The Internet and the freedom of speech is a complex and controversial issue. It involves two contradictory terms: The
Internet control and censorship on the one hand and the freedom of speech on
the other.
People have been opposing to
any kind of censorship, whether on political or social issues, within borders
of a given country or globally for many years.
Before, the
governments muffled the public’s mouth and didn’t allow people to voice their
dissatisfaction of the governing authorities (as it was in e.g. Morocco under King Hassan II or under Stalinism in Poland or the Soviet Union). Freedom of speech has become an important weapon
against any national oppression and injustices. Thanks to it, many important social
changes could occur, though not always along with total acceptance of
grassroots as with the feminist movement or the gay rights movement. Before winning the privilege of freedom of speech, all the opposition
was brutally cracked down. Yet different groups kept sacrificing and didn’t give up but
continuedthe fight for their freedoms, like the civil rights activist, Martin Luther King did.
After all
these turbulent years and all the sacrifice, we have entered a new era of social and
political challenges, an era of cyber dominance with all its goodies and
threats. Will the Internet and its users fall victim to the cyber dictatorship
that will deprive us of all the rights we have already been granted?
The line
between the freedom of speech and a breach of law is very thin. But what is
meant with a breach of law depends on who establishes the law and its limits.
There are no unified laws and regulations
protecting users. EU policy differs vastly from the US one: the EU Community raises a question about data protection and the US focuses debate on PRIVACY.
A number of websites either sell or just give
freely your personal information such as your full name, address, marital
status, phone number and other information (DOB, your financial standing,
Social Security Number and so on). Your data are collected from publicly-available
sources (court records, marriage and birth certificates, voting records etc.). Any
site you visit can tell who your provider is, where it is located, what you do
while you are there and what software you are using.
Many sites want you to register in order to use their services. You may
be asked to give your real name, and e-mail address, your physical address,
your telephone number, your income level, your interests, etc. This can be
valuable information for someone unwanted.
Beware of cookies!
Often the sites we have visited and
registered onremember us as a visitor. How come? Well, they have planted a cookieon our system with
information about us. When we connected, our cookie files were checked to
see if we were a registered user, andif we had elected to store our
username and password in the cookie. Cookies may or may not be encrypted. There
is another type of cookie that keeps track of logins. It remains in our RAM while
we stay connected. But here we have an option: not to give access to cookies in our
browsers. If we do so, we will just have to retype the username and password
every time we log in to the same website. Well, not a big deal after all!
Here’s another cookie-deuce: in some cases
cookies may be generated by another site, not the one we have entered. It can
be for instance some advertising agency providing services for a number of other
web sites.
Cookies make it easier for us to get
around but let's think twice if we really want to have them.
Be careful what you send and write in
e-mail messages!
Remember a
hotmail scandal when someone hacked into hotmail accounts?
For
a hacker it is easy to get our account details, password and user name, or to set
up so called "sniffer" software to monitor e-mails we send or
e-mails containing our name, for instance. Sniffers enable the third party even
to see exactly what we are doing on the computer in a given moment. Planting
spywares is common for advertizing companies. When we buy some software or
game and install it on our computers, we let this unwanted guest enter
our systems without even being aware of the fact.
Because of all this there are lots of dangers lurking
for us, average netizens. To name
a fewwe can fall victims of stalking, hacking oridentity theft, our name can get on spam
mailings.
All online activities should be carried out via
anonymizers.
E-mails and web browsing should be encrypted and
we should beware of what information we give, where and to whom!
Another Cyber Hacking Victim
The issue of privacy and control of
individuals has reached an unexpected dimension. The Internet, on the one hand,
is a powerful tool to spread information and on the other, to control or steal
it. Average cybercitizen is unaware of all the dangers lurking out there in the
cyber space, unaware of constant surveillance and unaware that there is no
possibility to hide or escape.
Intellectual Property
We have two
categories of IP:
Industrial property (trademarks, patents); Copyright (literary, musical and
artistic works: films, paintings,
sculptures, drawings and architectural designs, art performances, even radio and
television programs).
The right to intellectual property protects the owner from others making copies
of his work without authorization.
Intellectual theft
Within the legislature we can name:
the right to control
the act of reproduction, e.g. the reproduction of books by a publisher, the
manufacture of records by a record producer; the right to
authorize distribution of copies of works; the right to
authorize rental of copies.
In the era of technology it is very easy to
download and copy films, music and other types of works via free programs available
on the Internet.
Mind you!
There are few exceptions where we can freely use parts of others' works without any authorization, such as:
using illustrationsfor
teaching purposes, using works for news
reporting, using quotations from
protected works but with the author’s name given.
Strict regulations and their execution could
protect many from intellectual theft, unfair competition, plagiarism or brand piracy whether just online or in real life.
Intellectual Property Rights on the Internet
We need to be very careful of what kind of
stuff AVAILABLE on the Net we use and to which purposes. We often forget about
intellectual rights of the authors that (pieces of) works we “borrow” just because
everything seems to be so easily AVAILABLE on the Internet. It’s usually not
the authors themselves who have given away their works to the wide cyber audience.