SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Internet Decency Legislation




                      Terrance Garmon
1996




1995      2000   2005   2010
Telecommunication Act of 1996
      •   Primary Purpose: to reduce regulation and encourage
          the “rapid deployment of new telecommunication
          technologies.”

      •   Originally for Telephone, T.V. and Radio

      •   Internet started to become more popular

      •   Congress saw potential of Internet as a medium for
          educational and political discourse, and as a result
          wanted to enact legislation that would promote the
          development of the internet

      •   Congress also saw how easy it was for users to access
          sexually explicit sites without knowing the user‟s age

      •   As a result, title V of the Act was created to address
          decency on the internet
The Communications Decency Act
        of 1996 (CDA)

 •   The 1st notable attempt by the US Congress to regulate
     pornographic material on the internet.

 • Did 2 things:
    • 1.) Attempted to regulate both indecency (when available to
       children) and obscenity in cyberspace.
    • 2.) Section 230 of the Act has been interpreted to say that
       operators of Internet services are not to be construed as
       publishers (and thus not legally liable for the words of third
       parties who use their services).
What Did the CDA Say?
• Passed in 1996 stating :
   – the CDA imposed criminal sanctions on anyone who
      • knowingly (A) uses an interactive computer service to
        send to a specific person or persons under 18 years of
        age, or (B) uses any interactive computer service to
        display in a manner available to a person under 18 years
        of age, any comment, request, suggestion, proposal,
        image, or other communication that, in context, depicts or
        describes, in terms patently offensive as measured by
        contemporary community standards, sexual or excretory
        activities or organs.
      • It further criminalized the transmission of materials that
        were "obscene or indecent" to persons known to be under
        18.
• Free Speech Advocates Challenged the CDA claiming it was
  unconstitutional as it violated the 1st amendment.
Reno v. American Civil Liberties Union
               (1997)
      • ACLU argued provisions violated 1st amendment because of
        vagueness
      • The U.S. Supreme Court held the two provisions of the
        Communications Decency Act of 1996 (CDA) that criminalized
        providing obscene materials to minors by on the internet were
        unconstitutional because:
         • 1.) there was no definition of “indecent”
         • 2.) patently offensive could exclude literary, artistic, political,
            scientific, or educational value.
      • Policy problems:
         • If upheld:
              • 1.) would place burden on senders/ websites to
                 determine whether speech is subject to regulation
              • 2.) whether recipient is of min. age
         • “the mere possibility that user-based Internet screening
            software would „soon be widely available‟ was relevant to
            their restriction of an overboard regulation.”
1998
          1997
   1996




1995                    2000   2005   2010
Child Online Protection Act (COPA)
• A direct response to the Reno v. ACLU decision narrowing the range of material
  covered

• Was a law in the United States of America, passed in 1998 with the declared
  purpose of restricting access by minors to any material defined as harmful to
  such minors on the Internet.

• COPA only limits commercial speech and only affects providers based within the
  U.S.

• Required all commercial distributors of "material harmful to minors" to restrict
  their sites from access by minors.

• "Material harmful to minors" was defined as material that by "contemporary
  community standards" was judged to appeal to the "prurient interest" and that
  showed sexual acts or nudity (including female breasts). This is a much broader
  standard than obscenity.

• Law Never took effect as 3 rounds of litigation led to a permanent injunction
  against the law
Ashcroft v. American Civil Liberties
           Union (2004)
 Legislation
 – Round 1= remanded back to circuit ct (1998-2002)
 – Round 2= upheld injunction, likely unconstitutional (2003-2004)
     • Supreme ct of Ashcroft
         – It prevented online publishers from publishing some
           material that adults had a right to access - and because it
           did not use the least restrictive means possible to protect
           children (the court found that blocking software installed
           on home computers by parents would do as good a job
           without preventing free speech).
         – For similar reasons, the panel found that the act was
           unconstitutionally "overbroad" - that is, it applied to too
           much protected material.
 – Round 3= permanent enjoinment of law granted and upheld on
   appeal and denied review in Supreme ct, which killed the bill.
   (2007-2009)
1995
       1996




       1997


       1998

       2000




2000
2005
2010   2004
Children’s Internet Protection Act
              (CIPA)
   What is it?
          -The Children‟s Internet Protection Act (CIPA) is a federal
          law enacted by Congress to address concerns about
          access to offensive content over the Internet on school
          and library computers.

          -CIPA imposes certain types of requirements on any
          school or library that receives certain types of federal
          funding.

          -In passing CIPA, Congress required libraries and K-12
          schools using these discounts (sometimes called "E-Rate
          discounts") on Internet access and internal connections to
          purchase and use a "technology protection measure" on
          every computer connected to the Internet.
What CIPA Requires
Schools and libraries subject to CIPA may not receive the federal funding unless:
        1.) they certify that they have an Internet safety policy that includes
        technology protection measures.
        2.) The protection measures must block or filter Internet access to pictures
        that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for
        computers that are accessed by minors).
        3.) Before adopting this Internet safety policy, schools and libraries must
        provide reasonable notice and hold at least one public hearing or meeting
        to address the proposal.
        4.) Adopt and enforce a policy to monitor online activities of minors.
        5.) required to adopt and implement an Internet safety policy addressing:
                 (a) access by minors to inappropriate matter on the Internet; (b)
                 the safety and security of minors when using electronic mail, chat
                 rooms and other forms of direct electronic communications; (c)
                 unauthorized access, including so-called “hacking,” and other
                 unlawful activities by minors online; (d) unauthorized disclosure, u
                 se, and dissemination of personal information regarding minors;
                 and (e) measures restricting minors‟ access to materials harmful
                 to them.
What Else Does it Require?
• Schools and libraries are required to certify that they have their
  safety policies and technology in place before receiving funding.
• CIPA does not affect funding for schools and libraries receiving
  discounts only for telecommunications, such as telephone service.

• An authorized person may disable the blocking or filtering measure
  during use by an adult to enable access for bona fide research or
  other lawful purposes.

• Schools and libraries that do not receive (E-Rate discounts) or only
  receive discounts for telecommunication services and not for Internet
  access or internal connections, do not have any obligation to filter
  under CIPA.

• As of 2007 approximately one third of libraries had chosen to forego
  federal E-Rate and certain types of LSTA funds so they would not be
  required to filter the Internet access of their patrons and staff.
United States v. American Library
             Association (2003)
•   Challenged the Constitutionality of Act
     – Argued 1.) Did not help disadvantaged schools and libraries improve
       economically
     – 2.) that "no filtering software successfully differentiates constitutionally
       protected speech from illegal speech on the Internet.“

•   Found:
     – That it is not possible for a public library to comply with CIPA without
        blocking a very substantial amount of constitutionally protected speech,
        in violation of the First Amendment."

     – Upon appeal to the U.S. Supreme Court, however, the law was
       upheld as constitutional as a condition imposed on institutions in
       exchange for government funding

•   Upheld and made it clear that the constitutionality of CIPA would be
    upheld only "if, as the Government represents, a librarian will unblock
    filtered material or disable the Internet software filter without significant
    delay on an adult user's request."
1995
       1996




       1997


       1998

       2000




2000
       2003


2005
2010   2004

Weitere ähnliche Inhalte

Was ist angesagt?

International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpointrockinmole
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationbollmanp
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationmoralsus
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
Battlefortheinternet
BattlefortheinternetBattlefortheinternet
BattlefortheinternetLee Cafferata
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentationadriana ahner
 
Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011Emporia State University
 
Content & copyright
Content & copyrightContent & copyright
Content & copyrightjadams1957
 
communication decency act
communication decency actcommunication decency act
communication decency actAditya Kumar
 
Content pirates
Content pirates Content pirates
Content pirates LIJIJOYSON
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 

Was ist angesagt? (20)

International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
Child grooming
Child groomingChild grooming
Child grooming
 
SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
 
Freedom
FreedomFreedom
Freedom
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
110 koenig
110 koenig110 koenig
110 koenig
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Battlefortheinternet
BattlefortheinternetBattlefortheinternet
Battlefortheinternet
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011
 
Hobbs and valenza 4.6.11
Hobbs and valenza 4.6.11Hobbs and valenza 4.6.11
Hobbs and valenza 4.6.11
 
Content & copyright
Content & copyrightContent & copyright
Content & copyright
 
communication decency act
communication decency actcommunication decency act
communication decency act
 
Content pirates
Content pirates Content pirates
Content pirates
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 

Andere mochten auch

第40局局務會議紀錄
第40局局務會議紀錄第40局局務會議紀錄
第40局局務會議紀錄gongwujugongwuju
 
NTU & NTUST Tangible Interaction Design Project Proposal 1
NTU & NTUST Tangible Interaction Design Project Proposal 1NTU & NTUST Tangible Interaction Design Project Proposal 1
NTU & NTUST Tangible Interaction Design Project Proposal 1Han-Wei Liao
 
Prezentácia - Študentská spoločnosť STROM (SOŠ hotelových služieb a obchodu, ...
Prezentácia - Študentská spoločnosť STROM (SOŠ hotelových služieb a obchodu, ...Prezentácia - Študentská spoločnosť STROM (SOŠ hotelových služieb a obchodu, ...
Prezentácia - Študentská spoločnosť STROM (SOŠ hotelových služieb a obchodu, ...Lenka Križanová
 
不違背職務行賄罪簡介100.08.26
不違背職務行賄罪簡介100.08.26不違背職務行賄罪簡介100.08.26
不違背職務行賄罪簡介100.08.26gongwujugongwuju
 
2012南瀛綠都心迎春花卉展
2012南瀛綠都心迎春花卉展2012南瀛綠都心迎春花卉展
2012南瀛綠都心迎春花卉展gongwujugongwuju
 
Killing in the military; Death Penalty; Biblically Wrong?
Killing in the military; Death Penalty; Biblically Wrong?Killing in the military; Death Penalty; Biblically Wrong?
Killing in the military; Death Penalty; Biblically Wrong?SwordSharp Studios
 
新建二科1010524局務會議業務報告(精簡版) (1)
新建二科1010524局務會議業務報告(精簡版) (1)新建二科1010524局務會議業務報告(精簡版) (1)
新建二科1010524局務會議業務報告(精簡版) (1)gongwujugongwuju
 
Cheap realisticskinshading kor
Cheap realisticskinshading korCheap realisticskinshading kor
Cheap realisticskinshading kor민웅 이
 
ภูมิภาคชายฝั่ง
ภูมิภาคชายฝั่งภูมิภาคชายฝั่ง
ภูมิภาคชายฝั่งjumjaP
 
LG LW5600 3D LED HDTV
LG LW5600 3D LED HDTVLG LW5600 3D LED HDTV
LG LW5600 3D LED HDTVWilson Jack
 
What the Bible Says About Profanity
What the Bible Says About ProfanityWhat the Bible Says About Profanity
What the Bible Says About ProfanitySwordSharp Studios
 
局務會議業務報告 養護工程二科101.2.1
局務會議業務報告 養護工程二科101.2.1局務會議業務報告 養護工程二科101.2.1
局務會議業務報告 養護工程二科101.2.1gongwujugongwuju
 
公園管理二科業務簡報(100.8.2).pptnew
公園管理二科業務簡報(100.8.2).pptnew公園管理二科業務簡報(100.8.2).pptnew
公園管理二科業務簡報(100.8.2).pptnewgongwujugongwuju
 
Post processing in_color
Post processing in_colorPost processing in_color
Post processing in_color민웅 이
 
2010 Annual Meeting R5 Bs
2010 Annual Meeting R5 Bs2010 Annual Meeting R5 Bs
2010 Annual Meeting R5 Bspeterderaedt
 
科務報告(企劃科) 2011.08.25(定稿版)
科務報告(企劃科) 2011.08.25(定稿版)科務報告(企劃科) 2011.08.25(定稿版)
科務報告(企劃科) 2011.08.25(定稿版)gongwujugongwuju
 

Andere mochten auch (20)

第40局局務會議紀錄
第40局局務會議紀錄第40局局務會議紀錄
第40局局務會議紀錄
 
局務會議簡報10008
局務會議簡報10008局務會議簡報10008
局務會議簡報10008
 
NTU & NTUST Tangible Interaction Design Project Proposal 1
NTU & NTUST Tangible Interaction Design Project Proposal 1NTU & NTUST Tangible Interaction Design Project Proposal 1
NTU & NTUST Tangible Interaction Design Project Proposal 1
 
Talk about apps vol 2
Talk about apps   vol 2Talk about apps   vol 2
Talk about apps vol 2
 
1010704
10107041010704
1010704
 
Prezentácia - Študentská spoločnosť STROM (SOŠ hotelových služieb a obchodu, ...
Prezentácia - Študentská spoločnosť STROM (SOŠ hotelových služieb a obchodu, ...Prezentácia - Študentská spoločnosť STROM (SOŠ hotelových služieb a obchodu, ...
Prezentácia - Študentská spoločnosť STROM (SOŠ hotelových služieb a obchodu, ...
 
不違背職務行賄罪簡介100.08.26
不違背職務行賄罪簡介100.08.26不違背職務行賄罪簡介100.08.26
不違背職務行賄罪簡介100.08.26
 
2012南瀛綠都心迎春花卉展
2012南瀛綠都心迎春花卉展2012南瀛綠都心迎春花卉展
2012南瀛綠都心迎春花卉展
 
Killing in the military; Death Penalty; Biblically Wrong?
Killing in the military; Death Penalty; Biblically Wrong?Killing in the military; Death Penalty; Biblically Wrong?
Killing in the military; Death Penalty; Biblically Wrong?
 
新建二科1010524局務會議業務報告(精簡版) (1)
新建二科1010524局務會議業務報告(精簡版) (1)新建二科1010524局務會議業務報告(精簡版) (1)
新建二科1010524局務會議業務報告(精簡版) (1)
 
Cheap realisticskinshading kor
Cheap realisticskinshading korCheap realisticskinshading kor
Cheap realisticskinshading kor
 
ภูมิภาคชายฝั่ง
ภูมิภาคชายฝั่งภูมิภาคชายฝั่ง
ภูมิภาคชายฝั่ง
 
25 __
25  __25  __
25 __
 
LG LW5600 3D LED HDTV
LG LW5600 3D LED HDTVLG LW5600 3D LED HDTV
LG LW5600 3D LED HDTV
 
What the Bible Says About Profanity
What the Bible Says About ProfanityWhat the Bible Says About Profanity
What the Bible Says About Profanity
 
局務會議業務報告 養護工程二科101.2.1
局務會議業務報告 養護工程二科101.2.1局務會議業務報告 養護工程二科101.2.1
局務會議業務報告 養護工程二科101.2.1
 
公園管理二科業務簡報(100.8.2).pptnew
公園管理二科業務簡報(100.8.2).pptnew公園管理二科業務簡報(100.8.2).pptnew
公園管理二科業務簡報(100.8.2).pptnew
 
Post processing in_color
Post processing in_colorPost processing in_color
Post processing in_color
 
2010 Annual Meeting R5 Bs
2010 Annual Meeting R5 Bs2010 Annual Meeting R5 Bs
2010 Annual Meeting R5 Bs
 
科務報告(企劃科) 2011.08.25(定稿版)
科務報告(企劃科) 2011.08.25(定稿版)科務報告(企劃科) 2011.08.25(定稿版)
科務報告(企劃科) 2011.08.25(定稿版)
 

Ähnlich wie Internet decency legislation

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptAnil Yadav
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfBiproRoy3
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
Network Neutrality & Spam
Network Neutrality & SpamNetwork Neutrality & Spam
Network Neutrality & SpamEdwin A. Opare
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Censorship down under
Censorship down underCensorship down under
Censorship down underErhan Boduk
 
Legal and ethical issues modern technologies
Legal and ethical issues                            modern technologiesLegal and ethical issues                            modern technologies
Legal and ethical issues modern technologiesrgermosen
 

Ähnlich wie Internet decency legislation (20)

4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.ppt
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdf
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Network Neutrality & Spam
Network Neutrality & SpamNetwork Neutrality & Spam
Network Neutrality & Spam
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Censorship
CensorshipCensorship
Censorship
 
Censorship
CensorshipCensorship
Censorship
 
Media and government
Media and governmentMedia and government
Media and government
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
 
Legal and ethical issues modern technologies
Legal and ethical issues                            modern technologiesLegal and ethical issues                            modern technologies
Legal and ethical issues modern technologies
 

Kürzlich hochgeladen

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Internet decency legislation

  • 2. 1996 1995 2000 2005 2010
  • 3. Telecommunication Act of 1996 • Primary Purpose: to reduce regulation and encourage the “rapid deployment of new telecommunication technologies.” • Originally for Telephone, T.V. and Radio • Internet started to become more popular • Congress saw potential of Internet as a medium for educational and political discourse, and as a result wanted to enact legislation that would promote the development of the internet • Congress also saw how easy it was for users to access sexually explicit sites without knowing the user‟s age • As a result, title V of the Act was created to address decency on the internet
  • 4. The Communications Decency Act of 1996 (CDA) • The 1st notable attempt by the US Congress to regulate pornographic material on the internet. • Did 2 things: • 1.) Attempted to regulate both indecency (when available to children) and obscenity in cyberspace. • 2.) Section 230 of the Act has been interpreted to say that operators of Internet services are not to be construed as publishers (and thus not legally liable for the words of third parties who use their services).
  • 5. What Did the CDA Say? • Passed in 1996 stating : – the CDA imposed criminal sanctions on anyone who • knowingly (A) uses an interactive computer service to send to a specific person or persons under 18 years of age, or (B) uses any interactive computer service to display in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs. • It further criminalized the transmission of materials that were "obscene or indecent" to persons known to be under 18. • Free Speech Advocates Challenged the CDA claiming it was unconstitutional as it violated the 1st amendment.
  • 6. Reno v. American Civil Liberties Union (1997) • ACLU argued provisions violated 1st amendment because of vagueness • The U.S. Supreme Court held the two provisions of the Communications Decency Act of 1996 (CDA) that criminalized providing obscene materials to minors by on the internet were unconstitutional because: • 1.) there was no definition of “indecent” • 2.) patently offensive could exclude literary, artistic, political, scientific, or educational value. • Policy problems: • If upheld: • 1.) would place burden on senders/ websites to determine whether speech is subject to regulation • 2.) whether recipient is of min. age • “the mere possibility that user-based Internet screening software would „soon be widely available‟ was relevant to their restriction of an overboard regulation.”
  • 7. 1998 1997 1996 1995 2000 2005 2010
  • 8. Child Online Protection Act (COPA) • A direct response to the Reno v. ACLU decision narrowing the range of material covered • Was a law in the United States of America, passed in 1998 with the declared purpose of restricting access by minors to any material defined as harmful to such minors on the Internet. • COPA only limits commercial speech and only affects providers based within the U.S. • Required all commercial distributors of "material harmful to minors" to restrict their sites from access by minors. • "Material harmful to minors" was defined as material that by "contemporary community standards" was judged to appeal to the "prurient interest" and that showed sexual acts or nudity (including female breasts). This is a much broader standard than obscenity. • Law Never took effect as 3 rounds of litigation led to a permanent injunction against the law
  • 9. Ashcroft v. American Civil Liberties Union (2004) Legislation – Round 1= remanded back to circuit ct (1998-2002) – Round 2= upheld injunction, likely unconstitutional (2003-2004) • Supreme ct of Ashcroft – It prevented online publishers from publishing some material that adults had a right to access - and because it did not use the least restrictive means possible to protect children (the court found that blocking software installed on home computers by parents would do as good a job without preventing free speech). – For similar reasons, the panel found that the act was unconstitutionally "overbroad" - that is, it applied to too much protected material. – Round 3= permanent enjoinment of law granted and upheld on appeal and denied review in Supreme ct, which killed the bill. (2007-2009)
  • 10. 1995 1996 1997 1998 2000 2000 2005 2010 2004
  • 11. Children’s Internet Protection Act (CIPA) What is it? -The Children‟s Internet Protection Act (CIPA) is a federal law enacted by Congress to address concerns about access to offensive content over the Internet on school and library computers. -CIPA imposes certain types of requirements on any school or library that receives certain types of federal funding. -In passing CIPA, Congress required libraries and K-12 schools using these discounts (sometimes called "E-Rate discounts") on Internet access and internal connections to purchase and use a "technology protection measure" on every computer connected to the Internet.
  • 12. What CIPA Requires Schools and libraries subject to CIPA may not receive the federal funding unless: 1.) they certify that they have an Internet safety policy that includes technology protection measures. 2.) The protection measures must block or filter Internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors). 3.) Before adopting this Internet safety policy, schools and libraries must provide reasonable notice and hold at least one public hearing or meeting to address the proposal. 4.) Adopt and enforce a policy to monitor online activities of minors. 5.) required to adopt and implement an Internet safety policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using electronic mail, chat rooms and other forms of direct electronic communications; (c) unauthorized access, including so-called “hacking,” and other unlawful activities by minors online; (d) unauthorized disclosure, u se, and dissemination of personal information regarding minors; and (e) measures restricting minors‟ access to materials harmful to them.
  • 13. What Else Does it Require? • Schools and libraries are required to certify that they have their safety policies and technology in place before receiving funding. • CIPA does not affect funding for schools and libraries receiving discounts only for telecommunications, such as telephone service. • An authorized person may disable the blocking or filtering measure during use by an adult to enable access for bona fide research or other lawful purposes. • Schools and libraries that do not receive (E-Rate discounts) or only receive discounts for telecommunication services and not for Internet access or internal connections, do not have any obligation to filter under CIPA. • As of 2007 approximately one third of libraries had chosen to forego federal E-Rate and certain types of LSTA funds so they would not be required to filter the Internet access of their patrons and staff.
  • 14. United States v. American Library Association (2003) • Challenged the Constitutionality of Act – Argued 1.) Did not help disadvantaged schools and libraries improve economically – 2.) that "no filtering software successfully differentiates constitutionally protected speech from illegal speech on the Internet.“ • Found: – That it is not possible for a public library to comply with CIPA without blocking a very substantial amount of constitutionally protected speech, in violation of the First Amendment." – Upon appeal to the U.S. Supreme Court, however, the law was upheld as constitutional as a condition imposed on institutions in exchange for government funding • Upheld and made it clear that the constitutionality of CIPA would be upheld only "if, as the Government represents, a librarian will unblock filtered material or disable the Internet software filter without significant delay on an adult user's request."
  • 15. 1995 1996 1997 1998 2000 2000 2003 2005 2010 2004