Deeplinks Blog posts about Free Speech
Should a company be allowed to use its own contractual fine print to take away its customers’ free speech? What fundamental rights should not be waivable?
We’ve written in the past about companies putting clauses in their form contracts that ostensibly forbid customers from posting online reviews of those companies’ products and services. Members of the Maryland House of Delegates have introduced a bill (MD H.B. 131) seeking to end the practice in Maryland. The bill’s sponsors are Dels. Jeff Waldstreicher, David Moon, Benjamin Kramer, and C.T. Wilson.
Through the lens of someone with little direct experience with prisons and jails, corrections systems in the United States may look like they're improving how prisoners communicate with the outside world through new technologies, such as inmate email, video visitation, and media tablets.
EFF has been steadfast in its criticism of officials like FBI Director James Comey, who have implored tech companies to provide a backdoor to their customers’ encrypted communications. Now it appears as though the White House would like a backdoor to the First Amendment’s free speech protections by requiring private tech companies to monitor, censor, and automatically report speech on topics related to ISIS and terrorism.
January 12, 2016 Update: It is important to note that some of the language that was added to the Twitter Rules on December 30, 2015 is not entirely new and was recycled from other Twitter Help pages, such as the Abusive behavior policy page. We consider the direct and explicit inclusion of this language in the Twitter Rules significant for the reasons discussed in the post below.
Xinjiang, home of the China's muslim Uighur minority, has long been the world's laboratory for Internet repression. Faced with widespread local unrest, and online debate, China has done everything it can to enforce its vision of the Net in the region, from imprisoning bloggers and online publishers, to quarantining the entire Xinjiang network from the rest of the Internet for over ten months in 2009. Nonetheless, Xinjiang residents still circumvent censorship and surveillance in the pursuit of privacy and free expression. They use virtual private networks and other methods to get around the Great Firewall.
Pages
Subscribe to EFF Updates
Deeplinks Archives
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- International
- Know Your Rights
- Privacy
- Trade Agreements and Digital Rights
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized