Social Media Policies, Corporate Censorship and the Right to Be Forgiven: a Proposed Framework for Free Expression in an Era of Employer Social Media Monitoring
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Self-Censorship and the First Amendment Robert A
Notre Dame Journal of Law, Ethics & Public Policy Volume 25 Article 2 Issue 1 Symposium on Censorship & the Media 1-1-2012 Self-Censorship and the First Amendment Robert A. Sedler Follow this and additional works at: http://scholarship.law.nd.edu/ndjlepp Recommended Citation Robert A. Sedler, Self-Censorship and the First Amendment, 25 Notre Dame J.L. Ethics & Pub. Pol'y 13 (2012). Available at: http://scholarship.law.nd.edu/ndjlepp/vol25/iss1/2 This Article is brought to you for free and open access by the Notre Dame Journal of Law, Ethics & Public Policy at NDLScholarship. It has been accepted for inclusion in Notre Dame Journal of Law, Ethics & Public Policy by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. ARTICLES SELF-CENSORSHIP AND THE FIRST AMENDMENT ROBERT A. SEDLER* I. INTRODUCTION Self-censorship refers to the decision by an individual or group to refrain from speaking and to the decision by a media organization to refrain from publishing information. Whenever an individual or group or the media engages in self-censorship, the values of the First Amendment are compromised, because the public is denied information or ideas.' It should not be sur- prising, therefore, that the principles, doctrines, and precedents of what I refer to as "the law of the First Amendment"' are designed to prevent self-censorship premised on fear of govern- mental sanctions against expression. This fear-induced self-cen- sorship will here be called "self-censorship bad." At the same time, the First Amendment also values and pro- tects a right to silence. -
The Impact of Disinformation on Democratic Processes and Human Rights in the World
STUDY Requested by the DROI subcommittee The impact of disinformation on democratic processes and human rights in the world @Adobe Stock Authors: Carme COLOMINA, Héctor SÁNCHEZ MARGALEF, Richard YOUNGS European Parliament coordinator: Policy Department for External Relations EN Directorate General for External Policies of the Union PE 653.635 - April 2021 DIRECTORATE-GENERAL FOR EXTERNAL POLICIES POLICY DEPARTMENT STUDY The impact of disinformation on democratic processes and human rights in the world ABSTRACT Around the world, disinformation is spreading and becoming a more complex phenomenon based on emerging techniques of deception. Disinformation undermines human rights and many elements of good quality democracy; but counter-disinformation measures can also have a prejudicial impact on human rights and democracy. COVID-19 compounds both these dynamics and has unleashed more intense waves of disinformation, allied to human rights and democracy setbacks. Effective responses to disinformation are needed at multiple levels, including formal laws and regulations, corporate measures and civil society action. While the EU has begun to tackle disinformation in its external actions, it has scope to place greater stress on the human rights dimension of this challenge. In doing so, the EU can draw upon best practice examples from around the world that tackle disinformation through a human rights lens. This study proposes steps the EU can take to build counter-disinformation more seamlessly into its global human rights and democracy policies. -
Social Media and Customer Engagement in Tourism: Evidence from Facebook Corporate Pages of Leading Cruise Companies
Social Media and Customer Engagement in Tourism: Evidence from Facebook Corporate Pages of Leading Cruise Companies Giovanni Satta, Francesco Parola, Nicoletta Buratti, Luca Persico Department of Economics and Business Studies and CIELI, University of Genoa, Italy, email: [email protected] (Corresponding author), [email protected], [email protected], [email protected] Roberto Viviani email: [email protected] Department of Economics and Business Studies, University of Genoa, Italy Abstract In the last decade, an increasing number of scholars has challenged the role of Social Media Marketing (SMM) in tourism. Indeed, Social Media (SM) provide undoubted opportunities for fostering firms’ relationships with their customers, and online customer engagement (CE) has become a common objective when developing communication strategies. Although extant literature appear very rich and heterogeneous, only a limited number of scholars have explored which kind of contents, media and posting day would engage tourists on social media. Hence, a relevant literature gap still persists, as tourism companies would greatly benefit from understanding how posting strategies on major social media may foster online CE. The paper investigates the antecedents of online CE in the tourism industry by addressing the posting activities of cruise companies on their Facebook pages. For this purpose, we scrutinize the impact of post content, format and timing on online CE, modelled as liking, commenting and sharing. In particular, we test the proposed model grounding on an empirical investigation performed on 982 Facebook posts uploaded by MSC Crociere (446), Costa Crociere (331) and Royal Caribbean Cruises (205) in a period of 12 month. -
We Need Net Neutrality As Evidenced by This Article to Prevent Corporate
We need Net Neutrality as evidenced by this article to prevent corporate censorship of individual free speech online, whether its AOL censoring DearAOL.com emails protesting their proposed email fee for prioritized email delivery that evades spam filters, AT&T censoring Pearl Jam which this article is about, or Verizon Wireless censoring text messages from NARAL Pro Choice America. If the FCC won't reclassify broadband under Title II the FTC should regulate Net Neutrality, also the DOJ should investigate corporations engaging in such corporate censorship and if they are violating competition laws break them up. Pearl Jam came out in favor of net neutrality after AT&T censored a broadcast a performance they did in Chicago last Sunday. I guess AT&T didn?t like Pearl Jam?s anti-Bush message. I don?t know if Pearl Jam?s sudden embrace of net neutrality is out of ignorance, or if it?s retaliation. It doesn?t really matter because it should help bring some more awareness to the issue. Here?s the issue with net neutrality, in a nutshell. AT&T wants to charge companies like Amazon, eBay, and Google when people like you and me access their web pages. And if the companies don?t pay, AT&T will make the web sites slower. The idea is that if one company doesn?t pay the fees but a competitor does, AT&T customers will probably opt to use the faster services. IT"S WORTH NOTING: Without content, an Internet connection has no value. Proponents say AT&T built the infrastructure, so they have the right to charge whoever uses it. -
Translation and Manipulation
5785 Forough Rahimi et al./ Elixir Ling. & Trans. 41 (2011) 5785-5790 Available online at www.elixirpublishers.com (Elixir International Journal) Linguistics and Translation Elixir Ling. & Trans. 41 (2011) 5785-5790 Translation and manipulation: a critical discourse analysis case study Forough Rahimi and Mohammad Javad Riasati Department of Foreign Languages, Shiraz Branch, Islamic Azad University, Shiraz, Iran. ARTICLE INFO ABSTRACT Article history: This paper seeks to delineate the constraints imposed on translators of movie dialogues in Received: 20 September 2011; the context of Iran. The movie ''Platoon'' is selected for this purpose. In this situation a Received in revised form: myriad of external constraints, that is, cultural, religious, and political, lead to rewriting or 16 November 2011; manipulation of movie texts. This is an effective means for creating and naturalizing Accepted: 28 November 2011; ideologies, through expurgation, derogation, etc. The movie translations in Iran are scenes of ideological incursions in translation, that is, suppression of dialectal features. They are sites Keywords of ideological clashes in which certain realities are constructed and challenged and Translation, xenophobic attitudes are propagated. The translators counterfeit realities and inculcate them Censorship, in the innocent audience. This paper explores the ideological and socio-political factors Ideological manipulation. which determine the strategies applied in the translation of western movies. © 2011 Elixir All rights reserved. Introduction language is an irreducible part of social life. The dialectic During the past decade educational researchers increasingly relation between language and social reality is realized through have turned to Critical Discourse Analysis (CDA) as a set of social events (texts), social practices (orders of discourse) and approaches to answer questions about the relationships between social structures (languages) [3]. -
Edri Submission to UN Special Rapporteur David Kaye's Call on Freedom of Expression and the Private Sector in the Digital Age
EDRi submission to UN Special Rapporteur David Kaye's call on freedom of expression and the private sector in the digital age Introduction EDRi is a not-for-profit association of digital civil rights organisations. Our objectives are to promote, protect and uphold civil rights in the field of information and communication technology. European Digital Rights (EDRi) welcomes the UN Special Rapporteur on freedom of opinion and expression David Kaye’s public consultation on the role of ICT companies vis-à-vis freedom of expression in the digital environment to identify: I. the categories of actors in the ICT sector whose activities implicate the freedom of opinion and expression; II. the main legal issues raised for freedom of opinion and expression within the ICT sector; and III. the conceptual and normative work already done to develop corporate responsibility and human rights frameworks in these spaces, including governmental, inter-governmental, civil society, corporate and multistakeholder efforts. I. ICT actors with a potential to impact freedom of expression and opinion In order to communicate online, it is necessary to rely on a chain of different service providers, often based in different jurisdictions and with whom one may have no direct relationship at all. For example, if "zero-rating" or even data caps are imposed by Internet access providers in a country and you have no organisational and financial capacity to be "zero-rated", your ability to communicate with people that are using such restricted services is limited and there is no "leverage" with the ISPs that connect your intended audience with the Internet. -
Protecting Privacy to Prevent Discrimination
William & Mary Law Review Volume 56 (2014-2015) Issue 6 Article 4 5-18-2015 Protecting Privacy to Prevent Discrimination Jessica L. Roberts Follow this and additional works at: https://scholarship.law.wm.edu/wmlr Part of the Civil Rights and Discrimination Commons, and the Privacy Law Commons Repository Citation Jessica L. Roberts, Protecting Privacy to Prevent Discrimination, 56 Wm. & Mary L. Rev. 2097 (2015), https://scholarship.law.wm.edu/wmlr/vol56/iss6/4 Copyright c 2015 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmlr PROTECTING PRIVACY TO PREVENT DISCRIMINATION JESSICA L. ROBERTS* ABSTRACT A person cannot consider information that she does not have. Unlawful discrimination, therefore, frequently requires discrimina- tors to have knowledge about protected status. This Article exploits that simple reality, arguing that protecting privacy can prevent discrimination by restricting access to the very information discrimi- nators use to discriminate. Although information related to many antidiscrimination categories, like race and sex, may be immediately apparent upon meeting a person, privacy law can still do significant work to prevent discrimination on the basis of less visible traits such as genetic information, age, national origin, ethnicity, and religion, as well as in cases of racial or gender ambiguity. To that end, this Article explores the advantages and disadvantages of enacting privacy protections to thwart discrimination. It concludes that the weaknesses endemic to privacy law might be addressed by adopting an explicit antidiscrimination purpose. Hence, just as privacy law may further antidiscrimination, so may antidiscrimination enhance privacy law. -
Employee Privacy Laws: North Carolina
View the online version at http://us.practicallaw.com/w-000-3324 Employee Privacy Laws: North Carolina ALICIA A. GILLESKIE AND KIMBERLY J. KORANDO, SMITH, ANDERSON, BLOUNT, DORSETT, MITCHELL & JERNIGAN, L.L.P., WITH PRACTICAL LAW LABOR & EMPLOYMENT A guide to state law on employee privacy laws Does not adversely affect: for private employers in North Carolina. This the employee's job performance: the employee's ability to properly fulfill the responsibilities of Q&A addresses employee privacy rights and the position in question; or the consequences for employers that violate the safety of other employees. these rights. Federal, local or municipal law may (N.C. Gen. Stat. § 95-28.2(b).) impose additional or different requirements. Employers do not violate this law if they: OVERVIEW OF STATE PRIVACY LAW Restrict the lawful use of lawful products by employees during nonworking hours if the restriction relates to a bona fide occupa- 1. Please list each state law relating to employee privacy (for tional requirement and is reasonably related to the employment example, employee right to privacy, access to personnel files, activities. If the restriction reasonably relates to only a particular electronic communications, surveillance and monitoring, medi- employee or group of employees, then the restriction may only cal examinations, and lawful off-duty activity laws), EXCEPT lawfully apply to them. state laws on background checks and drug testing. For each, Restrict the lawful use of lawful products by employees during please describe: nonworking hours if the restriction relates to the fundamental objectives of the organization. What activity the law protects. Discharges, disciplines, or takes any action against an employee Which employers are covered. -
A Study on How Wendy's Use Different Forms of Audience Engagement In
Audience Engagement on Social Media – A Study on how Wendy’s Use Different Forms of Audience Engagement in their Social Media Posts Emma Kauppila Pro gradu-avhandling i engelska språket och litteraturen Handledare: Brita Wårvik Fakulteten för humaniora, psykologi och teologi Åbo Akademi (2019) ÅBO AKADEMI – FAKULTETEN FÖR HUMANIORA, PSYKOLOGI OCH TEOLOGI Abstrakt för avhandling pro gradu Ämne: Engelska språket och litteraturen Författare: Emma Kauppila Arbetets titel: Audience Engagement on Social Media – A Study on how Wendy’s Use Different Forms of Audience Engagement in their Social Media Posts Handledare: Brita Wårvik Handledare: Abstrakt: Social media have acquired important roles in both private and public matters. While creating different networks for people to connect with each other, social media also create networks where businesses can connect with their consumers and create and maintain an online relationship with them. In order to create a valuable relationship the businesses need to know how to interact with their online audience. The businesses also need to listen to their audiences so that they learn what the audience actually is expecting from the business. This leads to the need of audience engagement, i.e. interactive communication between the business and the audience. In order to create a situation where engagement is likely to take place, online users can use different forms of audience engagement in their online content. The purpose of this thesis is to study the language used online on social media and how that language can be used to create audience engagement. The research questions the thesis attempts to answer are 1. What forms of audience engagement can be found and defined? 2. -
SHOULD EMPLOYERS HAVE the ABILITY to MONITOR THEIR EMPLOYEES ELECTRONICALLY? Danielle Dorval University of Rhode Island
University of Rhode Island DigitalCommons@URI Seminar Research Paper Series Schmidt Labor Research Center 2004 Should Employers Have the Ability to Monitor Their mploE yees Electronically? Danielle Dorval University of Rhode Island Follow this and additional works at: http://digitalcommons.uri.edu/lrc_paper_series Recommended Citation Dorval, Danielle, "Should Employers Have the Ability to Monitor Their mpE loyees Electronically?" (2004). Seminar Research Paper Series. Paper 18. http://digitalcommons.uri.edu/lrc_paper_series/18http://digitalcommons.uri.edu/lrc_paper_series/18 This Seminar Paper is brought to you for free and open access by the Schmidt Labor Research Center at DigitalCommons@URI. It has been accepted for inclusion in Seminar Research Paper Series by an authorized administrator of DigitalCommons@URI. For more information, please contact [email protected]. SHOULD EMPLOYERS HAVE THE ABILITY TO MONITOR THEIR EMPLOYEES ELECTRONICALLY? Danielle Dorval University of Rhode Island The purpose of this paper is to answer the question of whether or not employers should have the ability to electronically monitor their employees in the workplace. It stresses both the monitoring of computers, and also telephone wiretapping. The topic is examined through a legal, behavioral, and ethical perspective, to gain a more complete idea of the extent of the concern with electronic monitoring. Court cases were used to explain the different facets of the legal struggle between the employer's right to monitor and the employee's right to privacy. Several theories, including panoptic theory, were used to explain the behavioral effects of employer surveillance. Finally, the ethical issues with regards to electronic monitoring were explained through the idea of social control, and the balance of the needs of the employer and the needs of the employee. -
Chapter 14 the Political Economy of Capitalist and Alternative Social Media Christian Fuchs and Marisol Sandoval
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by WestminsterResearch Chapter 14 The Political Economy of Capitalist and Alternative Social Media Christian Fuchs and Marisol Sandoval Fuchs, Christian and Marisol Sandoval. 2015. The Political Economy of Capitalist and Alternative Social Media. In The Routledge Companion to Alternative and Community Media, ed. Chris Atton, 165-175. London: Routledge. <165> This chapter provides an overview of political economy questions that arise when discussing the relationship of capitalist and alternative social media. We begin by clarifying the notion of social media, before going on to examine aspects of the political economy of alternative media. We then apply these aspects to the realm of social media in order to discuss the relationship between capitalist and alternative social media. This includes a discussion of the contradictory character of social media in the Occupy movement. What are social media? During the past fifteen years, a number of new platforms have become prominent and now range among the 50 most-accessed World Wide Web (WWW) sites in the world (alexa.com 2013). They include: • social networking sites: Facebook (#2, founded in 2004), LinkedIn (#8, 2003), VKontakte (#22, 2006); • video-sharing platforms: YouTube (#3, 2005), XVideos (#41, 1997); • wikis: Wikipedia (#6, 2001); • blogs: Blogspot (#12, 1999), Wordpress (#15, 2003), Blogger (#38, 1999); • microblogs: Twitter (#10, 2006), Sina Weibo (#34, 2009); • online pinboards: Tumblr (#25, 2007), Pinterest (#27, 2010); and • photo-sharing sites: Instagram (#37, 2010). These platforms allow users to generate and share texts and multimedia contents and/or to collaboratively create and edit content and/or to communicate with a <166> self-defined network of contacts and friends. -
INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE in EUROPE, DESTROYED in the UNITED STATES Lothar Determannt & Robert Spragueu
INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE IN EUROPE, DESTROYED IN THE UNITED STATES Lothar Determannt & Robert SpragueU TABLE OF CONTENTS I. INTRODUCTION ................. ...................... 980 II. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-U.S. PERSPECTIVE ............................ 981 A. WORK-RELATED EMPLOYER MONITORING........................................981 B. WORK-RELATED EMPLOYEE PRIVACY ................ ....... 986 1. Work-Related Rights to Privag Under the Constitution.....................986 2. Work-Related Rights to Privag Under the Common Law..................990 3. Statutog Rjghts to Privag................................. 993 a) The Electronic Communications Privacy Act ............... 995 C. INTRUSIVE WORKPLACE MONITORING AND EMPLOYEE PRIVACY................................................ 1001 1. Employer Access to PersonalWeb-Based Applications..................... 1007 2. Webcams ...................................... 1009 3. GPS ..................................... 1012 D. WORKPLACE PRIVACY TRENDS IN THE UNITED STATES............... 1016 III. EMPLOYER MONITORING AND EMPLOYEE PRIVACY-EUROPEAN PERSPECTIVE .. ................... 1018 A. LAWS IN EUROPE-OVERVIEW ................ ............. 1019 B. CIVIL RIGHTS PROTECTIONS FOR PRIVACY AT THE EUROPEAN LEVEL............................. .......... 1019 ( 2011 Lothar Determann & Robert Sprague. t Dr. iur habil, Privatdozent, Freie Universitat Berlin; Adjunct Professor, University of California, Berkeley School of Law and Hastings College