Personal Tech Pipeline | Privacy, Free Speech | Cyberstalking Law Targets E-mail, But Could Chill Bloggers
<A HREF="http://as.cmpnet.com/event.ng/Type=click&amp;FlightID=52281&amp;AdID=87440&amp;TargetID=2164&amp;Segments=115,1411,2549,2690,3108,3448,4751,6918&amp;Targets=315,2164,2625,2878,5028&amp;Values=34,46,51,63,77,85,90,100,140,203,222,227,442,645,646,659,1184,1311,1405,1431,1716,1767,1785,1798,1901,1925,1945,1970,2217,2299,2310,2329,2352,2678,2767,2787,2862,2878,2942,2956,3235,3347,3385&amp;RawValues=&amp;Redirect=http://www.xenos.com/infoleap" target="_top"><IMG SRC="http://i.cmpnet.com/ads/graphics/as5/dz/xenos/s3_728x90.gif" WIDTH=728 HEIGHT=90 BORDER=0></A>

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

January 24, 2006

Cyberstalking Law Targets E-mail, But Could Chill Bloggers



Courtesy of TechWeb News

A new law against cyberstalking hasn't been tested in court yet, but both stalking victims' advocates and privacy advocates are critical of it.

President Bush signed the Violence Against Women Reauthorization Act as part of a Department of Justice bill on Jan. 5. It was intended to fight domestic violence and stalking. The law prohibits calling people anonymously with the intent to annoy, abuse, threaten or harass. A new provision adds that same prohibition to Internet use.

Jeff Lundgren, communications director for the U.S. House Judiciary Committee, claims it doesn't target any Internet except e-mail. Speaking for the committee that drafted the legislation, he said critics are misinterpreting the law because of a lack of understanding.

"All it's doing is updating the law to reflect technological changes," he said in an interview Friday. "Annoy is already in the law for phones, and we're updating it for things like e-mail. A blog is different. I would have to go look for it rather than it coming to me. We wanted to treat e-mail communications the same way we treat phone communications. I think most people would understand if they look at it that's all we're doing here."

That's not how victims' advocates or privacy advocates see it. They believe it could chill free speech.

"While the change appears to be an attempt to close loopholes that stalkers could exploit such as using VOIP to talk someone, if read broadly, it could criminalize Web pages or blogs that criticize, lampoon, or otherwise annoy someone," the Electronic Privacy Information Center, or EPIC, states in a recent privacy alert.

Jayne Hitchcock, president and founder of the group, Working To Halt Online Abuse, or WHOA said that the way the law is worded, it can be applied to message boards, chat rooms, instant messaging, electronic greetings, and pretty much anything that can be accessed over the Internet without a password.

She's fine with that part. It's the word annoy that bothers the anti-cyberstalking expert.

"I think they're going to be bogged down with petty cases when there are legitimate cyberstalking cases out there," she said during an interview Friday. "I asked them not to include that word several times, and they just wouldn't do it, and we wouldn't support it after that. It's going to really hurt the real cyberstalking victims out there. What the law comes down to is: if you write things that don't agree with my opinions, you're annoying."

Hitchcock has a lesser complaint as well. She thinks the law should have been wrapped into federal stalking legislation, not rules targeting women who are victims of domestic violence.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
How to Achieve High Performance Through IT
Learn to achieve high performance by aligning IT to
strategic objectives and solutions to unlock that value.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Apple posted this week its first-ever full-length movie -- the made-for-TV Disney Channel original movie "High School Musical" -- on iTunes for the price of $9.99. What do you think of this pricing for downloadable movies?
Love it! The price is lower than I would expect.
Like it. The price is about right.
Dislike it. The price is is a little too high.
Hate it! The price is way, way too high.
Neutral. It depends on the movie.


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Transform your IT infrastructure with IBM
Successful CIOs see IT as a prime stimulus for business innovation-and themselves as key participants in a process that develops business and IT strategies in concert. Read an executive summary and register to download the full IBM paper.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

Block or Secure IM Use
IM threats up 250%. Protect your corporate network. Free Download.

Secure & Easy Console Management with Digi CM
The Digi CM console server provides secure, intelligent & easy access to network devices with a serial console port. With Digi CM, you can securely monitor & control servers, routers, switches & other devices even when your network is down.

Learn how much you save with open source.
Find out how much of a financial impact open source can have on your enterprise. Get these tools now, compliments of JBoss. Go!


Buy a Link Now


SAS continues to lead the way in the business intelligence market. Want proof?
Application-Smart Networking for Fast, Reliable, Secure Application Deliver
CSC Worldwide IT consulting, systems integration, outsourcing
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia