What is an Internet Content Filter?

internet content filterInternet content filters are used to prevent users on a computer from accessing websites deemed inappropriate and downloading files that may affect the security of a computer. Many Internet content filters are in place to block websites that contain pornography, hate groups, and other sensitive, and possibly illegal, activities and items. Many content filters are software based, but a large amount of organizations are moving toward hardware-based filtering, taking advantage of features in routers.

Companies need to be protected both legally, and in terms of network and information security. Content filters help to prevent programs and files from being downloaded that may be malicious, stealing company data, infecting systems with viruses, and more. Internet content filters are a necessary evil that actually help security.

Additionally, Internet content filters help to keep both an organization and an individual legally protected. By blocking pornographic websites, organizations are helping to prevent sexual harassment lawsuits against themselves, as well as the individual accessing the website. Hate-filled websites dealing with racism, sexism, and more are also blocked to prevent offending anyone, and leaving an organization and individual open to a hate crime related lawsuit. For the large amount of protection these filters provide, the small hindrance and annoyance they bring about are very minor.

Whether it involves using the internet at work, school, or the library, most organizations utilize IT specialists, such as site administrators or media directors, to assist with the decision of which internet filters to implement. These specialists can also help organizations monitor the daily use of the Internet and create website tracking methods.

For most library institutions, it is up to the local library board to decide which websites are appropriate for their visitors to use. The librarians who work at an individual location may have a significant amount of input towards this decision, as well as monitor the activity of the computer systems while in use.

In an elementary through high school environment, the board of education, principals, teachers, and parents should all have a say in which Internet sites are made available to young students. Most parents filter Internet use for their own children at home, so it is imperative that they contribute their opinions.

At a college level, most universities should allow department deans and campus libraries to determine the appropriate Internet sites allowed in the classrooms, administration facilities, and academic departments. Depending on the specialty of a given department, certain websites may be allowed in one area over another due to the type of research that is required for specific classes.

As for a work environment, executive level management should be involved with the decision, however, department directors should be the main point of contact regarding which websites are allowed and how employees will be monitored.

Unfortunately, there are multiple ways around filters, including proxy websites, and more can be found online.The punishments used against individuals can vary specific to the organization and the severity of the websites used when circumventing Internet filters. In either of the environments mentioned above, the rules and regulations of Internet use should be made clear from the beginning.

Filters are implemented for a reason and for an individual to break the filter, he or she must understand the consequences.  In some cases, the severity of the websites accessed may come into play. Some companies do not allow employees to utilize personal email websites such as Hotmail, Yahoo, or Google. This type of site may be considered a minor offense, however, websites that may involve illegal activity would be considered a severe offense and require an appropriate response.

Bookmark and Share

This entry was posted on Friday, May 28th, 2010 at 4:45 pm and is filed under Computer Security, Security Management. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.

Leave a Reply