Children's Internet Protection Act (CIPA) Ruling. United States District Court for the Eastern District of Pennsylvania

Чтение книги онлайн.

Читать онлайн книгу Children's Internet Protection Act (CIPA) Ruling - United States District Court for the Eastern District of Pennsylvania страница 5

Children's Internet Protection Act (CIPA) Ruling - United States District Court for the Eastern District of Pennsylvania

Скачать книгу

for the first time of complaints about children being exposed to pornography that was displayed on the library's Internet terminals.

      In late January to early February of 2000, the library installed privacy screens and recessed terminals in an effort to restrict the display of sexually explicit Web sites at the library. In February, 2000, the Board informed the library staff that they were expected to be familiar with the South Carolina obscenity statute and to enforce the policy prohibition on access to obscene materials, child pornography, or other materials prohibited under applicable local, state, and federal laws. Staff were told that they were to enforce the policy by means of a "tap on the shoulder." Prior to adopting its current Internet Use Policy, the Board adopted an "Addendum to Current Internet Use Policy." Under the policy, the Board temporarily instituted a two-hour time limit per day for Internet use; reduced substantially the number of computers with Internet access in the library; reconfigured the location of the computers so that librarians had visual contact with all Internet-accessible terminals; and removed the privacy screens from terminals with Internet access. Even after the Board implemented the privacy screens and later the "tap-on-the-shoulder" policy combined with placing terminals in view of librarians, the library experienced a high turnover rate among reference librarians who worked in view of Internet terminals. Finding that the policies that it had tried did not prevent the viewing of sexually explicit materials in the library, the Board at one point considered discontinuing Internet access in the library. The Board finally concluded that the methods that it had used to regulate Internet use were not sufficient to stem the behavioral problems that it thought were linked to the availability of pornographic materials in the library. As a result, it implemented a mandatory filtering policy.

      We note, however, that none of the libraries proffered by the defendants presented any systematic records or quantitative comparison of the amount of criminal or otherwise inappropriate behavior that occurred in their libraries before they began using Internet filtering software compared to the amount that happened after they installed the software. The plaintiffs' witnesses also testified that because public libraries are public places, incidents involving inappropriate behavior in libraries (sexual and otherwise) existed long before libraries provided access to the Internet. 2. Methods for Regulating Internet Use The methods that public libraries use to regulate Internet use vary greatly. They can be organized into four categories: (1) channeling patrons' Internet use; (2) separating patrons so that they will not see what other patrons are viewing; (3) placing Internet terminals in public view and having librarians observe patrons to make sure that they are complying with the library's Internet use policy; and (4) using Internet filtering software. The first category channeling patrons' Internet use frequently includes offering training to patrons on how to use the Internet, including how to access the information that they want and to avoid the materials that they do not want. Another technique that some public libraries use to direct their patrons to pages that the libraries have determined to be accurate and valuable is to establish links to "recommended Web sites" from the public library's home page (i.e., the page that appears when patrons begin a session at one of the library's public Internet terminals). Librarians select these recommended Web sites by using criteria similar to those employed in traditional collection development. However, unless the library determines otherwise, selection of these specific sites does not preclude patrons from attempting to access other Internet Web sites.

      Libraries may extend the "recommended Web sites" method further by limiting patrons' access to only those Web sites that are reviewed and selected by the library's staff. For example, in 1996, the Westerville, Ohio Library offered Internet access to children through a service called the "Library Channel." This service was intended to be a means by which the library could organize the Internet in some fashion for presentation to patrons. Through the Library Channel, the computers in the children's section of the library were restricted to 2,000 to 3,000 sites selected by librarians. After three years, Westerville stopped using the Library Channel system because it overly constrained the children's ability to access materials on the Internet, and because the library experienced several technical problems with the system.

      Public libraries also use several different techniques to separate patrons during Internet sessions so that they will not see what other patrons are viewing. The simplest way to achieve this result is to position the library's public Internet terminals so that they are located away from traffic patterns in the library (and from other terminals), for example, by placing them so that they face a wall. This method is obviously constrained by libraries' space limitations and physical layout. Some libraries have also installed privacy screens on their public Internet terminals. These screens make a monitor appear blank unless the viewer is looking at it head-on. Although the Multnomah and Fort Vancouver Libraries submitted records showing that they have received few complaints regarding patrons' unwilling exposure to materials on the Internet, privacy screens do not always prevent library patrons or employees from inadvertently seeing the materials that another patron is viewing when passing directly behind a terminal. They also have the drawback of making it difficult for patrons to work together at a single terminal, or for librarians to assist patrons at terminals, because it is difficult for two people to stand side by side and view a screen at the same time. Some library patrons also find privacy screens to be a hindrance and have attempted to remove them in order to improve the brightness of the screen or to make the view better.

      Another method that libraries use to prevent patrons from seeing what other patrons are viewing on their terminals is the installation of "recessed monitors." Recessed monitors are computer screens that sit below the level of a desk top and are viewed from above. Although recessed monitors, especially when combined with privacy screens, eliminate almost all of the possibility of a patron accidentally viewing the contents on another patron's screen, they suffer from the same drawbacks as privacy screens, that is, they make it difficult for patrons to work together or with a librarian at a single terminal. Some librarians also testified that recessed monitors are costly, but did not indicate how expensive they are compared to privacy screens or filtering software. A related technique that some public libraries use is to create a separate children's Internet viewing area, where no adults except those accompanying children in their care may use the Internet terminals. This serves the objective of keeping children from inadvertently viewing materials appropriate only for adults that adults may be viewing on nearby terminals. A third set of techniques that public libraries have used to enforce their Internet use policies takes the opposite tack from the privacy screens/recessed monitors approach by placing all of the library's public Internet terminals in prominent and visible locations, such as near the library's reference desk. This approach allows librarians to enforce their library's Internet use policy by observing what patrons are viewing and employing the tap-on-the-shoulder policy. Under this approach, when patrons are viewing materials that are inconsistent with the library's policies, a library staff member approaches them and asks them to view something else, or may ask them to end their Internet session. A patron who does not comply with these requests, or who repeatedly views materials not permitted under the library's Internet use policy, may have his or her Internet or library privileges suspended or revoked. But many librarians are uncomfortable with approaching patrons who are viewing sexually explicit images, finding confrontation unpleasant. Hence some libraries are reluctant to apply the tap-on-the- shoulder policy.

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или

Скачать книгу