The Communications Decency Act

:: 1 Works Cited
Length: 1744 words (5 double-spaced pages)
Rating: Excellent
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

The Communications Decency Act

The U.S. Government should not attempt to place restrictions on the internet.
The Internet does not belong to the United States and it is not our
responsibility to save the world, so why are we attempting to regulate something
that belongs to the world? The Telecommunications Reform Act has done exactly
that, put regulations on the Internet.

Edward Cavazos quotes William Gibson says, "As described in Neuromancer,
Cyberspace was a consensual hallucination that felt and looked like a physical
space but actually was a computer-generated construct representing abstract
data." (1) When Gibson coined that phrase he had no idea that it would become
the household word that it is today. "Cyberspace now represents a vast array of
computer systems accessible from remote physical locations." (Cavazos 2)

The Internet has grown explosively over the last few years. "The Internet's
growth since its beginnings in 1981. At that time, the number of host systems
was 213 machines. At the time of this writing, twelve years later, the number
has jumped to 1,313,000 systems connecting directly to the Internet." (Cavazos
10)

"Privacy plays a unique role in American law." (Cavazos 13) Privacy is not
explicitly provided for in the Constitution, yet most of the Internet users
remain anonymous. Cavazos says, "Computers and digital communication
technologies present a serious challenge to legislators and judges who try to
meet the demands of economic and social change while protecting this most basic
and fundamental personal freedom." Networks and the Internet make it easy for
anyone with the proper equipment to look at information based around the world
instantly and remain anonymous. "The right to conduct at least some forms of
speech activity anonymously has been upheld by the U.S. Supreme Court." (Cavazos
15) In cyberspace it is extremely uncommon for someone to use their given name
to conduct themselves, but rather they use pseudonyms or "Handles". (Cavazos 14)
Not only is it not illegal to use handles on most systems, but the sysop (System
Operator) does not have to allow anyone access to his data files on who is the
person behind the handle. Some sysops make the information public, or give the
option to the user, or don't collect the information at all.

The Internet brings forth many new concerns regarding crime and computers. With
movies like Wargames, and more recently Hackers, becoming popular, computer
crime is being blown out of proportion. "The word Hacker conjures up a vivid
image in the popular media." (Cavazos 105) There are many types of computer
crime that fall under the umbrella of "Hacking". Cavazos says, "In 1986
Congress passed a comprehensive federal law outlawing many of the activities

How to Cite this Page

MLA Citation:
"The Communications Decency Act." 123HelpMe.com. 22 Nov 2017
    <http://www.123HelpMe.com/view.asp?id=89288>.
Title Length Color Rating  
The Communications Decency Act Essay - The Communications Decency Act The U.S. Government should not attempt to place restrictions on the internet. The Internet does not belong to the United States and it is not our responsibility to save the world, so why are we attempting to regulate something that belongs to the world. The Telecommunications Reform Act has done exactly that, put regulations on the Internet. Edward Cavazos quotes William Gibson says, "As described in Neuromancer, Cyberspace was a consensual hallucination that felt and looked like a physical space but actually was a computer-generated construct representing abstract data." (1) When Gibson coined that phrase he had no idea that it would become the hou...   [tags: essays research papers fc]
:: 1 Works Cited
1744 words
(5 pages)
Strong Essays [preview]
The Unconstitutionality of the Communications Decency Act of 1996 Essay - The Unconstitutionality of the Communications Decency Act of 1996 The U.S. Congress passed the Telecommunications Act of 1996 on February 1, 1996. Title V of this Act was the Communications Decency Act, or CDA, whose main goal was to regulate pornography on the Internet. It was intended to be similar to the regulations that had already been passed allowing the Federal Communications Commission (FCC) to regulate indecency on radio and Television (“Communications”). According to the Center for Democracy and Technology, the CDA prohibited “posting ‘indecent’ or ‘patently offensive’ materials in a public forum on the Internet – including web pages, newsgroups, chat rooms, or online discussion...   [tags: Law Legal Issues Essays]
:: 4 Works Cited
1418 words
(4.1 pages)
Powerful Essays [preview]
Communications Decency Act: Regulation In Cyberspace Essay - Communications Decency Act: Regulation In Cyberspace Being one of millions of surfers throughout the Internet, I see that fundamental civil liberties are as important in cyberspace as they are in traditional contexts. Cyberspace defined in Webster's Tenth Edition dictionary is the on-line worlds of networks. The right to speak and publish using a virtual pen has its roots in a long tradition dating back to the very founding of democracy in this country. With the passage of the 1996 Telecommunications Act, Congress has prepared to turn the Internet from one of the greatest resources of cultural, social, and scientific information into the online equivalent of a children's reading room....   [tags: essays research papers] 480 words
(1.4 pages)
Strong Essays [preview]
The Stored Communications Act and Facebook Essay example - The Stored Communications Act Title II of the Electronic Communications Privacy Act of 1986, or the Stored Communications Act, falls short of the technological advances we have made in our society to date. Within its’ boundaries, the Stored Communications Act treats personal information, such as private messages, emails, and user information differently than physical documents stored in an individual’s home. In the previous assignment, I described the shortcomings of the SCA. Now, I will delve into what can be done to change this Act in order to make it congruent with present and future data use....   [tags: shortcomings of communication technology policies]
:: 6 Works Cited
1656 words
(4.7 pages)
Powerful Essays [preview]
Electronic Communications History Essay - Introduction The origins of the market in electronic communications lie with the development and exploitation of the telegraph around the middle of the 19th century. You will find an excellent account of the development of the telegraph and some of the lessons this holds for the modern world in Tom Standage’s book, The Victorian Internet (readily available via Amazon). The telephone was invented (allegedly) by Alexander Graham Bell who in 1876 was granted a United States patent (174465) which in a mere six pages specified what are recognisably still the key features of the telephone system....   [tags: Electronic Communications] 1790 words
(5.1 pages)
Powerful Essays [preview]
Gap Analysis: Global Communications Essay - Global Communications is struggling to compete in the telecommunication industry. Management has put in place an aggressive plan that will address the company’s 50% depreciation in stock value over the last three years. Kreitner and Kinicki quote "Change begets conflict, conflict begets change" (2004). Global Communications was already facing an uphill battle because of the planned changes and they made a critical mistake by not including all critical stakeholders in the planning and implementation of these initiatives thus isolating the stakeholders and endangering the success of the plan....   [tags: Global Communications Case Study] 1719 words
(4.9 pages)
Strong Essays [preview]
Essay about Global Communications Gap Analysis - Gap Analysis: Global Communications The confidence in the entire telecommunications industry is diminishing. Stockholders are realizing diminishing returns on their investment and are having doubts about the industry?s ability to regain past levels of profitability. Telecommunications companies are experiencing losses due to high levels of competition for the consumer dollars available. Cable companies have been allowed into the market to provide a single provider solution for television, broadband internet, and two-way voice communication....   [tags: Gap Analysis Global Communications] 1718 words
(4.9 pages)
Powerful Essays [preview]
Essay on Team Communications: Workplace Meetings - Team Communication: Workplace Meetings and Interactions Workplace meetings have become as common an occurrence in daily business activity as punching in on a time clock. "Done right, meetings are one of the most powerful communication tools." (Thibodeau, 2005, para. 1). As beneficial as productive meetings can be to business organizations, ineffective meetings can have an equally detrimental effect. Regardless of how boring or pointless they may seem, not even modern technology is a substitute for personal interfacing....   [tags: Business Communications] 1469 words
(4.2 pages)
Strong Essays [preview]
Essay about Global Communications - Gap Analysis: Global Communications In today's telecommunication business, companies are increasingly outsourcing to improve profitability and productivity. From reading this scenario about Global Communication, several points of interest will be presented in this paper. The scenario involves a company called Global Communication and presents various business and ethical dilemmas that this company must face to continue being a competitive force in this field. This paper will discuss the initial problem that explains issues and opportunities....   [tags: Global Communications Gap Analysis Case Study] 866 words
(2.5 pages)
Strong Essays [preview]
Communications Essay - What is communication. According to Hybel & Weaver (2004, p7) the terms ‘Communication’ which is interact with others to share information and beliefs, exchange ideas and feelings, make plans and solve problems. Sometimes this interaction is done interpersonally, in a team or small group, in a conference and sometimes through the media or via computer. We may say that communication consists of transmitting information from one people to another. Communication theory is explains the process of transmitting information, the form and structure of the information, the function and effects of the information....   [tags: Communication Definition Analysis Research paper] 1208 words
(3.5 pages)
Strong Essays [preview]



commonly referred to as 'hacking.'" (107) Breaking into a computer system
without the proper access being given, traditional hacking, is illegal; hacking
to obtain financial information is illegal; hacking into any department or
agency of the United States is illegal; and passing passwords out with the
intent for others to use them to hack into a system without authorization is
also illegal.

"One of the more troubling crimes committed in cyberspace is the illicit
trafficking in credit card numbers and other account information." (Cavazos 109)
Many people on the Internet use their credit cards to purchase things on-line,
this is a dangerous practice because anyone with your card number can do the
samething with your card. Millions of dollars worth of goods and services a
year are stolen using credit card fraud. No matter how illegal, many are not
caught. With the use of anonymous names and restricted access to provider's
data on users, it becomes harder to catch the criminals on-line.

The "[Wire Fraud Act] makes it illegal for anyone to use any wire, radio, or
television communication in interstate or foreigncommerce to further a scheme to
defraud people of money or goods." (Cavazos 110) This is interpreted to include
telephone communications, therefore computer communication as well. There is
much fraud on the Internet today, and the fraud will continue until a feasable
way to enforce the Wire Fraud Act comes about.

Cavazos continues, "unauthorized duplication, distribution, and use of someone
else's intellectual property is subject to civil and criminal penalties under
the U.S. Copyright Act." (111) This "intellectual property" is defined to
include computer software. (Cavazos 111) Software piracy is very widespread and
rampant, and was even before the Internet became popular.

The spread of Computer Viruses has been advanced by the popularity of the
Internet. "A virus program is the result of someone developing a mischievous
program that replicates itself, much like the living organism for which it is
named." (Cavazos 114) Cyberspace allows for the rapid transfer and downloading
of software over the entire world, this includes viruses. If a file has been
corrupted before you download it, you are infecting your system. If you then
give any software in any medium to any other user you run the risk of spreading
the virus, just as if you had taken in a person sick with the bubonic plague.
"Whatever the mechanism, there can be no doubt that virus software can be
readily found in cyberspace." (Cavazos 115)

The Electronic Communications Privacy Act was enacted to protect the rights of
the on-line users within the bounds of the United States. "Today the Electronic
Communications Privacy Act (ECPA) makes it illegal to intercept or disclose
private communications and provides victims of such conduct a right to sue
anyone violating its mandate." (Cavazos 17) There are exceptions to this law; if
you are a party of the communication you can release it to the public, your
provider can use the intercepted communication in the normal course of
employment, your provider can intercept mail for the authorities if ordered by a
court, if the communication is public, and your provider can intercept
communications to record the fact of the communication or to protect you from
abuse of the system. If you are not cardful as a criminal then you will get
caught, and the number of careful criminals are increasing.

Says Cavazos, "a person or entity providing an electronic communication service
to the public shall not knowingly divulge to anyone the contents o fa
communication while in electronic storage on that service." (21) The sysop is
not allowed to read your e-mail, destroy your e-mail before you read it, nor is
he allowed to make public your e-mail unless that e-mail has already been made
public.

"Many systems monitor every keystroke entered by a user. Such keystroke
monitoring may very well constitute an interception for the purposes of the
ECPS." (18) If the U/S/ Government is going to continue to place restrictions
on the Internet then soon we will have to do away with free speech and
communications. Says Kirsten Macdissi, "Ultmiately, control will probably have
to come from the user or a provider close to the individual user..." (1995, p.1).
Monitoring individual users is still not the answer; to cut down on fraud and
other law violations a new system must be devised to monitor the Internet that
does not violate the right to privacy and does not prevent adults from having a
right to free speech.

The Constitution reads, "Amendment 1. Congress shall make no law respecting an
establishment of religion, or prohibiting the free exercise thereof; or
abridging the freedom of speech, or of the press; or the right of the people
peaceably to assemble, and to petition the Government for a redress of
grievances." (1776). If you read the Communications Decency Act of the
Telecommunications Reform Act, there are now seven words taht cannot be used on
the Internet. A direct abridgement of the right to choose what we say. Yet the
providers, who have the right to edit what is submitted, choose let many things
slide. The responsibility should lie with the provider, not the U.S. Government.
Says Macdissi, "As an access provider, Mr. Dale Botkin can see who is connected,
but not what they are doing." (1995). Yet almost all providers keep a running
record of what files are communivated through their servers.

Macdissi quoted Mr. Dale Botkin, president of Probe Technology, an Internet
access provider, as saying, "'There is a grass roots organization called Safe
Surf,' Botkin said. 'What they've done is come up with a way for people putting
up information on the internet to flag it as okay or not okay for kids.'" (1995).
The system is idiot proof. The information provider flags his web page as
appropriate for children, the Safe Surf program will connect to the site. If
the information provider chooses to not flag his web page, or to flag it as
inappropriate for children, the Safe Surf program will not connect to the site.
If this, or something similar, were mandated for the Internet the Communications
Decency Act would be unnecessary. Says Eric Stone, an Internet user, "[The
C.D.A.] attempts to place more restrictive constraints on the conversation in
cyberspace than currently exist in the Senate Cafeteria..." (1996).

The liability is still with the end-user. The American, or fireigner, who sits
in front of their computer everyday to conduct business, chat with friends, or
learn about something he didn't know about before. For us to take liability
away from the end-user we must lay the liability on either the providers or on
the system operators. Cavazos says, "the Constitution only provides this
protection where the government is infringing on your rights." (1994).

When the providers and system operators censor the users it is called editorial
discretion. When the Government does it, it is infringement of privacy. So why
are we still trying to let the Government into our personal and private lives?
The popularity of the C.D.A. with the unknowledgeable and the right
conservatives makes it a very popular law. The left ant the knowledgeable are
in the minority, so our power to change this law is not great. The Government
also won't listen to us because we pose less of a threat than the majority in
re-election. This law will have to be recognized for what it is, a blatant
violation of the First Amendment right of free speech, by the average citizen
before the C.D.A. will be changed.

Works Cited

Cavazos, E. (1994) Cyberspace and the law: Your rights and duties in the on-line
world.
Boston: MIT Press

Macdissi, K. (1995) Enforcement is the problem with regulation of the Internet.
Midlands Business Journal

Stone, E. (1996) A Cyberspace independence declaration. Unpublished Essay,
Heretic@csulb.com (E-Mail address)


Return to 123HelpMe.com