SlideShare a Scribd company logo
Internet Governance, Surveillance, and Social Controls Reform the Social Structure First before looking at internet censorship. Mr.  Gener Luis Morada National Advocacy Coordinator I-Café Pilipinas
I-Café Pilipinas Challenging the Internet Cafes in the Philippines to do Better Social Advocacy Network Composed of the Internet Café Owners, operators and associations around the country It strives to become their voice on a national level to represent their interest on issues pertaining to efficient operation of their business.
Was not surprised when I received your invitation since early this year, I was told that  there are initiatives related to the governing the internet will be pushed. Child Anti Pornography Bill is now at the Bicameral level and if all things will push through it is expected that it will be a law by December
Countries that are trying to implement internet filtering program Australia, Canada, China, Denmark, European Union, France. Germany, Malaysia ,New Zealand, Norway, Saudi Arabia, Singapore, South Korea, Sweden,U.K.and U.S.A.  As at March 2002, government policies concerning censorship of the Internet may be broadly grouped into four categories:  a) Government policy to encourage Internet industry self-regulation and end-user voluntary use of filtering/blocking technologies.
b) Criminal law penalties (fines or jail terms) applicable to content providers who make content "unsuitable for minors" available online.  c) Government mandated blocking of access to content deemed unsuitable for adults.  d) Government prohibition of public access to the Internet.
Philippine Model of Internet Censorship With the passage of the Child Anti Pornography Law the Philippines would be adopting Government mandated blocking of access to content deemed unsuitable for adults.  If you would study both bills the centerpiece program is based on the mandatory installation of blocking software on the ISP Level down to the users.
The Stand of I-Café Pilipinas Is not against the passage of the Anti-Child Pornography Bill since it is for the welfare of the Filipino Children It is regrettable that we learned about this bill in its final stages since it is now too late to air our concern about its effective implementation.
Initiatives at the Internet Café Level Internet Café owners and operators are mandated by local ordinances to prohibit access to pornographic materials that could be found in the internet We are mandated to post signs telling our customers that “Access to Pornographic Materials is not Allowed” Internet Café owners use open DNS as a blocking tool against pornographic sites
And Despite these Initiatives  House OKs bill against child pornography  Philippine Daily InquirerFirst Posted 08:44:00 08/26/2009Filed Under: Children, Legislation, Pornography MANILA, Philippines—The House of Representatives delivered what could be the strongest warning yet to child pornographers, pedophiles, cyber-sex den and unscrupulous Internet café operators by unanimously approving on third reading on Monday the Anti-Child Pornography Bill.
House approves anti-child porn billBy DelonPorcalla (The Philippine Star) Updated August 26, 2009 12:00 AM  MANILA, Philippines - The House of Representatives, in a unanimous vote, approved yesterday on third and final reading the anti-child pornography bill that will prosecute and penalize pedophiles, pornographers, and operators of cyber-sex dens and Internet cafés who prey on children.
Our Concern The Proposed Child Pornography Law would be the starting point of government to regulate content found in the internet. Someday articles and blogs that are critical to the government will be censured thus denying the people of access to information.
18 January 2002, Associated Press reported that:  "China has issued its most intrusive Internet controls to date, ordering service providers to screen private e-mail for political content and holding them responsible for subversive postings on their Web sites. ... Under the new rules, general portal sites must install security programs to screen and copy all e-mail messages sent or received by users. Those containing 'sensitive materials' must be turned over to authorities.  Providers are also responsible for erasing all prohibited content posted on their Web sites, including online chatrooms and bulletin board
The Philippines does not have the right social infrastructure to implement such provision of  installation of blocking software. We do have many laws that was passed by congress to protect children and women against abuse. REPUBLIC ACT NO. 9208 Law against Trafficking of Women and Children PRESIDENTIAL DECREE NO. 603  Child Welfare Law Republic Act No. 7610   Child Abuse Law REPUBLIC ACT NO. 9239 -  Optical Media Law
Question: How far was the Pirated DVD Store selling  pornographic materials from the Police Station? Senior Police Inspector Aileen Recla shows off a confiscated copy of alleged sex video of actress Katrina Halili and Dr. Hayden Kho during a police raid yesterday on stalls selling pirated DVDs along Colon Street.
In other countries the is a single government agency that is in charge of implementing internet blocking programs. In the Philippines, we don’t have a single government agency that is in charge of the ICT programs in the country. CICT is not yet a government line agency it is just a commission that is why other government agency has ICT programs of their own.
Who will be in Charge to implement the mandatory Installation of blocking software According to the Law ISP Level – National Telecommunication Commission  CELL LOADS:  NTC  TO  REGULATE  UNWANTED  TEXTS  MANILA, October 24, 2005 (STAR) By JasminUy - Mobile phone subscribers may no longer have to worry about their rapidly diminishing cellphone load credits due to unwanted promotional text messages sent by their networks. This, after the National Telecommunications Commission (NTC) announced that it is regulating "text spam" due to complaints.
End users like businesses and internet cafes  Local Government Units What would prevent them from imposing preferred software filtering products? LTO Early Warning Device Program Business Third Party Insurance Program
Summation The Implementation of an Internet  filtering program in the Philippines would be open to abuse due to the absence of a strong centralized government agency that would handle the ICT Programs and formulate the ICT Related Polices. The line of authority as to who would be responsible is not clearly defined.
It is open to abuse and the Philippines government does not really have a very good image when it comes to respecting the rights of its citizenry. We need to pass the law making the CICT as a line agency that would handle all ICT related policies in order to give it the moral authority to manage ICT related policies in the Philippines
Standardized ICT educational standards the would reflect the present realities and empower the people to make an educated choice with regards to internet content. Empowerment to the People through ICT   Internet Censorship

More Related Content

What's hot

The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Cellular Antennas on Special District Property: The Opportunity and the Risk
Cellular Antennas on Special District Property: The Opportunity and the RiskCellular Antennas on Special District Property: The Opportunity and the Risk
Cellular Antennas on Special District Property: The Opportunity and the Risk
Best Best and Krieger LLP
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32
KLIBEL
 
FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013
Best Best and Krieger LLP
 
communication decency act
communication decency actcommunication decency act
communication decency actAditya Kumar
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schoolsadawidziuk
 
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
Best Best and Krieger LLP
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
Shahzaib Mahesar
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
Internet Law Center
 
Navigating the Internet Protocol Transition
Navigating the Internet Protocol TransitionNavigating the Internet Protocol Transition
Navigating the Internet Protocol Transition
Best Best and Krieger LLP
 
What Issues are Building and How Do They Affect Local Governments
What Issues are Building and How Do They Affect Local GovernmentsWhat Issues are Building and How Do They Affect Local Governments
What Issues are Building and How Do They Affect Local Governments
Best Best and Krieger LLP
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
Benedict Ishabakaki
 
Policy Implications of the Digital Economy
Policy Implications of the Digital EconomyPolicy Implications of the Digital Economy
Policy Implications of the Digital Economy
Competitive Enterprise Institute
 
Mega-Mergers and Impacts on Local Government
Mega-Mergers and Impacts on Local GovernmentMega-Mergers and Impacts on Local Government
Mega-Mergers and Impacts on Local Government
Best Best and Krieger LLP
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
Bennet Kelley
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
MohsinMughal28
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
Internet Law Center
 

What's hot (20)

The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
 
Cellular Antennas on Special District Property: The Opportunity and the Risk
Cellular Antennas on Special District Property: The Opportunity and the RiskCellular Antennas on Special District Property: The Opportunity and the Risk
Cellular Antennas on Special District Property: The Opportunity and the Risk
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013FCC Wireless Rulemaking - 2013
FCC Wireless Rulemaking - 2013
 
communication decency act
communication decency actcommunication decency act
communication decency act
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schools
 
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
The Wheeler Federal Communications Commission - 2014 Outlook on Congress and ...
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Navigating the Internet Protocol Transition
Navigating the Internet Protocol TransitionNavigating the Internet Protocol Transition
Navigating the Internet Protocol Transition
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
What Issues are Building and How Do They Affect Local Governments
What Issues are Building and How Do They Affect Local GovernmentsWhat Issues are Building and How Do They Affect Local Governments
What Issues are Building and How Do They Affect Local Governments
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Policy Implications of the Digital Economy
Policy Implications of the Digital EconomyPolicy Implications of the Digital Economy
Policy Implications of the Digital Economy
 
Mega-Mergers and Impacts on Local Government
Mega-Mergers and Impacts on Local GovernmentMega-Mergers and Impacts on Local Government
Mega-Mergers and Impacts on Local Government
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 

Viewers also liked

Ra.9262 â violence against women and their children
Ra.9262 â   violence against women and their childrenRa.9262 â   violence against women and their children
Ra.9262 â violence against women and their children
Gerald Anthony Lazaro
 
Republic act 9262
Republic act 9262Republic act 9262
Republic act 9262
Rhoda Estinopo
 
Physical Issues in Society: Suicide, Domestic Violence and Crime
Physical Issues in Society: Suicide, Domestic Violence and Crime Physical Issues in Society: Suicide, Domestic Violence and Crime
Physical Issues in Society: Suicide, Domestic Violence and Crime
Joy Camille Faustino
 
The rights of women and their children
The rights of women and their childrenThe rights of women and their children
The rights of women and their children
Thomas John Thaddeus de Castro
 
Child sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpitChild sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpit
Judith Albano
 
Child trafficking
Child traffickingChild trafficking
Child trafficking
ekata karki
 
Child Trafficking
Child TraffickingChild Trafficking
Child TraffickingNMirpuri
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)
F Mad
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004Sharon Geroquia
 
Child protection policy
Child protection policyChild protection policy
Child protection policy
Ayie Paghangaan
 
Human Trafficking Presentation
Human Trafficking PresentationHuman Trafficking Presentation
Human Trafficking Presentation
HumanTrafficking
 
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
Justice Emilio Angeles Gancayco Memorial High School SHS
 
Domestic Violence Presentation
Domestic Violence PresentationDomestic Violence Presentation
Domestic Violence Presentationkarlagee
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protectionGrace Fabrero
 

Viewers also liked (20)

Ra.9262 â violence against women and their children
Ra.9262 â   violence against women and their childrenRa.9262 â   violence against women and their children
Ra.9262 â violence against women and their children
 
Republic act 9262
Republic act 9262Republic act 9262
Republic act 9262
 
Child and the law
Child and the lawChild and the law
Child and the law
 
Physical Issues in Society: Suicide, Domestic Violence and Crime
Physical Issues in Society: Suicide, Domestic Violence and Crime Physical Issues in Society: Suicide, Domestic Violence and Crime
Physical Issues in Society: Suicide, Domestic Violence and Crime
 
The rights of women and their children
The rights of women and their childrenThe rights of women and their children
The rights of women and their children
 
Child sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpitChild sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpit
 
Child trafficking
Child traffickingChild trafficking
Child trafficking
 
Child Trafficking
Child TraffickingChild Trafficking
Child Trafficking
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
 
Child protection policy
Child protection policyChild protection policy
Child protection policy
 
Human Trafficking Presentation
Human Trafficking PresentationHuman Trafficking Presentation
Human Trafficking Presentation
 
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
Special Protection Against Child Abuse, Exploitation and Discrimination Act (...
 
Child abuse 2012
Child abuse 2012Child abuse 2012
Child abuse 2012
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Child abuse
Child abuseChild abuse
Child abuse
 
Domestic Violence Presentation
Domestic Violence PresentationDomestic Violence Presentation
Domestic Violence Presentation
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protection
 

Similar to Internet Governance, Surveillance, And Social Controls

CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carrsegughana
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Daniel Asher
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
Daniel Asher
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Winthrop Yu
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)
Eunice Alamag
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
Krishna De
 
Mobile Alliance flyer
Mobile Alliance flyerMobile Alliance flyer
Mobile Alliance flyerMercy Ndegwa
 
Health q 2 l-3
Health q 2 l-3Health q 2 l-3
Health q 2 l-3
melody_23
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
fiza209
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
RomanoGabrillo1
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
CollinsKimathi
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Arazim Sheu
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
VincentAcapen
 
Position paper on drafting of irr for ra 9775
Position paper on drafting of irr for ra 9775Position paper on drafting of irr for ra 9775
Position paper on drafting of irr for ra 9775I-Café Pilipinas
 
Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775
I-Café Pilipinas
 
Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775
I-Café Pilipinas
 

Similar to Internet Governance, Surveillance, And Social Controls (20)

CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
Mobile Alliance flyer
Mobile Alliance flyerMobile Alliance flyer
Mobile Alliance flyer
 
Health q 2 l-3
Health q 2 l-3Health q 2 l-3
Health q 2 l-3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Blogging & Law
Blogging & LawBlogging & Law
Blogging & Law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
 
Position paper on drafting of irr for ra 9775
Position paper on drafting of irr for ra 9775Position paper on drafting of irr for ra 9775
Position paper on drafting of irr for ra 9775
 
Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775
 
Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775Position Paper On Drafting Of Irr For Ra 9775
Position Paper On Drafting Of Irr For Ra 9775
 

More from Gener Luis Morada

Money management towards a prolific college life
Money management towards a prolific college lifeMoney management towards a prolific college life
Money management towards a prolific college life
Gener Luis Morada
 
How to set up an internet café
How to set up an internet caféHow to set up an internet café
How to set up an internet café
Gener Luis Morada
 
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013Gener Luis Morada
 
Pilipinas I-Cafe Marketing Cooperative Membership
Pilipinas I-Cafe Marketing Cooperative MembershipPilipinas I-Cafe Marketing Cooperative Membership
Pilipinas I-Cafe Marketing Cooperative MembershipGener Luis Morada
 
Pilipinas i cafe marketing cooperative company profile
Pilipinas i cafe marketing cooperative company profilePilipinas i cafe marketing cooperative company profile
Pilipinas i cafe marketing cooperative company profileGener Luis Morada
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesGener Luis Morada
 
Reaching out to more people through Icafes
Reaching out to more people through IcafesReaching out to more people through Icafes
Reaching out to more people through Icafes
Gener Luis Morada
 
G.ho.st
G.ho.stG.ho.st
G.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless OfficeG.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless OfficeGener Luis Morada
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systemsGener Luis Morada
 
ICT Training Municipality of Imus
ICT Training Municipality of ImusICT Training Municipality of Imus
ICT Training Municipality of ImusGener Luis Morada
 
internet cafe finishing module
internet cafe finishing moduleinternet cafe finishing module
internet cafe finishing moduleGener Luis Morada
 

More from Gener Luis Morada (20)

Money management towards a prolific college life
Money management towards a prolific college lifeMoney management towards a prolific college life
Money management towards a prolific college life
 
How to set up an internet café
How to set up an internet caféHow to set up an internet café
How to set up an internet café
 
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
FOSS Appreciation Course Philippine Trade Training Center May 8, 2013
 
Pilipinas I-Cafe Marketing Cooperative Membership
Pilipinas I-Cafe Marketing Cooperative MembershipPilipinas I-Cafe Marketing Cooperative Membership
Pilipinas I-Cafe Marketing Cooperative Membership
 
Training proper
Training properTraining proper
Training proper
 
Impress training
Impress trainingImpress training
Impress training
 
Pilipinas i cafe marketing cooperative company profile
Pilipinas i cafe marketing cooperative company profilePilipinas i cafe marketing cooperative company profile
Pilipinas i cafe marketing cooperative company profile
 
Basic pc trouble shooting
Basic pc trouble shootingBasic pc trouble shooting
Basic pc trouble shooting
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Course outline
Course outlineCourse outline
Course outline
 
Business Module
Business ModuleBusiness Module
Business Module
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business Philippines
 
Reaching out to more people through Icafes
Reaching out to more people through IcafesReaching out to more people through Icafes
Reaching out to more people through Icafes
 
G.ho.st
G.ho.stG.ho.st
G.ho.st
 
G.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless OfficeG.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless Office
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systems
 
Now What?
Now What?Now What?
Now What?
 
Engaging in ICT
Engaging in ICTEngaging in ICT
Engaging in ICT
 
ICT Training Municipality of Imus
ICT Training Municipality of ImusICT Training Municipality of Imus
ICT Training Municipality of Imus
 
internet cafe finishing module
internet cafe finishing moduleinternet cafe finishing module
internet cafe finishing module
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Internet Governance, Surveillance, And Social Controls

  • 1. Internet Governance, Surveillance, and Social Controls Reform the Social Structure First before looking at internet censorship. Mr. Gener Luis Morada National Advocacy Coordinator I-Café Pilipinas
  • 2. I-Café Pilipinas Challenging the Internet Cafes in the Philippines to do Better Social Advocacy Network Composed of the Internet Café Owners, operators and associations around the country It strives to become their voice on a national level to represent their interest on issues pertaining to efficient operation of their business.
  • 3. Was not surprised when I received your invitation since early this year, I was told that there are initiatives related to the governing the internet will be pushed. Child Anti Pornography Bill is now at the Bicameral level and if all things will push through it is expected that it will be a law by December
  • 4. Countries that are trying to implement internet filtering program Australia, Canada, China, Denmark, European Union, France. Germany, Malaysia ,New Zealand, Norway, Saudi Arabia, Singapore, South Korea, Sweden,U.K.and U.S.A. As at March 2002, government policies concerning censorship of the Internet may be broadly grouped into four categories: a) Government policy to encourage Internet industry self-regulation and end-user voluntary use of filtering/blocking technologies.
  • 5. b) Criminal law penalties (fines or jail terms) applicable to content providers who make content "unsuitable for minors" available online. c) Government mandated blocking of access to content deemed unsuitable for adults. d) Government prohibition of public access to the Internet.
  • 6. Philippine Model of Internet Censorship With the passage of the Child Anti Pornography Law the Philippines would be adopting Government mandated blocking of access to content deemed unsuitable for adults. If you would study both bills the centerpiece program is based on the mandatory installation of blocking software on the ISP Level down to the users.
  • 7. The Stand of I-Café Pilipinas Is not against the passage of the Anti-Child Pornography Bill since it is for the welfare of the Filipino Children It is regrettable that we learned about this bill in its final stages since it is now too late to air our concern about its effective implementation.
  • 8. Initiatives at the Internet Café Level Internet Café owners and operators are mandated by local ordinances to prohibit access to pornographic materials that could be found in the internet We are mandated to post signs telling our customers that “Access to Pornographic Materials is not Allowed” Internet Café owners use open DNS as a blocking tool against pornographic sites
  • 9. And Despite these Initiatives House OKs bill against child pornography Philippine Daily InquirerFirst Posted 08:44:00 08/26/2009Filed Under: Children, Legislation, Pornography MANILA, Philippines—The House of Representatives delivered what could be the strongest warning yet to child pornographers, pedophiles, cyber-sex den and unscrupulous Internet café operators by unanimously approving on third reading on Monday the Anti-Child Pornography Bill.
  • 10. House approves anti-child porn billBy DelonPorcalla (The Philippine Star) Updated August 26, 2009 12:00 AM MANILA, Philippines - The House of Representatives, in a unanimous vote, approved yesterday on third and final reading the anti-child pornography bill that will prosecute and penalize pedophiles, pornographers, and operators of cyber-sex dens and Internet cafés who prey on children.
  • 11. Our Concern The Proposed Child Pornography Law would be the starting point of government to regulate content found in the internet. Someday articles and blogs that are critical to the government will be censured thus denying the people of access to information.
  • 12. 18 January 2002, Associated Press reported that: "China has issued its most intrusive Internet controls to date, ordering service providers to screen private e-mail for political content and holding them responsible for subversive postings on their Web sites. ... Under the new rules, general portal sites must install security programs to screen and copy all e-mail messages sent or received by users. Those containing 'sensitive materials' must be turned over to authorities. Providers are also responsible for erasing all prohibited content posted on their Web sites, including online chatrooms and bulletin board
  • 13. The Philippines does not have the right social infrastructure to implement such provision of installation of blocking software. We do have many laws that was passed by congress to protect children and women against abuse. REPUBLIC ACT NO. 9208 Law against Trafficking of Women and Children PRESIDENTIAL DECREE NO. 603 Child Welfare Law Republic Act No. 7610   Child Abuse Law REPUBLIC ACT NO. 9239 - Optical Media Law
  • 14. Question: How far was the Pirated DVD Store selling pornographic materials from the Police Station? Senior Police Inspector Aileen Recla shows off a confiscated copy of alleged sex video of actress Katrina Halili and Dr. Hayden Kho during a police raid yesterday on stalls selling pirated DVDs along Colon Street.
  • 15. In other countries the is a single government agency that is in charge of implementing internet blocking programs. In the Philippines, we don’t have a single government agency that is in charge of the ICT programs in the country. CICT is not yet a government line agency it is just a commission that is why other government agency has ICT programs of their own.
  • 16. Who will be in Charge to implement the mandatory Installation of blocking software According to the Law ISP Level – National Telecommunication Commission CELL LOADS:  NTC  TO  REGULATE  UNWANTED  TEXTS  MANILA, October 24, 2005 (STAR) By JasminUy - Mobile phone subscribers may no longer have to worry about their rapidly diminishing cellphone load credits due to unwanted promotional text messages sent by their networks. This, after the National Telecommunications Commission (NTC) announced that it is regulating "text spam" due to complaints.
  • 17. End users like businesses and internet cafes Local Government Units What would prevent them from imposing preferred software filtering products? LTO Early Warning Device Program Business Third Party Insurance Program
  • 18. Summation The Implementation of an Internet filtering program in the Philippines would be open to abuse due to the absence of a strong centralized government agency that would handle the ICT Programs and formulate the ICT Related Polices. The line of authority as to who would be responsible is not clearly defined.
  • 19. It is open to abuse and the Philippines government does not really have a very good image when it comes to respecting the rights of its citizenry. We need to pass the law making the CICT as a line agency that would handle all ICT related policies in order to give it the moral authority to manage ICT related policies in the Philippines
  • 20. Standardized ICT educational standards the would reflect the present realities and empower the people to make an educated choice with regards to internet content. Empowerment to the People through ICT Internet Censorship