Chapter 4 Information Through Opposing Viewpoints: - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Chapter 4 Information Through Opposing Viewpoints:

Description:

... to be secure in their persons, houses, papers, and effects, against unreasonable ... The White House calls voluntary meeting for Internet for companies to develop ... – PowerPoint PPT presentation

Number of Views:20
Avg rating:3.0/5.0
Slides: 11
Provided by: Micr150
Category:

less

Transcript and Presenter's Notes

Title: Chapter 4 Information Through Opposing Viewpoints:


1
Chapter 4 - Information Through Opposing
Viewpoints
  • Group 4 Civil Men
  • Nathan Gay, Jimmy Rhodes, Chris Zawacki, Mike
    Phalen Dan Wagner

2
  • Amendment I Congress shall make no law
    respecting an establishment of religion, or
    prohibiting the free exercise thereof or
    abridging the freedom of speech, or of the press
    or the right of the people peaceably to assemble,
    and to petition the Government for a redress of
    grievances.
  • Amendment IV The right of the people to be
    secure in their persons, houses, papers, and
    effects, against unreasonable searches and
    seizures, shall not be violated, and no warrants
    shall issue, but upon probable cause, supported
    by oath or affirmation, and particularly
    describing the place to be searched, and the
    persons or things to be seized.

3
How Does the Internet Affect Civil Liberties?
4
Topics of Discussion
  • Privacy
  • Internet Censorship
  • Computer Encryption Codes

5
The Internet Threatens the Right to Privacy.
  • Sniffer Programs.
  • Website owners use cookies to monitor surfing
    habits and information.
  • E-mail is subject to hackers and unintended
    distribution violating the authors privacy.

6
The Internets Invasion of Privacy is Exaggerated.
  • It is vital for a website to know when you are
    there and how long you have been there.
  • Cookies allow websites to positively monitor your
    Internet habits.
  • You control how much personal information a
    website can obtain.
  • Sniffer programs monitor traffic on the Internet
    to solve problems.

7
Indecent Material on the Internet Should Be
Censored.
  • Children are susceptible to pornography on the
    Internet.
  • Parents have responsibility, but should not be
    the only means of censorship.
  • The Supreme court has consistently ruled that not
    all speech is protected speech.

8
Censoring Indecent Material on the Internet
Violates Free Speech.
  • CDA is overturned by the Supreme Court in Reno
    vs. ACLU.
  • The White House calls voluntary meeting for
    Internet for companies to develop and deploy
    tools for blocking inappropriate speech.
  • Microsoft and Netscape use PICS (Platform for
    Internet Content Selection) as a rating and
    blocking tool in their web browsers.
  • Examples of Filtered searches.

9
Computer Encryption Threatens Public Safety.
  • The 4th Amendment strikes a balance between
    individual needs and societies.
  • Allowing the use of unbreakable encryption, to
    protect privacy, compromises public safety.
  • The goal of encryption is to protect individual
    privacy and commerce, but in a way that preserves
    law enforcements ability to protect public
    safety.
  • Encrypting Codes is very costly and time
    consuming, therefore keys to these codes should
    be made available.

10
Computer Encryption Codes are Necessary to
Protect Privacy.
  • Giving the government the key to encrypted
    information violates the right to privacy.
  • The framers of the constitution were aware of
    cryptography, and did not deny the right to use
    it.
  • Encrypting Codes is very costly and time
    consuming, however, they are necessary to keep
    information private.
Write a Comment
User Comments (0)
About PowerShow.com