No Country Should be Making Speech Rules for the World

It's a simple proposition: no single country should be able to restrict speech across the entire internet.
Any other approach invites a swift relay race to the bottom for online expression, giving governments and courts in countries with the weakest speech protections carte blanche to edit the internet.
Governments, including democracies that care about the rule of law, too often lose sight of this simple proposition.
That's why EFF, represented by Johnson Winter Slattery, has moved to intervene in support of X, formerly known as Twitter's legal challenge to a global takedown order from Australia's eSafety Commissioner.
The Commissioner ordered X and Meta to take down a post with a video of a stabbing in a church.
X complied by geo-blocking the post so Australian users couldn't access it, but it declined to block it elsewhere.
The Commissioner asked an Australian court to order a global takedown.
Our intervention calls the court's attention to the important public interests at stake in this litigation, particularly for internet users who are not parties to the case but will nonetheless be affected by the precedent it sets.
A ruling against X is effectively a declaration that an Australian court can prevent internet users around the world from accessing something online, even if the law in their own country is quite different.
In the United States, for example, the First Amendment guarantees that platforms generally have the right to decide what content they will host, and their users have a corollary right to receive it.
In Google v Equustek, a company used a trade secret claim to persuade a Canadian court to order Google to delete search results linking to sites that contained allegedly infringing goods from Google.
Ca and all other Google domains, including Google.com and Google.co.uk.
Google appealed, but both the British Columbia Court of Appeal and the Supreme Court of Canada upheld the order.
The following year, a U.S. court held the ruling couldn't be enforced against Google US. The Australian takedown order also ignores international human rights standards, restricting global access to information without considering less speech-intrusive alternatives.
In other words: the Commissioner used a sledgehammer to crack a nut.
If one court can impose speech-restrictive rules on the entire Internet-despite direct conflicts with laws a foreign jurisdiction as well as international human rights principles-the norms of expectations of all internet users are at risk.
We're glad X is fighting back, and we hope the judge will recognize the eSafety regulator's demand for what it is-a big step toward unchecked global censorship-and refuse to let Australia set another dangerous precedent.


This Cyber News was published on www.eff.org. Publication date: Thu, 09 May 2024 20:43:06 +0000


Cyber News related to No Country Should be Making Speech Rules for the World

Bringing Composability to Firewalls with Runtime Protection Rules - Rule control - Customers could not easily write their own firewall rules because of the use of proprietary languages that most teams weren't familiar with unless they received specialized training, or behind walled gardens only accessible by vendor ...
4 months ago Securityboulevard.com
What Are Firewall Rules? Ultimate Guide - Firewall rules are preconfigured, logical computing controls that give a firewall instructions for permitting and blocking network traffic. Network admins must configure firewall rules that protect their data and applications from threat actors. ...
5 months ago Esecurityplanet.com
Speaking Freely: Alison Macrina - In the US, I think about power that comes from, not just the government, but also rich individuals and how they use their money to influence things like free speech, as well as corporations. I think the best way that we can use our speech is using it ...
6 months ago Eff.org
In Landmark Battle Over Free Speech, EFF Urges Supreme Court to Strike Down Texas and Florida Laws that Let States Dictate What Speech Social Media Sites Must Publish - WASHINGTON D.C.-The Electronic Frontier Foundation and five organizations defending free speech urged the Supreme Court to strike down laws in Florida and Texas that let the states dictate certain speech social media sites must carry, violating the ...
6 months ago Eff.org
It's Time For Lawmakers to Listen to Courts: Your Law Regulating Online Speech Will Harm Internet Users' Free Speech Rights - Despite a long history of courts ruling that government efforts to regulate speech online harm all internet users and interfere with their First Amendment rights, state and federal lawmakers continue to pass laws that do just that. Three separate ...
1 day ago Eff.org
No Country Should be Making Speech Rules for the World - It's a simple proposition: no single country should be able to restrict speech across the entire internet. Any other approach invites a swift relay race to the bottom for online expression, giving governments and courts in countries with the weakest ...
1 month ago Eff.org
Tell the FCC It Must Clarify Its Rules to Prevent Loopholes That Will Swallow Net Neutrality Whole - The Federal Communications Commission has released draft rules to reinstate net neutrality, with a vote on adopting the rules to come on the 25th of April. The FCC needs to close some loopholes in the draft rules before then. Net neutrality is the ...
2 months ago Eff.org
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
7 months ago Feeds.dzone.com
Sigma rules for Linux and MacOS ~ VirusTotal Blog - TLDR: VT Crowdsourced Sigma rules will now also match suspicious activity for macOS and Linux binaries, in addition to Windows. We recently discussed how to maximize the value of Sigma rules by easily converting them to YARA Livehunts. At that time ...
6 months ago Blog.virustotal.com
2023 Year in Review: The U.S. Supreme Court's Busy Year of Free Speech and Tech Cases - The U.S. Supreme Court has taken an unusually active interest in internet free speech issues. EFF participated as amicus in a whopping nine cases before the court this year. The court decided four of those cases, and decisions in the remaining five ...
6 months ago Eff.org
Establishing New Rules for Cyber Warfare - The efforts of the International Committee of the Red Cross to establish rules of engagement to combatants in a cyberwar should be applauded internationally, even if adherence is likely to be limited. The ICRC recently released a set of rules for ...
7 months ago Darkreading.com
What Is Packet Filtering? Definition, Advantages & How It Works - Packet filtering is a firewall feature that allows or drops data packets based on simple, pre-defined rules regarding IP addresses, ports, or protocols. Each data packet consists of three components: a header to provide information about the data ...
4 months ago Esecurityplanet.com
FAQ: What Is DFARS Compliance and How Does It Work? - Our intention is to offer a comprehensive perspective on DFARS in the context of cybersecurity, its various clauses, and the intricacies of maintaining compliance as these rules constantly shift and change over time. Size doesn't matter - big global ...
5 months ago Securityboulevard.com
DP World confirms data stolen in cyberattack, no ransomware used - International logistics giant DP World has confirmed that data was stolen during a cyber attack that disrupted its operations in Australia earlier this month. The company says no ransomware payloads or encryption was used in the attack. On November ...
7 months ago Bleepingcomputer.com
Analyzing KOSA's Constitutional Problems In Depth - EFF does not think KOSA is the right approach to protecting children online, however. As we've said before, we think that in practice, KOSA is likely to exacerbate the risks of children being harmed online because it will place barriers on their ...
3 months ago Eff.org
Singapore Cybersecurity Update Puts Cloud Providers on Notice - Lawmakers in Singapore updated the nation's cybersecurity regulations on May 7, giving more power to the agency responsible for enforcing the rules, adopting definitions of computer systems that include cloud infrastructure, and requiring that ...
1 month ago Darkreading.com
White House hosts Counter Ransomware Initiative summit, with a focus on not paying hackers - The third annual White House-led counter ransomware summit convening 48 countries, the European Union and Interpol launches in Washington today, featuring several new elements including a pledge from most member states not to pay ransoms and a ...
7 months ago Therecord.media
Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines - Starting Dec. 18, publicly traded companies will need to report material cyber threats to the SEC. Deloitte offers business leaders tips on how to prepare for these new SEC rules. The U.S. Securities and Exchange Commission’s new rules around ...
6 months ago Techrepublic.com
5 Ways Exabeam Delivers Better Security Outcomes Than Microsoft Sentinel - Security information and event management is one of the most important tools in the fight against cyberthreats, but not all SIEMs are created equal. Native SIEM solutions can be difficult to customize and maintain, and their advertised "Low or free" ...
1 year ago Exabeam.com
3 Essential Firewall Attributes to Secure Today's Network - Every modern network needs to be kept secure, and an equally secure firewall is the foundation of achieving this security. Firewalls are the first line of defense against threats from outside and from within a network. A firewall can be an appliance, ...
1 year ago Csoonline.com
What Is a Firewall Policy? Ultimate Guide - A firewall policy is a set of rules and standards designed to control network traffic between an organization's internal network and the internet. There are key components to consider, main types of firewall policies and firewall configurations to be ...
5 months ago Esecurityplanet.com
Online safety laws: What's in store for children's digital playgrounds? - As children's safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm. Tomorrow is Safer Internet Day, an annual awareness campaign that started in Europe in 2004 ...
1 year ago Welivesecurity.com
Speaking Freely: Lynn Hamadallah - There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine. The argument put forward was that those cases represented instances of free speech rather than hate speech. You ...
2 months ago Eff.org
States Attack Young People's Constitutional Right to Use Social Media: 2023 Year in Review - Legislatures in more than half of the country targeted young people's use of social media this year, with many of the proposals blocking adults' ability to access the same sites. Courts blocked several of these laws for violating the First ...
6 months ago Eff.org
When a Botnet Cries: Detecting Botnet Infection Chains - These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors ...
6 months ago Blog.sekoia.io

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)