SlideShare uma empresa Scribd logo
1 de 23
Freedom of Expression
Freedom of Expression: overview Anonymous, or Anon, is a movement made up of a number of nameless internet activists from around the world.For many, the 'hacktivist' group has become the face of the new cyber-war against oppressive governments and all-powerful corporate. Others say the group's actions are reckless.Describing itself as "the freedom of speech, the freedom of information and the freedom of expression taken to a logical extreme," Anon says it breaks laws, but only for the greater good
Freedom of Expression Anonymous the latest and most active “Hacktivists” today.
First Amendment Rights The internet enables a worldwide exchange of news, ideas, opinions, rumors, and information. It’s broad accessibility, open-minded discussions, and anonymity make the Internet an ideal communication medium. People must often make ethical decisions about how to use such remarkable freedom and power. Like the popular quote goes “with great power comes great responsibility”.
First Amendment Rights The right to freedom of expression is one of the most important rights for free people anywhere.  The First Amendment to the U.S. Constitution was adopted to guarantee this right and others. The First Amendment reads: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances. In other words, the First Amendment protects the right to freedom of religion and freedom of expression from government interference.
First Amendment Rights Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression, such as burning the national flags, dance movements, and hand gestures. But the most relevant to information technology types of speech are obscene speech and defamation. Obscene speech-  An obscenity is any statement or act which strongly offends the prevalent morality of the time, is a profanity, or is otherwise taboo, indecent, abhorrent, or disgusting, or is especially inauspicious. The term is also applied to an object that incorporates such a statement or displays such an act. Defamation-  Defamation—also called calumny, vilification, traducement, slander (for transitory statements), and libel (for written, broadcast, or otherwise published words)—is the communication of a statement that makes a claim, expressly stated or implied to be factual, that may give an individual, business, product, group, government, or nation a negative image. It is usually a requirement that this claim be false and that the publication is communicated to someone other than the person defamed (the claimant).
Obscene Speech The IT city of Hyderabad was shocked by the news of a cyber crime. A man whose marriage alliance was turned down tormented the woman by putting up obscene profiles of her on the Internet
Obscene speech There are three questions in the First Amendment that will help determine if the speech can be considered obscene. These are the ff: 1) Would the average person, applying contemporary community standards, find that the work, taken as a whole, appeals to the prurient interest? 2) Does the work depict or describe, in a patently offensive way, sexual conduct specifically defined by the applicable state law? 3) Does the work, taken as a whole lack serious literary, artistic, political, or scientific value?
Obscene Speech These tests has raised many issues, like how a work can be assessed by its impact on an average adult in a community , who is an average adult, what are the contemporary community standards, and in the mere case of potentially obscene material displayed “world-wide” on the Internet, what is the community?
Defamation The dangers of defaming somebody on the internet have been brought to the fore, with a group of Sydney men now at risk of losing their jobs for bad-mouthing their boss on Facebook - 17 September 2009
Defamation The right to freedom of expression is restricted when the expressions, whether spoken or written, are untrue and cause harm to another person. This publication of a statement of alleged fact that is false and harms another person is defamation.  Two different types: Slander- oral defamatory Libel- written defamatory Although people have the right to express opinions, they must exercise care in their Internet communications to avoid possible charges of defamation.
Freedom of Expression: Key Issues Information technology has provided amazing new ways to communicate with people around the world. With these new methods come responsibilities and new ethical problems. Some of the key issues are: controlling access to information on the Internet, anonymity, defamation, hate speech , and pornography.
Controlling Access to Information on the Internet Have you thought about the consequences of putting information about yourself up on the web? An informative visual video experience created by 4 communication master´s students at the Royal Institute of Technology in Stockholm, Sweden.
Controlling Access to Information on the Internet One of the main reasons to support control of access to information in the internet is the children’s capability of accessing the Internet. Here are some of the sections that address this issue. The Communications Decency Act(CDA) This act aimed at protecting children from online pornography. The CDA imposed $250,000 fines and prison terms of up to two years for the transmission of “indecent” material over the Internet.
Controlling Access to Information on the Internet The Child Online Protection Act(COPA) In October 1998, the COPA was signed into law. The law states that “whoever knowingly and with knowledge of the character of the material, in interstate or foreign commerce by means of the World Wide Web, makes any communication for commercial purposes that is available to any minor and that includes any material that is harmful to minors shall be fined not more than $50,000, imprisoned not more than 6 months, or both”.
Controlling Access to Information on the Internet Internet Filtering An internet filter is software that can be installed with a Web browser to block access to certain web sites that contain inappropriate or offensive material. The best internet filters use a combination of URL filtering, keyword filtering, and dynamic content filtering. URL filtering-  is filtering a particular URL or domain name identified as an objectionable site. Keyword filtering- uses keywords or phrases such as sex, Satan, f***, b*tch, and gambling to trigger the blocking of web sites. Dynamic content filtering- each website’s content is evaluated immediately before it is displayed by using image recognition and object analysis.
Anonymity The principle of anonymous expression allows people to state their opinions without revealing their identity. The freedom to express an opinion without fear of reprisal is an important right of a democratic society. Anonymity is even more important in countries that don’t allow free speech. However, in the wrong hands, anonymous communication can be used as a tool to commit illegal or unethical activities.
Anonymity:Anonymous Anonymity at the wrong hands? Or not?
Anonymity: Ways for being Anonymous: Anonymous Remailers Maintaining anonymity is a legitimate need for some Internet activities. Internet users who want to remain anonymous can send e-mail to an anonymous remailer service, where a computer program strips the originating address from the message. It then forwards the message to its intended recipient. John Doe Lawsuit in a John Doe Lawsuit, the identity of the defendant is temporarily unknown. Such suits are common in the internet libel cases, where the defendant communicates using a pseudonym or anonymously.
National Security Letter (NSL) A NSL requires financial institutions to turn over electronic records about finances, telephone calls, e-mail, and other personal information of suspected terrorists or spies. Recent developments have expanded the scope and power of NSLs to the point that some believe they now represent a threat to freedom of speech.
Pornography Many adults(also my classmates) and free-speech advocates believe that nothing is illegal or wrong about purchasing adult pornographic material made for and by consenting adults.  But some are deeply concerned about its impact on children and fear that increasingly easy access to pornography encourages pedophiles and sexual molesters. Today, the internet has been a boom to the pornography industry by providing fast, cheap and convenient access to more than 60,000 web sex sites. About one in four regular Internet user (almost 21 million Americans) visits a Web sex site at least once a month- more than the number of visitors to web sports sites.
Pornography Companies established steps that includes a computer usage policy that prohibits access to pornography sites, identifying those who violate the policy, and taking action against those users- no matter how embarrassing it is for the users or how harmful it might be for the company, because  as long as they were taking reasonable steps to prevent pornography, they have a valid defense if they are subject to a sexual harassment lawsuit.
Pornography Free speech or something else?

Mais conteúdo relacionado

Mais procurados

Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
Ristya Anditha
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Pornography and ethics - India specific
Pornography and ethics - India specificPornography and ethics - India specific
Pornography and ethics - India specific
Nithya Ramachandran
 

Mais procurados (20)

Social and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - EthicsSocial and Professional Issues in Computing - Ethics
Social and Professional Issues in Computing - Ethics
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Copyright And The Internet
Copyright And The InternetCopyright And The Internet
Copyright And The Internet
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
PROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONPROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTION
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Pornography and ethics - India specific
Pornography and ethics - India specificPornography and ethics - India specific
Pornography and ethics - India specific
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 

Semelhante a Freedom of expression

Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 
Intro to press regulation 1 the legal system
Intro to press regulation 1 the legal systemIntro to press regulation 1 the legal system
Intro to press regulation 1 the legal system
latymermedia
 
Political Communication In Cmc Mypart
Political Communication In Cmc MypartPolitical Communication In Cmc Mypart
Political Communication In Cmc Mypart
aligi
 
Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
aligi
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
DCL2701A
 

Semelhante a Freedom of expression (17)

Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.
 
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaFree Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
 
Digital r rsjb2011
Digital r rsjb2011Digital r rsjb2011
Digital r rsjb2011
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Intro to press regulation 1 the legal system
Intro to press regulation 1 the legal systemIntro to press regulation 1 the legal system
Intro to press regulation 1 the legal system
 
© Houghton mifflin harcour
© Houghton mifflin harcour© Houghton mifflin harcour
© Houghton mifflin harcour
 
Political Communication In Cmc Mypart
Political Communication In Cmc MypartPolitical Communication In Cmc Mypart
Political Communication In Cmc Mypart
 
Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_report
 
Essay On Consumer Rights.pdf
Essay On Consumer Rights.pdfEssay On Consumer Rights.pdf
Essay On Consumer Rights.pdf
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Freedom of expression

  • 2. Freedom of Expression: overview Anonymous, or Anon, is a movement made up of a number of nameless internet activists from around the world.For many, the 'hacktivist' group has become the face of the new cyber-war against oppressive governments and all-powerful corporate. Others say the group's actions are reckless.Describing itself as "the freedom of speech, the freedom of information and the freedom of expression taken to a logical extreme," Anon says it breaks laws, but only for the greater good
  • 3. Freedom of Expression Anonymous the latest and most active “Hacktivists” today.
  • 4. First Amendment Rights The internet enables a worldwide exchange of news, ideas, opinions, rumors, and information. It’s broad accessibility, open-minded discussions, and anonymity make the Internet an ideal communication medium. People must often make ethical decisions about how to use such remarkable freedom and power. Like the popular quote goes “with great power comes great responsibility”.
  • 5. First Amendment Rights The right to freedom of expression is one of the most important rights for free people anywhere. The First Amendment to the U.S. Constitution was adopted to guarantee this right and others. The First Amendment reads: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances. In other words, the First Amendment protects the right to freedom of religion and freedom of expression from government interference.
  • 6. First Amendment Rights Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression, such as burning the national flags, dance movements, and hand gestures. But the most relevant to information technology types of speech are obscene speech and defamation. Obscene speech- An obscenity is any statement or act which strongly offends the prevalent morality of the time, is a profanity, or is otherwise taboo, indecent, abhorrent, or disgusting, or is especially inauspicious. The term is also applied to an object that incorporates such a statement or displays such an act. Defamation- Defamation—also called calumny, vilification, traducement, slander (for transitory statements), and libel (for written, broadcast, or otherwise published words)—is the communication of a statement that makes a claim, expressly stated or implied to be factual, that may give an individual, business, product, group, government, or nation a negative image. It is usually a requirement that this claim be false and that the publication is communicated to someone other than the person defamed (the claimant).
  • 7. Obscene Speech The IT city of Hyderabad was shocked by the news of a cyber crime. A man whose marriage alliance was turned down tormented the woman by putting up obscene profiles of her on the Internet
  • 8. Obscene speech There are three questions in the First Amendment that will help determine if the speech can be considered obscene. These are the ff: 1) Would the average person, applying contemporary community standards, find that the work, taken as a whole, appeals to the prurient interest? 2) Does the work depict or describe, in a patently offensive way, sexual conduct specifically defined by the applicable state law? 3) Does the work, taken as a whole lack serious literary, artistic, political, or scientific value?
  • 9. Obscene Speech These tests has raised many issues, like how a work can be assessed by its impact on an average adult in a community , who is an average adult, what are the contemporary community standards, and in the mere case of potentially obscene material displayed “world-wide” on the Internet, what is the community?
  • 10. Defamation The dangers of defaming somebody on the internet have been brought to the fore, with a group of Sydney men now at risk of losing their jobs for bad-mouthing their boss on Facebook - 17 September 2009
  • 11. Defamation The right to freedom of expression is restricted when the expressions, whether spoken or written, are untrue and cause harm to another person. This publication of a statement of alleged fact that is false and harms another person is defamation. Two different types: Slander- oral defamatory Libel- written defamatory Although people have the right to express opinions, they must exercise care in their Internet communications to avoid possible charges of defamation.
  • 12. Freedom of Expression: Key Issues Information technology has provided amazing new ways to communicate with people around the world. With these new methods come responsibilities and new ethical problems. Some of the key issues are: controlling access to information on the Internet, anonymity, defamation, hate speech , and pornography.
  • 13. Controlling Access to Information on the Internet Have you thought about the consequences of putting information about yourself up on the web? An informative visual video experience created by 4 communication master´s students at the Royal Institute of Technology in Stockholm, Sweden.
  • 14. Controlling Access to Information on the Internet One of the main reasons to support control of access to information in the internet is the children’s capability of accessing the Internet. Here are some of the sections that address this issue. The Communications Decency Act(CDA) This act aimed at protecting children from online pornography. The CDA imposed $250,000 fines and prison terms of up to two years for the transmission of “indecent” material over the Internet.
  • 15. Controlling Access to Information on the Internet The Child Online Protection Act(COPA) In October 1998, the COPA was signed into law. The law states that “whoever knowingly and with knowledge of the character of the material, in interstate or foreign commerce by means of the World Wide Web, makes any communication for commercial purposes that is available to any minor and that includes any material that is harmful to minors shall be fined not more than $50,000, imprisoned not more than 6 months, or both”.
  • 16. Controlling Access to Information on the Internet Internet Filtering An internet filter is software that can be installed with a Web browser to block access to certain web sites that contain inappropriate or offensive material. The best internet filters use a combination of URL filtering, keyword filtering, and dynamic content filtering. URL filtering- is filtering a particular URL or domain name identified as an objectionable site. Keyword filtering- uses keywords or phrases such as sex, Satan, f***, b*tch, and gambling to trigger the blocking of web sites. Dynamic content filtering- each website’s content is evaluated immediately before it is displayed by using image recognition and object analysis.
  • 17. Anonymity The principle of anonymous expression allows people to state their opinions without revealing their identity. The freedom to express an opinion without fear of reprisal is an important right of a democratic society. Anonymity is even more important in countries that don’t allow free speech. However, in the wrong hands, anonymous communication can be used as a tool to commit illegal or unethical activities.
  • 18. Anonymity:Anonymous Anonymity at the wrong hands? Or not?
  • 19. Anonymity: Ways for being Anonymous: Anonymous Remailers Maintaining anonymity is a legitimate need for some Internet activities. Internet users who want to remain anonymous can send e-mail to an anonymous remailer service, where a computer program strips the originating address from the message. It then forwards the message to its intended recipient. John Doe Lawsuit in a John Doe Lawsuit, the identity of the defendant is temporarily unknown. Such suits are common in the internet libel cases, where the defendant communicates using a pseudonym or anonymously.
  • 20. National Security Letter (NSL) A NSL requires financial institutions to turn over electronic records about finances, telephone calls, e-mail, and other personal information of suspected terrorists or spies. Recent developments have expanded the scope and power of NSLs to the point that some believe they now represent a threat to freedom of speech.
  • 21. Pornography Many adults(also my classmates) and free-speech advocates believe that nothing is illegal or wrong about purchasing adult pornographic material made for and by consenting adults. But some are deeply concerned about its impact on children and fear that increasingly easy access to pornography encourages pedophiles and sexual molesters. Today, the internet has been a boom to the pornography industry by providing fast, cheap and convenient access to more than 60,000 web sex sites. About one in four regular Internet user (almost 21 million Americans) visits a Web sex site at least once a month- more than the number of visitors to web sports sites.
  • 22. Pornography Companies established steps that includes a computer usage policy that prohibits access to pornography sites, identifying those who violate the policy, and taking action against those users- no matter how embarrassing it is for the users or how harmful it might be for the company, because as long as they were taking reasonable steps to prevent pornography, they have a valid defense if they are subject to a sexual harassment lawsuit.
  • 23. Pornography Free speech or something else?