Bradburn et al v. North Central Regional Library District

Filing 33

DECLARATION by Barbara Walters in Support re 28 MOTION for Summary Judgment filed by North Central Regional Library District. (Attachments: # 1 Exhibit Exhibits A-C, Pages 7-22)(Adams, Thomas)

Download PDF
Bradburn et al v. North Central Regional Library District Doc. 33 1 The Honorable Edward F. Shea Thomas D. Adams 2 3 Celeste Mountain Monroe 4 KARR TUTTLE CAMPBELL 5 1201 Third Avenue, Suite 2900 Seattle, Washington 98101-3028 6 (206) 223-1313 7 Attorneys for North Central Regional Library District 8 9 10 11 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WASHINGTON AT SPOKANE 12 13 SARAH BRADBURN, PEARL 14 15 CHERRNGTON, CHARLES HEINLEN, and THE SECOND AMENDMENT FOUNATION, Plaintiffs, v. 16 17 18 ) ) ) NO. CV-06-327-EFS ) ) DECLARATION OF BARBARA ) WALTERS ) ) 19 20 21 NORTH CENTRAL REGIONAL LIBRARY DISTRICT, 22 23 Defendant. ) ) ) ) ) 24 25 26 27 28 I, Barbara Walters, declare as follows: DECLARATION OF BARBARA WALTERS - 1 CV-06-327-EFS #657876 v i /42703-00 i La1\ Ofjìces KARR TUTTLE CAMPBELL A Professional Service Corporation 12111 Third A,.cnuc, SuiIe i~llii. Scaiilc, Washingtun 981111-31128 Tclciihonc (2116) 223-1313, F;icsimilc (2U6) 6Hi~ 71011 Dockets.Justia.com 1 1. I am over the age of 18 and competent to testify to the matters set 2 3 forth herein. 2. I am currently employed by North Central Regional Library as the 4 5 Information Technology Manager. 3. NCRL purchased its original Internet filter in December 2000. 4. The original filter was referred to as "BESS." 6 7 8 9 10 11 5. Washington State Library statistics for 2005, indicate that 16 out of 47 library systems with filters reported they were using a form of BESS, or 34%. the above-referenced statistics.) 12 (Attached as Ex. A is a true and correct copy of 13 14 15 6. BESS was the operative filter at the time of the incidents giving rise to the current litigation. 16 17 18 7. In October 2006, BESS was replaced with a new filter called F ortiguard, which is manufactured by F ortinet. 8. The replacement was part of a global upgrade to the computer 19 20 21 cataloguing system and Wide Area Network (WAN). Fortinets Fortiguard Web 22 23 Filtering technology allows NCRL to control access to Internet content via banned word lists, UR block lists, UR exemption lists, web threat blocks such as spam URL'S, and category blocks such as pornography. Before the switch to 24 25 26 27 28 Fortiguard, NCRL did not have control over making filter changes. With DECLARATION OF BARBARA WALTERS - 2 CV -06-327-EFS La1\ Ofjìce.i' KARR TUTTLE CAMPBELL A Professional Service Corpora/ion 1201 Third Avenue, Suite 2900. SCillllc, Wilshington 981111-3028 Tclc)ihonc (20G) 223-1313, Facsimile (lOG) 682-71011 #657876 vI /42703-001 1 F ortiguard and the F ortinet F ortimanager, changes to the filter happen simultaneously at all NCRL branches. 8. The following categories are blocked under NCRL's current 2 3 4 5 filtering profile: (1) hacking; (2) proxy avoidance; (3) phishing; (4) malware; (5) 6 7 8 spyware; (6) gambling; (7) adult materials; (8) nudity/risqué; (9) pornography; (10) webchat; (11) instant messaging. The following classifications are also blocked: image search, video search; and spam UR. (Attached as Ex. B is an NCRL document detailing our current filtering profile.) 9. The above-referenced categories and classifications are defined by 9 10 11 12 13 14 15 Fortinet as follows: 16 i7 i8 . Hacking - Website that depict ilicit activities surrounding the unauthorized modification or access to programs, computers, equipment and websites; 19 . Proxy Avoidance - Websites that provide information or tools on how to bypass Internet access controls and browse the Web anonymously, includes anonymous proxy servers . Phishing- Counterfeit web pages that duplicate legitimate business 20 21 22 23 web pages for the purpose of eliciting financial, personal or other private information from the users . Malware - Sites that are infected with destructive or malicious software, specifically designed to damage, disrupt, attack or manipulate computer systems without the user's consent, such as a virus or Troj an horse. 24 25 26 27 28 . Spyware - Sites that host software that is covertly downloaded to a user's machine to collect information and monitor user activity, including spyware, adware, etc. DECLARATION OF BARBARA WALTERS - 3 CV -06-327-EFS #657876 v i /42703-00 i Lmi' Ofjìces KARR TUTTLE CAMPBELL A Professional Sen'ÎCe Corporafion 12(1) Thin) A,'cnuc, Suile 2900, SC~i.llc. WĦlsliing111n 98111i~J1I28 Tclciihonc (2116) 22J~i31J, Facsimile (2116) 6S2-71UO

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?