Bradburn et al v. North Central Regional Library District
Filing
33
DECLARATION by Barbara Walters in Support re 28 MOTION for Summary Judgment filed by North Central Regional Library District. (Attachments: # 1 Exhibit Exhibits A-C, Pages 7-22)(Adams, Thomas)
Bradburn et al v. North Central Regional Library District
Doc. 33
1
The Honorable Edward F. Shea
Thomas D. Adams
2
3 Celeste Mountain Monroe
4 KARR TUTTLE CAMPBELL
5 1201 Third Avenue, Suite 2900
Seattle, Washington 98101-3028
6 (206) 223-1313
7 Attorneys for North Central Regional Library District
8
9 10
11
UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WASHINGTON AT SPOKANE
12
13
SARAH BRADBURN, PEARL
14
15
CHERRNGTON, CHARLES
HEINLEN, and THE SECOND
AMENDMENT FOUNATION,
Plaintiffs,
v.
16 17
18
) ) ) NO. CV-06-327-EFS ) ) DECLARATION OF BARBARA ) WALTERS
) )
19
20
21
NORTH CENTRAL REGIONAL LIBRARY DISTRICT,
22
23
Defendant.
) ) ) ) )
24
25
26 27 28
I, Barbara Walters, declare as follows:
DECLARATION OF BARBARA WALTERS - 1
CV-06-327-EFS
#657876 v i /42703-00 i
La1\ Ofjìces
KARR TUTTLE CAMPBELL
A Professional Service Corporation
12111 Third A,.cnuc, SuiIe i~llii. Scaiilc, Washingtun 981111-31128 Tclciihonc (2116) 223-1313, F;icsimilc (2U6) 6Hi~ 71011
Dockets.Justia.com
1
1. I am over the age of 18 and competent to testify to the matters set
2
3
forth herein.
2. I am currently employed by North Central Regional Library as the
4
5
Information Technology Manager.
3. NCRL purchased its original Internet filter in December 2000.
4. The original filter was referred to as "BESS."
6 7
8
9 10
11
5. Washington State Library statistics for 2005, indicate that 16 out of
47 library systems with filters reported they were using a form of
BESS, or 34%.
the above-referenced statistics.)
12
(Attached as Ex. A is a true and correct copy of
13
14
15
6. BESS was the operative filter at the time of
the incidents giving rise
to the current litigation.
16 17
18
7. In October 2006, BESS was replaced with a new filter called
F ortiguard, which is manufactured by F ortinet.
8. The replacement was part of a global upgrade to the computer
19
20
21
cataloguing system and Wide Area Network (WAN). Fortinets Fortiguard Web
22
23
Filtering technology allows NCRL to control access to Internet content via
banned word lists, UR block lists, UR exemption lists, web threat blocks such
as spam URL'S, and category blocks such as pornography. Before the switch to
24
25
26 27 28
Fortiguard, NCRL did not have control over making filter changes. With
DECLARATION OF BARBARA WALTERS - 2
CV -06-327-EFS
La1\ Ofjìce.i'
KARR TUTTLE CAMPBELL
A Professional Service Corpora/ion
1201 Third Avenue, Suite 2900. SCillllc, Wilshington 981111-3028 Tclc)ihonc (20G) 223-1313, Facsimile (lOG) 682-71011
#657876 vI /42703-001
1
F ortiguard and the F ortinet F ortimanager, changes to the filter happen
simultaneously at all NCRL branches.
8. The following categories are blocked under NCRL's current
2
3
4
5
filtering profile: (1) hacking; (2) proxy avoidance; (3) phishing; (4) malware; (5)
6 7
8
spyware; (6) gambling; (7) adult materials; (8) nudity/risqué; (9) pornography;
(10) webchat; (11) instant messaging. The following classifications are also
blocked: image search, video search; and spam UR. (Attached as Ex. B is an
NCRL document detailing our current filtering profile.)
9. The above-referenced categories and classifications are defined by
9
10
11
12
13
14
15
Fortinet as follows:
16
i7
i8
. Hacking - Website that depict ilicit activities surrounding the unauthorized modification or access to programs, computers,
equipment and websites;
19
. Proxy Avoidance - Websites that provide information or tools on how to bypass Internet access controls and browse the Web anonymously, includes anonymous proxy servers
. Phishing- Counterfeit web pages that duplicate legitimate business
20
21
22
23
web pages for the purpose of eliciting financial, personal or other private information from the users . Malware - Sites that are infected with destructive or malicious software, specifically designed to damage, disrupt, attack or manipulate computer systems without the user's consent, such as a
virus or Troj an horse.
24
25
26 27
28
. Spyware - Sites that host software that is covertly downloaded to a user's machine to collect information and monitor user activity, including spyware, adware, etc.
DECLARATION OF BARBARA WALTERS - 3
CV -06-327-EFS #657876 v i /42703-00 i
Lmi' Ofjìces
KARR TUTTLE CAMPBELL
A Professional Sen'ÎCe Corporafion
12(1) Thin) A,'cnuc, Suile 2900, SC~i.llc. WĦlsliing111n 98111i~J1I28 Tclciihonc (2116) 22J~i31J, Facsimile (2116) 6S2-71UO
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?