<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Social Media Law Archives - Todd McMurtry</title>
	<atom:link href="https://toddmcmurtrylaw.com/topics/social-media-law/feed/" rel="self" type="application/rss+xml" />
	<link>https://toddmcmurtrylaw.com/topics/social-media-law/</link>
	<description>Todd&#039;s Personal Site</description>
	<lastBuildDate>Wed, 18 Dec 2019 19:52:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/toddmcmurtrylaw.com/wp-content/uploads/2024/06/cropped-mcmurtry_initials_fav-1.webp?fit=32%2C32&#038;ssl=1</url>
	<title>Social Media Law Archives - Todd McMurtry</title>
	<link>https://toddmcmurtrylaw.com/topics/social-media-law/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">190864123</site>	<item>
		<title>Steps To Help Shield You and Your Company from Online Doxxing</title>
		<link>https://toddmcmurtrylaw.com/2019/12/18/steps-to-help-shield-you-and-your-company-from-online-doxxing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=steps-to-help-shield-you-and-your-company-from-online-doxxing</link>
		
		<dc:creator><![CDATA[Todd McMurtry]]></dc:creator>
		<pubDate>Wed, 18 Dec 2019 19:51:56 +0000</pubDate>
				<category><![CDATA[Complex Litigation]]></category>
		<category><![CDATA[Defamation]]></category>
		<category><![CDATA[Sandmann Case]]></category>
		<category><![CDATA[Social Media Law]]></category>
		<guid isPermaLink="false">https://toddmcmurtrylaw.com/?p=2059</guid>

					<description><![CDATA[<p>An aggravated consumer, industry rival, former employee or another person who is upset with your company may try to exact revenge by use of “doxxing” — the practice of gathering a person or entity’s personal information and publishing it online. This may include sensitive information about the finances, health, residence, political affiliation, family and private [&#8230;]</p>
<p>The post <a href="https://toddmcmurtrylaw.com/2019/12/18/steps-to-help-shield-you-and-your-company-from-online-doxxing/">Steps To Help Shield You and Your Company from Online Doxxing</a> appeared first on <a href="https://toddmcmurtrylaw.com">Todd McMurtry</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>An aggravated consumer, industry
rival, former employee or another person who is upset with your company may try
to exact revenge by use of “<a href="http://theconversation.com/what-is-doxxing-and-why-is-it-so-scary-95848">doxxing</a>” — the
practice of gathering a person or entity’s personal information and publishing
it online. This may include sensitive information about the finances, health,
residence, political affiliation, family and private lives of executives and
employees at targeted organizations. Whether performed by an experienced hacker
or an amateur sleuth, doxxing can take a serious toll on a company, leaving it
and its employees vulnerable to embarrassment and possible financial injury. </p>



<p>Doxxing is distinguishable from
defamation, which is the publication of false information about a person or
entity. The danger from doxxing is that the information released is true but
sensitive. Unfortunately, there is a wealth of data that can be legally
obtained online by clever searchers.</p>



<p>Fortunately, there are ways to
help prevent hackers from finding the information they want. Cyber security
professionals recommend the following actions:</p>



<ul class="wp-block-list"><li><strong>Provide digital security training for
employees</strong> — Create standard protocols for Internet activity and teach
information-protection practices to employees. This helps prevent the release
of information that should remain private.</li><li><strong>Limit what is shared on social media</strong> — People
with bad intentions can latch onto one detail your employee posts online and
use it to uncover much more about the person’s life. Changing social media
privacy settings can limit access to identifying data points — like addresses,
employers, schools and email addresses — making it harder to track you on other
platforms. </li><li><strong>Use encryption tools</strong> — A
hacker who accesses someone’s computer system may obtain important data and
metadata from documents like Word, Excel and Powerpoint files. Documents and
communications should be encrypted to keep their contents virtually
inaccessible to anyone except the intended recipient.</li><li><strong>Use strong</strong><strong>
passwords and vary them</strong> — Passwords are the keys to your data
online, yet many users favor simple passwords that are easy to remember and,
worse, include identifying information. Security experts recommend long
passwords with a mix of numbers, symbols and upper- and lower-case letters.
Also, use different ones for different accounts.</li><li><strong>Update computer security</strong> —
Internet firewall and antivirus software should be frequently updated. New
versions are issued frequently to keep ahead of hackers that learn to exploit
security weaknesses and mine hard drives for data. </li></ul>



<p>Doxxing may warrant civil legal
action or criminal charges, depending on the type of information released, the
means used to acquire the information, the intent of the publisher and the
reputation damage or other harm inflicted.</p>



<p>If you or your company has been
doxxed, you should consult with an attorney to see what can be done to limit
the damage to your reputation and hold the bad guys responsible.&nbsp; But it is far better to avoid the problem in
the first place by being careful about your online activities and how you or
your business share information with others.&nbsp;
</p>



<p><a href="http://www.hemmerlaw.com/attorney-profiles/todd-v-mcmurtry/">Todd V.
McMurtry</a> is a Member at <a href="http://www.hemmerlaw.com/">Hemmer
DeFrank Wessels, PLLC</a>.&nbsp; He is a <a href="http://www.hemmerlaw.com/litigation/">commercial trial attorney</a> and
Harvard trained mediator.&nbsp; You can reach
him at (859) 344-1188 or <a href="mailto:tmcmurtry@hemmerlaw.com">tmcmurtry@hemmerlaw.com</a>.&nbsp; </p>
<p>The post <a href="https://toddmcmurtrylaw.com/2019/12/18/steps-to-help-shield-you-and-your-company-from-online-doxxing/">Steps To Help Shield You and Your Company from Online Doxxing</a> appeared first on <a href="https://toddmcmurtrylaw.com">Todd McMurtry</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2059</post-id>	</item>
		<item>
		<title>Why the Communications Decency Act May Elect a Democrat in 2020.</title>
		<link>https://toddmcmurtrylaw.com/2019/08/27/why-the-communications-decency-act-may-elect-a-democrat-in-2020/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-the-communications-decency-act-may-elect-a-democrat-in-2020</link>
		
		<dc:creator><![CDATA[Todd McMurtry]]></dc:creator>
		<pubDate>Tue, 27 Aug 2019 14:56:42 +0000</pubDate>
				<category><![CDATA[Social Media Law]]></category>
		<guid isPermaLink="false">https://toddmcmurtrylaw.com/?p=2001</guid>

					<description><![CDATA[<p>I spent a day last week in Washington, DC to meet with some of the nation’s leading conservative thinkers to discuss the threat social media presents to President Trump and other conservative candidates.&#160; I was invited to discuss my research on ways to hold social media companies accountable in the courts. Every one of the [&#8230;]</p>
<p>The post <a href="https://toddmcmurtrylaw.com/2019/08/27/why-the-communications-decency-act-may-elect-a-democrat-in-2020/">Why the Communications Decency Act May Elect a Democrat in 2020.</a> appeared first on <a href="https://toddmcmurtrylaw.com">Todd McMurtry</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I spent a day last week in Washington, DC to meet with some of
the nation’s leading conservative thinkers to discuss the threat social media
presents to President Trump and other conservative candidates.&nbsp; I was invited to discuss my research on ways
to hold social media companies accountable in the courts. Every one of the
fifteen or so participants agreed that Facebook, Google, YouTube and Twitter
can swing the election.&nbsp; It is widely
accepted that the leaders of most social media companies are decidedly liberal—even
Leftist!<a href="#_ftn1">[1]</a>&nbsp; Dr. Robert Epstein, a leading figure on this
topic, has presented extensive research and analysis to support his contention
that Google alone can swing over ten million votes in favor of the Democratic
Party’s presidential candidate.<a href="#_ftn2">[2]</a>&nbsp; Combine the power of social media with the
threat of manipulation from foreign powers such as China and Russia, and it
becomes clear that our democratic process faces its greatest challenge since
the Civil War.<a href="#_ftn3">[3]</a>&nbsp; Now, as then, we confront threats from within
and without. </p>



<span id="more-2001"></span>



<p>The participants in the meeting believe that social media
companies are well-organized, well-funded and prepared to act across all
spheres to retain their influence.&nbsp; For
example, social media companies are willing to spend lavishly on widely-panned
reports, such as former Senator John Kyl’s recent “investigation” into
Facebook.<a href="#_ftn4">[4]</a>
<a href="#_ftn5">[5]</a>&nbsp; They routinely hire the most influential
lawyers in the nation to fight every challenge to their power.<a href="#_ftn6">[6]</a>&nbsp; And, they lobby the Washington power
structure to keep legislative protections in place.<a href="#_ftn7">[7]</a></p>



<p>The source of Big Tech’s power is 47 U.S. Code §230 of the
Communications Decency Act.<a href="#_ftn8">[8]</a>&nbsp; The relevant portion of the Act provides
civil immunity to social media platforms for “any action voluntarily taken in good
faith to restrict access to or availability of material that the provider or
user considers to be&nbsp;obscene, lewd, lascivious, filthy, excessively
violent, harassing, or otherwise objectionable, whether or not such material is
constitutionally protected . . .”&nbsp; Put
another way, social media platforms can control what anyone posts online,
including elected officials and influential organizations.<a href="#_ftn9">[9]</a>&nbsp; They have absolute control, and there are no
clear ways to limit their power.&nbsp; Perhaps
of greatest importance is that the language of §230 is so powerful that
courts practically never question the unlimited authority it grants social
media companies.&nbsp; Highly persuasive
lawsuits from the likes of PragerU, Tulsi Gabbard, Devin Nunez and Laura Loomer
either have already been dismissed or most likely will be.<a href="#_ftn10">[10]</a>&nbsp;&nbsp; </p>



<p>Prior to the election of
President Trump, social media platforms were
strong
adherents to First Amendment values and the free exchange of ideas. The
platforms’ commitment to free speech had few limitations. Terms of service and
community guidelines were careful to prohibit only child pornography, spam,
phishing, fraud, impersonation, and copyright violations. Over time, the
platforms experienced increasing pressure from advertisers to restrict content.<a href="#_ftn11">[11]</a> As
well, critics blamed the loss of the 2016 presidential election on the
influence of conservative social media influencers.<a href="#_ftn12">[12]</a>&nbsp; Now, in place of a commitment to free speech,
the platforms claim they are committed to a goal of striking a balance between
free expression and abuse prevention.<a href="#_ftn13">[13]</a></p>



<p>The reality of striking a balance, however, is that conservative voices are being suppressed.&nbsp; In 2018, the Media Research Center produced an exhaustive study titled, <em>Censored! How Online Media Companies are Suppressing Conservative Speech.<a href="#_ftn14">[14]</a> </em>As this suppression continues, conservative voices are muted and liberal ones are elevated.&nbsp; Obviously, this change could easily swing an election.&nbsp; To play this out, were the Democrats to win the presidency in 2020, they would be able to grow the influence of liberal-dominated social media thus locking in their advantage in perpetuity. This is scary stuff.&nbsp; </p>



<p>What is to be done? We must find a way to reduce the
protections of §230.&nbsp; I am personally
exploring novel ways to sue social media companies on behalf of content
creators and consumers.&nbsp; With a
conservative Supreme Court, there is a chance to have §230 of the
Communications Decency Act repealed as unconstitutional.&nbsp; For example, it could rule that social media
companies are state actors that unconstitutionally limit freedom of speech.&nbsp; There are also a few legal avenues by which a
plaintiff could seek substantial damages from the social media platforms.&nbsp; We hope to hit them in the pocketbook. But
lawsuits are very expensive and time consuming.&nbsp;
There is little a lawsuit can do in the short term to stop social media
platforms from influencing the 2020 elections.&nbsp;
</p>



<p>What we can do today to address this problem is to educate
others.&nbsp; We must make people aware of what
is happening.&nbsp; So, share this article
with your friends.&nbsp; The more who
appreciate the threat the Communications Decency Act presents to our democracy,
the better our chances to avoid the malign influence of social media companies
in the 2020 election. Don’t let the Communications Decency Act decide who wins
in 2020!<br></p>



<hr class="wp-block-separator"/>



<p><a href="#_ftnref1">[1]</a> <a href="https://www.investors.com/politics/commentary/i-confronted-google-about-its-liberal-groupthink-at-a-shareholder-meeting-heres-what-happened-next/">https://www.investors.com/politics/commentary/i-confronted-google-about-its-liberal-groupthink-at-a-shareholder-meeting-heres-what-happened-next/</a></p>



<p><a href="#_ftnref2">[2]</a> <a href="https://www.judiciary.senate.gov/imo/media/doc/Epstein%20Testimony.pdf">https://www.judiciary.senate.gov/imo/media/doc/Epstein%20Testimony.pdf</a></p>



<p><a href="#_ftnref3">[3]</a> <a href="https://freebeacon.com/national-security/china-covertly-subverting-trump-reelection/">https://freebeacon.com/national-security/china-covertly-subverting-trump-reelection/</a></p>



<p><a href="#_ftnref4">[4]</a> <a href="https://www.newsbusters.org/blogs/techwatch/corinne-weaver/2019/08/20/facebook-audit-fails-address-conservative-censorship">https://www.newsbusters.org/blogs/techwatch/corinne-weaver/2019/08/20/facebook-audit-fails-address-conservative-censorship</a></p>



<p><a href="#_ftnref5">[5]</a> <a href="https://fbnewsroomus.files.wordpress.com/2019/08/covington-interim-report-1.pdf">https://fbnewsroomus.files.wordpress.com/2019/08/covington-interim-report-1.pdf</a></p>



<p><a href="#_ftnref6">[6]</a> 700+ lawyer firm Wilson Sonsini represents
Google against claims brought by PraegerU. <a href="https://www.wsgr.com/WSGR/Default.aspx">https://www.wsgr.com/WSGR/Default.aspx</a></p>



<p><a href="#_ftnref7">[7]</a> <a href="https://www.bloomberg.com/news/articles/2019-01-22/google-set-2018-lobbying-record-as-washington-techlash-expands">https://www.bloomberg.com/news/articles/2019-01-22/google-set-2018-lobbying-record-as-washington-techlash-expands</a></p>



<p><a href="#_ftnref8">[8]</a> <a href="https://www.law.cornell.edu/uscode/text/47/230">https://www.law.cornell.edu/uscode/text/47/230</a></p>



<p><a href="#_ftnref9">[9]</a> <a href="https://www.lifesitenews.com/news/breaking-apple-news-bans-lifesite-without-warning-shows-intolerance">https://www.lifesitenews.com/news/breaking-apple-news-bans-lifesite-without-warning-shows-intolerance</a></p>



<p><a href="#_ftnref10">[10]</a> <a href="https://www.fresnobee.com/news/local/article234258302.html">https://www.fresnobee.com/news/local/article234258302.html</a></p>



<p><a href="#_ftnref11">[11]</a> Danielle Keats Citron, Extremist Speech, Compelled
Conformity, and Censorship Creep, 93 Notre Dame L. Rev. 1035 (2018).</p>



<p><a href="#_ftnref12">[12]</a> <a href="https://www.cjr.org/analysis/youtube-breaking-news.php">https://www.cjr.org/analysis/youtube-breaking-news.php</a></p>



<p><a href="#_ftnref13">[13]</a>Danielle Keats Citron, Id.</p>



<p><a href="#_ftnref14">[14]</a> <a href="https://www.newsbusters.org/blogs/culture/ashley-rae-goldenberg/2018/04/16/censored-how-online-media-companies-are-suppressing">https://www.newsbusters.org/blogs/culture/ashley-rae-goldenberg/2018/04/16/censored-how-online-media-companies-are-suppressing</a></p>
<p>The post <a href="https://toddmcmurtrylaw.com/2019/08/27/why-the-communications-decency-act-may-elect-a-democrat-in-2020/">Why the Communications Decency Act May Elect a Democrat in 2020.</a> appeared first on <a href="https://toddmcmurtrylaw.com">Todd McMurtry</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2001</post-id>	</item>
	</channel>
</rss>
