10.12.2012 Views

EveryBody's Guide to the Law

EveryBody's Guide to the Law

EveryBody's Guide to the Law

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

a company specializing in res<strong>to</strong>ring data recovery at considerable cost. This goes <strong>to</strong> show how<br />

important it is <strong>to</strong> back up your work on floppy disks, zip drives, or o<strong>the</strong>r data-saving equipment.<br />

If you have a stand-alone computer that is not connected <strong>to</strong> <strong>the</strong> Internet, you do not have<br />

<strong>to</strong> worry much about viruses. About <strong>the</strong> only time your computer could be infected by a virus<br />

is by using shareware (free software containing software programs and sometimes viruses). But<br />

if you are connected <strong>to</strong> <strong>the</strong> Internet, you must be ever vigilant of viruses hidden in e-mails<br />

with attachments or pictures. If you are not sure who is sending you <strong>the</strong> e-mail, it is best <strong>to</strong><br />

delete it ra<strong>the</strong>r than risk opening <strong>the</strong> attachment or picture only <strong>to</strong> find a virus lurking inside.<br />

To prevent viruses from infecting your computer, you should have antivirus software<br />

installed in your computer. There are several excellent programs commercially available for<br />

just this purpose. However, you will need <strong>to</strong> update your antivirus software regularly <strong>to</strong> protect<br />

it against newly created viruses. Some of <strong>the</strong> best-selling antivirus programs have a system<br />

whereby each month you can download antivirus programs for new viruses.<br />

Besides a virus, <strong>the</strong>re are o<strong>the</strong>r disruptive programs, such as a “bomb,” a “worm,” and a “Trojan<br />

horse.” A bomb is a program that sits silently in a computer’s memory until it is triggered<br />

by a specific condition, such as a date. A worm is a destructive program that replicates itself<br />

over a network, reproducing itself as it goes. A Trojan horse is a malicious program that reproduces<br />

itself over a network, and like a virus must be distributed by diskette or e-mail.<br />

Protecting Minors from Indecent Material<br />

There are at least thirty-thousand adult sites promoting pornography on <strong>the</strong> World Wide<br />

Web. Parents, educa<strong>to</strong>rs, librarians, lawmakers, and o<strong>the</strong>rs are justifiably concerned about <strong>the</strong><br />

harmful effect such sites may have on children who innocently or intentionally visit such sites.<br />

Because of this, several laws have been passed in recent years in an attempt <strong>to</strong> regulate <strong>the</strong><br />

content of pornographic websites and protect minors from viewing harmful material. As we<br />

shall see below, however, such attempts <strong>to</strong> regulate website content basically have failed, <strong>the</strong><br />

courts holding that <strong>the</strong> laws unconstitutionally infringe on <strong>the</strong> website publisher’s first amendment<br />

guarantee of freedom of speech.<br />

The Communications Decency Act (CDA), passed in 1996, prohibited Internet users from<br />

using <strong>the</strong> Internet <strong>to</strong> communicate material that under “contemporary community standards”<br />

(see chapter 20) would be deemed patently offensive <strong>to</strong> minors under <strong>the</strong> age of 18. The<br />

United States Supreme Court ruled that <strong>the</strong> CDA was unconstitutionally vague, as it failed <strong>to</strong><br />

define key terms. Additionally, <strong>the</strong> high court noted that <strong>the</strong> breadth of <strong>the</strong> CDA was “wholly<br />

unprecedented” as, for instance, it was not limited <strong>to</strong> commercial speech or commercial entities,<br />

but ra<strong>the</strong>r its open-ended prohibitions embraced all nonprofit entities and individuals<br />

posting indecent material or displaying <strong>the</strong>m on <strong>the</strong>ir own computers.<br />

Most troubling <strong>to</strong> <strong>the</strong> Supreme Court was <strong>the</strong> “contemporary community standards” criterion<br />

as applied <strong>to</strong> <strong>the</strong> Internet. The Supreme Court found that applying such a test would<br />

effectively mean that because all Internet communication is made available <strong>to</strong> a worldwide<br />

Computers and <strong>the</strong> Internet 361

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!