Feeds

US publishers say Child Online Protection Act should be struck down

COPA non grata

Top 5 reasons to deploy VMware with Tegile

A group of US online publishers and a lobby group is taking the Government to court to challenge an eight-year-old law which it says amounts to censorship of the internet. The challenge is to the Child Online Protection Act (COPA), which became law in 1998.

Designed to protect children from viewing pornographic and harmful content on the internet, the law imposes restrictions on what can be seen on the internet.

Allowing the possibility of children seeing material which could be "harmful to minors" is a criminal act under the law and can by punished by six-month prison terms and $50,000 fines.

The law has never been used and its constitutionality has been questioned by courts in the US. The current case is being taken by the American Civil Liberties Union (ACLU) and will be heard by Judge Lowell Reed at the Eastern District Court of Pennsylvania.

The ACLU is arguing that the Act violates the 'first amendment' rights of users of the internet and publishers. The first amendment of the US Constitution guarantees the right to freedom of expression.

"This case is about speech. It is not the role of the government to decide what people can see and use on the internet. Those are personal decisions that should be made by individuals and their families," said Chris Hansen, a staff attorney at the ACLU.

COPA was involved in a court case in Philadelphia but the federal and appeals courts both said that the law was unconstitutional and should not be enforced. The Supreme Court upheld that ban on enforcement in 2004.

The ACLU will argue in the case that individual screening software in the home is sufficient to block unsuitable material, and that parental supervision must take the place of state interference. "As a parent, I know that what's fine for my daughter may not be appropriate even for some of her friends," said Salon.com editor in chief Joan Walsh in testimony to the court this week.

The Government has said that it will argue that the screening technology is not adequate to protect children. "The evidence will show that a shocking amount of pornography slips through to children," said Eric Beane, a government attorney, in court.

The non-jury trial is expected to last for four weeks.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Intelligent flash storage arrays

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.