SlideShare a Scribd company logo
1 of 15
Internet Decency Legislation Terrance Garmon
Communication Decency Act Telecommunications Act of 1996 1996 1995 2000 2005 2010
Telecommunication Act of 1996 Primary Purpose: to reduce regulation and encourage the “rapid deployment of new telecommunication technologies.” Originally for Telephone, T.V. and Radio Internet started to become more popular Congress saw potential of Internet as a medium for educational and political discourse, and as a result wanted to enact legislation that would promote the development of the internet Congress also saw how easy it was for users to access sexually explicit sites without knowing the user’s age As a result, title V of the Act was created to address decency on the internet
The Communications Decency Act of 1996 (CDA) ,[object Object]
Did 2 things:
1.) Attempted to regulate both indecency (when available to children) and obscenity in cyberspace.
2.) Section 230 of the Act has been interpreted to say that operators of Internet services are not to be construed as publishers (and thus not legally liable for the words of third parties who use their services).,[object Object]
Reno v. American Civil Liberties Union (1997) ,[object Object]
The U.S. Supreme Court held thetwo provisions of the Communications Decency Act of 1996 (CDA) that criminalized providing obscene materials to minors by on the internet were unconstitutional  because:
1.) there was no definition of “indecent”
2.) patently offensive could exclude literary, artistic, political, scientific, or educational value.
Policy problems:
If upheld:
1.) would place burden on senders/ websites to determine whether speech is subject to regulation
2.) whether recipient is of min. age

More Related Content

What's hot

CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Actgibb0
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overviewedtecher
 
communication decency act
communication decency actcommunication decency act
communication decency actAditya Kumar
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000nielson900
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
Children and the Media
Children and the MediaChildren and the Media
Children and the MediaEllieWeedon
 
About Internet
About InternetAbout Internet
About Internetjanetcc
 
Censorship down under
Censorship down underCensorship down under
Censorship down underErhan Boduk
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsGener Luis Morada
 

What's hot (20)

Techinnovation
TechinnovationTechinnovation
Techinnovation
 
CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Act
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
 
communication decency act
communication decency actcommunication decency act
communication decency act
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Children and the Media
Children and the MediaChildren and the Media
Children and the Media
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
About Internet
About InternetAbout Internet
About Internet
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
 
110 koenig
110 koenig110 koenig
110 koenig
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 

Viewers also liked

Reviscopa núm.21 Escola Jaume Balmes
Reviscopa núm.21  Escola Jaume BalmesReviscopa núm.21  Escola Jaume Balmes
Reviscopa núm.21 Escola Jaume Balmesjbalmesprat
 
Human Computer Interaction Presentation
Human Computer Interaction PresentationHuman Computer Interaction Presentation
Human Computer Interaction PresentationIheanyi Ekechukwu
 
Linkedin Company Page Guide
Linkedin Company Page GuideLinkedin Company Page Guide
Linkedin Company Page GuideAchmedTarrass
 
International education program_guide_201164284 (3)
International education program_guide_201164284 (3)International education program_guide_201164284 (3)
International education program_guide_201164284 (3)Future Link Consultants
 
Advert Pitch
Advert PitchAdvert Pitch
Advert Pitchjbier
 
Reviscopa núm.26 Escola Jaume Balmes
Reviscopa núm.26  Escola Jaume BalmesReviscopa núm.26  Escola Jaume Balmes
Reviscopa núm.26 Escola Jaume Balmesjbalmesprat
 
NTU & NTUST Tangible Interaction Design Project Proposal 3
NTU & NTUST Tangible Interaction Design Project Proposal 3NTU & NTUST Tangible Interaction Design Project Proposal 3
NTU & NTUST Tangible Interaction Design Project Proposal 3Han-Wei Liao
 
параллельная загрузка Java script и css файлов без прерывания
параллельная загрузка Java script и css файлов без прерыванияпараллельная загрузка Java script и css файлов без прерывания
параллельная загрузка Java script и css файлов без прерыванияAlexey Vidanov
 
NTU & NTUST Tangible Interaction Design Project Proposal Final
NTU & NTUST Tangible Interaction Design Project Proposal FinalNTU & NTUST Tangible Interaction Design Project Proposal Final
NTU & NTUST Tangible Interaction Design Project Proposal FinalHan-Wei Liao
 
Reviscopa Núm.13
Reviscopa Núm.13Reviscopa Núm.13
Reviscopa Núm.13jbalmesprat
 
Why does God allow Bad things to happen to Good people?
Why does God allow Bad things to happen to Good people?Why does God allow Bad things to happen to Good people?
Why does God allow Bad things to happen to Good people?SwordSharp Studios
 
Deloitte Private Club/Aamplify Archetypes Presentation
Deloitte Private Club/Aamplify Archetypes PresentationDeloitte Private Club/Aamplify Archetypes Presentation
Deloitte Private Club/Aamplify Archetypes PresentationMargaret Hartwell
 
Value proposition for social media marketing
Value proposition for social media marketingValue proposition for social media marketing
Value proposition for social media marketingPavan Krishnaa Mulpur
 
Wrapped diffuse
Wrapped diffuseWrapped diffuse
Wrapped diffuse민웅 이
 
Spiritual WARfare vs Spiritual WELfare
Spiritual WARfare vs Spiritual WELfareSpiritual WARfare vs Spiritual WELfare
Spiritual WARfare vs Spiritual WELfareSwordSharp Studios
 

Viewers also liked (20)

Reviscopa núm.21 Escola Jaume Balmes
Reviscopa núm.21  Escola Jaume BalmesReviscopa núm.21  Escola Jaume Balmes
Reviscopa núm.21 Escola Jaume Balmes
 
Human Computer Interaction Presentation
Human Computer Interaction PresentationHuman Computer Interaction Presentation
Human Computer Interaction Presentation
 
Linkedin Company Page Guide
Linkedin Company Page GuideLinkedin Company Page Guide
Linkedin Company Page Guide
 
International education program_guide_201164284 (3)
International education program_guide_201164284 (3)International education program_guide_201164284 (3)
International education program_guide_201164284 (3)
 
Advert Pitch
Advert PitchAdvert Pitch
Advert Pitch
 
Reviscopa núm.26 Escola Jaume Balmes
Reviscopa núm.26  Escola Jaume BalmesReviscopa núm.26  Escola Jaume Balmes
Reviscopa núm.26 Escola Jaume Balmes
 
NTU & NTUST Tangible Interaction Design Project Proposal 3
NTU & NTUST Tangible Interaction Design Project Proposal 3NTU & NTUST Tangible Interaction Design Project Proposal 3
NTU & NTUST Tangible Interaction Design Project Proposal 3
 
Info 1 teorica color
Info 1   teorica colorInfo 1   teorica color
Info 1 teorica color
 
параллельная загрузка Java script и css файлов без прерывания
параллельная загрузка Java script и css файлов без прерыванияпараллельная загрузка Java script и css файлов без прерывания
параллельная загрузка Java script и css файлов без прерывания
 
NTU & NTUST Tangible Interaction Design Project Proposal Final
NTU & NTUST Tangible Interaction Design Project Proposal FinalNTU & NTUST Tangible Interaction Design Project Proposal Final
NTU & NTUST Tangible Interaction Design Project Proposal Final
 
Reviscopa Núm.13
Reviscopa Núm.13Reviscopa Núm.13
Reviscopa Núm.13
 
Why does God allow Bad things to happen to Good people?
Why does God allow Bad things to happen to Good people?Why does God allow Bad things to happen to Good people?
Why does God allow Bad things to happen to Good people?
 
Deloitte Private Club/Aamplify Archetypes Presentation
Deloitte Private Club/Aamplify Archetypes PresentationDeloitte Private Club/Aamplify Archetypes Presentation
Deloitte Private Club/Aamplify Archetypes Presentation
 
Value proposition for social media marketing
Value proposition for social media marketingValue proposition for social media marketing
Value proposition for social media marketing
 
Wrapped diffuse
Wrapped diffuseWrapped diffuse
Wrapped diffuse
 
Can You Lose Your Salvation?
Can You Lose Your Salvation?Can You Lose Your Salvation?
Can You Lose Your Salvation?
 
Spiritual WARfare vs Spiritual WELfare
Spiritual WARfare vs Spiritual WELfareSpiritual WARfare vs Spiritual WELfare
Spiritual WARfare vs Spiritual WELfare
 
#magneticarchetypes
#magneticarchetypes#magneticarchetypes
#magneticarchetypes
 
Pull Test Presentation
Pull Test PresentationPull Test Presentation
Pull Test Presentation
 
Ecg Signal Processing
Ecg Signal ProcessingEcg Signal Processing
Ecg Signal Processing
 

Similar to Internet decency legislation

Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
CIPA Policy Tracking Paper
CIPA Policy Tracking PaperCIPA Policy Tracking Paper
CIPA Policy Tracking Papereward511
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Chapter 3Freedom of SpeechBased on slides prepared
Chapter 3Freedom of SpeechBased on slides prepared Chapter 3Freedom of SpeechBased on slides prepared
Chapter 3Freedom of SpeechBased on slides prepared TawnaDelatorrejs
 
Chapter 3Freedom of SpeechBased on slides prepared .docx
Chapter 3Freedom of SpeechBased on slides prepared .docxChapter 3Freedom of SpeechBased on slides prepared .docx
Chapter 3Freedom of SpeechBased on slides prepared .docxketurahhazelhurst
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright InfringementWCU_Becca
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessmentblogzilla
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate ResponsibilityCharles Mok
 
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docxComputer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docxmaxinesmith73660
 
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docxComputer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docxpatricke8
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 

Similar to Internet decency legislation (17)

Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Media and government
Media and governmentMedia and government
Media and government
 
CIPA Policy Tracking Paper
CIPA Policy Tracking PaperCIPA Policy Tracking Paper
CIPA Policy Tracking Paper
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Chapter 3Freedom of SpeechBased on slides prepared
Chapter 3Freedom of SpeechBased on slides prepared Chapter 3Freedom of SpeechBased on slides prepared
Chapter 3Freedom of SpeechBased on slides prepared
 
Chapter 3Freedom of SpeechBased on slides prepared .docx
Chapter 3Freedom of SpeechBased on slides prepared .docxChapter 3Freedom of SpeechBased on slides prepared .docx
Chapter 3Freedom of SpeechBased on slides prepared .docx
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docxComputer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
 
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docxComputer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
Computer Forensics and Cyber Crime, 3rd ed.Marjie T. Britz.docx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Savannah Smith
Savannah Smith Savannah Smith
Savannah Smith
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Internet decency legislation

  • 2. Communication Decency Act Telecommunications Act of 1996 1996 1995 2000 2005 2010
  • 3. Telecommunication Act of 1996 Primary Purpose: to reduce regulation and encourage the “rapid deployment of new telecommunication technologies.” Originally for Telephone, T.V. and Radio Internet started to become more popular Congress saw potential of Internet as a medium for educational and political discourse, and as a result wanted to enact legislation that would promote the development of the internet Congress also saw how easy it was for users to access sexually explicit sites without knowing the user’s age As a result, title V of the Act was created to address decency on the internet
  • 4.
  • 6. 1.) Attempted to regulate both indecency (when available to children) and obscenity in cyberspace.
  • 7.
  • 8.
  • 9. The U.S. Supreme Court held thetwo provisions of the Communications Decency Act of 1996 (CDA) that criminalized providing obscene materials to minors by on the internet were unconstitutional because:
  • 10. 1.) there was no definition of “indecent”
  • 11. 2.) patently offensive could exclude literary, artistic, political, scientific, or educational value.
  • 14. 1.) would place burden on senders/ websites to determine whether speech is subject to regulation
  • 15. 2.) whether recipient is of min. age
  • 16.
  • 17.
  • 18. Was a law in the United States of America, passed in 1998 with the declared purpose of restricting access by minors to any material defined as harmful to such minors on the Internet.
  • 19. COPA only limits commercial speech and only affects providers based within the U.S.
  • 20. Required all commercial distributors of "material harmful to minors" to restrict their sites from access by minors.
  • 21. "Material harmful to minors" was defined as material that by "contemporary community standards" was judged to appeal to the "prurient interest" and that showed sexual acts or nudity (including female breasts). This is a much broader standard than obscenity.
  • 22.
  • 23. Communication Decency Act Telecommunications Act of 1996 Child Internet Protection Act Child Online Protection Act Communication Decency Act Child Online Protection Act 2000 1998 2004 1997 1996 2005 1995 2000 2010
  • 24. Children’s Internet Protection Act (CIPA) What is it? -The Children’s Internet Protection Act (CIPA) is a federal law enacted by Congress to address concerns about access to offensive content over the Internet on school and library computers. -CIPA imposes certain types of requirements on any school or library that receives certain types of federal funding. -In passing CIPA, Congress required libraries and K-12 schools using these discounts (sometimes called "E-Rate discounts") on Internet access and internal connections to purchase and use a "technology protection measure" on every computer connected to the Internet.  
  • 25. What CIPA Requires Schools and libraries subject to CIPA may not receive the federal funding unless: 1.) they certify that they have an Internet safety policy that includes technology protection measures. 2.) The protection measures must block or filter Internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors). 3.) Before adopting this Internet safety policy, schools and libraries must provide reasonable notice and hold at least one public hearing or meeting to address the proposal. 4.) Adopt and enforce a policy to monitor online activities of minors. 5.) required to adopt and implement an Internet safety policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using electronic mail, chat rooms and other forms of direct electronic communications; (c) unauthorized access, including so-called “hacking,” and other unlawful activities by minors online; (d) unauthorized disclosure, u se, and dissemination of personal information regarding minors; and (e) measures restricting minors’ access to materials harmful to them.
  • 26. What Else Does it Require? Schools and libraries are required to certify that they have their safety policies and technology in place before receiving funding. CIPA does not affect funding for schools and libraries receiving discounts only for telecommunications, such as telephone service. An authorized person may disable the blocking or filtering measure during use by an adult to enable access for bona fide research or other lawful purposes. Schools and libraries that do not receive (E-Rate discounts) or only receive discounts for telecommunication services and not for Internet access or internal connections, do not have any obligation to filter under CIPA. As of 2007 approximately one third of libraries had chosen to forego federal E-Rate and certain types of LSTA funds so they would not be required to filter the Internet access of their patrons and staff.
  • 27. United States v. American Library Association (2003) Challenged the Constitutionality of Act Argued 1.) Did not help disadvantaged schools and libraries improve economically 2.) that "no filtering software successfully differentiates constitutionally protected speech from illegal speech on the Internet.“ Found: That it is not possible for a public library to comply with CIPA without blocking a very substantial amount of constitutionally protected speech, in violation of the First Amendment." Upon appeal to the U.S. Supreme Court, however, the law was upheld as constitutional as a condition imposed on institutions in exchange for government funding Upheld and made it clear that the constitutionality of CIPA would be upheld only "if, as the Government represents, a librarian will unblock filtered material or disable the Internet software filter without significant delay on an adult user's request."
  • 28. Communication Decency Act Child Internet Protection Act Telecommunications Act of 1996 Child Internet Protection Act Child Online Protection Act Communication Decency Act Child Online Protection Act 2000 1998 2004 1997 2003 1996 2005 1995 2000 2010