Social Media in the Crosshairs

Social Media in the Crosshairs

The Federal Communications Commission has begun to target social media companies in what seems to be part of an overtly political act by the White House ahead of November’s elections. Today, we will take a look at Section 230, how it currently gives social media power that some politicians are uncomfortable with, and what they plan to do about it.

What’s the Issue?

Social media platforms are extremely powerful, this much is undeniable. In fact, in the United States, 72 percent of adults believe that they carry too much power and political influence according to a 2020 poll. Some in government believe that much of the power that Facebook, Twitter, and other platforms hold is due to some language found in the Communications Decency Act of 1996 (CDA). Specifically, Section 230, which has provided protection from liability for providers and users of an “interactive computer service” that publishes information by third-party users. 

The law also states that the provider shall not be prosecuted for the removal or moderation of third-party material as long as it is done in good faith. This means that social media platforms have civil protection over the moderation of their platforms. This is what has politicians so angry.

Alternative Facts

The political landscape is extremely contentious at present. One reason for this is that there seems to be two sets of facts. Despite there being several entities whose only job is to independently fact check the rhetoric of government officials and media personalities, there seem to be dual truths to almost every issue. In industries where transparency should be of paramount concern, public relations strategies have moved the discussion to social media. If who a person believes is largely dictated by what political party they support, facts, real facts, become pointless. This is the most important of the several issues that has social media preparing for a legal battle with the government.

You see, the scrutiny of social media has been there since its inception, but it only went mainstream in 2020 after one of the President’s tweets was flagged as misinformation. The White House considered this an egregious action, as to them this wasn’t just moderation, it was censorship on political bias, not good faith. Despite several legal precedents that should work to continue to protect the social media companies, a bi-partisan challenge to the law as it stands now will be hard for social media companies to fight. Both parties’ candidates have stated their support for a revocation of section 230 for social media, but with two different versions of the truth out there, who is to say if there is any legal standing in the fight against misinformation and censorship on social media?

Where Does the FCC Fit In?

This is where the Federal Communications Commission comes in. In May, after Twitter flagged one of President Trump’s tweets as misleading, he sprung into action signing an executive order to have the FCC look into the claims of censorship. This was just months after the would-be Democratic Presidential Nominee also blasted social media’s role in propagating misinformation, calling Section 230 to be revoked. 

Ajit Pai, the current FCC chairman who is famous for his very public rollback of the net neutrality mandate, has come out to say that he will help set up rules that, despite the First Amendment and CDA protection, will work to remove the immunity that these businesses have enjoyed over the past decade-plus. Time will tell how the situation will play out. If the rhetoric coming from Washington is any indication, we should expect to see some legal wrangling happen in the future. 

What are your thoughts on this issue? Do you think that social media platforms should be able to censor content? Do you think they should be held liable for the content they allow to be distributed? Leave your thoughts in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 02 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Privacy Email Cloud Network Security Microsoft Software Hackers Efficiency Hosted Solutions Business Workplace Tips Data Computer Malware Communication Hardware Google IT Support IT Services Small Business Smartphone Mobile Devices Android Internet Cloud Computing Mobile Device Tech Term Data Recovery Backup Managed IT Services Smartphones Phishing Users Ransomware Innovation Windows VoIP Saving Money Outsourced IT Upgrade Information Cybersecurity Facebook Miscellaneous Windows 10 Social Media communications Disaster Recovery Data Backup Network Browser Server Business Management Office 365 Business Continuity Microsoft Office Passwords Productivity Quick Tips Managed IT Services Internet of Things Data Management Managed Service Windows 10 Vulnerability Remote Monitoring COVID-19 Gadgets Save Money Apps Analytics App Collaboration Word Gmail Money Chrome Managed Service Provider Remote Work Mobile Office Infrastructure Conferencing Government Artificial Intelligence Encryption Employer-Employee Relationship IT Support Networking Display Spam VPN Settings WiFi Access Control Applications Paperless Office Router Information Technology Google Drive Company Culture Virtual Reality Website Tip of the week Remote Workers BYOD Big Data HIPAA BDR Operating System IT Management Data Security Business Technology Robot Virtual Private Network Content Filtering Bandwidth Automation YouTube End of Support Unified Threat Management Apple Risk Management Education Employee-Employer Relationship Storage Maintenance Office Tips Firewall Avoiding Downtime Antivirus Development Document Management Computers Hacker Data storage Solid State Drive Software as a Service Break Fix Social Network Wireless Retail Alert Search Downtime Training Outlook Computing Hard Disk Drive Bring Your Own Device Mobile Security Marketing LiFi Vendor Management Social Monitors Humor Chromebook Hosted Solution Server Management Compliance Business Intelligence Best Practice iOS Administration Touchscreen Mouse Managed IT Tablet Data loss How To Regulations Telephone Systems Going Green desktop Managed Services Remote Computing MSP Augmented Reality Managing Stress SaaS Printing Two-factor Authentication Managed IT Service Wi-Fi Password OneNote Holiday Data Breach Customer Relationship Management Scam Virtualization Laptop Windows 7 IT The Internet of Things Deep Learning Managed Services Provider Fraud Cost Management Mobile Device Management Onboarding GDPR Time Management Printer Policy Identity Continuity Print Toner Myths Black Friday Politics Screen Reader Charging Identity Theft Slack Hard Disk Drives Smart Office Work/Life Balance Banking Wires Corporate Profile Alt Codes Messaging Emergency Customer Service Holidays Cybercrime Licensing Dongle Content Huawei Servers Google Calendar Solar G Suite Entertainment Vendor Dark Web Health Distribution Private Cloud Assessment Automobile Digital Signage Data Warehouse Network Management Office Samsung Procedure Budget Shortcuts Mobile Management Cyber Monday Tech Support Smart Tech Monitoring Solid State Drives Work Dell Legislation Reviews Voice over Internet Protocol WannaCry Typing Employee-Employer Relationships Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Hybrid Cloud Microsoft Excel Logistics Hotspot Internet Exlporer Google Maps Current Events Troubleshooting Business Analysis SharePoint Social Engineering PCI DSS Security Cameras Profiles Smart Technology Websites Connectivity Spying National Security Techology Twitter Halloween IT Technicians Optimization Statistics Remote Modem FinTech Cryptocurrency Analysis Students Lenovo Inventory Staff Leominster Human Error Memory Google Docs Scalability Mail Merge Blockchain Asset Management Language Value IT solutions Virus Downloads Safety Battery Utility Computing Shortcut Distributed Denial of Service IoT Digital Payment Hacks Updates VoIP Unified Threat Management Peripheral Scary Stories Mirgation Recycling Bluetooth Comparison Cookies Digital Bitcoin Mixed Reality Firefox Superfish Network Congestion Shadow IT Running Cable K-12 Schools Meetings Disaster Google Wallet Device Reducing Cost Buisness Social Networking Business Growth Migration Consulting Address Permissions Memes Computing Infrastructure Professional Services LED Threats Files Legal Laptops Patch Management Virtual Desktop Star Wars PowerPoint User Error Writing Management Sports Chatbots eWaste Batteries Specifications Nanotechnology Spyware Windows 8 Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Unified Communications Drones Mobility RMM Motherboard Cables Computer Care IBM Dark Data Update Alerts USB File Sharing Co-Managed IT Heating/Cooling Multi-Factor Security Computer Repair Relocation Error Mobile Data Point of Sale Ben McDonald shares How To Recovery Travel Mobile Computing Regulation Supercomputer CrashOverride Black Market Law Enforcement Staffing Motion Sickness Taxes Electronic Medical Records Administrator Notifications Physical Security IT Budget Web Server what was your? Upgrades Gadget GPS Emoji IT Consultant Printers Crowdsourcing Personal Information Botnet Cameras 3D Printing user treats Tracking Cortana Cleaning CCTV Machine Learning Processors Unsupported Software Webcam Financial

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3