Thursday, December 25, 2008

States Aim To Protect Kids From Spam; Michigan and Utah are creating registries of e-mail addresses by a means similar to "do not call" lists.(Brief Article) | InformationWeek | Find Art

As we explore age-verification technologies and approached, it can be helpful to look back a few years to see what we thought about kid "do not e-mail" list to help shiled them from porn and other inappropriate messaging. Large lists of children's contact information (aside from the COPPA legal implications) may not be what we want when predator groups could use them as a catalogue of children.States Aim To Protect Kids From Spam; Michigan and Utah are creating registries of e-mail addresses by a means similar to "do not call" lists.(Brief Article) | InformationWeek | Find Art

K12Planet.com Announces Joint Effort With Federal Trade Commission and Wired Kids to Protect Children Online | Business Wire | Find Articles at BNET

As I look back over the years, it's good to see how much things have improved.the first joint efforts among the FTC, Parry Aftab and an industry player. This was one of K12Planet.com Announces Joint Effort With Federal Trade Commission and Wired Kids to Protect Children Online | Business Wire | Find Articles at BNET

-MICROSOFT: Microsoft co-sponsors Internet Fair to teach families how to surf the web safely. | M2 Presswire | Find Articles at BNET

More than ten year ago, Parry Aftab conducted the very first cybersafety event with Microsoft.-MICROSOFT: Microsoft co-sponsors Internet Fair to teach families how to surf the web safely. | M2 Presswire | Find Articles at BNET

Wednesday, December 03, 2008

I am so frustrated! If one more person tells me there isn't a law that could have applied to Lori Drew in Missouri, I will scream!

On January 5, 2006 President Bush signed Section 113 of the Violence against Women Act into law. It amends 47 U.S.C. 223, the telecommunications harassment statute that is rooted in the Communications Act of 1934.
The telecommunications statue bans anyone from using a telephone or a telecommunications device without disclosing their identity and with intent to annoy, abuse, threaten, or harass any person. This applies to Internet-based communications as well. (Section 113 amends the statute to include “any device or software that can be used to originate telecommunications or other types of communications that are transmitted, in whole or in part, by the Internet.)