Verified Document

Policy & Privacy Lamb, Gregory Term Paper

Smith, Sylvia. 2006. "Neutrality' backers fear Net censorship." Journal-Gazette. July 17: page 1.

Smith's article raises other concerns regarding government regulation -- that of restricting price increases for telephone companies, the cable industry and Internet Service Providers. These providers have argued that restricting how much they can raise their fees will compromise the development of the technology, and may pave the way for unequal access to information technology. Cyber-businesses, on the other hand, argue that if Congress takes a "hands-off" approach, these private companies are in a position to monopolize access to the Internet, and to practice censorship.

For consumer advocates and cyber-businesses, the solution should be a government-instituted policy of "net neutrality." Instead of addressing the fee issues, there should be a law specifically stating that service providers could regulate access to the Internet. This policy makes much sense, and is a better focus than the fee issue. An ISP, for example, should not be allowed to bar access to websites that the company deems "objectionable."

The idea of "net neutrality" contributes much to this country's information policy, especially in the light of censorship being practiced in other parts of the world. Recently, for example, Google agreed to censor access to politically provocative sites to consumers in China. In the Philippines, the Catholic Church - the country's largest ISP - regularly blocks access to internet sites that are deemed pornographic or otherwise objectionable. Both companies may argue overriding reasons for their censorship. However, the task of regulating the content that comes into one's own computer should belong to the consumers or, in the case of minors, their parents.

Roach, Ronald. 2004....

"Academic coalition opposes moves to extend wiretap law." Black Issues in Higher Education. May 6. 21:6.
Roach's article takes a look at an ongoing debate regarding the differences between government regulation on regular internet traffic and the kind of access needed for users in higher education. Current legislation gives law enforcement access to communication traffic, under stringent legal conditions and constraints. Librarians and other researchers in higher education, however, argue that access rules should be different for the academe, in order to ensure academic freedom.

This article recognizes the rapid changes in information technology, and many academics and librarians have been quick to use the medium for their own research. While the medium has its advantages, it also brings the researchers outside of the academe, which has a strong tradition of freedom. Such freedom is necessary to ensure that an academic could conduct research without social or political repercussions. For example, severe constraints on research and development would occur if a researcher could face jail time or worse for their beliefs. Similar issues could plague a writer who is crafting a novel that could be deemed "subversive," such as George Orwell's 1984.

Given these larger issues, the coalitions of universities, librarians and researchers are right in asking Congress to recognize their different needs. Law enforcement officials certainly have a legitimate need for wiretaps and other methods of monitoring communications traffic. However, the perceived needs to strengthen national security should not come at the expense of rights that this country already holds dear - those of freedom of expression, freedom of information and, as Supreme Court Justice Louis Brandeis once stated, "the right to be let alone."

Sources used in this document:
Roach's article takes a look at an ongoing debate regarding the differences between government regulation on regular internet traffic and the kind of access needed for users in higher education. Current legislation gives law enforcement access to communication traffic, under stringent legal conditions and constraints. Librarians and other researchers in higher education, however, argue that access rules should be different for the academe, in order to ensure academic freedom.

This article recognizes the rapid changes in information technology, and many academics and librarians have been quick to use the medium for their own research. While the medium has its advantages, it also brings the researchers outside of the academe, which has a strong tradition of freedom. Such freedom is necessary to ensure that an academic could conduct research without social or political repercussions. For example, severe constraints on research and development would occur if a researcher could face jail time or worse for their beliefs. Similar issues could plague a writer who is crafting a novel that could be deemed "subversive," such as George Orwell's 1984.

Given these larger issues, the coalitions of universities, librarians and researchers are right in asking Congress to recognize their different needs. Law enforcement officials certainly have a legitimate need for wiretaps and other methods of monitoring communications traffic. However, the perceived needs to strengthen national security should not come at the expense of rights that this country already holds dear - those of freedom of expression, freedom of information and, as Supreme Court Justice Louis Brandeis once stated, "the right to be let alone."
Cite this Document:
Copy Bibliography Citation

Related Documents

Policy Changes in the Criminal
Words: 870 Length: 3 Document Type: Research Paper

This would lead to some sort of drug treatment and rehabilitation for the prisoners leading to reforms when they are released from prison Davis 20. This sentiment is shared by Lt. Gannon who stated that many of those who end up in prison do not belong there. They just need drug treatment, rehabilitation and community support services. Most of all, they need a second chance Lemaitre () . If reforms can

Policy Process: On Long-Term Care Part II
Words: 1287 Length: 4 Document Type: Essay

Policy Process: on LONG-TERM CARE Part II Policy Process 3292 Health care and nursing is more complex today than ever before. New technologies and ever-growing population demands a much more disciplined and organized health care industry (Abood, 2007). This is possible when there are policies, rules and regulations about medical procedures. The medical industry involves some policies today that a person could never imagine few centuries ago. For example there are policies

Lesson Plan Amp; Reflection I Didn't Know
Words: 857 Length: 3 Document Type: Essay

Lesson Plan Amp; Reflection I didn't know what state you are in so was unable to do state/district standards! Lesson Plan Age/Grade Range; Developmental Level(s): 7-8/2nd Grade; Below grade level Anticipated Lesson Duration: 45 Minutes Lesson Foundations Pre-assessment (including cognitive and noncognitive measures): All students are reading below grade level (5-7 months) as measured by standardized assessments and teacher observation Curricular Focus, Theme, or Subject Area: Reading: Fluency, word recognition, and comprehension State/District Standards: Learning Objectives: Students will develop

Branding New Service Dominant Logic
Words: 12522 Length: 50 Document Type: Dissertation

Branding in Service Markets Amp Aim And Objectives Themes for AMP Characteristics Composing Branding Concept Branding Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Categories and Themes Branding Theory Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Branding Concept Characteristics Characteristics Composing Branding Concept Sampling of Studies Reviewed Evolution of Branding Theory Evolution of Marketing Service-Brand-Relationship-Value Triangle Brand Identity, Position & Image Just as marketing increasingly influences most aspects of the consumer's lives, brands

Privacy
Words: 1048 Length: 3 Document Type: Essay

torproject.org//overview.html.en . You refer Tor Wikipedia page. Other questions require a web searching reading. Questions: 1. Alice a Lilliputian overthrow government Lilliput Privacy has become a critical aspect nowadays. There are more and more dangers in terms of national security, international terrorism, and organized crime. In the name of protecting a nation, or providing a secure living environment, the governments often address possible cybercrimes or terrorist actions by infringing the

Privacy of an Individual in the Workplace
Words: 2222 Length: 8 Document Type: Essay

Privacy of an Individual in the Workplace Argument Length: 2,000 words Task Construct argument notion individual's privacy important consideration workplace, Use ethical theory support position. Rationale This task designed: demonstrate capacity understand evaluate privacy; demonstrate understanding issues encroach individual's privacy workplace; demonstrate ability construct a compelling argument logically consistent supported ethical theory; Privacy of an individual in the workplace In the workplace, it is expected that employees must relinquish some of their most

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now