Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media is Being Scrutinized

Social Media is Being Scrutinized

It’s probably fair to label social media as one of the greatest inventions of the 21st century. Nearly half of the world’s population are active users of social media; and, that number would almost certainly be higher if more people had access to unencumbered broadband. Over the past few weeks, however, one of the most utilized social media services, the microblogging website Twitter, has sparked some controversy after they added an amendment to a tweet sent by the U.S. President Donald Trump suggesting it contained “potentially misleading information”. Today, we’ll briefly discuss what this showdown with the White House means for social media companies. 

To start, let’s go back a few years. In the aftermath of the 2016 Presidential election, another major social media company, Facebook, was under fire for allowing foreign companies to influence the outcome of the election through insite advertising. Google and Twitter were also caught up in the mess, but the scrutiny Facebook saw during the ordeal, well...really hasn’t gone away. 

The result was hearings, lots of hearings. The debate whether social media advertising--if it is broadcasting hateful, divisive, or misleading information--should be allowed on these platforms rages forward. Facebook stood by the First Amendment, even as it was embroiled in the Cambridge Analytica mess. Twitter, took a different approach. They enacted a Civic Integrity Policy. This policy allows them to mark political posts that contain false information. CEO Jack Dorsey stated, “We’ll continue to point out incorrect or disputed information about elections globally. And we will admit to and own any mistakes we make.”

This action was implemented on a Presidential tweet, and it has drawn the ire of the White House. They immediately stated that this policy allegedly prioritizes perspectives that ignore a conservative point of view. Twitter denies this.

Trump’s reaction to this was swift. The President signed executive order #13925 - Preventing Online Censorship, which gives the Federal Communications Commission the power to regulate social media’s censorship practices.

Soon after, the Center for Democracy and Technology filed a federal lawsuit with the President as the defendant stating that the executive order is unconstitutional and violates the company’s First Amendment rights. Whether a company is entitled to rights, will be a major point of contention in the days ahead. The CDT went on record stating that, because of the executive order, tech company executives believe it will actually work to limit free speech, as businesses will err on the side of caution to avoid risk of crossing federal regulators.

Do you believe that it is responsible for social media companies to warn viewers that powerful people could be lying? Leave your thoughts in the comments section below. Please be respectful.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 29 March 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Cybersecurity Quick Tips Business Management Users Upgrade Managed IT Services Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Server Save Money Data Recovery Cloud Computing Passwords Windows 10 Saving Money Tech Term Holiday Chrome Gadgets Virtualization Social Media Microsoft Office Managed IT Services Automation Managed Service Cybercrime Operating System Computers Facebook Artificial Intelligence BYOD Mobile Device Management Health Networking IT Support Hacking Internet of Things Wi-Fi Managed Service Provider Spam Remote Office 365 Telephone Systems Alert Information Information Technology Covid-19 Recovery Employer-Employee Relationship Bandwidth Router Social Engineering Mobility BDR Application Money Human Resources Encryption Applications Data Breach Big Data Remote Monitoring Law Enforcement App History Mobile Computing Password Apps Data Storage Patch Management Remote Computing Mobile Office Government Blockchain Private Cloud Paperless Office How To Office Tips Training Managed IT VPN Voice over Internet Protocol Settings Vulnerability Two-factor Authentication Windows 7 Word Google Drive Mouse HaaS Servers Avoiding Downtime Data Security Flexibility Marketing Wireless WiFi Bring Your Own Device IT solutions Entertainment Data Management Gmail Website Work/Life Balance Infrastructure Budget USB Firewall Employee/Employer Relationship Conferencing End of Support RMM Scam Education Physical Security Virtual Reality Safety Apple Data Protection Sports HIPAA Social Redundancy Vendor Management Keyboard User Error Meetings Risk Management Software as a Service Hacker Telephone System Staff Save Time Machine Learning Vendor Connectivity Remote Work The Internet of Things Lithium-ion battery Managed Services Display Cleaning Customer Service Environment Hard Drive IT Consultant Fax Server Battery Augmented Reality Shadow IT Fraud Legal Business Intelligence SaaS Computing Humor Remote Worker Internet Exlporer Audit Worker IT Management Cryptocurrency Botnet Network Congestion PDF IT Plan eWaste Comparison Digital Signage Proactive IT Unsupported Software CES Best Practice YouTube Charger Procurement Black Market Business Technology Content Management Wearable Technology Workplace Strategy Access Control Compliance Retail Net Neutrality Hard Drives OneNote Computer Care Instant Messaging Virus Robot Help Desk Excel Virtual Assistant Current Events Authentication Printing Document Management Unified Threat Management Telephony Computer Accessories Solid State Drive Wireless Technology Samsung Biometrics Virtual Desktop How to Downtime Value Managed Services Provider DDoS Update Data storage Spam Blocking Electronic Medical Records Automobile Database Printer SharePoint Bluetooth Remote Workers Google Docs Hiring/Firing Identity Theft Computing Infrastructure Going Green Processor Accountants Managed IT Service Emergency Security Cameras Reputation Tip of the week MSP Streaming Media Computer Tips webinar Microchip Tech Support Virtual CIO Public Cloud Thought Leadership OneDrive Employer Employee Relationship Credit Cards Content Biometric Security Professional Services Techology Laptop Password Management Peripheral Assessment Password Manager Antivirus Using Data Multi-Factor Security Windows 8 Customers Windows Server 2008 Digital Security Cameras Search Engine Twitter Copiers IT service Audiobook 5G Tools Touchpad NIST Quick Tip Television Business Mangement Smart Tech Trending Smartwatch Tablet Ergonomics Addiction Development Amazon Domains Politics OLED Advertising PCI DSS Public Computer Recycling Virtual Machine Practices IaaS Fiber Optics Transportation Maintenance Employee Regulations Wiring Notifications 2FA Computer Fan Cache Messaging Rootkit Amazon Web Services Consultant Cabling Bloatware Analytics Safe Mode Policy Criminal Hypervisor Workers Hosted Computing Trend Micro Benefits Tablets Relocation GDPR Dark mode FENG Wireless Internet SMS Online Shopping Best Available Default App Entrepreneur Video Games File Sharing Procedure IBM WIndows 7 Saving Time dark theme Inventory Shopping Smart Technology Specifications Shortcut Worker Commute Google Search Flash Camera Wire AI Evernote Experience IT Infrastructure Cost Management Travel Social Networking Scalability Bing Software Tips FinTech Supercomputer Emails Social Network Millennials Business Owner Sync Printers NarrowBand Smart Office Wireless Charging Investment User Employee/Employer Relationships PowerPoint Search Windows Media Player Employees Running Cable Windows 365 Netflix Two Factor Authentication Workforce ISP Memory iPhone Virtual Private Network Root Cause Analysis Video Conferencing Cables ROI Managing Stress Bitcoin Music Shortcuts HBO Sales Knowledge Project Management Point of Sale Nanotechnology Personal Telecommuting Cryptomining Files Skype Cameras Chromecast Data loss Supply Chain Management Cortana Digital Signature Batteries Troubleshooting Science Outlook Monitoring Leadership Warranty Uninterrupted Power Supply Windows 8.1 Digitize Colocation Start Menu Screen Mirroring HVAC Loyalty Google Apps Windows Server 2008 R2 Analysis Distributed Denial of Service Books Customer Relationship Management Monitor Frequently Asked Questions Customer relationships Administrator Email Best Practices Windows 10s Devices IT Assessment Manufacturing Analyitcs Mobile Programming Printer Server Cast Enterprise Content Management

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code