Computer Laws

Running head: COMPUTER LAWS
Computer Laws
Computer Laws
Computer laws usually exist in the form of drafts for the sole reason of covering the
various types of the differentiated computer crimes which get perpetrated. Therefore, computer
experts are obliged to unleash the exploitable technological voids subject to legal breach.
Meanwhile, existing laws, as well as the newly formulated laws, always get considered handy in
charging individuals bound to computer crimes. One of the stringent computer laws created
initially as a sound approach to combat computer crimes is the CIPA law, an Act dealing with
protecting children who get to access the internet.
CIPA, that is, the Children’s Internet Protection Act had to face legal creation to ensure
that schools, as well as libraries, filter most of the malicious electronic content which children
may intercept. CIPA’s objectives pay strict attention hence giving assurance that minors would
not get exposed directly to indecent online information. The guidelines by CIPA require all
schools as well as libraries to consider its operative cannons (Easttom & Taylor, 2010). Such an
approach would then act as a conduit which enables learning institutions to acquire discounts,
especially from the E-rate programs. The merit bound to such codes is that libraries and schools
receive markdown purchases relating to internet services as well as computing systems. Schools
and libraries are legally obliged to patronize the lucrative benefits attached to the CIPA program.
Meanwhile, the enacted safety internet policy, along with measures concerning technology
protection overly ensures the blockage of malicious content.
According to CIPA, minors require an appropriate formal education which considers
online etiquette and cyberbullying awareness. Besides, intermingling amicably within most of
the social platforms is an online priority. Therefore, through CIPA’s considerations, proofs
bound to adverse reactions sometimes point fingers on how the legal system may overly become
harmful. Initially, several reports indicated how the particular features which get to block some
of the harmful content might particularly lead to extensive damages other that fostering
positivism (Easttom & Taylor, 2010). Filters usually under-block or even over-block some
content deemed significant. Again, through research, CIPA got indicated as a channel which
disproportionately influenced students already disadvantaged technologically. Students with a
monopoly over filters while accessing the World Wide Web do have some merits as compared to
those who get to access the filtered internet at school. Content filtering is overly significant in
influencing students’ learning.
Individuals discovered to have violated the legal considerations as prescribed may easily
lose funding subject to the E-rate (Carvin, A., 2000). They could also get forced to repay some of
the discount allotted towards them. According to one of the critical case laws, petitions had to get
filed regarding computer laws. The Commission by the Federal Communications, with Verizon
New Jersey and the Integrated Corp of Verizon Network had a similar petition regarding
computer laws. In Denville, the Morris Catholic School as well as the Queen of Peace School,
situated in North Arlington had obtained a discounted access to the internet via a program called
the E-rate. The noted schools had claimed about their adherence to the CIPA codes. Morrison
Catholic School, having been found not compliant with the CIPA cannons, the school was
obliged to reverse amounts over five hundred dollars which they got reimbursed initially. CIPA
had discovered that the Morrison Catholic School had violated its compliance and therefore, the
school had to repay the damages.
Legal Effectiveness
Children require protection from illicit content. Meanwhile, CIPA, being an institution,
CIPA received the view of having a negative influence. According to CIPA, it is not a
requirement for libraries to block specific sites because of their non-academic related content
which they offer (Oder, N., 2003). Some libraries do not hinder its users from accessing online
information containing general nonacademic materials hence allowing the need to obtain an
insightful form of knowledge which may not get considered scholarly. Sometimes, the laws can
get misinterpreted as it receives the view where censorship is final hence making some of the
contents which should not get blocked to become blocked. Such an approach creates appropriate
guidelines which need attention from CIPA.
Law Ratification
Changing the blocked type of content as per CIPA’s compliance might ultimately unveil
information to minor scholars who entirely rely on the school’s resources to finalize research,
projects as well as other educational programs. The blocking of more electronic content leads to
the final lock of the already set filters. Users then become more restricted. Such similar
restrictions also apply to the minimal content which the concerned institutions intercept
electronically. Therefore, implementing a suitable way which explicitly puts a blockade on most
of the malicious sites is the way to go. Meanwhile, CIPA revealed clearly about its intention
bound to targeting images for blocking. However, the filters imposed could block entire useful
words and suitable sites. The law amendment against blockading anything apart from what
should get filtered does not comply with the concerned legal considerations. Laws by CIPA
usually adhere legally with what needs to get screened hence minimizing any form of non-
compliance. Because of such initiated considerations, students get to acquire all the necessary as
well as the required content.
One of the extreme difficulties straining CIPA concerns most schools which get to filter
useful electronic content. It is explicitly tricky to sieve specific materials. Filters, according to
their nature, cannot sort content as required by the internet moderators; valuable content from the
internet gets blocked instead (Oder, N., 2003). Therefore, making a sound distinction is a
pertinent concern which filters cannot consider overly. Filters usually operate under the influence
of a generalized form of instructions to block electronic materials as instructed.
Meanwhile, from one of its initial court trials, CIPA had to face legal wrath for not being
procedural; the body had created a legal void. Hence, during the noted hearing, the American
Library Association, that is, ALA filed a petition against CIPA. ALA defended its essential body
through legal means by claiming that the internet should not get utilized as a tool bound to
filtering scholarly works. Internet became branded a public forum. However, the Supreme Court
had mixed reactions (Library Research Service, 2014). The court gave sound approaches on how
to moderate electronic content, a fact which CIPA could not consider. Therefore, it would have
been overly significant to note the malicious online materials for filtration.
Laws exist purposefully. Hence, the consideration of CIPA’s regulatory guidelines
focuses on protecting schools and children from intercepting harmful content while surfing
online. Besides, the discounts which benefit learning institution, as well as libraries due to its
massive benefits flowing from the E-rate, require schools under its umbrella to adhere to CIPA’s
regulatory cannons. Overly, CIPA typically gives focus on the electronic content accessed by
minors. However, CIPA usually faces persistent challenges while enforcing its guidelines. Some
of the difficulties are sometimes challenging to address.
Carvin, A. (2000). The E-Rate in America: A Tale of Four Cities.
Easttom, C., & Taylor, J. (2010). Computer crime, investigation, and the law. Boston, MA:
Course Technology, a part of Cengage Learning.
Library Research Service (November 5, 2014). ALA report on the impact of CIPA discovers that
the filtration of software influences students negatively. Retrieved on January 25, 2018
Oder, N. (2003). Supreme Court justices appear highly divided in CIPA case. Library
Journal, 128(6), 16-16.

Place new order. It's free, fast and safe

550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.