lure (someone) into a relationship by means of a fictional online personaSynonyms - catfishing
The Children’s Internet Protection Act (CIPA) of 2000 requires public schools and libraries receiving federal e-rate funds to use a portion of those funds to filter their internet access. They must filter out obscenity on library computer terminals used by adults and both obscenity and harmful-to-minors materials on terminals used by minor children. CIPA was upheld by the u.s. supreme court as constitutional in June 2003.Synonyms - The Children’s Internet Protection Act
|Communications Decency Act of 1996||
This was a part of the Telecommunications Act of 1996. It was the U.S. Congress' first attempt to protect children on the Internet from pornography. The act prohibited knowingly sending or displaying “indecent” material to minors through the computer, defined as: “any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms of patently offensive as measured by contemporary community standards, sexual or excretory activities or organs.”Synonyms - CDA
The ACLU immediately challenged the act with a law suit and was blocked by a lower court. A year later the U.S. Supreme Court struck down the indecency provisions in the historical case of Reno v. ACLU (1997). The Supreme Court held that a law that places a “burden on adult speech is unacceptable if less restrictive alternatives would be at least as effective in achieving” the same goal. The court did, however, reaffirmed the application of obscenity and child pornography laws in cyberspace—an important victory for the protection of children online.
When someone's being calm and drama free . (I.e. not ausing social drama drama or acting crazy)
The Child Online Protection Act (COPA) of 1998 was an effort by the U.S. Congress to modify the CDA in response to the Supreme Court’s decision in Reno v. ACLU. The law sought to make it a crime for commercial websites to make pornographic material that is “harmful to minors” available to juveniles. The purpose of COPA was to protect children from instant access to pornographic “teaser images” on porn syndicate web pages, by requiring pornographers to take credit card numbers, adult verification numbers, or access codes to restrict children’s access to pornographic material and to allow access to this material for consenting adults only. Despite the critical need for measures to protect children from accessing harmful materials, the law was immediately challenged and blocked by lower courts, and has become the subject of an epic legal battle, still raging today. The permanent injunction against the enforcement of COPA remains in effect today. The government has not announced whether it will appeal the case to the U.S. Supreme Court for a third time.Synonyms - Child Online Protection Act
The Children’s Online Privacy Protection Act of 1998, which went into effect in April 2000, requires websites that market to children under the age of 13 to get “verifiable parental consent” before allowing children access to their sites. The Federal Trade commission (FTC), which is responsible for enforcing COPPA, adopted a sliding scale approach to obtaining parental consent. The sliding scale approach allows website operators to use a mix of methods to comply with the law, including print-and-fax forms, follow-up phone calls and e-mails, and credit card authorizations.Synonyms - Children’s Online Privacy Protection Act
is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.
Is copyright infringement a federal crime?
the words "hacking" and "hacker" in mainstream parlance have come to subsume the words "cracking" and "cracker," and that's misleading. Hackers are tinkerers; they're not necessarily bad guys. Crackers are malicious.
Willful and repeated harm inflicted through the use of computers,
cell phones, and other electronic devices.
Any Internet-related illegal activity.
the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.