Page 80 TITLE 47—TELEGRAPHS, TELEPHONES, AND

Total Page:16

File Type:pdf, Size:1020Kb

Page 80 TITLE 47—TELEGRAPHS, TELEPHONES, AND § 230 TITLE 47—TELEGRAPHS, TELEPHONES, AND RADIOTELEGRAPHS Page 80 (3) Joint board technologies that empower parents to restrict The Commission shall convene a Federal- their children’s access to objectionable or in- State joint board to recommend appropriate appropriate online material; and changes to part 36 of the Commission’s rules (5) to ensure vigorous enforcement of Fed- with respect to recovery of costs pursuant to eral criminal laws to deter and punish traf- charges, practices, classifications, and regula- ficking in obscenity, stalking, and harassment tions under the jurisdiction of the Commis- by means of computer. sion. (c) Protection for ‘‘Good Samaritan’’ blocking and screening of offensive material (June 19, 1934, ch. 652, title II, § 229, as added Pub. L. 103–414, title III, § 301, Oct. 25, 1994, 108 (1) Treatment of publisher or speaker Stat. 4292.) No provider or user of an interactive com- puter service shall be treated as the publisher REFERENCES IN TEXT or speaker of any information provided by an- The Communications Assistance for Law Enforce- other information content provider. ment Act, referred to in subsecs. (a) and (e), is title I (2) Civil liability of Pub. L. 103–414, Oct. 25, 1994, 108 Stat. 4279, which is classified generally to subchapter I (§ 1001 et seq.) of No provider or user of an interactive com- chapter 9 of this title. For complete classification of puter service shall be held liable on account this Act to the Code, see Short Title note set out under of— section 1001 of this title and Tables. (A) any action voluntarily taken in good This chapter, referred to in subsecs. (d) and (e)(2), was faith to restrict access to or availability of in the original ‘‘this Act’’, meaning act June 19, 1934, ch. 652, 48 Stat. 1064, known as the Communications Act material that the provider or user considers of 1934, which is classified principally to this chapter. to be obscene, lewd, lascivious, filthy, exces- For complete classification of this Act to the Code, see sively violent, harassing, or otherwise objec- section 609 of this title and Tables. tionable, whether or not such material is constitutionally protected; or § 230. Protection for private blocking and screen- (B) any action taken to enable or make ing of offensive material available to information content providers (a) Findings or others the technical means to restrict ac- 1 The Congress finds the following: cess to material described in paragraph (1). (1) The rapidly developing array of Internet (d) Obligations of interactive computer service and other interactive computer services avail- A provider of interactive computer service able to individual Americans represent an ex- shall, at the time of entering an agreement with traordinary advance in the availability of edu- a customer for the provision of interactive com- cational and informational resources to our puter service and in a manner deemed appro- citizens. priate by the provider, notify such customer (2) These services offer users a great degree that parental control protections (such as com- of control over the information that they re- puter hardware, software, or filtering services) ceive, as well as the potential for even greater are commercially available that may assist the control in the future as technology develops. customer in limiting access to material that is (3) The Internet and other interactive com- harmful to minors. Such notice shall identify, or puter services offer a forum for a true diver- provide the customer with access to information sity of political discourse, unique opportuni- identifying, current providers of such protec- ties for cultural development, and myriad ave- tions. nues for intellectual activity. (e) Effect on other laws (4) The Internet and other interactive com- (1) No effect on criminal law puter services have flourished, to the benefit of all Americans, with a minimum of govern- Nothing in this section shall be construed to ment regulation. impair the enforcement of section 223 or 231 of (5) Increasingly Americans are relying on this title, chapter 71 (relating to obscenity) or interactive media for a variety of political, 110 (relating to sexual exploitation of children) educational, cultural, and entertainment serv- of title 18, or any other Federal criminal stat- ices. ute. (b) Policy (2) No effect on intellectual property law It is the policy of the United States— Nothing in this section shall be construed to (1) to promote the continued development of limit or expand any law pertaining to intellec- the Internet and other interactive computer tual property. services and other interactive media; (3) State law (2) to preserve the vibrant and competitive Nothing in this section shall be construed to free market that presently exists for the prevent any State from enforcing any State Internet and other interactive computer serv- law that is consistent with this section. No ices, unfettered by Federal or State regula- cause of action may be brought and no liabil- tion; ity may be imposed under any State or local (3) to encourage the development of tech- law that is inconsistent with this section. nologies which maximize user control over (4) No effect on communications privacy law what information is received by individuals, families, and schools who use the Internet and Nothing in this section shall be construed to other interactive computer services; limit the application of the Electronic Com- (4) to remove disincentives for the develop- ment and utilization of blocking and filtering 1 So in original. Probably should be ‘‘subparagraph (A).’’ Page 81 TITLE 47—TELEGRAPHS, TELEPHONES, AND RADIOTELEGRAPHS § 231 munications Privacy Act of 1986 or any of the EFFECTIVE DATE OF 1998 AMENDMENT amendments made by such Act, or any similar Amendment by Pub. L. 105–277 effective 30 days after State law. Oct. 21, 1998, see section 1406 of Pub. L. 105–277, set out (f) Definitions as a note under section 223 of this title. As used in this section: § 231. Restriction of access by minors to mate- rials commercially distributed by means of (1) Internet World Wide Web that are harmful to minors The term ‘‘Internet’’ means the inter- national computer network of both Federal (a) Requirement to restrict access and non-Federal interoperable packet (1) Prohibited conduct switched data networks. Whoever knowingly and with knowledge of (2) Interactive computer service the character of the material, in interstate or foreign commerce by means of the World Wide The term ‘‘interactive computer service’’ Web, makes any communication for commer- means any information service, system, or ac- cial purposes that is available to any minor cess software provider that provides or enables and that includes any material that is harmful computer access by multiple users to a com- to minors shall be fined not more than $50,000, puter server, including specifically a service or imprisoned not more than 6 months, or both. system that provides access to the Internet and such systems operated or services offered (2) Intentional violations by libraries or educational institutions. In addition to the penalties under paragraph (1), whoever intentionally violates such para- (3) Information content provider graph shall be subject to a fine of not more The term ‘‘information content provider’’ than $50,000 for each violation. For purposes of means any person or entity that is respon- this paragraph, each day of violation shall sible, in whole or in part, for the creation or constitute a separate violation. development of information provided through (3) Civil penalty the Internet or any other interactive com- puter service. In addition to the penalties under para- graphs (1) and (2), whoever violates paragraph (4) Access software provider (1) shall be subject to a civil penalty of not The term ‘‘access software provider’’ means more than $50,000 for each violation. For pur- a provider of software (including client or poses of this paragraph, each day of violation server software), or enabling tools that do any shall constitute a separate violation. one or more of the following: (b) Inapplicability of carriers and other service (A) filter, screen, allow, or disallow con- providers tent; For purposes of subsection (a) of this section, (B) pick, choose, analyze, or digest con- a person shall not be considered to make any tent; or communication for commercial purposes to the (C) transmit, receive, display, forward, extent that such person is— cache, search, subset, organize, reorganize, (1) a telecommunications carrier engaged in or translate content. the provision of a telecommunications service; (June 19, 1934, ch. 652, title II, § 230, as added (2) a person engaged in the business of pro- Pub. L. 104–104, title V, § 509, Feb. 8, 1996, 110 viding an Internet access service; Stat. 137; amended Pub. L. 105–277, div. C, title (3) a person engaged in the business of pro- XIV, § 1404(a), Oct. 21, 1998, 112 Stat. 2681–739.) viding an Internet information location tool; or REFERENCES IN TEXT (4) similarly engaged in the transmission, The Electronic Communications Privacy Act of 1986, storage, retrieval, hosting, formatting, or referred to in subsec. (e)(4), is Pub. L. 99–508, Oct. 21, translation (or any combination thereof) of a 1986, 100 Stat. 1848, as amended. For complete classi- communication made by another person, with- fication of this Act to the Code, see Short Title of 1986 Amendment note set out under section 2510 of Title 18, out selection or alteration of the content of Crimes and Criminal Procedure, and Tables. the communication, except that such person’s deletion of a particular communication or ma- CODIFICATION terial made by another person in a manner Section 509 of Pub. L. 104–104, which directed amend- consistent with subsection (c) of this section ment of title II of the Communications Act of 1934 (47 or section 230 of this title shall not constitute U.S.C.
Recommended publications
  • Section 230 of the Communications Decency Act: Research Library Perspectives June 2021 by Katherine Klosek
    Issue Brief Section 230 of the Communications Decency Act: Research Library Perspectives June 2021 By Katherine Klosek With thanks to Jonathan Band, General Counsel at ARL; Greg Cram, Director of Copyright, Permissions & Information Policy at New York Public Library; and Judy Ruttenberg, Senior Director of Scholarship and Policy at ARL Introduction 3 Background 3 Section 230 of the Communications Decency Act 5 Libraries and Section 230 7 FOSTA: The Allow States and Victims to Fight Online Sex Trafcking Act 9 Discussion 10 Appendix: Discussion Guide 12 Access to Information 12 Afordability 12 Anti-harassment 12 Diversity 13 Open Internet 13 Political Neutrality/Freedom of Expression 14 Privacy 14 Issue Brief: Section 230 of the Communications Decency Act—June 2021 2 Introduction The 117th US Congress is holding hearings and debating bills on changes to Section 230 of the Communications Decency Act (CDA), a 1996 law that protects internet service providers and internet users from liability for content shared by third parties. When it was enacted, Section 230 ofered liability protections for then- nascent services that are integral to the development of the internet we have today. But Section 230 has come under fre from Democrats who believe internet service providers are not engaging in responsible content moderation, and from Republicans who believe that large social media companies censor conservative voices. This myopic debate ignores the longstanding role that research libraries have played as internet service providers, and the vast experience research libraries have in moderating and publishing content. More information on this topic can be found in the “Discussion” section of this brief.
    [Show full text]
  • An Overview of the Communication Decency Act's Section
    Legal Sidebari Liability for Content Hosts: An Overview of the Communication Decency Act’s Section 230 Valerie C. Brannon Legislative Attorney June 6, 2019 Section 230 of the Communications Act of 1934, enacted as part of the Communications Decency Act of 1996 (CDA), broadly protects online service providers like social media companies from being held liable for transmitting or taking down user-generated content. In part because of this broad immunity, social media platforms and other online content hosts have largely operated without outside regulation, resulting in a mostly self-policing industry. However, while the immunity created by Section 230 is significant, it is not absolute. For example, courts have said that if a service provider “passively displays content that is created entirely by third parties,” Section 230 immunity will apply; but if the service provider helps to develop the problematic content, it may be subject to liability. Commentators and regulators have questioned in recent years whether Section 230 goes too far in immunizing service providers. In 2018, Congress created a new exception to Section 230 in the Allow States and Victims to Fight Online Sex Trafficking Act of 2017, commonly known as FOSTA. Post-FOSTA, Section 230 immunity will not apply to bar claims alleging violations of certain sex trafficking laws. Some have argued that Congress should further narrow Section 230 immunity—or even repeal it entirely. This Sidebar provides background information on Section 230, reviewing its history, text, and interpretation in the courts. Legislative History Section 230 was enacted in early 1996, in the CDA’s Section 509, titled “Online Family Empowerment.” In part, this provision responded to a 1995 decision issued by a New York state trial court: Stratton- Oakmont, Inc.
    [Show full text]
  • Google V. Hood
    Case 3:14-cv-00981-HTW-LRA Document 37-1 Filed 01/22/15 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF MISSISSIPPI NORTHERN DIVISION GOOGLE, INC. PLAINTIFF VS. CIVIL ACTION NO. 3:14-cv-981-HTW-LRA JIM HOOD, ATTORNEY GENERAL OF THE STATE OF MISSISSIPPI, IN HIS OFFICIAL CAPACITY DEFENDANT PROPOSED MEMORANDUM OF AMICUS CURIAE INTERNATIONAL ANTICOUNTERFEITING COALITION I. INTEREST OF AMICUS CURIAE The International AntiCounterfeiting Coalition (“IACC”) is a nonprofit corporation recognized as tax-exempt under Internal Revenue Code § 501(c)(6). It has no parent corporation, and no publicly held corporation owns 10% or more of its stock. The IACC was established in 1979 to combat counterfeiting and piracy by promoting laws, regulations, directives, and relationships designed to render the theft of intellectual property undesirable and unprofitable. 1 Counterfeiting and piracy are scourges that threaten consumer health and safety and drain billions of dollars from the U.S. economy. The IACC is the oldest and largest organization in the country devoted exclusively to combating these threats. Today the IACC’s members include more than 230 companies in the pharmaceutical, health and beauty, automotive, fashion, food and beverage, computer and electronics, and entertainment industries, among others. The IACC offers anti-counterfeiting programs designed to increase protection for patents, trademarks, copyrights, service marks, trade dress and trade secrets. Critical to the IACC's 1 IACC states that no party’s counsel authored this brief in whole or in part; no party or party’s counsel contributed money that was intended to fund preparing or submitting this brief; and no person, other than the amicus curiae and its members, contributed money that was intended to fund preparing or submitting this brief.
    [Show full text]
  • Social Media Immunity in 2021 and Beyond: Will Platforms Continue to Avoid Litigation Exposure Faced by Offline Counterparts
    Social Media Immunity in 2021 and Beyond: Will Platforms Continue to Avoid Litigation Exposure Faced by Offline Counterparts By: Peter J. Pizzi Peter J. Pizzi, CIPPE/US, is a business trial lawyer with decades of experience in commercial litigation, internal investigations, technology litigation, eDiscovery, and labor and employment law. A Certified Civil Trial Attorney, Peter represents corporate clients in a broad array of industries, including healthcare, pharmaceuticals, financial services, information technology, cosmetics, industrial equipment, food service and others. Recent highlights include a federal court jury verdict on a contract claim arising from an acquisition and pre-discovery dismissals of consumer class actions in the convenience store retail and private aviation industries. A member of the New Jersey, New York and Pennsylvania bars, Peter is former Chair of IADC’s Cyber Security, Data Privacy and Technology Committee. URING the 2020 election cycle, companies from being held liable for both the United States transmitting or taking down user- D presidential candidates generated content (UGC). Twice in called for changes to Section 230 of 2020, the Senate held hearings, with the Communications Decency Act of both sides demanding change to the 1996, which protects online service statute and to platform moderation providers like social media practices.1 Then, following the 1 Cat Zakrzewski and Rachel Lerman, The election was a chance for Facebook and Twitter to show they could control misinformation. Now lawmakers are grilling them on it, WASH. POST (Nov. 17, 2020), https://www.washingtonpost.com/techno 2 DEFENSE COUNSEL JOURNAL | JULY 2021 January 6, 2021 Capitol Hill riot, I. Origins Donald Trump and others within his circle were de-platformed by Defamation actions brought in Twitter, Facebook, and YouTube.
    [Show full text]
  • Section 230 Legislation in the 117Th Congress
    Section 230 Legislation in the 117th Congress 47 USC 230, commonly referred to as Section 230, was passed as part of the Communications Decency Act of 1996. Section 230 provides immunity for website platforms for third-party content posted on their platforms and allows platforms to remove or restrict content the service provider finds objectionable. This immunity has allowed the ad-supported internet to grow over the past 25 years without publishers facing crippling lawsuits for user-posted content. Both parties have raised issues about this immunity and support repeal or modification – for different reasons. Republicans, including Senators Josh Hawley (R-MO) and Ted Cruz (R-TX), believe that platforms use Section 230 to censor the views of conservatives. Democrats, such as Senators Mark Warner (D-VA) and Amy Klobuchar (D-MN), want to remove the protections of Section 230 from ads and paid content, while allowing users to sue over content that threatens them with harassment or discrimination. Senate Bill Number Bill Title S. 47 Adversarial Platform Prevention Act of 2021 (APP Act) Sponsor Description Rubio (R-FL) This bill would require owners and operators of covered foreign software to provide consumers with a warning prior to the download of the software and requires annual reports to the FTC and DOJ on the privacy practices of the owner concerning US users. It would also remove Section 230 protection from owners of covered foreign software. Cosponsors History None 1.26.2021: Introduced in Senate 1.26.2021: Referred to the Senate Committee on Commerce, Science, and Transportation Bill Number Bill Title S.
    [Show full text]
  • Platform Justice: Content Moderation at an Inflection Point 3
    A HOOVER INSTITUTION ESSAY ON Platform Justice C ONTENT MODERATION at an INFLECTION POINT DANIELLE CITRON & QUINTA JURECIC Aegis Series Paper No. 1811 In June 2016, Facebook Vice President Andrew Bosworth circulated an internal memorandum describing the company’s mission. “We connect people,” he wrote. “Maybe someone finds love. Maybe [Facebook] even saves the life of someone on the brink of suicide. Maybe it costs a life by exposing someone to bullies. Maybe someone dies in a terrorist attack coordinated on our tools.”1 Bosworth was not speaking metaphorically. The month after he distributed the memo, Facebook was sued by the parents of five victims of terrorist attacks conducted by Hamas, which had made extensive use of the company’s platform to recruit and organize. Days before, the social media platform had inadvertently broadcast a murder over the streaming app Facebook Live. National Security, Technology, and Law and Technology, Security, National Yet the outrage Facebook weathered in the aftermath of this violence was nothing compared to the scathing criticism it endured two years later after Buzzfeed News published Bosworth’s memo. When the memo leaked in March 2018, Facebook was neck-deep in controversies over its influence on the 2016 presidential election, including the use of the platform’s ad-targeting function by Russian trolls to sow political discord and the harvesting of user data under false pretenses by the Trump-affiliated political consultancy Cambridge Analytica.2 Meanwhile, Facebook’s competitors, Twitter and Google, faced mounting criticism over their failure to curb disinformation and abusive content.3 In 2016, Bosworth’s memo might have been an awkward attempt at self-reflection.
    [Show full text]
  • Corynne Mcsherry, Ph.D
    The Subcommittee on Communications and Technology and the Subcommittee on Consumer Protection and Commerce of the Committee on Energy and Commerce Joint Hearing: “Fostering a Healthier Internet to Protect Consumers” Statement of Corynne McSherry, Ph.D. Legal Director Electronic Frontier Foundation October 16, 2019 As Legal Director for the Electronic Frontier Foundation, I thank Chairman Pallone, Ranking Member Walden and Members of the Subcommittee on Communications and Technology and the Subcommittee on Consumer Protection and Commerce for the opportunity to share EFF’s views on how to create a healthier Internet and protect all of its users. EFF is a donor-funded nonprofit, with contributions from more than 30,000 dues-paying members from around the world forming the backbone of our financial support. The majority of EFF’s funding comes from ordinary individuals, and over 80% of that funding consists of donations under $10,000. We receive less than six and a half percent of our funding from corporate sponsors.1 For nearly 30 years, EFF has represented the interests of technology users both in court cases and in broader policy debates to help ensure that law and technology support our civil liberties. From that vantage point, we are well aware that online speech is not always pretty—sometimes it’s extremely ugly and causes real-world harm. The effects of this kind of speech are often disproportionately felt by communities for whom the Internet has also provided invaluable tools to organize, educate, and connect. Systemic discrimination does not disappear and can even be amplified online. Given the paucity and inadequacy of tools for users themselves to push back, it’s no surprise that many would look to Internet intermediaries to do more to limit such speech.
    [Show full text]
  • Section 230 and the Twitter Presidency
    Copyright 2020 by Michael A. Cheah Vol. 115 Northwestern University Law Review SECTION 230 AND THE TWITTER PRESIDENCY Michael A. Cheah ABSTRACT—In response to Twitter’s decision to label one of the President’s tweets misleading, the Trump White House issued an executive order to limit the scope of Section 230 of the Communications Decency Act via agency rulemaking. In the Order, Trump calls for the Federal Communications Commission (FCC) to “interpret” Section 230 in a manner that curtails websites’ ability to remove and restrict user speech. This Essay analyzes the Order and concludes that the President’s effort to limit Section 230 will fail. First, the FCC does not have rulemaking authority to issue the proposed rules. Second, the proposed rules cannot be issued because they are inconsistent with the statute. Finally, this Essay will discuss the policy implications of the proposed rules and argue that they would lead to less speech and engagement on the Internet, not more of it. AUTHOR—General Counsel of Vimeo, Inc. and adjunct faculty at the University of Miami School of Law. A big thank you to my colleague Erika Barros Sierra Cordera at Vimeo for help in researching and editing, Professor Caroline Mala Corbin at the University of Miami School of Law for her excellent feedback, and the Northwestern University Law Review for their diligent and timely work in shepherding this Essay to publication. 192 115:192 (2020) Section 230 and the Twitter Presidency INTRODUCTION ............................................................................................................. 193 I. SECTION 230 OF THE COMMUNICATIONS DECENCY ACT ....................................... 196 A. The Genesis of Section 230 .........................................................................
    [Show full text]
  • Petition for Rulemaking of the National Telecommunications and Information Administration
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Section 230 of the ) File No. RM-_____ Communications Act of 1934 ) To: The Commission PETITION FOR RULEMAKING OF THE NATIONAL TELECOMMUNICATIONS AND INFORMATION ADMINISTRATION National Telecommunications and Information Administration U.S. Department of Commerce 1401 Constitution Avenue, NW Washington, DC 20230 (202) 482-1816 July 27, 2020 TABLE OF CONTENTS I. STATEMENT OF INTEREST ............................................................................................ 3 II. SUMMARY OF ARGUMENT ............................................................................................ 3 III. THE COMMISSION SHOULD ACT TO PROTECT FREE SPEECH ONLINE .... 6 IV. RELEVANT FACTS AND DATA: TECHNOLOGICAL AND MARKET ............... 9 V. THE AUTHORITY AND NEED FOR ISSUING REGULATIONS FOR SECTION 230 ............................................................................................................................................... 15 A. The Commission’s Power to Interpret Section 230 of the Communications Decency Act ............................................................................................................................................... 15 B. Background to Section 230 ................................................................................................. 18 C. Section 230(c)’s Structure .................................................................................................. 22 D. Expansive Court Rulings
    [Show full text]
  • The Communications Decency Act in Inaction
    HSIA – FINAL TWITTER TROUBLE: THE COMMUNICATIONS DECENCY ACT IN INACTION Julie Hsia∗ The Communications Decency Act affords Internet service providers (ISPs) immunity from liability for defamation, among other crimes, to allow self-policing of websites. However, due to this immunity, websites have no incentive to remove defamatory content, which undermines the entire purpose of the Communications Decency Act. To improve this statute and promote the removal of defamatory content, the United States should follow in the footsteps of countries with more effective Internet laws. This Note presupposes that a higher percentage of Twitter removal requests in which Twitter has withheld some content indicates a higher efficacy of the Internet laws in those countries. The data published by Twitter shows that France, Germany, Japan, the Netherlands, and Russia are the top five countries in terms of percentage of removal requests with which Twitter has complied. Four of these five countries have laws similar to the notice and takedown provision of the Digital Millennium Copyright Act, which requires an Internet service provider to quickly remove content once made aware of its unlawful nature. Therefore, a notice and takedown provision with a critical opinion safe harbor should be added to the Communications Decency Act. ∗ J.D. Candidate 2017, Columbia Law School; B.A. 2014, Wesleyan University. Many thanks to Professor Philippa Loengard for her invaluable guidance and feedback on this Note. Additional thanks to Samantha Adler, Hilary Greenwald, and the staff of the Columbia Business Law Review for their outstanding editing and assistance in preparing this Note for publication. Lastly, special thanks to my family and friends for their love and support.
    [Show full text]
  • Cloudflare-10-K-2019.Pdf
    Table of contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 __________________________________________________ FORM 10-K __________________________________________________ (Mark One) ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2019 or ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number: 001-39039 __________________________________________________ Cloudflare, Inc. (Exact name of registrant as specified in its charter) __________________________________________________ Delaware 27-0805829 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification Number) 101 Townsend Street San Francisco, California 94107 (Address of principal executive offices and zip code) (888) 993-5273 (Registrant’s telephone number, including area code) __________________________________________________ Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Trading Symbol Name of Each Exchange on Which Registered Class A Common Stock, $0.001 par value NET The New York Stock Exchange Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ☐ No ☒ Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15 (d) of the Act. Yes ☐ No ☒ Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Reforming Section 230 and Platform Liability
    REFORMING SECTION 230 AND PLATFORM LIABILITY STANFORD UNIVERSITY Dr. Mary Anne Franks Professor of Law and Dean’s Distinguished Scholar, University of Miami School of Law President and Legislative & Tech Policy Director, Cyber Civil Rights Initiative REFORMING SECTION 230 AND PLATFORM LIABILITY Insulating the tech industry from liability for online extremism, abuse, and misinformation has threatened free expression, worsened existing inequalities of gender, race, and class, and gravely undermined democracy. The tech industry can no longer be exempted from the principle of collective responsibility for harm. THE PROBLEM On Jan. 8, 2021, two days after a violent mob attacked the United States Capitol in an attempt to prevent Congress’s certification of the 2020 presidential election, the social media platform Twitter permanently banned President Donald Trump’s personal account. Twitter had temporarily locked the @realDonaldTrump account on Jan. 6 after Trump posted a video and a statement repeating false claims about the election and expressing his “love” for the rioters, requiring Trump to delete the tweets before being able to post again. At the time of the lockout, the Twitter Safety team noted that if Trump violated Twitter’s policies again his account would be banned. In a blog post on Jan. 8, the company explained that it had determined that two of Trump’s tweets following the riots, one referencing “American Patriots” and another stating that Trump would not be attending President-Elect Joseph R. Biden’s inauguration, were “likely to inspire others to replicate the violent acts that took place on Jan. 6, 2021, and that there are multiple indicators that they are being received and understood as encouragement to do so.” The rioters who attacked the Capitol on Jan.
    [Show full text]