Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Online Speech Isn’t (Usually) a Free Speech Issue

Why Online Speech Isn’t (Usually) a Free Speech Issue

It is undeniable that technology has become ingrained into our workplaces, and perhaps even more so into our daily lives—particularly considering the events of the past few years. This is likely why it is so surprising when a large tech company bans a user for some activity on their platform.

With all that is happening today, this surprise has largely turned into outrage over whether or not these companies can really ban people over what they share on the platform. Let’s go over the situation to try and glean from it some answers.

Before we begin, we just want to establish that we are not offering any legal advice here, just a bit of perspective.

First, a History Lesson

Contrary to popular belief, the concept of freedom of speech is far from a recent invention. For one of the first examples on record, we must turn to the Greek city of Athens, where the philosopher Socrates spoke the following at his trial in 339 BC: “If you offered to let me off this time on condition I am not any longer to speak my mind… I should say to you, Men of Athens, I shall obey the Gods rather than you.”

Many other thinkers over the centuries also supported the ideals of freedom—particularly, freedom of speech.

  • In 1516, Erasmus wrote The Education of a Christian Prince, and included, “In a free state, tongues too should be free.”
  • In 1644, the poet John Milton wrote in support of the freedom of the press in his pamphlet Aeropagitica that, “He who destroys a good book, kills reason itself.”
  • In 1770, Voltaire: “Monsieur l'abbé, I detest what you write, but I would give my life to make it possible for you to continue to write.”
  • In 1789,  The Declaration of the Rights of Man was written amidst the French Revolution and contained reference to the freedom of speech.

In the years since, countless more examples have popped up—the First Amendment to the United States’ Bill of Rights in 1791, the 1859 essay On Liberty by John Stuart Mill, and the unanimously voted upon Universal Declaration of Human Rights passed in 1948 that promoted freedom of expression to member nations—all these and more have expounded upon the right to speak one’s mind throughout history.

However, it has not been nearly that long since we have been able to speak to the entire world, as Internet technology was not invented until the 1960s, and the network only got its name in 1995. As such, there has since been some confusion over what is and isn’t “allowed” on the Internet, as well as what can and cannot be said.

Your Digital Rights

Today, the Internet permeates our daily lives, more than many of us might initially realize. Cloud services, many telecom connections, and a sizable portion of everything else we do ties back to the Internet in some way. We conduct business, communicate with friends and relatives, and essentially network ourselves using this greater shared network.

Censorship on the Internet?

However, there has been some dissonance with many people, as posts they have shared have been removed from online platforms. Some people have even been blocked from some networks entirely because of the ideas and opinions they have shared.

Taking it one step further lately, there have been entire platforms taken down, due to the content that has been posted there.

Many users of these platforms have taken offense to this, with cries of censorship and the infringement upon their rights to have their free speech stifled. However, what these users don’t understand is that these networks and platforms are well within their rights to take such actions—even though this seems to run counter to the concept of free speech in general.

Why Are Platforms Allowed to Take Down Content?

To understand this concept, it may help to turn our attention to the most famous example of government-ensured free speech: the First Amendment to the United States Constitution.

This amendment states that: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech, or of the press, or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”

While many might read this as “nobody can tell me not to say something I want to say,” the reality is that the government can’t tell somebody what to say… whether that’s in conversation, in print, or online.

However, most platforms like Facebook, Twitter, and the like, aren’t typically part of a governing body. They’re businesses, and as such can decide what they want to be associated with. This leaves these platforms and service providers in the clear to decide who they want to do business with. And, let’s be clear here: for many of these platforms, the users are the actual product.

Why You Should Read the Terms of Service

Think back to when you first signed up for a social media network—or any online service, for that matter. Part of the process was to click a little checkbox indicating that you agreed to their terms of service, or TOS.

The TOS is essentially that service’s code of conduct. By giving your consent to them, you agree that you are aware of the limitations that a given website has in terms of its user behavior while browsing it. The platforms that host these websites also have their own TOS that applies to the website as well.

The terms of service acts as a website’s rulebook, setting a precedent to what the website will and will not stand for. That way, the website can’t be seen as legally responsible for its users’ conduct and has the capability to cut off any users that breach their previously established terms. Those businesses that sustain these websites are also beholden to the platforms that allow them to host content. Amazon Web Services and other cloud vendors have demonstrated this as well by taking down entire websites that breach their TOS agreements. Once the data centers that these vendors provide don’t allow you to use their services, you will need to go somewhere else, or establish your own hosting environment. This is usually prohibitively expensive.

So, what is seen as a public service is (in reality) part of a regulated business. This means that the rights that many governments ensure simply don’t apply to websites and the web hosts that enable them.

Some Exceptions to the Such Rights and Rules

Admittedly, there are other issues at play throughout these discussions, making this less of a yes/no issue and more complicated. In the case of the First Amendment, many circumstances can also play out that can very well be restricted by the government. These include categories of speech like:

  • Obscenity
  • Fraud
  • Inciting speech
  • Intellectual property violation
  • Threats
  • Commercial advertising
  • Speech integral to illegal conduct or content

So, if a social media platform didn’t remove content that advertised something false, or was stolen from another source, or that infringed on someone else’s intellectual property, it could potentially be subject to fines and even government intervention… at least, so much is true in the United States.

What This Means to Businesses

Frankly, it means a lot. While the freedom of speech may be vast and wide-reaching, it isn’t by any means a get out of jail free card for organizations. This is why we see establishments refusing to work with or for certain people based on some as-of-yet unprotected status not seeing any governmental recourse, but suffering backlash from their audience.

Speech will have consequences, even if one has the right to say something. This is important to keep in mind.

So long as your speech or someone else’s isn’t infringing on the exceptions listed above (along with a few other circumstances that we recommend you take up with a lawyer) there is nothing that says you are protected from the judgement it brings.

As an IT provider, this was admittedly a little out of our wheelhouse, but it is important to understand that a platform or service provider is well within their rights to stifle or silence your or your business’ official opinions as you use them. Again, we recommend that any questions you have regarding this matter are directed toward a licensed legal professional.

Any questions about how to use your IT to better your business? Those we can handle. For this kind of assistance, reach out to our team at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Internet Hardware Efficiency IT Support User Tips Malware Privacy Email Phishing Workplace Tips Google Computer Collaboration IT Services Users Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Small Business Microsoft Workplace Strategy Data Backup Communication Smartphone Business Management VoIP Smartphones Android Saving Money Mobile Devices communications Data Recovery Passwords Backup Managed Service Managed IT Services Social Media Microsoft Office Upgrade Browser Disaster Recovery Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Miscellaneous Gadgets Remote Work Server Managed Service Provider Windows Current Events Information Productivity Outsourced IT Encryption Spam Holiday Employee/Employer Relationship AI Windows 10 Compliance Government Office Data Management Business Continuity Virtualization Blockchain Wi-Fi Training Business Technology Windows 10 Bandwidth Data Security Apps Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship Vendor Mobile Device Management Chrome Gmail Managed Services Budget Voice over Internet Protocol How To BDR BYOD Computing Hacker Applications Information Technology Avoiding Downtime Access Control Office 365 Tip of the week Conferencing WiFi Big Data Managed IT Services Operating System HIPAA Computers Router Virtual Private Network Risk Management Website Marketing Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Display Printer Paperless Office Windows 11 Infrastructure Monitoring 2FA IT Support Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Entertainment Administration Vulnerabilities Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN Employees YouTube Meetings Physical Security Integration Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays Data storage LiFi Data Storage Word Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Safety Maintenance Antivirus Sports Downloads Mouse iPhone Licensing Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Search Dark Web Cables Best Practice Trends Supply Chain Management Alert Application Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance IBM Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Organization Travel Social Networking Legislation Shortcuts Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Vendors Competition Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Knowledge Fraud Meta Google Drive User Error Microchip User Internet Exlporer Software as a Service Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Outsource IT IP Address Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Recovery Tactics Development Hard Drives Windows 8 Laptop Websites Mirgation Hypervisor Displays Domains Drones Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Refrigeration Management PCI DSS Halloween Chatbots Navigation Public Speaking Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Entrepreneur Scary Stories Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Fun Co-managed IT Twitter Alerts SQL Server Technology Care Deep Learning Download Net Neutrality Undo Financial Data Error History Business Communications Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Upload Procurement

Blog Archive