Реферат по предмету "Иностранный язык"


Current Free Speech Doctrine

– Will It Work On The Essay, Research Paper

Current Free Speech Doctrine: Will It Work on the Internet?The Internet offers a much greater potential for interactive communication between informationsenders and receivers than the more traditional methods of communication such as newspaper, radio andtelevision. Freedom of speech ascertained by the constitution is not an absolute right. Depending on themedium through which information is delivered various degrees of the freedom to express one’s self isprotected. Internet communication may be analogous to either a specific existing communication medium oreven several. Current free speech protection begins to dissipate as it is applied to the uncertainconfines of the newly developed Cyberspace. The traditionalist approach to free speech protection iscentered on core values and yields results that are basically neutral so that content allowed through onecommunication medium is permissible in all media. Freedom of speech and of the press is a basic tenant of United States constitutional law. Perhapsconcern for the English use of prior restraint (licensing of press) and seditious libel was the reasonfor including the first amendment in our bill of rights. When the first amendment became law the printedpage was the most widely used non-verbal medium of speech. Speech, as we understand it, involves morethan verbal communication. Speecht includes pictures, movies, radio, television and expressive conduct[Shelton v. Tucker, 364 US 479 (1960)]. As technology advanced and additional communication mediumdeveloped, speech was given various levels of first amendment protection depending on the medium throughwhich the information was delivered. Cyberspace is a network of computer systems permitting literally millions of people tocommunicate with one another on an hourly basis. Cyberspace may mirror other types of communicationmedium singularly or several at one time. Current free speech protectionapproaches break down when applied to Cyberspace since one may prohibit speech when delivered by onemedium but permit identical speech delivered via a different medium. A core values approach protectsidentical speech regardless of the medium in which it is delivered. So it is a foundation forCyberspace and promotes development of new technology. That, “Congress shall make no law…, or abridging the freedom of speech”, suggests an absoluteright to speak. Justice Black dissenting in Konigsberg felt that freedom of speech was absolute[Konigsberg v. State Bar of California, 366 US 36 (1961)]. Justice Harlan writing for the majorityrejected an absolute right, noting that protected freedom of speech was less than an unlimited license totalk. When examining a restriction on speech the court will look for a compelling government interest towarrant the restraint on speech. Also the court will look to determine if the regulation accomplishesthe governmental objective in the least restrictive way. Some forms of speech are not protected by the first amendment. Fighting words, intended andlikely to provoke a physical response breaching the peace may be prohibited [Chaplinsky v. New Hampshire,315 US 568 (1942)]. Criminal statutes may punish speech advocating unlawful conduct. Under theBrandenburg test the state must prove that: 1) the speaker subjectively intended to incite unlawfulactions, 2) that in their context the words spoken were likely to produce imminent lawless action, and 3)that the words used objectively encouraged incitement [Brandenburg v. Ohio, 395 US 444 (1969)]. Obscene speech/works are not given First amendment protection. Miller v California is the currenttest a court should apply in determining if speech is obscene [Miller v. California, 413 US 15 (1973)]. The test has three parts: 1) whether an average person applying contemporary community standards wouldfind the work taken as a whole appeals to prurient interests, 2) whether the work depicts or describes ina patently offensive way sexual conduct specifically defined by applicable state law, and 3) whether thework taken as a whole, lacks serious literary, artistic, political or scientific value. The first twoparts of the test apply based on standards of the local community so that what is obscene may vary withthe locality. The third part is based on a reasonable person standard and is not based on local communitystandards. For a work to be found obscene all three portions of the test must be found. Indecent speech does receive first amendment protection. However in the context of broadcastradio and television courts have upheld FCC regulation of “adult speech”. In Sable v FCC the courtinvalidated a law prohibiting indecent Dial-a-Porn phone messages which were not obscene [SableCommunications v. FCC, 492 US 115 (1989)]. There the court found congress could regulate to protectminors by requiring use of credit cards, access codes and scrambling rules. Early cases did not give commercial speech (advertising) first amendment protection. InPittsburgh Press the court held that the exchange of information in commercial speech was important as inother types of speech [Pittsburgh Press Co. v. Pittsburgh Commission, 413 US 376 (1973)]. Modern casesprovide first amendment protection to commercial speech. Hate Speech, verbal abuse and violence directed at ethnic groups, homosexuals and religiousgroups has increased in recent years. Some college campuses have adopted speech codes prohibitingracist, sexist and homophobic speech [American Civil Liberties Union, Briefing Paper Number 16 - HateSpeech on Campus]. Medium of Speech Regulated Speech has been regulated differently depending on the medium overwhich the communication has been made. The printed medium has been found to enjoy the broadest freedom ofspeech protection. When radio and television cases arose the courts upheld the right of FCC regulationbased on the scarcity of broadcast channels and to provide for the needs of viewers and listeners ratherthan licensed broadcasters [FCC v. League of Women Voters, 468 US 364 (1984)]. For cable television somecourts have held that government has less ability to regulate program content than for broadcasttelevision [Cruz v. Ferre, 755 F. 2d 1415 (11th 1985)]. Different FCC regulations apply to thecommercial use of phone lines [Sable Communications v. FCC, 492 US 115 (1989)]. Congress has appliedmany regulations to satellite broadcasts that were at one time only applied to broadcast television. Satellite does not suffer from limited channels as broadcast television does s!o courts may permit less regulation of satellite broadcasts than traditional television. Finally it hasbeen held that a person may possess obscene material in their own homes [Stanley v. Georgia, 394 US 557(1969)], so while production or distribution of obscene material is not protected ownership is at somelevel. U.S. v Thomas, found California based system operators, who operated a bulletin board, guilty ofviolating Tennessee obscenity laws [US v. Thomas, Case No. 94-20019-G (WD Tn 1994)]. A Tennessee postalinspector joined Thomas’ system. He downloaded sexually oriented pictures, ordered a video tape andsent Thomas an unsolicited child-porn video. A Memphis jury found the California couple guilty. Hereprotected speech/activity legal in California was illegal in Tennessee. An argument can be made that thecommunity standard of Miller would allow a conservative community to force their standards on anotherstate for conduct performed in the more liberal state. An example of how Cyberspace can increase discourse of expression and ideas involved hate speech

messages on Prodigy. Some users denied Holocaust occurred and disparaged Jews. Other users were able torespond, disagree with and label as bigots the original group. In reviewing the incident the ElectronicFrontier Foundation (EFF) found that on balance bothsides were able to express their viewpoints. [Electronic Frontier Foundation, Letter to Office of PolicyAnalysis and Development NTIA, US Department of Commerce, by Shari Steel, staff attorney, 4-26-93]. Dueto the interactive nature of Cyberspace more people are able to express themselves. Unlike printed presswhere there are publishers and readers or television where there are broadcasters and viewers theInternet allows a far greater level of interaction. In Cubby, Inc. v CompuServe, CompuServe was found not to be liable for distributing the materialsof others [Cubby, Inc. v. Compuserve, Inc., 776 F Supp 135 (SDNY 1991)]. Like a real world distributorof books it would not be reasonable to expect CompuServe to review all messages and files passing throughtheir system. The major criticism involving free speech and Cyberspace relate to the media specific nature ofcurrent regulations [Robert Corn-Revere, "New Technology and the First Amendment: Breaking The Cycle ofRepression", 17 Hastings]. Each time a new technology has developed new criteria is established. When abreakthrough in technology first emerges there is no solid framework that developers, users, governmentor courts can look to for guidance. As a result what may be protected in print media is prohibited frombroadcast television. In Cyberspace a user or system operator can wear numerous hats. When acting as apublisher one is responsible for libel and defamation. If acting as a distributor of someone else’sproduct there will likely be no liability. [Cubby, Inc. v. Compuserve, Inc.776 F Supp 135 (SDNY 1991)]. Others point out that Cyberspace is unlike other communication media and therefore should not beregulated at all or should have a different standard [Anne Wells Branscomb, "Anonymity, Autonomy, andAccountability: Challenges to First Amendment in Cyberspace," 104 Yale Law Journal, 1639, 1995 ]. Current politics is attempting to draft legislation to either restrain or protect the Internet from theregulatory arm of the government. Robert Corn-Revere has described the inconsistent protection/ regulation through an exampleinvolving a regulator simultaneously viewing an identical sex scene on five televisions. One of thetelevisions is receiving its signal from a broadcast tv station, another from a cable television feed,another from a VCR, a fourth via satellite and the fifth via fiber opticphone lines. The paradox is that identical expression/content on the five sets may be subject to five ormore types of regulatory schemes and receive varying levels of free speech protection. The difference inregulation may be ascribed to the law reacting to new technologies in a manner to fit the level ofregulation to the developing technology. Revere describes three judicial approaches which may be used in determining what level of freespeech is afforded, incremental approach, revisionist and traditionalism. The incremental approachreflects current reality where different standards are applied to different media even though the speechcontent may be identical. This approach provides full free speech protection only to the printed media. A disadvantage is the lack of a framework that can be applied to new technologies, like Cyberspace. Therevisionist approach is based on balancing private and public interest to maximize the good for all. Likethe incremental approach, changes in technology outpace the regulators and a void develops whenever a newcommunication medium emerges. To fill the void regulators tend to attempt using regulations designed forother communication forms that may not work well. The traditional approach ignores the medium through which communication is transmitted andanalyzes the content of the message to test if it warrants free speech protection. Laurence Tribe hasreferred the constitution’s core values [Lawrence H. Tribe, "The Constitution in Cyberspace," preparedremarks, Keynote address at the First Conference on Computers & Privacy, (1991)]. The core values wouldbe universal beliefs and ideals that would not change with new technologies. Tribe put forth five principles that applied to Cyberspace issues. They would maintain the FirstAmendment’s vitality and ability to guarantee free speech. First the constitution limits what governmentmay do but advances in technology do not expand what government may do. Secondly private property isprivate and the government can not make private property public subject to the fifth amendment. The thirdprinciple is that government may not control the content of speech/information. Tribe submits thatwriting of computer viruses (information content which is speech) would be constitutionally protected. But the use of viruses tothe harm of others can be prosecuted like yelling fire in a theater where no fire exists. The fourthprinciple is that right and wrong do not change with technology. And the final principle is thatConstitution’s meaning should not vary as technology changes. The Constitution’s principles must beinterpreted in a dynamic way. One example provided was how the court in Olmstead held that wiretappingwas not a search invading a person’s right to privacy in the same way a physical search of a house wouldbe [Olmstead v. US, 389 US 351 (1967)]. In Katz, the Supreme Court repudiated the earlier decisionfinding that the fourth amendment protected people not places and that wiretapping was an invasion of aperson’s privacy [Katz v. US, 389 US 351 (1967)]. The traditionalist or core value approach provides a stable framework for determining whetherthere is a compelling governmental interest sufficient to warrant a restriction on free speech and if theregulation is narrowly tailored. Regardless of the medium of speech identical content would receive thesame level of protection. The traditionalist approach also provides aframework to apply to emerging technologies like Cyberspace and technologies unknown at present [RobertCorn-Revere, "New Technology and the First Amendment: Breaking the Cycle of Repression, 17 Hastings]. Existing free speech protection devices that regulate to a varying degree based on the medium ofcommunication rather than the content transmitted do not provide a suitable framework to protect speechin Cyberspace. A core-value approach to speech protection provides equal protection to identical speechcontent regardless of the medium through which the information is transmitted. A core-value approachtherefore provides a stable framework for addressing free speech issues in Cyberspace and technologiesyet to develop. In the words of the late Professor Meiklejohn, who has articulated a view of the first amendment whichassumes its justification to be political self-government, has wisely pointed out that, “what isessential is not that everyone shall speak, but that everything worth saying shall be said”–that thepoint of ultimate interest is not the words of the speaker but the minds of the hearers [A. Meiklejohn,Political Freedom: The Constitutional Powers of the People 25-28]. Can everything worth saying beeffectively said? Constitutional opinions that are particularly solicitous of the interest of massmedia–radio, television, and mass circulated newspaper– devote little thought to securing thedifficulties of access to those media The overwhelming public use of the Internet has forced a majorfocus on the public’s access to a mass medium. The Internet’s purpose of creating an opportunity forexpression has been as important as ensuring the right to express ideas without fear o!f governmental reprisal.




Не сдавайте скачаную работу преподавателю!
Данный реферат Вы можете использовать для подготовки курсовых проектов.

Поделись с друзьями, за репост + 100 мильонов к студенческой карме :

Пишем реферат самостоятельно:
! Как писать рефераты
Практические рекомендации по написанию студенческих рефератов.
! План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом.
! Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач.
! Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты.
! Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ.

Читайте также:
Виды рефератов Какими бывают рефераты по своему назначению и структуре.

Сейчас смотрят :

Реферат Банкротство предприятия механизм определения и пути преодоления на примере ООО Тольяттиquo
Реферат Резервы повышение экономической эффективности скотоводства СПК Рассохинский
Реферат Європейський інструмент сусідства та партнерства україна Стратегія єс щодо України на період 2007 – 2013 рр. Зміст
Реферат Сумісна діяльність психолога та логопеда при роботі з дітьми логопедичних груп
Реферат Лекции - Гистология (Печень)
Реферат Гигиена детей и подростков
Реферат Отчет по производственной практике (СУБД)
Реферат Теоретический анализ функционирования имен собственных в современном английском романе
Реферат Дивизиональная структура управления полномочия корпоративного центра и дивизионов
Реферат Личностные особенности больных гипертонической болезнью
Реферат Дикорастущие грибы Заготовки
Реферат Деятельность предприятия, оказывающего услуги противокоррозионной обработки автомобилей
Реферат Производство поливинилбутираля
Реферат Фоменко Анатолий Тимофеевич.
Реферат Зависимость интенсивности дыхания растительных продуктов от температуры