CIPA: Myths vs. RealityChrista BurnsNebraska Library CommissionTechnology Planning Summer CampAugust 23, 2011
CIPAChildren’s Internet Protection ActFederal law implemented in 2001 by the FCCCIPA requires 3 things:Technology Protection Measure
Internet Safety Plan
Public Notice and Meeting/HearingMYTH:Libraries who apply for E-rate discounts for basic telephone service must comply with CIPAFALSELibraries only must comply with CIPA if they are applying for E-rate discounts for Internet Access and/or Internal Connections
MYTH:CIPA dictates which Technology Protection Measures (filters) libraries must useFALSELibraries are free to choose whatever Technology Protection Measure they want
The law defines a “technology protection measure” as “a specific technology that blocks or filters Internet access to visual depictions that are— (A) obscene . . .; (B) child pornography . . .; or (C) harmful to minors . . .”Although the law clearly requires the use of filtering or blocking technology, it does not require the use of specific filtering software or services.
MYTH:CIPA only applies to computers accessed by children and/or the publicFALSECIPA states that a library must have a TPM on “any of its computers with Internet access”.
The law makes no distinction between computers used only by minors or adults or computers used only by staff and those accessible to the public. Therefore, even Internet connected computers located in administrative areas not accessible to the public or students must still have filters, but they can be disabled.
MYTH:Technology Protection Measures (filters) cannot be disabledFALSE“An administrator, supervisor, or person authorized by the responsible authority under paragraph (1) may disable the technology protection measure concerned to enable access for bona fide research or other lawful purposes.”
MYTH:If someone comes in with their own device (laptop, etc) to use the library’s wifi, we must filter that deviceFALSECIPA states that a library must have a TPM on “any of its computers with Internet access”.
MYTH:My library can’t receive E-rate funds for Internet Access and/or Internal Connections until we’ve complied with CIPAFALSEWhile you are applying for, and receiving E-rate discounts, you have 3 years to comply
In the first funding year in which you are "applying" for funds, you can certify that you are undertaking actions to be in compliancefor the next funding year. You may also make this certification in your second funding year for purposes of CIPA if you seek a waiver.If the library "applies" for support in the third funding year, it must be in compliance with CIPA.
MYTH:My library must track the internet usage of patrons to comply with CIPAFALSE“SEC.1702.(b) DISCLAIMER REGARDING PRIVACY.--Nothing in this title or the amendments made by this title shall be construed to require the tracking of Internet use by any identifiable minor or adult user.”
Other MYTHs?
Information on CIPAE-rate: http://www.usac.org/sl/applicants/step10/cipa.aspxFCC:                http://www.fcc.gov/guides/childrens-internet-protection-actALA: http://www.ala.org/ala/issuesadvocacy/advocacy/ federallegislation/cipa/index.cfm

Fear of filtering the reality of internet content management (burns)

  • 1.
    CIPA: Myths vs.RealityChrista BurnsNebraska Library CommissionTechnology Planning Summer CampAugust 23, 2011
  • 2.
    CIPAChildren’s Internet ProtectionActFederal law implemented in 2001 by the FCCCIPA requires 3 things:Technology Protection Measure
  • 3.
  • 4.
    Public Notice andMeeting/HearingMYTH:Libraries who apply for E-rate discounts for basic telephone service must comply with CIPAFALSELibraries only must comply with CIPA if they are applying for E-rate discounts for Internet Access and/or Internal Connections
  • 5.
    MYTH:CIPA dictates whichTechnology Protection Measures (filters) libraries must useFALSELibraries are free to choose whatever Technology Protection Measure they want
  • 6.
    The law definesa “technology protection measure” as “a specific technology that blocks or filters Internet access to visual depictions that are— (A) obscene . . .; (B) child pornography . . .; or (C) harmful to minors . . .”Although the law clearly requires the use of filtering or blocking technology, it does not require the use of specific filtering software or services.
  • 7.
    MYTH:CIPA only appliesto computers accessed by children and/or the publicFALSECIPA states that a library must have a TPM on “any of its computers with Internet access”.
  • 8.
    The law makesno distinction between computers used only by minors or adults or computers used only by staff and those accessible to the public. Therefore, even Internet connected computers located in administrative areas not accessible to the public or students must still have filters, but they can be disabled.
  • 9.
    MYTH:Technology Protection Measures(filters) cannot be disabledFALSE“An administrator, supervisor, or person authorized by the responsible authority under paragraph (1) may disable the technology protection measure concerned to enable access for bona fide research or other lawful purposes.”
  • 10.
    MYTH:If someone comesin with their own device (laptop, etc) to use the library’s wifi, we must filter that deviceFALSECIPA states that a library must have a TPM on “any of its computers with Internet access”.
  • 11.
    MYTH:My library can’treceive E-rate funds for Internet Access and/or Internal Connections until we’ve complied with CIPAFALSEWhile you are applying for, and receiving E-rate discounts, you have 3 years to comply
  • 12.
    In the firstfunding year in which you are "applying" for funds, you can certify that you are undertaking actions to be in compliancefor the next funding year. You may also make this certification in your second funding year for purposes of CIPA if you seek a waiver.If the library "applies" for support in the third funding year, it must be in compliance with CIPA.
  • 13.
    MYTH:My library musttrack the internet usage of patrons to comply with CIPAFALSE“SEC.1702.(b) DISCLAIMER REGARDING PRIVACY.--Nothing in this title or the amendments made by this title shall be construed to require the tracking of Internet use by any identifiable minor or adult user.”
  • 14.
  • 15.
    Information on CIPAE-rate:http://www.usac.org/sl/applicants/step10/cipa.aspxFCC: http://www.fcc.gov/guides/childrens-internet-protection-actALA: http://www.ala.org/ala/issuesadvocacy/advocacy/ federallegislation/cipa/index.cfm
  • 16.
    Christa BurnsSpecial ProjectsLibrarianNebraska Library Commissionhttp://nlc.nebraska.gov/erate/[email protected]