makerspaces Workshop HandoutALATechSource
 
HathiTrust--a GovDocs Repository?
HathiTrust--a GovDocs Repository?HathiTrust--a GovDocs Repository?
HathiTrust--a GovDocs Repository?Brian Vetruba
 
Del Mar Summer Academy: Federal Laws and Universal Design for Learning
Del Mar Summer Academy:  Federal Laws and Universal Design for LearningDel Mar Summer Academy:  Federal Laws and Universal Design for Learning
Del Mar Summer Academy: Federal Laws and Universal Design for LearningRaymond Rose
 
Cummings LIBR 200 Term Paper
Cummings LIBR 200 Term PaperCummings LIBR 200 Term Paper
Cummings LIBR 200 Term PaperDarcy Cummings
 
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...eraser Juan José Calderón
 
Ala Fall PD Day Presentation v2
Ala Fall PD Day Presentation v2Ala Fall PD Day Presentation v2
Ala Fall PD Day Presentation v2cmillburg
 
Ala Fall PD Day Presentation
Ala Fall PD Day PresentationAla Fall PD Day Presentation
Ala Fall PD Day Presentationcmillburg
 
Implications of a Mobile Computing World for Academic Libraries and Their Users
Implications of a Mobile Computing World for Academic Libraries and Their UsersImplications of a Mobile Computing World for Academic Libraries and Their Users
Implications of a Mobile Computing World for Academic Libraries and Their UsersRobin M. Ashford, MSLIS
 
How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?Jacklin Berry
 

Was ist angesagt? (18)

Intellectual Freedom poster
Intellectual Freedom posterIntellectual Freedom poster
Intellectual Freedom poster
 
Mobile Learning & Digital Literacy
Mobile Learning & Digital LiteracyMobile Learning & Digital Literacy
Mobile Learning & Digital Literacy
 
Aup Critique
Aup CritiqueAup Critique
Aup Critique
 
Let the trumpet sound 2007 version
Let the trumpet sound 2007 versionLet the trumpet sound 2007 version
Let the trumpet sound 2007 version
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
 
Sp ws2 sally johnstone
Sp ws2 sally johnstoneSp ws2 sally johnstone
Sp ws2 sally johnstone
 
Mobile Technology and Learning: Information Literacy Beyond the Classroom
Mobile Technology and Learning: Information Literacy Beyond the Classroom Mobile Technology and Learning: Information Literacy Beyond the Classroom
Mobile Technology and Learning: Information Literacy Beyond the Classroom
 
WLMA 2009 Social Studies CBAs Secondary
WLMA 2009 Social Studies CBAs SecondaryWLMA 2009 Social Studies CBAs Secondary
WLMA 2009 Social Studies CBAs Secondary
 
Makerspaces Workshop Handout
Makerspaces Workshop HandoutMakerspaces Workshop Handout
Makerspaces Workshop Handout
 
HathiTrust--a GovDocs Repository?
HathiTrust--a GovDocs Repository?HathiTrust--a GovDocs Repository?
HathiTrust--a GovDocs Repository?
 
Del Mar Summer Academy: Federal Laws and Universal Design for Learning
Del Mar Summer Academy:  Federal Laws and Universal Design for LearningDel Mar Summer Academy:  Federal Laws and Universal Design for Learning
Del Mar Summer Academy: Federal Laws and Universal Design for Learning
 
Cummings LIBR 200 Term Paper
Cummings LIBR 200 Term PaperCummings LIBR 200 Term Paper
Cummings LIBR 200 Term Paper
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
 
Ala Fall PD Day Presentation v2
Ala Fall PD Day Presentation v2Ala Fall PD Day Presentation v2
Ala Fall PD Day Presentation v2
 
Ala Fall PD Day Presentation
Ala Fall PD Day PresentationAla Fall PD Day Presentation
Ala Fall PD Day Presentation
 
Implications of a Mobile Computing World for Academic Libraries and Their Users
Implications of a Mobile Computing World for Academic Libraries and Their UsersImplications of a Mobile Computing World for Academic Libraries and Their Users
Implications of a Mobile Computing World for Academic Libraries and Their Users
 
How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?How will killing Net Neutrality impact education?
How will killing Net Neutrality impact education?
 

Ähnlich wie CIPA Policy Tracking Paper

C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L S
C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L SC O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L S
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L SWilliam Kritsonis
 
Copy Of C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S ...
Copy Of  C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S ...Copy Of  C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S ...
Copy Of C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S ...William Kritsonis
 
Copy Of Computer And Internet Law In Public Schools
Copy Of Computer And Internet Law In Public SchoolsCopy Of Computer And Internet Law In Public Schools
Copy Of Computer And Internet Law In Public SchoolsWilliam Kritsonis
 
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L S
C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L SC O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L S
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L SWilliam Kritsonis
 
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L S
C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L SC O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L S
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L SWilliam Kritsonis
 
Copy Of C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S ...
Copy Of  C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S ...Copy Of  C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S ...
Copy Of C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S ...William Kritsonis
 
Computer And Internet Law In Public Schools
Computer And Internet Law In Public SchoolsComputer And Internet Law In Public Schools
Computer And Internet Law In Public SchoolsWilliam Kritsonis
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Library Censorship
Library CensorshipLibrary Censorship
Library CensorshipScott Lee
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docxLIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docxsmile790243
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on educationCraig Cunningham
 
A Sea of Information
A Sea of InformationA Sea of Information
A Sea of InformationLatia Ward
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000nielson900
 

Ähnlich wie CIPA Policy Tracking Paper (19)

C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L S
C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L SC O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L S
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L S
 
Copy Of C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S ...
Copy Of  C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S ...Copy Of  C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S ...
Copy Of C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S ...
 
Copy Of Computer And Internet Law In Public Schools
Copy Of Computer And Internet Law In Public SchoolsCopy Of Computer And Internet Law In Public Schools
Copy Of Computer And Internet Law In Public Schools
 
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L S
C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L SC O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L S
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L S
 
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L S
C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L SC O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S C H O O L S
C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S C H O O L S
 
Copy Of C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S ...
Copy Of  C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S ...Copy Of  C O M P U T E R  A N D  I N T E R N E T  L A W  I N  P U B L I C  S ...
Copy Of C O M P U T E R A N D I N T E R N E T L A W I N P U B L I C S ...
 
Computer And Internet Law In Public Schools
Computer And Internet Law In Public SchoolsComputer And Internet Law In Public Schools
Computer And Internet Law In Public Schools
 
Current Issue Paper
Current Issue PaperCurrent Issue Paper
Current Issue Paper
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...
Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...
Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...
 
Library Censorship
Library CensorshipLibrary Censorship
Library Censorship
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docxLIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
LIBRARIES TO FILTER OR CENSOR PROVIDED MATERIALCOMPUTER.docx
 
Stoprwa
StoprwaStoprwa
Stoprwa
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on education
 
A Sea of Information
A Sea of InformationA Sea of Information
A Sea of Information
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000
 

Mehr von eward511

Response Letter to Challenge
Response Letter to ChallengeResponse Letter to Challenge
Response Letter to Challengeeward511
 
Dr Seuss Plans
Dr Seuss PlansDr Seuss Plans
Dr Seuss Planseward511
 
Wondering Lesson Plan
Wondering Lesson PlanWondering Lesson Plan
Wondering Lesson Planeward511
 
Budgeting Assignment
Budgeting AssignmentBudgeting Assignment
Budgeting Assignmenteward511
 
QR Case Study
QR Case StudyQR Case Study
QR Case Studyeward511
 
Fourth Grade Map Journal excerpts
Fourth Grade Map Journal excerptsFourth Grade Map Journal excerpts
Fourth Grade Map Journal excerptseward511
 
Dress Like Dr. Seuss Week Bookmarks
Dress Like Dr. Seuss Week BookmarksDress Like Dr. Seuss Week Bookmarks
Dress Like Dr. Seuss Week Bookmarkseward511
 
Treasure Hunt Activity
Treasure Hunt ActivityTreasure Hunt Activity
Treasure Hunt Activityeward511
 
Library Stations Worksheet
Library Stations WorksheetLibrary Stations Worksheet
Library Stations Worksheeteward511
 
Library Stations Pretest
Library Stations PretestLibrary Stations Pretest
Library Stations Pretesteward511
 
Library Stations Lesson Plan
Library Stations Lesson PlanLibrary Stations Lesson Plan
Library Stations Lesson Planeward511
 
Managing Myself Inventory
Managing Myself InventoryManaging Myself Inventory
Managing Myself Inventoryeward511
 
Collaboration Journal Exceprts
Collaboration Journal ExceprtsCollaboration Journal Exceprts
Collaboration Journal Exceprtseward511
 
Website Evaluation Lesson
Website Evaluation LessonWebsite Evaluation Lesson
Website Evaluation Lessoneward511
 
Assessment Assignment
Assessment AssignmentAssessment Assignment
Assessment Assignmenteward511
 
Storytelling in LIS and Beyond
Storytelling in LIS and BeyondStorytelling in LIS and Beyond
Storytelling in LIS and Beyondeward511
 
Research Project Lesson Plan
Research Project Lesson PlanResearch Project Lesson Plan
Research Project Lesson Planeward511
 
Internet Investigators Lesson
Internet Investigators LessonInternet Investigators Lesson
Internet Investigators Lessoneward511
 
Evaluating websiteslesson
Evaluating websiteslessonEvaluating websiteslesson
Evaluating websiteslessoneward511
 
InternetInvestigatorNotebook
InternetInvestigatorNotebookInternetInvestigatorNotebook
InternetInvestigatorNotebookeward511
 

Mehr von eward511 (20)

Response Letter to Challenge
Response Letter to ChallengeResponse Letter to Challenge
Response Letter to Challenge
 
Dr Seuss Plans
Dr Seuss PlansDr Seuss Plans
Dr Seuss Plans
 
Wondering Lesson Plan
Wondering Lesson PlanWondering Lesson Plan
Wondering Lesson Plan
 
Budgeting Assignment
Budgeting AssignmentBudgeting Assignment
Budgeting Assignment
 
QR Case Study
QR Case StudyQR Case Study
QR Case Study
 
Fourth Grade Map Journal excerpts
Fourth Grade Map Journal excerptsFourth Grade Map Journal excerpts
Fourth Grade Map Journal excerpts
 
Dress Like Dr. Seuss Week Bookmarks
Dress Like Dr. Seuss Week BookmarksDress Like Dr. Seuss Week Bookmarks
Dress Like Dr. Seuss Week Bookmarks
 
Treasure Hunt Activity
Treasure Hunt ActivityTreasure Hunt Activity
Treasure Hunt Activity
 
Library Stations Worksheet
Library Stations WorksheetLibrary Stations Worksheet
Library Stations Worksheet
 
Library Stations Pretest
Library Stations PretestLibrary Stations Pretest
Library Stations Pretest
 
Library Stations Lesson Plan
Library Stations Lesson PlanLibrary Stations Lesson Plan
Library Stations Lesson Plan
 
Managing Myself Inventory
Managing Myself InventoryManaging Myself Inventory
Managing Myself Inventory
 
Collaboration Journal Exceprts
Collaboration Journal ExceprtsCollaboration Journal Exceprts
Collaboration Journal Exceprts
 
Website Evaluation Lesson
Website Evaluation LessonWebsite Evaluation Lesson
Website Evaluation Lesson
 
Assessment Assignment
Assessment AssignmentAssessment Assignment
Assessment Assignment
 
Storytelling in LIS and Beyond
Storytelling in LIS and BeyondStorytelling in LIS and Beyond
Storytelling in LIS and Beyond
 
Research Project Lesson Plan
Research Project Lesson PlanResearch Project Lesson Plan
Research Project Lesson Plan
 
Internet Investigators Lesson
Internet Investigators LessonInternet Investigators Lesson
Internet Investigators Lesson
 
Evaluating websiteslesson
Evaluating websiteslessonEvaluating websiteslesson
Evaluating websiteslesson
 
InternetInvestigatorNotebook
InternetInvestigatorNotebookInternetInvestigatorNotebook
InternetInvestigatorNotebook
 

Kürzlich hochgeladen

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Kürzlich hochgeladen (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

CIPA Policy Tracking Paper

  • 1. Emily Ward LIS 502 28 March 2011 Policy Tracking Paper: Internet Filtering in Libraries Background: Development of CIPA and Supreme Court Decision On December 21, 2000, President Clinton signed a law that would require libraries receiving certain federal funding to disregard nearly every tenet of the American Library Association’s Bill of Rights. This law was known as the Children’s Internet Protection Act (CIPA), and kicked off the major controversy surrounding Internet filtering in libraries. The Act was first proposed by Sen. John McCain in 1999 and would require that any school or library receiving federal funding would have to install filtering software on any computers that can access the Internet. This bill, and several others with similar intention, was dropped before any action was taken. However, by the close of 2000, supporters of the Act finally found the support they needed and the bill became law. The final wording of CIPA was more specific than originally proposed by McCain in 1999. According to the language of Public Law 106-554, any libraries or schools that use E-rate funding to provide Internet access to patrons or that receive certain federal funding under the Library Services and Technology Act or the Elementary and Secondary Education Act must now develop Internet safety policies that include filtering software on computers that can access the Internet. This software must filter images that are 1) obscene; 2) child pornography; and/or 3) harmful to minors (when viewed by minors) (Susman). This legislation was particularly worrisome to public and school librarians alike for multiple reasons. As noted above, the basic implications of the law go against many of the gut instincts of librarians and library services. Filtering information that is otherwise freely accessible opposes many principles that librarians use to guide their service, as is laid out in the Library Bill of Rights, including
  • 2. that “materials should not be proscribed or removed because of partisan or doctrinal disapproval”, that libraries should resist “abridgment of free expression and free access to ideas”, and that “a person’s right to use a library should not be denied or abridged because of origin, age, background, or views” (Library Bill of Rights). Perhaps even more troubling, however, are the deficiencies of the available filtering software. Software is yet to be developed that will block only the images required to be blocked by the Public Law. Instead, filters are blocking many legitimate, information-rich sources that students, educators, and public patrons are thus missing out on. In a report published by the Free Expression Policy Project summarizing some 70 studies testing the effectiveness of filtering software, it was found that filters were significantly over-blocking websites, mostly due to the “broad and vague blocking categories” used by software manufacturers (Heins, et al. i). Other problems librarians encounter include filters causing a false sense of security (when users assume that if a website got through the filter, it is a reliable source), and the fact that filtering software manufacturers are not held accountable, meaning their discriminations and biases can affect the blocking (Willard 58). Libraries now had to make the choice of whether to forgo federal funding (and thus find funding to support certain programs elsewhere), or risk censoring information from their patrons. Understandably, many libraries were unhappy with the position in which this law placed them. Filtering websites, no matter the good intentions, is an active form of censorship that libraries are supposed to fight, and fight they did. In a civil action suit the American Library Association brought against the United States, et al., the U.S. District Court for the Eastern District of Pennsylvania found that CIPA “is facially invalid, since it will induce public libraries, as state actors, to violate the First Amendment” (188). It seemed as if the ALA had won, and that filtering software would no longer be
  • 3. legally required. However, the case was appealed and then appeared before the U.S. Supreme Court, which met with a different conclusion. According to the June 23, 2003 decision, six of nine Supreme Court Justices found that requiring filtering software on computers supported by federal funding was not a violation of the First Amendment because adult patrons are able to request that the filters be turned off. Justice Kennedy wrote that librarians should unblock any site or disable the filter at an adult patron’s request “without significant delay” and without requiring an explanation from the patron (U.S., et al. v. ALA, Inc.). Requiring Internet filters to receive certain federal funds would remain law. Recent Developments The decision upheld by the Supreme Court not only placed libraries back in the position they were when the law was first written, but also introduced a new potential problem. By specifying that librarians have the responsibility to disable filters quickly and at any time, the door was left open for “additional challenges if libraries do not adopt an adequate unblocking system” (American Civil Liberties Union). Libraries can now risk facing challenges from the federal government and unsatisfied patrons alike. Indeed, in 2006 in the case Sarah Bradburn et al. v. North Central Regional Library District, a patron sued her library for not adequately responding to her requests for disabling the filter. The defendants argued that the library’s policy for filtering was in line with their collection development policy and limited confrontation between patrons and staff. They argued that unblocking websites for each and every individual request is inefficient and costly. Although the decision made on May 6, 2010, favored the library, ruling that the policy was not unconstitutional, three justices dissented, arguing that the ruling went against the 2003 U.S. Supreme Court decision (Oliver, et al. 42-43). Although there have been no additional federal laws regarding Internet filtering in libraries and schools since Public Law 106-554, twenty-five states now have Internet filtering laws for organizations
  • 4. that are publicly funded, like libraries and schools. While the majority of these state laws only require the adoption of Internet safety policies that will protect minors from obscene or harmful materials, some states do require filters to be installed to receive public funds. Arizona, Pennsylvania, and Ohio are among those states that require filtering software to be used on all public school computers. To date, Illinois does not have a law detailing the use of Internet filtering software on publicly-funded computers (State Internet Filtering Laws). Although CIPA was signed into law in 2000 and upheld by the Supreme Court in 2003, the issue is still hot at hand, and continues to be of importance as our dependency on the Internet for educational, informational, and entertainment purposes grows. As the ISTE National Educational Technology Standards encourage our teachers to “collaborate using digital tools and resources” and “participate in local and global learning communities”, educators are attempting to embrace Web 2.0 technologies, many of which are inaccessible with installed filtering software (Willard 56). Even the U.S. Department of Education admits in the National Educational Technology Plan 2010 that filtering “creates barriers to the rich learning experiences that in-school Internet access should afford students” (54). Until filtering software becomes more effective or Public Law 106-554 and state laws requiring Internet filtering are repealed, students and patrons will continue to meet barriers preventing their use of more modern technologies. Staying Current on the Issue Librarians wanting to stay informed on developing issues surrounding Internet filtering in schools and libraries should regularly review various library and technology periodicals, as well as watching for new updates on relevant organizational websites. The following sources can be referenced to stay current: American Civil Liberties Union website: http://www.aclu.org/
  • 5. The ACLU takes an active role in protecting citizens’ rights, particularly those upheld in the First Amendment. As such, issues of censorship (like Internet filtering), is a major concern of the ACLU. To find information on this issue specifically, users can search for “Internet filtering” in the search bar on the home page, and will be shown thousands of initiatives, blog posts, and articles the ACLU has put forth. These results can be sorted by relevance or date, so users can access the most recent information easily. American Library Association—Children’s Internet Protection Act website: http://ala.org/ala/issuesadvocacy/advocacy/federallegislation/cipa/index.cfm The ALA has an entire section of their website devoted to resources librarians can access to learn more about CIPA and its implications, including ideas for how to adhere to the law, while keeping as much information as possible available to patrons. Users can also search the ALA website for “Internet filtering” to find current memorandums and articles related to the issue. Knowledge Quest: Journal of the American Association for School Librarians This bimonthly journal provides information relevant to school librarians and librarian educators. The recent September/October 2010 issue focuses entirely on issues of online intellectual freedom. Members of the AASL have full access to the journal, as well as those with access to EBSCO and Wilson Library Lit databases. Library Journal: http://www.libraryjournal.com/csp/cms/sites/LJ/Home/index.csp Library Journal is the oldest and arguably most respected journal covering issues related to libraries and librarians. Past issues, articles, and blog posts are easily searchable by “Internet filtering” or “CIPA” and will allow access to recent and relevant information. Although the print version of Library Journal costs, nearly everything is accessible for free online. Library Lit & Information Science Full-Text alerts For those that have access to Wilson’s Library Lit, an alert tool is available to let the user know whenever a new article has been posted related to a specific search term. Once the user has a personal account (which is easily set up), an alert can be created by searching for “Internet filtering software”, clicking “Create Alert”, and filling in the resulting form. E-mails will then be sent to the account you entered whenever a new article is available. Bibliography American Civil Liberties Union. “ACLU Disappointed in Ruling on Internet Censorship in Libraries, But Sees Limited Impact for Adults.” 23 June 2003. Web. 26 March 2011. Accessed from http://www.aclu.org/technology-and-liberty/aclu-disappointed-ruling-internet-censorship- libraries-sees-limited-impact-ad
  • 6. American Library Association, Inc. v. United States, et al. No. 01-1303. US District Court for the Eastern District of Pennsylvania. 31 May 2002. Web. 26 March 2011. Accessed from http://www.ala.org/ala/issuesadvocacy/advocacy/federallegislation/cipa/internet.pdf The Children’s Internet Protection Act (CIPA). American Library Association. Web. 24 March 2011. Accessed from http://www.ala.org/ala/issuesadvocacy/advocacy/federallegislation/cipa/index.cfm Heins, Marjorie, Christina Cho, and Ariel Feldman. “Internet Filters: A Public Policy Report.” Free Expression Policy Project. New York: Brennan Center of Justice at NYU School of Law, 2006. Web. 24 March 2011. Accessed from http://www.fepproject.org/policyreports/filters2.pdf Library Bill of Rights. American Library Association. 23 January 1996. Web. 24 March 2001. Accessed from http://www.ala.org/ala/issuesadvocacy/intfreedom/librarybill/index.cfm State Internet Filtering Laws. National Conference of State Legislators. 13 January 2011. Web. 26 March 2011. Accessed from http://www.ncsl.org/default.aspx?tabid=13491 Oliver, Kent, June Pinnell-Stephens, and Barbara Jones. “All or Nothing: Hardly the Facts.” Library Journal 136.1 (2011): 42-43. Web. 23 March 2011. Accessed via Library Lit, http://www.library.illinois.edu/lsx/ Susman, Thomas. “Children’s Internet Protection: A Summary.” American Library Association. 13 January 2001. Web. 24 March 2011. Accessed from http://www.ala.org/ala/issuesadvocacy/advocacy/federallegislation/cipa/cipasummary.pdf United States, et al. v. American Library Association, Inc. No. 02-361. US Supreme Court. 23 June 2003. Web. Accessed from http://www.supremecourt.gov/opinions/boundvolumes/539bv.pdf U.S. Department of Education. “Transforming American Education: Learning Powered by Technology [Draft].” National Educational Technology Plan 2010. 5 March 2010. Web. 26 March 2011. Accessed from http://www.ed.gov/sites/default/files/NETP-2010-final-report.pdf Willard, Nancy. “Teaching Them to Swim.” Knowledge Quest 39.1 (2010). Web. 26 March 2011: 54-61. Accessed via Library Lit, http://www.library.illinois.edu/lsx/