SlideShare uma empresa Scribd logo
1 de 20
Internet Governance, Surveillance, and Social Controls Reform the Social Structure First before looking at internet censorship. Mr.  Gener Luis Morada National Advocacy Coordinator I-Café Pilipinas
I-Café Pilipinas Challenging the Internet Cafes in the Philippines to do Better Social Advocacy Network Composed of the Internet Café Owners, operators and associations around the country It strives to become their voice on a national level to represent their interest on issues pertaining to efficient operation of their business.
Was not surprised when I received your invitation since early this year, I was told that  there are initiatives related to the governing the internet will be pushed. Child Anti Pornography Bill is now at the Bicameral level and if all things will push through it is expected that it will be a law by December
Countries that are trying to implement internet filtering program Australia, Canada, China, Denmark, European Union, France. Germany, Malaysia ,New Zealand, Norway, Saudi Arabia, Singapore, South Korea, Sweden,U.K.and U.S.A.  As at March 2002, government policies concerning censorship of the Internet may be broadly grouped into four categories:  a) Government policy to encourage Internet industry self-regulation and end-user voluntary use of filtering/blocking technologies.
b) Criminal law penalties (fines or jail terms) applicable to content providers who make content "unsuitable for minors" available online.  c) Government mandated blocking of access to content deemed unsuitable for adults.  d) Government prohibition of public access to the Internet.
Philippine Model of Internet Censorship With the passage of the Child Anti Pornography Law the Philippines would be adopting Government mandated blocking of access to content deemed unsuitable for adults.  If you would study both bills the centerpiece program is based on the mandatory installation of blocking software on the ISP Level down to the users.
The Stand of I-Café Pilipinas Is not against the passage of the Anti-Child Pornography Bill since it is for the welfare of the Filipino Children It is regrettable that we learned about this bill in its final stages since it is now too late to air our concern about its effective implementation.
Initiatives at the Internet Café Level Internet Café owners and operators are mandated by local ordinances to prohibit access to pornographic materials that could be found in the internet We are mandated to post signs telling our customers that “Access to Pornographic Materials is not Allowed” Internet Café owners use open DNS as a blocking tool against pornographic sites
And Despite these Initiatives  House OKs bill against child pornography  Philippine Daily InquirerFirst Posted 08:44:00 08/26/2009Filed Under: Children, Legislation, Pornography MANILA, Philippines—The House of Representatives delivered what could be the strongest warning yet to child pornographers, pedophiles, cyber-sex den and unscrupulous Internet café operators by unanimously approving on third reading on Monday the Anti-Child Pornography Bill.
House approves anti-child porn billBy DelonPorcalla (The Philippine Star) Updated August 26, 2009 12:00 AM  MANILA, Philippines - The House of Representatives, in a unanimous vote, approved yesterday on third and final reading the anti-child pornography bill that will prosecute and penalize pedophiles, pornographers, and operators of cyber-sex dens and Internet cafés who prey on children.
Our Concern The Proposed Child Pornography Law would be the starting point of government to regulate content found in the internet. Someday articles and blogs that are critical to the government will be censured thus denying the people of access to information.
18 January 2002, Associated Press reported that:  "China has issued its most intrusive Internet controls to date, ordering service providers to screen private e-mail for political content and holding them responsible for subversive postings on their Web sites. ... Under the new rules, general portal sites must install security programs to screen and copy all e-mail messages sent or received by users. Those containing 'sensitive materials' must be turned over to authorities.  Providers are also responsible for erasing all prohibited content posted on their Web sites, including online chatrooms and bulletin board
The Philippines does not have the right social infrastructure to implement such provision of  installation of blocking software. We do have many laws that was passed by congress to protect children and women against abuse. REPUBLIC ACT NO. 9208 Law against Trafficking of Women and Children PRESIDENTIAL DECREE NO. 603  Child Welfare Law Republic Act No. 7610   Child Abuse Law REPUBLIC ACT NO. 9239 -  Optical Media Law
Question: How far was the Pirated DVD Store selling  pornographic materials from the Police Station? Senior Police Inspector Aileen Recla shows off a confiscated copy of alleged sex video of actress Katrina Halili and Dr. Hayden Kho during a police raid yesterday on stalls selling pirated DVDs along Colon Street.
In other countries the is a single government agency that is in charge of implementing internet blocking programs. In the Philippines, we don’t have a single government agency that is in charge of the ICT programs in the country. CICT is not yet a government line agency it is just a commission that is why other government agency has ICT programs of their own.
Who will be in Charge to implement the mandatory Installation of blocking software According to the Law ISP Level – National Telecommunication Commission  CELL LOADS:  NTC  TO  REGULATE  UNWANTED  TEXTS  MANILA, October 24, 2005 (STAR) By JasminUy - Mobile phone subscribers may no longer have to worry about their rapidly diminishing cellphone load credits due to unwanted promotional text messages sent by their networks. This, after the National Telecommunications Commission (NTC) announced that it is regulating "text spam" due to complaints.
End users like businesses and internet cafes  Local Government Units What would prevent them from imposing preferred software filtering products? LTO Early Warning Device Program Business Third Party Insurance Program
Summation The Implementation of an Internet  filtering program in the Philippines would be open to abuse due to the absence of a strong centralized government agency that would handle the ICT Programs and formulate the ICT Related Polices. The line of authority as to who would be responsible is not clearly defined.
It is open to abuse and the Philippines government does not really have a very good image when it comes to respecting the rights of its citizenry. We need to pass the law making the CICT as a line agency that would handle all ICT related policies in order to give it the moral authority to manage ICT related policies in the Philippines
Standardized ICT educational standards the would reflect the present realities and empower the people to make an educated choice with regards to internet content. Empowerment to the People through ICT   Internet Censorship

Mais conteúdo relacionado

Mais procurados

Cellular Antennas on Special District Property: The Opportunity and the Risk
Cellular Antennas on Special District Property: The Opportunity and the RiskCellular Antennas on Special District Property: The Opportunity and the Risk
Cellular Antennas on Special District Property: The Opportunity and the RiskBest Best and Krieger LLP
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32KLIBEL
 
communication decency act
communication decency actcommunication decency act
communication decency actAditya Kumar
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schoolsadawidziuk
 
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...Best Best and Krieger LLP
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanShahzaib Mahesar
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
What Issues are Building and How Do They Affect Local Governments
What Issues are Building and How Do They Affect Local GovernmentsWhat Issues are Building and How Do They Affect Local Governments
What Issues are Building and How Do They Affect Local GovernmentsBest Best and Krieger LLP
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIABenedict Ishabakaki
 
Mega-Mergers and Impacts on Local Government
Mega-Mergers and Impacts on Local GovernmentMega-Mergers and Impacts on Local Government
Mega-Mergers and Impacts on Local GovernmentBest Best and Krieger LLP
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 

Mais procurados (20)

The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
 
Cellular Antennas on Special District Property: The Opportunity and the Risk
Cellular Antennas on Special District Property: The Opportunity and the RiskCellular Antennas on Special District Property: The Opportunity and the Risk
Cellular Antennas on Special District Property: The Opportunity and the Risk
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013
 
communication decency act
communication decency actcommunication decency act
communication decency act
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schools
 
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Navigating the Internet Protocol Transition
Navigating the Internet Protocol TransitionNavigating the Internet Protocol Transition
Navigating the Internet Protocol Transition
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
What Issues are Building and How Do They Affect Local Governments
What Issues are Building and How Do They Affect Local GovernmentsWhat Issues are Building and How Do They Affect Local Governments
What Issues are Building and How Do They Affect Local Governments
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Policy Implications of the Digital Economy
Policy Implications of the Digital EconomyPolicy Implications of the Digital Economy
Policy Implications of the Digital Economy
 
Mega-Mergers and Impacts on Local Government
Mega-Mergers and Impacts on Local GovernmentMega-Mergers and Impacts on Local Government
Mega-Mergers and Impacts on Local Government
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 

Destaque

Ra.9262 â violence against women and their children
Ra.9262 â   violence against women and their childrenRa.9262 â   violence against women and their children
Ra.9262 â violence against women and their childrenGerald Anthony Lazaro
 
Physical Issues in Society: Suicide, Domestic Violence and Crime
Physical Issues in Society: Suicide, Domestic Violence and Crime Physical Issues in Society: Suicide, Domestic Violence and Crime
Physical Issues in Society: Suicide, Domestic Violence and Crime Joy Camille Faustino
 
Child sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpitChild sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpitJudith Albano
 
Child trafficking
Child traffickingChild trafficking
Child traffickingekata karki
 
Child Trafficking
Child TraffickingChild Trafficking
Child TraffickingNMirpuri
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)F Mad
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004Sharon Geroquia
 
Human Trafficking Presentation
Human Trafficking PresentationHuman Trafficking Presentation
Human Trafficking PresentationHumanTrafficking
 
Domestic Violence Presentation
Domestic Violence PresentationDomestic Violence Presentation
Domestic Violence Presentationkarlagee
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protectionGrace Fabrero
 

Destaque (20)

Ra.9262 â violence against women and their children
Ra.9262 â   violence against women and their childrenRa.9262 â   violence against women and their children
Ra.9262 â violence against women and their children
 
Republic act 9262
Republic act 9262Republic act 9262
Republic act 9262
 
Child and the law
Child and the lawChild and the law
Child and the law
 
Physical Issues in Society: Suicide, Domestic Violence and Crime
Physical Issues in Society: Suicide, Domestic Violence and Crime Physical Issues in Society: Suicide, Domestic Violence and Crime
Physical Issues in Society: Suicide, Domestic Violence and Crime
 
The rights of women and their children
The rights of women and their childrenThe rights of women and their children
The rights of women and their children
 
Child sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpitChild sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpit
 
Child trafficking
Child traffickingChild trafficking
Child trafficking
 
Child Trafficking
Child TraffickingChild Trafficking
Child Trafficking
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
 
Child protection policy
Child protection policyChild protection policy
Child protection policy
 
Human Trafficking Presentation
Human Trafficking PresentationHuman Trafficking Presentation
Human Trafficking Presentation
 
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
 
Child abuse 2012
Child abuse 2012Child abuse 2012
Child abuse 2012
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Child abuse
Child abuseChild abuse
Child abuse
 
Domestic Violence Presentation
Domestic Violence PresentationDomestic Violence Presentation
Domestic Violence Presentation
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protection
 

Semelhante a Internet Governance, Surveillance, And Social Controls

CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carrsegughana
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Daniel Asher
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Daniel Asher
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Winthrop Yu
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Eunice Alamag
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionKrishna De
 
Mobile Alliance flyer
Mobile Alliance flyerMobile Alliance flyer
Mobile Alliance flyerMercy Ndegwa
 
Health q 2 l-3
Health q 2 l-3Health q 2 l-3
Health q 2 l-3melody_23
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxVincentAcapen
 
Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775I-Café Pilipinas
 
Position Paper On Drafting Of IRR For RA 9775
Position Paper On Drafting Of IRR For RA 9775Position Paper On Drafting Of IRR For RA 9775
Position Paper On Drafting Of IRR For RA 9775I-Café Pilipinas
 
Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775I-Café Pilipinas
 

Semelhante a Internet Governance, Surveillance, And Social Controls (20)

CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
Mobile Alliance flyer
Mobile Alliance flyerMobile Alliance flyer
Mobile Alliance flyer
 
Health q 2 l-3
Health q 2 l-3Health q 2 l-3
Health q 2 l-3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Blogging & Law
Blogging & LawBlogging & Law
Blogging & Law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
 
Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775
 
Position Paper On Drafting Of IRR For RA 9775
Position Paper On Drafting Of IRR For RA 9775Position Paper On Drafting Of IRR For RA 9775
Position Paper On Drafting Of IRR For RA 9775
 
Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775
 

Mais de Gener Luis Morada

Money management towards a prolific college life
Money management towards a prolific college lifeMoney management towards a prolific college life
Money management towards a prolific college lifeGener Luis Morada
 
How to set up an internet café
How to set up an internet caféHow to set up an internet café
How to set up an internet caféGener Luis Morada
 
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013Gener Luis Morada
 
Pilipinas I-Cafe Marketing Cooperative Membership
Pilipinas I-Cafe Marketing Cooperative MembershipPilipinas I-Cafe Marketing Cooperative Membership
Pilipinas I-Cafe Marketing Cooperative MembershipGener Luis Morada
 
Pilipinas i cafe marketing cooperative company profile
Pilipinas i cafe marketing cooperative company profilePilipinas i cafe marketing cooperative company profile
Pilipinas i cafe marketing cooperative company profileGener Luis Morada
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesGener Luis Morada
 
Reaching out to more people through Icafes
Reaching out to more people through IcafesReaching out to more people through Icafes
Reaching out to more people through IcafesGener Luis Morada
 
G.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless OfficeG.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless OfficeGener Luis Morada
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systemsGener Luis Morada
 
ICT Training Municipality of Imus
ICT Training Municipality of ImusICT Training Municipality of Imus
ICT Training Municipality of ImusGener Luis Morada
 
internet cafe finishing module
internet cafe finishing moduleinternet cafe finishing module
internet cafe finishing moduleGener Luis Morada
 

Mais de Gener Luis Morada (20)

Money management towards a prolific college life
Money management towards a prolific college lifeMoney management towards a prolific college life
Money management towards a prolific college life
 
How to set up an internet café
How to set up an internet caféHow to set up an internet café
How to set up an internet café
 
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
 
Pilipinas I-Cafe Marketing Cooperative Membership
Pilipinas I-Cafe Marketing Cooperative MembershipPilipinas I-Cafe Marketing Cooperative Membership
Pilipinas I-Cafe Marketing Cooperative Membership
 
Training proper
Training properTraining proper
Training proper
 
Impress training
Impress trainingImpress training
Impress training
 
Pilipinas i cafe marketing cooperative company profile
Pilipinas i cafe marketing cooperative company profilePilipinas i cafe marketing cooperative company profile
Pilipinas i cafe marketing cooperative company profile
 
Basic pc trouble shooting
Basic pc trouble shootingBasic pc trouble shooting
Basic pc trouble shooting
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Course outline
Course outlineCourse outline
Course outline
 
Business Module
Business ModuleBusiness Module
Business Module
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business Philippines
 
Reaching out to more people through Icafes
Reaching out to more people through IcafesReaching out to more people through Icafes
Reaching out to more people through Icafes
 
G.ho.st
G.ho.stG.ho.st
G.ho.st
 
G.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless OfficeG.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless Office
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systems
 
Now What?
Now What?Now What?
Now What?
 
Engaging in ICT
Engaging in ICTEngaging in ICT
Engaging in ICT
 
ICT Training Municipality of Imus
ICT Training Municipality of ImusICT Training Municipality of Imus
ICT Training Municipality of Imus
 
internet cafe finishing module
internet cafe finishing moduleinternet cafe finishing module
internet cafe finishing module
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Internet Governance, Surveillance, And Social Controls

  • 1. Internet Governance, Surveillance, and Social Controls Reform the Social Structure First before looking at internet censorship. Mr. Gener Luis Morada National Advocacy Coordinator I-Café Pilipinas
  • 2. I-Café Pilipinas Challenging the Internet Cafes in the Philippines to do Better Social Advocacy Network Composed of the Internet Café Owners, operators and associations around the country It strives to become their voice on a national level to represent their interest on issues pertaining to efficient operation of their business.
  • 3. Was not surprised when I received your invitation since early this year, I was told that there are initiatives related to the governing the internet will be pushed. Child Anti Pornography Bill is now at the Bicameral level and if all things will push through it is expected that it will be a law by December
  • 4. Countries that are trying to implement internet filtering program Australia, Canada, China, Denmark, European Union, France. Germany, Malaysia ,New Zealand, Norway, Saudi Arabia, Singapore, South Korea, Sweden,U.K.and U.S.A. As at March 2002, government policies concerning censorship of the Internet may be broadly grouped into four categories: a) Government policy to encourage Internet industry self-regulation and end-user voluntary use of filtering/blocking technologies.
  • 5. b) Criminal law penalties (fines or jail terms) applicable to content providers who make content "unsuitable for minors" available online. c) Government mandated blocking of access to content deemed unsuitable for adults. d) Government prohibition of public access to the Internet.
  • 6. Philippine Model of Internet Censorship With the passage of the Child Anti Pornography Law the Philippines would be adopting Government mandated blocking of access to content deemed unsuitable for adults. If you would study both bills the centerpiece program is based on the mandatory installation of blocking software on the ISP Level down to the users.
  • 7. The Stand of I-Café Pilipinas Is not against the passage of the Anti-Child Pornography Bill since it is for the welfare of the Filipino Children It is regrettable that we learned about this bill in its final stages since it is now too late to air our concern about its effective implementation.
  • 8. Initiatives at the Internet Café Level Internet Café owners and operators are mandated by local ordinances to prohibit access to pornographic materials that could be found in the internet We are mandated to post signs telling our customers that “Access to Pornographic Materials is not Allowed” Internet Café owners use open DNS as a blocking tool against pornographic sites
  • 9. And Despite these Initiatives House OKs bill against child pornography Philippine Daily InquirerFirst Posted 08:44:00 08/26/2009Filed Under: Children, Legislation, Pornography MANILA, Philippines—The House of Representatives delivered what could be the strongest warning yet to child pornographers, pedophiles, cyber-sex den and unscrupulous Internet café operators by unanimously approving on third reading on Monday the Anti-Child Pornography Bill.
  • 10. House approves anti-child porn billBy DelonPorcalla (The Philippine Star) Updated August 26, 2009 12:00 AM MANILA, Philippines - The House of Representatives, in a unanimous vote, approved yesterday on third and final reading the anti-child pornography bill that will prosecute and penalize pedophiles, pornographers, and operators of cyber-sex dens and Internet cafés who prey on children.
  • 11. Our Concern The Proposed Child Pornography Law would be the starting point of government to regulate content found in the internet. Someday articles and blogs that are critical to the government will be censured thus denying the people of access to information.
  • 12. 18 January 2002, Associated Press reported that: "China has issued its most intrusive Internet controls to date, ordering service providers to screen private e-mail for political content and holding them responsible for subversive postings on their Web sites. ... Under the new rules, general portal sites must install security programs to screen and copy all e-mail messages sent or received by users. Those containing 'sensitive materials' must be turned over to authorities. Providers are also responsible for erasing all prohibited content posted on their Web sites, including online chatrooms and bulletin board
  • 13. The Philippines does not have the right social infrastructure to implement such provision of installation of blocking software. We do have many laws that was passed by congress to protect children and women against abuse. REPUBLIC ACT NO. 9208 Law against Trafficking of Women and Children PRESIDENTIAL DECREE NO. 603 Child Welfare Law Republic Act No. 7610   Child Abuse Law REPUBLIC ACT NO. 9239 - Optical Media Law
  • 14. Question: How far was the Pirated DVD Store selling pornographic materials from the Police Station? Senior Police Inspector Aileen Recla shows off a confiscated copy of alleged sex video of actress Katrina Halili and Dr. Hayden Kho during a police raid yesterday on stalls selling pirated DVDs along Colon Street.
  • 15. In other countries the is a single government agency that is in charge of implementing internet blocking programs. In the Philippines, we don’t have a single government agency that is in charge of the ICT programs in the country. CICT is not yet a government line agency it is just a commission that is why other government agency has ICT programs of their own.
  • 16. Who will be in Charge to implement the mandatory Installation of blocking software According to the Law ISP Level – National Telecommunication Commission CELL LOADS:  NTC  TO  REGULATE  UNWANTED  TEXTS  MANILA, October 24, 2005 (STAR) By JasminUy - Mobile phone subscribers may no longer have to worry about their rapidly diminishing cellphone load credits due to unwanted promotional text messages sent by their networks. This, after the National Telecommunications Commission (NTC) announced that it is regulating "text spam" due to complaints.
  • 17. End users like businesses and internet cafes Local Government Units What would prevent them from imposing preferred software filtering products? LTO Early Warning Device Program Business Third Party Insurance Program
  • 18. Summation The Implementation of an Internet filtering program in the Philippines would be open to abuse due to the absence of a strong centralized government agency that would handle the ICT Programs and formulate the ICT Related Polices. The line of authority as to who would be responsible is not clearly defined.
  • 19. It is open to abuse and the Philippines government does not really have a very good image when it comes to respecting the rights of its citizenry. We need to pass the law making the CICT as a line agency that would handle all ICT related policies in order to give it the moral authority to manage ICT related policies in the Philippines
  • 20. Standardized ICT educational standards the would reflect the present realities and empower the people to make an educated choice with regards to internet content. Empowerment to the People through ICT Internet Censorship