Feeds

US publishers say Child Online Protection Act should be struck down

COPA non grata

The Power of One Infographic

A group of US online publishers and a lobby group is taking the Government to court to challenge an eight-year-old law which it says amounts to censorship of the internet. The challenge is to the Child Online Protection Act (COPA), which became law in 1998.

Designed to protect children from viewing pornographic and harmful content on the internet, the law imposes restrictions on what can be seen on the internet.

Allowing the possibility of children seeing material which could be "harmful to minors" is a criminal act under the law and can by punished by six-month prison terms and $50,000 fines.

The law has never been used and its constitutionality has been questioned by courts in the US. The current case is being taken by the American Civil Liberties Union (ACLU) and will be heard by Judge Lowell Reed at the Eastern District Court of Pennsylvania.

The ACLU is arguing that the Act violates the 'first amendment' rights of users of the internet and publishers. The first amendment of the US Constitution guarantees the right to freedom of expression.

"This case is about speech. It is not the role of the government to decide what people can see and use on the internet. Those are personal decisions that should be made by individuals and their families," said Chris Hansen, a staff attorney at the ACLU.

COPA was involved in a court case in Philadelphia but the federal and appeals courts both said that the law was unconstitutional and should not be enforced. The Supreme Court upheld that ban on enforcement in 2004.

The ACLU will argue in the case that individual screening software in the home is sufficient to block unsuitable material, and that parental supervision must take the place of state interference. "As a parent, I know that what's fine for my daughter may not be appropriate even for some of her friends," said Salon.com editor in chief Joan Walsh in testimony to the court this week.

The Government has said that it will argue that the screening technology is not adequate to protect children. "The evidence will show that a shocking amount of pornography slips through to children," said Eric Beane, a government attorney, in court.

The non-jury trial is expected to last for four weeks.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
Price cuts, new features coming for Office 365 small biz customers
New plans for companies with up to 300 staff to launch in fall
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.