Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media is Being Scrutinized

Social Media is Being Scrutinized

It’s probably fair to label social media as one of the greatest inventions of the 21st century. Nearly half of the world’s population are active users of social media; and, that number would almost certainly be higher if more people had access to unencumbered broadband. Over the past few weeks, however, one of the most utilized social media services, the microblogging website Twitter, has sparked some controversy after they added an amendment to a tweet sent by the U.S. President Donald Trump suggesting it contained “potentially misleading information”. Today, we’ll briefly discuss what this showdown with the White House means for social media companies. 

To start, let’s go back a few years. In the aftermath of the 2016 Presidential election, another major social media company, Facebook, was under fire for allowing foreign companies to influence the outcome of the election through insite advertising. Google and Twitter were also caught up in the mess, but the scrutiny Facebook saw during the ordeal, well...really hasn’t gone away. 

The result was hearings, lots of hearings. The debate whether social media advertising--if it is broadcasting hateful, divisive, or misleading information--should be allowed on these platforms rages forward. Facebook stood by the First Amendment, even as it was embroiled in the Cambridge Analytica mess. Twitter, took a different approach. They enacted a Civic Integrity Policy. This policy allows them to mark political posts that contain false information. CEO Jack Dorsey stated, “We’ll continue to point out incorrect or disputed information about elections globally. And we will admit to and own any mistakes we make.”

This action was implemented on a Presidential tweet, and it has drawn the ire of the White House. They immediately stated that this policy allegedly prioritizes perspectives that ignore a conservative point of view. Twitter denies this.

Trump’s reaction to this was swift. The President signed executive order #13925 - Preventing Online Censorship, which gives the Federal Communications Commission the power to regulate social media’s censorship practices.

Soon after, the Center for Democracy and Technology filed a federal lawsuit with the President as the defendant stating that the executive order is unconstitutional and violates the company’s First Amendment rights. Whether a company is entitled to rights, will be a major point of contention in the days ahead. The CDT went on record stating that, because of the executive order, tech company executives believe it will actually work to limit free speech, as businesses will err on the side of caution to avoid risk of crossing federal regulators.

Do you believe that it is responsible for social media companies to warn viewers that powerful people could be lying? Leave your thoughts in the comments section below. Please be respectful.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Windows Upgrade Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Cloud Computing Office Passwords Windows 10 Gadgets Chrome Social Media Virtualization Tech Term Saving Money Holiday Microsoft Office Automation Managed Service Managed IT Services Operating System Artificial Intelligence Facebook Computers Cybercrime Wi-Fi Hacking Health BYOD Mobile Device Management Internet of Things Networking IT Support Alert Office 365 Managed Service Provider Remote Telephone Systems Information Technology Information Covid-19 Spam Social Engineering Mobility Employer-Employee Relationship Recovery Router BDR Bandwidth Big Data App Password History Money Encryption Mobile Computing Applications Human Resources Data Breach Application Law Enforcement Remote Monitoring How To Managed IT Office Tips Blockchain Training Paperless Office Apps Data Storage Patch Management VPN Remote Computing Government Mobile Office Private Cloud Bring Your Own Device Data Management Work/Life Balance Wireless Gmail Vulnerability Flexibility Marketing Windows 7 Word Settings WiFi Infrastructure Google Drive Voice over Internet Protocol IT solutions Entertainment Two-factor Authentication Website Servers Budget Avoiding Downtime Mouse HaaS Data Security Save Time Risk Management Hacker Cleaning Telephone System The Internet of Things Staff Software as a Service Lithium-ion battery Vendor Conferencing Machine Learning End of Support Managed Services Connectivity Display Remote Work Scam Education Physical Security Safety Firewall HIPAA Sports Employee/Employer Relationship Redundancy Keyboard Virtual Reality Vendor Management RMM Apple USB Social Data Protection User Error Meetings Retail Hard Drives CES Instant Messaging Value Procurement Excel Net Neutrality Workplace Strategy Data storage Robot Spam Blocking Business Technology Electronic Medical Records Content Management Automobile Biometrics Access Control Help Desk Printing Virtual Desktop Computing Infrastructure Virtual Assistant Hiring/Firing Going Green Authentication DDoS Managed Services Provider Virus SharePoint Database Unified Threat Management Battery Shadow IT Computer Accessories Update Legal Business Intelligence Remote Workers Customer Service Google Docs Audit Internet Exlporer Environment Worker Processor Identity Theft IT Management Fax Server Botnet PDF Hard Drive Printer IT Plan Bluetooth SaaS Proactive IT Augmented Reality Fraud Unsupported Software Computing Best Practice Network Congestion YouTube Remote Worker Charger eWaste Black Market IT Consultant Cryptocurrency Compliance OneNote Computer Care Humor Digital Signage Current Events Document Management Telephony Comparison Solid State Drive Wireless Technology Samsung How to Wearable Technology Downtime Files AI File Sharing Consultant IT Infrastructure Skype Specifications Data loss FinTech Chromecast Camera Inventory Analytics Bing Wire Troubleshooting Evernote Running Cable Outlook Leadership Social Network Start Menu Colocation Uninterrupted Power Supply Best Available Memory Investment Travel Millennials Screen Mirroring Employees Printers WIndows 7 Loyalty Employee/Employer Relationships Smart Office Books ISP Wireless Charging Frequently Asked Questions Windows 365 Monitor Mobile Windows 10s Video Conferencing ROI Shortcuts Workforce Cast Sales Virtual Private Network Bitcoin webinar Personal Streaming Media Science Emergency Cryptomining Cables Tip of the week Point of Sale Reputation Professional Services Public Cloud Supply Chain Management Tech Support Employer Employee Relationship Content PowerPoint Telecommuting Windows Media Player Techology Monitoring Laptop Project Management User Assessment Batteries Nanotechnology Customer Relationship Management Digitize Cortana Distributed Denial of Service Windows Server 2008 Windows 8.1 Customers Tools Analyitcs Windows Server 2008 R2 Digital Signature Audiobook Customer relationships Touchpad Warranty Managing Stress Programming Television IT Assessment HVAC Manufacturing Google Apps Email Best Practices Advertising Analysis Cameras Politics Devices Security Cameras Antivirus Computer Tips Administrator Public Computer Managed IT Service OneDrive Notifications Enterprise Content Management Windows 8 Transportation Biometric Security Regulations Virtual CIO IT service Computer Fan Peripheral MSP Rootkit Accountants Thought Leadership Credit Cards Digital Security Cameras Microchip Using Data Relocation Workers Copiers Password Management Tablet Benefits 5G Password Manager Multi-Factor Security Domains FENG Quick Tip Printer Server Twitter Smartwatch Video Games Ergonomics Search Engine IBM Maintenance Development NIST Smart Technology OLED Business Mangement Worker Commute IaaS Flash Experience Trending PCI DSS Bloatware Virtual Machine Smart Tech Addiction Employee Amazon Scalability Software Tips 2FA Supercomputer Fiber Optics Emails Messaging Tablets Cabling Recycling Business Owner Sync Policy NarrowBand Wiring Entrepreneur Hypervisor Practices Cache Amazon Web Services Search Dark mode Trend Micro iPhone Shortcut Netflix SMS Safe Mode Two Factor Authentication Default App Criminal Root Cause Analysis Procedure GDPR Cost Management Saving Time Hosted Computing Wireless Internet Music Google Search Online Shopping HBO dark theme Social Networking Knowledge Shopping

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code