Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Online Speech Isn’t (Usually) a Free Speech Issue

Why Online Speech Isn’t (Usually) a Free Speech Issue

It is undeniable that technology has become ingrained into our workplaces, and perhaps even more so into our daily lives—particularly considering the events of the past few years. This is likely why it is so surprising when a large tech company bans a user for some activity on their platform.

With all that is happening today, this surprise has largely turned into outrage over whether or not these companies can really ban people over what they share on the platform. Let’s go over the situation to try and glean from it some answers.

Before we begin, we just want to establish that we are not offering any legal advice here, just a bit of perspective.

First, a History Lesson

Contrary to popular belief, the concept of freedom of speech is far from a recent invention. For one of the first examples on record, we must turn to the Greek city of Athens, where the philosopher Socrates spoke the following at his trial in 339 BC: “If you offered to let me off this time on condition I am not any longer to speak my mind… I should say to you, Men of Athens, I shall obey the Gods rather than you.”

Many other thinkers over the centuries also supported the ideals of freedom—particularly, freedom of speech.

  • In 1516, Erasmus wrote The Education of a Christian Prince, and included, “In a free state, tongues too should be free.”
  • In 1644, the poet John Milton wrote in support of the freedom of the press in his pamphlet Aeropagitica that, “He who destroys a good book, kills reason itself.”
  • In 1770, Voltaire: “Monsieur l'abbé, I detest what you write, but I would give my life to make it possible for you to continue to write.”
  • In 1789,  The Declaration of the Rights of Man was written amidst the French Revolution and contained reference to the freedom of speech.

In the years since, countless more examples have popped up—the First Amendment to the United States’ Bill of Rights in 1791, the 1859 essay On Liberty by John Stuart Mill, and the unanimously voted upon Universal Declaration of Human Rights passed in 1948 that promoted freedom of expression to member nations—all these and more have expounded upon the right to speak one’s mind throughout history.

However, it has not been nearly that long since we have been able to speak to the entire world, as Internet technology was not invented until the 1960s, and the network only got its name in 1995. As such, there has since been some confusion over what is and isn’t “allowed” on the Internet, as well as what can and cannot be said.

Your Digital Rights

Today, the Internet permeates our daily lives, more than many of us might initially realize. Cloud services, many telecom connections, and a sizable portion of everything else we do ties back to the Internet in some way. We conduct business, communicate with friends and relatives, and essentially network ourselves using this greater shared network.

Censorship on the Internet?

However, there has been some dissonance with many people, as posts they have shared have been removed from online platforms. Some people have even been blocked from some networks entirely because of the ideas and opinions they have shared.

Taking it one step further lately, there have been entire platforms taken down, due to the content that has been posted there.

Many users of these platforms have taken offense to this, with cries of censorship and the infringement upon their rights to have their free speech stifled. However, what these users don’t understand is that these networks and platforms are well within their rights to take such actions—even though this seems to run counter to the concept of free speech in general.

Why Are Platforms Allowed to Take Down Content?

To understand this concept, it may help to turn our attention to the most famous example of government-ensured free speech: the First Amendment to the United States Constitution.

This amendment states that: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech, or of the press, or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”

While many might read this as “nobody can tell me not to say something I want to say,” the reality is that the government can’t tell somebody what to say… whether that’s in conversation, in print, or online.

However, most platforms like Facebook, Twitter, and the like, aren’t typically part of a governing body. They’re businesses, and as such can decide what they want to be associated with. This leaves these platforms and service providers in the clear to decide who they want to do business with. And, let’s be clear here: for many of these platforms, the users are the actual product.

Why You Should Read the Terms of Service

Think back to when you first signed up for a social media network—or any online service, for that matter. Part of the process was to click a little checkbox indicating that you agreed to their terms of service, or TOS.

The TOS is essentially that service’s code of conduct. By giving your consent to them, you agree that you are aware of the limitations that a given website has in terms of its user behavior while browsing it. The platforms that host these websites also have their own TOS that applies to the website as well.

The terms of service acts as a website’s rulebook, setting a precedent to what the website will and will not stand for. That way, the website can’t be seen as legally responsible for its users’ conduct and has the capability to cut off any users that breach their previously established terms. Those businesses that sustain these websites are also beholden to the platforms that allow them to host content. Amazon Web Services and other cloud vendors have demonstrated this as well by taking down entire websites that breach their TOS agreements. Once the data centers that these vendors provide don’t allow you to use their services, you will need to go somewhere else, or establish your own hosting environment. This is usually prohibitively expensive.

So, what is seen as a public service is (in reality) part of a regulated business. This means that the rights that many governments ensure simply don’t apply to websites and the web hosts that enable them.

Some Exceptions to the Such Rights and Rules

Admittedly, there are other issues at play throughout these discussions, making this less of a yes/no issue and more complicated. In the case of the First Amendment, many circumstances can also play out that can very well be restricted by the government. These include categories of speech like:

  • Obscenity
  • Fraud
  • Inciting speech
  • Intellectual property violation
  • Threats
  • Commercial advertising
  • Speech integral to illegal conduct or content

So, if a social media platform didn’t remove content that advertised something false, or was stolen from another source, or that infringed on someone else’s intellectual property, it could potentially be subject to fines and even government intervention… at least, so much is true in the United States.

What This Means to Businesses

Frankly, it means a lot. While the freedom of speech may be vast and wide-reaching, it isn’t by any means a get out of jail free card for organizations. This is why we see establishments refusing to work with or for certain people based on some as-of-yet unprotected status not seeing any governmental recourse, but suffering backlash from their audience.

Speech will have consequences, even if one has the right to say something. This is important to keep in mind.

So long as your speech or someone else’s isn’t infringing on the exceptions listed above (along with a few other circumstances that we recommend you take up with a lawyer) there is nothing that says you are protected from the judgement it brings.

As an IT provider, this was admittedly a little out of our wheelhouse, but it is important to understand that a platform or service provider is well within their rights to stifle or silence your or your business’ official opinions as you use them. Again, we recommend that any questions you have regarding this matter are directed toward a licensed legal professional.

Any questions about how to use your IT to better your business? Those we can handle. For this kind of assistance, reach out to our team at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Upgrade Managed Service Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Artificial Intelligence Facebook Automation Productivity Cloud Computing Gadgets Covid-19 Miscellaneous AI Remote Work Server Managed Service Provider Information Holiday Outsourced IT Encryption Spam Employee/Employer Relationship Compliance Windows 10 Office Data Management Business Continuity Government Training Windows 10 Bandwidth Blockchain Virtualization Business Technology Wi-Fi Data Security Apps Two-factor Authentication Mobile Office Managed Services Mobile Device Management Voice over Internet Protocol Networking Chrome Gmail Budget Apple BYOD Vendor App Employer-Employee Relationship IT Support How To BDR WiFi Applications Access Control Computing Tip of the week Hacker Information Technology Conferencing Avoiding Downtime Marketing Office 365 Office Tips Analytics Managed IT Services Augmented Reality Healthcare Storage Password Bring Your Own Device Big Data HIPAA Router Virtual Private Network Health Operating System Help Desk Computers Risk Management Retail Website Remote Workers Cooperation Firewall Patch Management Save Money Remote Monitoring Free Resource The Internet of Things End of Support Vulnerability Project Management Windows 7 Vendor Management Social Microsoft 365 Physical Security Display Solutions Going Green Printer Paperless Office Infrastructure Monitoring Customer Service Cybercrime Windows 11 Document Management 2FA Telephone Excel Scam Data loss Outlook Entertainment Money Humor iPhone Robot Telephone System Safety Cost Management Vulnerabilities Sports Data Privacy Mouse Images 101 IT Management Administration VPN Multi-Factor Authentication Meetings Mobility User Tip Modem Computer Repair Mobile Security Processor Customer Relationship Management Settings Employees Integration Printing Wireless Content Filtering Hacking Smart Technology Presentation YouTube Machine Learning Cryptocurrency Saving Time Holidays Wireless Technology Data Storage Supply Chain Managed IT Service Video Conferencing Maintenance Virtual Desktop Antivirus Managed Services Provider Data storage LiFi Downloads Professional Services Virtual Machines Licensing Word Regulations Compliance Social Network Evernote Paperless Multi-Factor Security Co-managed IT Refrigeration Dark Web Halloween Memes Tablet IoT Net Neutrality Trends SQL Server Technology Care Public Speaking Alert Financial Data Managed IT Customer Resource management History Lithium-ion battery File Sharing Regulations Business Communications Dark Data Google Calendar Star Wars Scams Hacks How To Microsoft Excel Entrepreneur Scary Stories Smartwatch Data Analysis IT Procurement Gamification Azure Hybrid Work Notifications Staff Fun Legislation Telework Cyber security Travel Social Networking Tech Human Resources Deep Learning Google Maps Cables Undo CES Techology Fileless Malware Communitications Supply Chain Management Content Wearable Technology Education Comparison FinTech Health IT Unified Threat Management Motherboard Term Google Apps Assessment IT Maintenance Mobile Computing Permissions Unified Threat Management Directions IT Assessment Flexibility Value Business Intelligence Search Network Congestion Specifications Organization Shortcuts Application Best Practice Internet Exlporer Ransmoware Fraud Buisness Digital Security Cameras User Error Microchip Smart Devices Remote Working Username Memory Vendors IBM Legal IT solutions Black Friday Data Breach Point of Sale Google Play Be Proactive Business Growth Database Workforce Videos Electronic Health Records Network Management Wasting Time Threats Tech Support IT Technicians Cortana Alt Codes Monitors Cyber Monday Proxy Server Trend Micro Cookies Security Cameras Workplace Strategies Software as a Service Tactics Meta Competition Hotspot Downtime Managing Costs Amazon Websites Mirgation Hosted Solution SSID Typing eCommerce Nanotechnology Surveillance Addiction Virtual Assistant Outsource IT Electronic Medical Records Language SharePoint Knowledge Management Virtual Machine Environment Google Drive Chatbots Media User Medical IT Writing Distributed Denial of Service Reviews Lenovo Screen Reader Development Service Level Agreement Transportation Small Businesses Virtual Reality Computing Infrastructure 5G Experience Server Management Hypervisor Displays IP Address Google Docs Private Cloud Identity Unified Communications PowerPoint Bitcoin Running Cable Shopping Superfish Bookmark Optimization Identity Theft Smart Tech Download Employer/Employee Relationships Outsourcing Google Wallet Twitter Alerts PCI DSS Error Navigation Recovery Workplace Hard Drives Windows 8 Social Engineering Break Fix Laptop Gig Economy Browsers Connectivity Internet Service Provider Upload Teamwork Hiring/Firing Domains Drones Remote Computing

Blog Archive