Internet Censorship In The United States
   HOME

TheInfoList



OR:

Internet censorship in the United States of America is the suppression of information published or viewed on the Internet in the United States. The
First Amendment of the United States Constitution The First Amendment (Amendment I) to the United States Constitution prevents Congress from making laws respecting an establishment of religion; prohibiting the free exercise of religion; or abridging the freedom of speech, the freedom ...
protects
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
and expression against federal, state, and local government censorship. Free speech protections allow little government-mandated Internet content restrictions. However, the Internet is highly regulated, supported by a complex set of legally binding and privately mediated mechanisms. Gambling,
cyber security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
, and the dangers to children who frequent social media are important ongoing debates. Significant public resistance to proposed content restriction policies has prevented measures used in some other countries from taking hold in the US. Many government-mandated attempts to regulate content have been barred, often after lengthy legal battles. However, the government has exerted pressure indirectly. With the exception of
child pornography Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is Eroticism, erotic ma ...
, content restrictions tend to rely on platforms to remove/suppress content, following state encouragement or the threat of legal action.
Intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
protections yielded a system that predictably removes infringing materials. The US also seizes domains and computers, at times without notification.


History

The first wave of regulatory actions came about in the 1990s in response to the profusion of sexually explicit material on the Internet within easy reach of minors. Since that time, several legislative attempts at creating a mandatory system of content controls have failed to produce a comprehensive solution. Legislative attempts to control the distribution of socially objectionable material have given way to a system that limits liability over content for Internet intermediaries such as Internet service providers (ISPs) and content hosting companies. Websites shut down by the U.S. for violating intellectual property rights include
Napster Napster was an American proprietary peer-to-peer (P2P) file sharing application primarily associated with digital audio file distribution. Founded by Shawn Fanning and Sean Parker, the platform originally launched on June 1, 1999. Audio shared ...
,
WikiLeaks WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
,
The Pirate Bay The Pirate Bay, commonly abbreviated as TPB, is a free searchable online index of Film, movies, music, video games, Pornographic film, pornography and software. Founded in 2003 by Swedish think tank , The Pirate Bay facilitates the connection ...
, and MegaUpload. In 2014, the United States was added to
Reporters Without Borders Reporters Without Borders (RWB; ; RSF) is an international non-profit and non-governmental organisation, non-governmental organization headquartered in Paris, which focuses on safeguarding the right to freedom of information. It describes its a ...
(RWB)'s list of "Enemies of the Internet", a group of countries with the highest level of Internet censorship and surveillance. RWB stated that the US had "undermined confidence in the Internet and its own standards of security" and that " US surveillance practices and decryption activities are a direct threat to investigative journalists, especially those who work with sensitive sources for whom confidentiality is paramount and who are already under pressure".


Federal laws

With limited exceptions, the free speech provisions of the First Amendment bar federal, state, and local governments from directly censoring the Internet. The primary exception has to do with
obscenity An obscenity is any utterance or act that strongly offends the prevalent morality of the time. It is derived from the Latin , , "boding ill; disgusting; indecent", of uncertain etymology. Generally, the term can be used to indicate strong moral ...
, including
child pornography Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is Eroticism, erotic ma ...
, which is not given First Amendment protection.


Computer Fraud and Abuse Act (CFAA)

The
Computer Fraud and Abuse Act The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (), which had been included in the Comprehensive Crime Control Act of 1984. Prior ...
(CFAA) was enacted in 1986 as an amendment to an existing computer fraud law (), which was part of the Comprehensive Crime Control Act of 1984. The CFAA prohibits accessing a computer without authorization, or in excess of authorization. Since 1986, the Act was amended in 1989, 1994, 1996, 2001 ( USA PATRIOT Act), 2002, and in 2008 (Identity Theft Enforcement and Restitution Act). The CFAA is a criminal law and also creates a
private right of action A cause of action or right of action, in law, is a set of facts sufficient to justify suing to obtain money or property, or to justify the enforcement of a legal right against another party. The term also refers to the legal theory upon which a p ...
, allowing individuals and companies to sue for damages. Provisions of the CFAA effectively make it a federal crime to violate the terms of service of Internet sites, allowing companies to forbid legitimate activities such as research, or limit or remove protections found elsewhere in law. Terms of service can be changed at any time without notifying users.
Tim Wu Timothy Shiou-Ming Wu (born 1971 or 1972) is a Taiwanese-American legal scholar who served as Special Assistant to the President for Technology and Competition Policy at the United States from 2021 to 2023. He is also a professor of law at Colum ...
called the CFAA "the worst law in technology". Aggressive prosecution under the Computer Fraud and Abuse Act (CFAA) has fueled growing criticism of the law's scope and application.


Communications Decency Act (CDA)

In 1996, the United States enacted the
Communications Decency Act The Communications Decency Act of 1996 (CDA) was the United States Congress's first notable attempt to regulate pornographic material on the Internet. In the 1997 landmark case '' Reno v. ACLU'', the United States Supreme Court unanimously stru ...
(CDA), which attempted to regulate both
indecency Inappropriateness refers to standards or ethics that are typically viewed as being negative in a society. It differs from things that are illicit in that inappropriate behavior does not necessarily have any accompanying legal ramifications. Co ...
(when available to children) and obscenity in
cyberspace Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
. In 1997, in the case of '' Reno v. ACLU'', the
United States Supreme Court The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all U.S. federal court cases, and over state court cases that turn on question ...
found the anti-indecency provisions of the Act unconstitutional. Writing for the Court, Justice
John Paul Stevens John Paul Stevens (April 20, 1920 – July 16, 2019) was an American lawyer and jurist who served as an associate justice of the Supreme Court of the United States from 1975 to 2010. At the time of his retirement, he was the second-oldes ...
held that "the CDA places an unacceptably heavy burden on protected speech". Section 230 is a separate portion of the CDA that remains in effect. Section 230 says that operators of Internet services are not legally liable for the words of third parties who use their services and also protects ISPs from liability for good faith voluntary actions taken to restrict access to certain offensive materials or giving others the technical means to restrict access to that material.


Child Online Protection Act (COPA)

In 1998, the United States enacted the
Child Online Protection Act The Child Online Protection Act (COPA) was a United States law, law in the United States, United States of America, passed in 1998 with the declared purpose of restricting access by Minor (law)#United States, minors to any material defined as h ...
(COPA) to restrict access by minors to any material defined as harmful to minors on the Internet. The law was found to be unconstitutional because it would hinder protected speech among adults. It never took effect, as three separate rounds of litigation led to a permanent injunction against the law in 2009. Had the law passed, it would have effectively made it an illegal act to post anything commercial on the internet that is knowingly harmful to children without some sort of vetting program to confirm user ages.


Digital Millennium Copyright Act (DMCA)

Enacted in 1998, the
Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
(DMCA, ) criminalized the production and dissemination of technology that could be used to circumvent copyright protection mechanisms and made it easier to act against alleged
copyright infringement Copyright infringement (at times referred to as piracy) is the use of Copyright#Scope, works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the c ...
on the Internet. The
Online Copyright Infringement Liability Limitation Act The Online Copyright Infringement Liability Limitation Act (OCILLA) is United States federal law that creates a conditional 'safe harbor' for online service providers (OSP), a group which includes Internet service providers (ISP) and other Inter ...
(OCILLA) is included as Title II of the DMCA and limits the liability of the
online service provider An online service provider (OSP) can, for example, be an Internet service provider, an email provider, a news provider (press), an entertainment provider (music, movies), a search engine, an e-commerce site, an online banking site, a health site, ...
s for copyright infringement by their users.


Children's Online Privacy Protection Act (COPPA)

The
Children's Online Privacy Protection Act The Children's Online Privacy Protection Act of 1998 (COPPA) is a United States federal law The law of the United States comprises many levels of Codification (law), codified and uncodified forms of law, of which the supreme law is ...
(COPPA) went into effect on 21 April 2000. It applies to the online collection of personal information by persons or entities under US jurisdiction from children under 13 and details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety including restrictions on the marketing to those under 13. While children under 13 can legally offer personal information with their parents' permission, many websites prohibit underage children from using their services altogether, due to the cost and amount of paperwork necessary for compliance.


Children's Internet Protection Act (CIPA)

In 2000 the
Children's Internet Protection Act The Children's Internet Protection Act (CIPA) is one of a number of bills that the United States Congress proposed to limit children's exposure to pornography and explicit content online, along others such as preventing minors from hacking other ...
(CIPA) was signed into law. CIPA requires K-12 schools and libraries receiving federal Universal Service Fund ( E-rate) discounts or LSTA grants for Internet access or internal connections to: * adopt and implement an Internet safety policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using
electronic mail Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
,
chat room The term chat room, or chatroom (and sometimes group chat; abbreviated as GC), is primarily used to describe any form of synchronous conferencing, occasionally even asynchronous conferencing. The term can thus mean any technology, ranging from ...
s, and other forms of direct electronic communications; (c) unauthorized access, including so-called " hacking," and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of
personal information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
regarding minors; and (e) measures restricting minors' access to materials harmful to them; * install internet filters or blocking software that prevents access to pictures that are: (a)
obscene An obscenity is any utterance or act that strongly offends the prevalent morality of the time. It is derived from the Latin , , "boding ill; disgusting; indecent", of uncertain etymology. Generally, the term can be used to indicate strong moral ...
, (b)
child pornography Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is Eroticism, erotic ma ...
, or (c) harmful to minors (for computers that are accessed by minors); * allow filtering or blocking to be disabled upon the request of an adult; and * adopt and enforce a policy to monitor the online activities of minors. CIPA does ''not'': * require tracking Internet use by minors or adults; or * affect E-rate funding for schools and libraries receiving discounts for telecommunications services, such as telephone service, but not for Internet access or internal connections. * require an internet filter that prevents access to video games, social media, etc.


Trading with the Enemy Act (TWEA)

In March 2008, the ''
New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' reported that a blocklist published by the
Office of Foreign Assets Control The Office of Foreign Assets Control (OFAC) is a financial intelligence and enforcement agency of the United States Department of the Treasury, United States Treasury Department. It administers and enforces economic and trade economic sanctions, ...
(OFAC), an agency established under the Trading with the Enemy Act 1917 and other federal legislation, included websites, so that US companies are prohibited from doing business with those websites and must freeze their assets. The blocklist had the effect that US-based
domain name registrar A domain name registrar is a company, person, or office that manages the reservation of Internet domain names. A domain name registrar must be accredited by a generic top-level domain (gTLD) Domain name registry, registry or a country code top-l ...
s must block those websites. According to the article, eNom, a private domain name registrar and Web hosting company operating in the US, disables domain names that appear on the blocklist. It described eNom's disabling of a European travel agent's web sites advertising travel to
Cuba Cuba, officially the Republic of Cuba, is an island country, comprising the island of Cuba (largest island), Isla de la Juventud, and List of islands of Cuba, 4,195 islands, islets and cays surrounding the main island. It is located where the ...
, which appeared on the list. According to the report, the US government claimed that eNom was "legally required" to block the websites under US law, even though the websites were not hosted in the US, were not targeted at US persons, and were legal under foreign law.


Cybersecurity Information Sharing Act (CISA)

The Cybersecurity Information Sharing Act (CISA) is intended to "improve
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
in the United States through enhanced sharing of information about cybersecurity threats and for other purposes". The law allows the sharing of Internet traffic information between the US government and technology and manufacturing companies. The bill's text was incorporated by amendment into a consolidated spending bill, Opponents questioned the CISA's value, believing it would move responsibility from private business to the government, thereby increasing the vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
and local police. Some felt that the act was more conducive to surveillance than security after many of the privacy protections from the original bill were removed.


Stop Advertising Victims of Exploitation Act of 2015 (SAVE)

The Stop Advertising Victims of Exploitation Act of 2015 (SAVE) is part of the larger Justice for Victims of Trafficking Act of 2015. The SAVE Act makes it illegal to knowingly advertise content related to sex trafficking, including online advertising. The law established federal criminal liability for third-party content. One concern was that this would lead companies to over-censor, or to limit the practice of monitoring content altogether to avoid "knowledge" of illegal content.


Americans with Disabilities Act (ADA)

In 2016, complainants from
Gallaudet University Gallaudet University ( ) is a private federally chartered university in Washington, D.C., for the education of the deaf and hard of hearing. It was founded in 1864 as a grammar school for both deaf and blind children. It was the first school ...
brought a lawsuit against
UC Berkeley The University of California, Berkeley (UC Berkeley, Berkeley, Cal, or California), is a public land-grant research university in Berkeley, California, United States. Founded in 1868 and named after the Anglo-Irish philosopher George Berkele ...
for not adding
closed captioning Closed captioning (CC) is the process of displaying text on a television, video screen, or other visual display to provide additional or interpretive information, where the viewer is given the choice of whether the text is displayed. Closed cap ...
to the recorded lectures it made free to the public. In an
unintended consequence In the social sciences, unintended consequences (sometimes unanticipated consequences or unforeseen consequences, more colloquially called knock-on effects) are outcomes of a purposeful action that are not intended or foreseen. The term was po ...
of the
Americans with Disabilities Act of 1990 The Americans with Disabilities Act of 1990 or ADA () is a civil rights law that prohibits discrimination based on disability. It affords similar protections against discrimination to Americans with disabilities as the Civil Rights Act of 1964, ...
, the
Department of Justice A justice ministry, ministry of justice, or department of justice, is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a ...
ruling resulted in Berkeley deleting 20,000 freely licensed videos instead of making them more accessible, which Berkeley had described as cost prohibitive.


Allow States and Victims to Fight Online Sex Trafficking Act - Stop Enabling Sex Traffickers Act (FOSTA-SESTA)

Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) was introduced in the US House of Representatives in 2017.
Stop Enabling Sex Traffickers Act FOSTA (Allow States and Victims to Fight Online Sex Trafficking Act) and SESTA (Stop Enabling Sex Traffickers Act) are U.S. Senate and House bills which became law on April 11, 2018. They clarify the country's sex trafficking law to make it il ...
(SESTA) was a similar US Senate bill. The combined FOSTA-SESTA package was enacted in 2018. The bill amended Section 230 of the Communications Decency Act to exclude the enforcement of federal and state sex trafficking laws from immunity and clarified SESTA to define participation in a venture as knowingly assisting, facilitating, or supporting sex trafficking. The bills were criticized as a "disguised internet censorship bill" that weakened Section 230 safe harbors, placed unnecessary burdens on internet companies and intermediaries that handle user-generated content or communications with service providers required to proactively take action against sex trafficking activities, and required a "team of lawyers" to evaluate all possible scenarios.
Sex worker A sex worker is a person who provides sex work, either on a regular or occasional basis. The term is used in reference to those who work in all areas of the sex industry.Oxford English Dictionary, "sex worker" According to one view, sex work is ...
s argued that the bill would harm their safety, as the platforms they utilize for offering and discussing sexual services (as an alternative to
street prostitution Street prostitution is a form of prostitution in which a prostitute solicitation, solicits customers from a public place, most commonly a street, while waiting at street corners or walking alongside a street, but also other public places such as ...
) had reduced their services or shut down entirely due to the threat of liability.


Proposed federal legislation that has not become law


Deleting Online Predators Act (DOPA)

The Deleting Online Predators Act of 2006 would have required schools, some businesses, and libraries to block minors' access to social networking websites. The bill was controversial because, according to its critics, it would limit access to a wide range of websites, including many with harmless and educational material. Two similar bills were introduced in 2007, but neither became law.


Protecting Cyberspace as a National Asset Act (PCNAA)

The 2010 Protecting Cyberspace as a National Asset Act. generated controversy for what critics perceived as its authorization for the US president to apply a full block of the Internet in the US The Executive Cyberspace Coordination Act of 2011 took a different approach.


Combating Online Infringement and Counterfeits Act (COICA)

The 2010 Combating Online Infringement and Counterfeits Act would have allowed the US Attorney General to bring an ''
in rem In law, ''in rem'' jurisdiction ( Law Latin for "power about or against 'the thing) is a legal term referring to the power a court may exercise over property (either real or personal) or a "status" against a person over whom the court does not ...
'' action against an infringing domain name in the
United States District Court The United States district courts are the trial courts of the United States federal judiciary, U.S. federal judiciary. There is one district court for each United States federal judicial district, federal judicial district. Each district cov ...
, and seek an order requesting injunctive relief. If granted, such an order would compel the registrar of the domain name in question to suspend the operation of, and may lock, the domain name. The US Justice Department would maintain two publicly available lists of domain names. The first list would contain domain names against which the Attorney General has obtained injunctions. The second list would contain domains alleged to be infringing, but against which no action had been taken. Any service provider who willingly took steps to block access to sites on this second list would be immune from prosecution.


Stop Online Piracy Act (SOPA)

The 2011
Stop Online Piracy Act The Stop Online Piracy Act (SOPA) was a proposed United States congressional bill to expand the ability of U.S. law enforcement to combat online copyright infringement and online trafficking in counterfeit goods. Introduced on October 26, 20 ...
(SOPA) would have allowed the US Department of Justice, as well as copyright holders, to seek court orders against websites accused of enabling or facilitating
copyright infringement Copyright infringement (at times referred to as piracy) is the use of Copyright#Scope, works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the c ...
. Depending on who requested the court orders, the actions could include barring online advertising networks and payment facilitators such as
PayPal PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support E-commerce payment system, online money transfers; it serves as an electronic alter ...
from doing business with the allegedly infringing website, barring search engines from linking to such sites, and requiring Internet service providers to block access to such sites. Many argued that requiring ISP's to block access to certain websites constituted censorship. On January 18, 2012, the English
Wikipedia Wikipedia is a free content, free Online content, online encyclopedia that is written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and the wiki software MediaWiki. Founded by Jimmy Wales and La ...
shut down for 24 hours to protest SOPA and PIPA. In the wake of many protests, consideration of the legislation was put on hold.


Protect Intellectual Property Act (PIPA)

The 2011 Protect Intellectual Property Act (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, or PIPA) was attempted to give the US government and copyright holders additional tools to curb "rogue websites dedicated to infringing or counterfeit goods", especially those registered outside the US. PIPA was a re-write of the Combating Online Infringement and Counterfeits Act (COICA), which failed to pass in 2010. In the wake of protests the bill was put on hold.


Cyber Intelligence Sharing and Protection Act (CISPA)

The 2011, 2013, and 2015
Cyber Intelligence Sharing and Protection Act The Cyber Intelligence Sharing and Protection Act (CISPA (112th Congress), (113th Congress), (114th Congress)) was a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. gove ...
(CISPA) attempted to give the government additional options and resources to ensure network security. CISA was a similar Senate bill that was enacted. CISPA was supported by trade groups representing more than eight hundred private companies, including the
Business Software Alliance The Software Alliance, also known as BSA, is a trade group of business software companies established in 1998. Its principal activity is trying to stop copyright infringement of software produced by its members. It is a member of the International ...
,
CTIA – The Wireless Association CTIA is a trade association representing the wireless communications industry in the United States. The association was established in 1984 and is headquartered in Washington, D.C. It is a 501(c)(6) nonprofit membership organization, and repre ...
,
Information Technology Industry Council The Information Technology Industry Council (ITI) is a Washington, D.C.–based global trade association that represents companies from the information and communications technology (ICT) industry. As an advocacy organization, ITI works to influ ...
, Internet Security Alliance,
National Cable & Telecommunications Association NCTA, formerly known as the National Cable & Telecommunications Association (NCTA), is a trade association representing the Internet in the United States, broadband and Cable television in the United States, cable television industries in the U ...
,
National Defense Industrial Association The National Defense Industrial Association (NDIA) is a trade association for the United States government and defense industrial base. It is an 501(c)(3) educational organization. Its headquarters are in Arlington, Virginia. NDIA was establi ...
,
TechAmerica TechAmerica was an American technology trade association that was created in 2009, through the merger of several American trade associations including the AeA and Information Technology Association of America. In May 2014, CompTIA, a nonprofi ...
and
United States Chamber of Commerce The United States Chamber of Commerce (USCC) is a business association advocacy group and is the largest lobbying group in the United States. The group was founded in April 1912 out of local chambers of commerce at the urging of President Will ...
, in addition to major telecommunications and information technology companies including
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
,
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
,
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
,
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, and Delaware General Corporation Law, incorporated in Delaware. Intel designs, manufactures, and sells computer compo ...
,
Oracle Corporation Oracle Corporation is an American Multinational corporation, multinational computer technology company headquartered in Austin, Texas. Co-founded in 1977 in Santa Clara, California, by Larry Ellison, who remains executive chairman, Oracle was ...
, Symantec, and
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
.
Reporters Without Borders Reporters Without Borders (RWB; ; RSF) is an international non-profit and non-governmental organisation, non-governmental organization headquartered in Paris, which focuses on safeguarding the right to freedom of information. It describes its a ...
expressed concern that in the name of fighting cybercrime, it would allow the government and private companies to monitor, even censor, the Web. Other organizations that oppose the bill include the Constitution Project,
American Civil Liberties Union The American Civil Liberties Union (ACLU) is an American nonprofit civil rights organization founded in 1920. ACLU affiliates are active in all 50 states, Washington, D.C., and Puerto Rico. The budget of the ACLU in 2024 was $383 million. T ...
,
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
,
Center for Democracy and Technology Center for Democracy & Technology (CDT) is a Washington, D.C.–based 501(c)(3) nonprofit organization that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the Internet for ...
,
Fight for the Future Fight for the Future (often abbreviated fightfortheftr or FFTF) is a nonprofit advocacy organization, advocacy group in the area of digital rights founded in 2011. The group aims to promote causes related to copyright legislation, as well as ...
, Free Press,
Sunlight Foundation The Sunlight Foundation was an American 501(c)(3) nonpartisan, nonprofit organization that advocated for open government. The organization was founded in April 2006 with the goal of increasing transparency and accountability in the United States ...
, and TechFreedom.
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
lobbied for it.


RESTRICT Act/DATA Act

In 2020 and 2023, the United States Government tried to ban social media app
TikTok TikTok, known in mainland China and Hong Kong as Douyin (), is a social media and Short-form content, short-form online video platform owned by Chinese Internet company ByteDance. It hosts user-submitted videos, which may range in duration f ...
. The DATA Act would have banned the selling of non-public personal data to third party buyers. The RESTRICT Act would allow the
United States Secretary of State The United States secretary of state (SecState) is a member of the executive branch of the federal government of the United States and the head of the U.S. Department of State. The secretary of state serves as the principal advisor to the ...
to review any attempt of a tech company to "
sabotage Sabotage is a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization (warfare), demoralization, destabilization, divide and rule, division, social disruption, disrupti ...
" the United States. In this scenario, after a review by the Secretary and other relevant departments found "security risks" then the government can restrict a company, service, or product. This would let the government investigate and possibly ban any site they deem a threat to national security. Violation by a US citizen would result in a fine of up to $1,000,000 or up to 20 years in prison. While the RESTRICT act does not mention TikTok by name, it was implied as this bill paralleled calls to ban TikTok.


State laws

In November 2019 the
National Conference of State Legislatures The National Conference of State Legislatures (NCSL), established in 1975, is a "nonpartisan public officials' association composed of sitting state legislators" from the states, territories and commonwealths of the United States. Background ...
listed twenty-seven states with laws that apply to Internet use at publicly funded schools or libraries:
The majority of these states simply require school boards/districts or public libraries to adopt Internet use policies to prevent minors from gaining access to sexually explicit, obscene or harmful materials. However, some states also require publicly funded institutions to install filtering software on library terminals or school computers.
The states that require schools and libraries to adopt policies to protect minors include: California, Delaware, Georgia, Indiana, Iowa, Kentucky, Louisiana, Maryland, Massachusetts, New Hampshire, New York, Rhode Island, South Carolina, and Tennessee. Florida law "encourages public libraries to adopt an Internet safety education program, including the implementation of a computer-based educational program". The states that require Internet filtering in schools and libraries to protect minors are: Arizona, Arkansas, Colorado, Idaho, Kansas, Michigan, Minnesota, Missouri, Ohio, Pennsylvania, South Dakota, Utah, and Virginia. Five states require Internet service providers to make a product or service available to subscribers to control use of the Internet. They are: Louisiana, Maryland, Nevada, Texas, and Utah. In July 2011
Missouri Missouri (''see #Etymology and pronunciation, pronunciation'') is a U.S. state, state in the Midwestern United States, Midwestern region of the United States. Ranking List of U.S. states and territories by area, 21st in land area, it border ...
lawmakers passed the Amy Hestir Student Protection Act which included a provision that barred K-12 teachers from using websites that allow "exclusive access" in communications with current students or former students who are 18 or younger, such as occurs with private messages. A
circuit court Circuit courts are court systems in several common law jurisdictions. It may refer to: * Courts that literally sit 'on circuit', i.e., judges move around a region or country to different towns or cities where they will hear cases; * Courts that s ...
order issued before the law went into effect blocked the provision because "the breadth of the prohibition is staggering" and the law "would have a
chilling effect In a legal context, a chilling effect is the inhibition or discouragement of the legitimate exercise of natural and legal rights by the threat of legal sanction. A chilling effect may be caused by legal actions such as the passing of a law, th ...
" on
free-speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recognise ...
rights. In September the legislature replaced the controversial provision with a requirement that local school districts develop their own policies on the use of electronic communication between employees and students. In May 2023, Montana enacted a ban on TikTok from operating within or offering its services to anyone within the state's borders. In December 2023, the ban was blocked by a federal judge who ruled that the statute was an unconstitutional restriction on free speech.


Court rulings

In April 2022, District Judge Katherine Polk Failla issued a site blocking order against three
piracy Piracy is an act of robbery or criminal violence by ship or boat-borne attackers upon another ship or a coastal area, typically with the goal of stealing cargo and valuable goods, or taking hostages. Those who conduct acts of piracy are call ...
websites, which were cited in lawsuits brought upon by a group of Israeli media companies, but whose operators failed to appear in court. The order mandated that the three websites, as well as any "newly-discovered websites" found to be operated by the defendants, be blocked by all US ISPs. It prohibited any third-party service operator from doing business with or offering services to the defendants, and ordered that their domain names be seized and transferred to the plaintiffs. This order is similar to, but goes beyond what was proposed in SOPA.


Censorship by institutions

The
constitutional A constitution is the aggregate of fundamental principles or established precedents that constitute the legal basis of a polity, organization or other type of entity, and commonly determines how that entity is to be governed. When these princ ...
and other
legal Law is a set of rules that are created and are law enforcement, enforceable by social or governmental institutions to regulate behavior, with its precise definition a matter of longstanding debate. It has been variously described as a Socia ...
protections that prohibit or limit government censorship of the Internet do not generally apply to
corporation A corporation or body corporate is an individual or a group of people, such as an association or company, that has been authorized by the State (polity), state to act as a single entity (a legal entity recognized by private and public law as ...
s. Corporations may choose to limit the content they make available or allow others to make available on the Internet. Corporations may be encouraged by government pressure or required by law or
court order A court order is an official proclamation by a judge (or panel of judges) that defines the legal relationships between the parties to a hearing, a trial, an appeal or other court proceedings. Such ruling requires or authorizes the carrying o ...
to remove or limit access to content that is judged to be
obscene An obscenity is any utterance or act that strongly offends the prevalent morality of the time. It is derived from the Latin , , "boding ill; disgusting; indecent", of uncertain etymology. Generally, the term can be used to indicate strong moral ...
(including
child pornography Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is Eroticism, erotic ma ...
), harmful to children,
defamatory Defamation is a communication that injures a third party's reputation and causes a legally redressable injury. The precise legal definition of defamation varies from country to country. It is not necessarily restricted to making assertions ...
, pose a threat to
national security National security, or national defence (national defense in American English), is the security and Defence (military), defence of a sovereign state, including its Citizenship, citizens, economy, and institutions, which is regarded as a duty of ...
, promote illegal activities such as
gambling Gambling (also known as betting or gaming) is the wagering of something of Value (economics), value ("the stakes") on a Event (probability theory), random event with the intent of winning something else of value, where instances of strategy (ga ...
,
prostitution Prostitution is a type of sex work that involves engaging in sexual activity in exchange for payment. The definition of "sexual activity" varies, and is often defined as an activity requiring physical contact (e.g., sexual intercourse, no ...
, theft of
intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
,
hate speech Hate speech is a term with varied meaning and has no single, consistent definition. It is defined by the ''Cambridge Dictionary'' as "public speech that expresses hate or encourages violence towards a person or group based on something such as ...
, and inciting
violence Violence is characterized as the use of physical force by humans to cause harm to other living beings, or property, such as pain, injury, disablement, death, damage and destruction. The World Health Organization (WHO) defines violence a ...
. Public and private institutions that provide Internet access for their employees, customers, students, or members will sometimes limit this access in an attempt to ensure it is used only for the organization's purposes. This can include
content-control software An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Such restrictions can be appl ...
to limit access to entertainment content in business and educational settings and limits to high-
bandwidth Bandwidth commonly refers to: * Bandwidth (signal processing) or ''analog bandwidth'', ''frequency bandwidth'', or ''radio bandwidth'', a measure of the width of a frequency range * Bandwidth (computing), the rate of data transfer, bit rate or thr ...
services. Some institutions also block outside
e-mail Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
services as a precaution, usually initiated out of concerns for network security or concerns that e-mail might be used intentionally or unintentionally to expose trade secrets or other confidential information.


Schools and libraries

K-12 schools and libraries that accept funds from the federal E-rate program or Library Services and Technology Act grants for Internet access or internal connections are required by CIPA to have an "Internet safety policy and technology protection measures". Many K-12 school districts use Internet filters to block material deemed inappropriate for a school setting. The federal government leaves decisions about what to filter or block to local authorities. However, critics assert that such decisions should be made by a student's parents or guardian. Concerns include: the risk of supporting a predominant ideology, that filter manufacturers' views are imposed on students, overblocking of useful information, and underblocking of harmful information. A 2003 study reported that "blocking software overblocked state-mandated curriculum topics–for every web page correctly blocked, one or more was inappropriately blocked". Some libraries may block access to certain web pages, including pornography, advertising, chat, gaming, social networking, and online forum sites, The use of filtering and blocking software in libraries remains controversial.


Search engines and social media

In 2007,
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
attempted to block the
abortion Abortion is the early termination of a pregnancy by removal or expulsion of an embryo or fetus. Abortions that occur without intervention are known as miscarriages or "spontaneous abortions", and occur in roughly 30–40% of all pregnan ...
rights group
NARAL Pro-Choice America Reproductive Freedom for All, formerly NARAL Pro-Choice America and commonly known as simply NARAL ( ), is a non-profit 501(c)(4) organization in the United States that engages in lobbying, politics, political action, and advocacy efforts to op ...
from using their text messaging services to speak to their supporters. Verizon claimed it was in order to enforce a policy that does not allow their customers to use their service to communicate "controversial" or "unsavory" messages.
Comcast Comcast Corporation, formerly known as Comcast Holdings,Before the AT&T Broadband, AT&T merger in 2001, the parent company was Comcast Holdings Corporation. Comcast Holdings Corporation now refers to a subsidiary of Comcast Corporation, not th ...
, AT&T and other ISPs have been accused of regulating internet traffic and bandwidth. eNom, a private domain name registrar and Web hosting company operating in the US, disables domain names that appear on a US Treasury blocklist.


Military

The
Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, ...
prohibits its personnel from accessing certain
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es from DoD computers. The US military's filtering policy is laid out in a report to Congress entitled "Department of Defense Personnel Access to the Internet". In October 2009, military blogger C.J. Grisham was pressured by his superiors at
Redstone Arsenal Redstone Arsenal is a United States Army base adjacent to Huntsville, Alabama in the Wheeler National Wildlife Refuge. A census-designated place in Madison County, Alabama, United States, it is part of the Huntsville-Decatur Combined Statistica ...
to close his blog, ''A Soldier's Perspective'', after complaining about local public school officials pushing a mandatory school uniform program without parental consent. ''The Monterey Herald'' reported on June 27, 2013, that the
United States Army The United States Army (USA) is the primary Land warfare, land service branch of the United States Department of Defense. It is designated as the Army of the United States in the United States Constitution.Article II, section 2, clause 1 of th ...
barred its personnel from accessing parts of ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in Manchester in 1821 as ''The Manchester Guardian'' and changed its name in 1959, followed by a move to London. Along with its sister paper, ''The Guardian Weekly'', ''The Guardi ...
'' website after
whistleblower Whistleblowing (also whistle-blowing or whistle blowing) is the activity of a person, often an employee, revealing information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe, unethical or ...
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
's revelations about the
PRISM PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
global surveillance Global mass surveillance can be defined as the mass surveillance of entire populations across national borders. Its existence was not widely acknowledged by governments and the mainstream media until the global surveillance disclosures by Edw ...
program and the NSA were published there. The entire ''Guardian'' website was blocked for personnel stationed throughout Afghanistan, the Middle East, and South Asia, as well as personnel stationed at US Central Command headquarters in Florida. In 2019, social media app TikTok was banned on all military devices for what the Pentagon said was "potential security risks".


WikiLeaks

In February 2008, the '' Bank Julius Baer vs. WikiLeaks'' lawsuit prompted the
United States District Court for the Northern District of California The United States District Court for the Northern District of California (in case citations, N.D. Cal.) is the federal United States district court whose jurisdiction comprises the following counties of California: Alameda, Contra Costa, De ...
to issue a permanent injunction against the website
WikiLeaks WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
'
domain name registrar A domain name registrar is a company, person, or office that manages the reservation of Internet domain names. A domain name registrar must be accredited by a generic top-level domain (gTLD) Domain name registry, registry or a country code top-l ...
. The result was that WikiLeaks could not be accessed through its web address. This elicited accusations of censorship and resulted in the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
defending WikiLeaks. After a later hearing, the injunction was lifted. Assange said that WikiLeaks chose Amazon knowing they would probably be kicked off of "in order to separate rhetoric from reality". On December 1, 2010
Amazon.com Amazon.com, Inc., doing business as Amazon, is an American multinational technology company engaged in e-commerce, cloud computing, online advertising, digital streaming, and artificial intelligence. Founded in 1994 by Jeff Bezos in Bellevu ...
cut off WikiLeaks 24 hours after it was contacted by the staff of Senator
Joe Lieberman Joseph Isadore Lieberman (; February 24, 1942 – March 27, 2024) was an American politician and lawyer who served as a United States senator from Connecticut from 1989 to 2013. Originally a member of the Democratic Party (United States), Dem ...
, Chairman of the US Senate Committee on Homeland Security. In a statement Lieberman said it was "the right decision and should set the standard for other companies". Constitutional lawyers say that this is not a first amendment issue because Amazon, as a private company, is free to make its own decisions. Kevin Bankston, a lawyer with the Electronic Frontier Foundation, agreed that this was not a violation of the first amendment.


Individual websites

Some websites that allow user-contributed content practice
self-censorship Self-censorship is the act of censoring or classifying one's own discourse, typically out of fear or deference to the perceived preferences, sensibilities, or infallibility of others, and often without overt external pressure. Self-censorship is c ...
by adopting policies on how the web site may be used and by banning or requiring pre-approval of editorial contributions from users that violate the site's policies. For example, a social media platform may restrict speech that it considers to be
hate speech Hate speech is a term with varied meaning and has no single, consistent definition. It is defined by the ''Cambridge Dictionary'' as "public speech that expresses hate or encourages violence towards a person or group based on something such as ...
more broadly than is required by US law, and may restrict speech that it considers to be
harassment Harassment covers a wide range of behaviors of an offensive nature. It is commonly understood as behavior that demeans, humiliates, and intimidates a person, and it is characteristically identified by its unlikelihood in terms of social and ...
and
verbal abuse Verbal abuse (also known as verbal aggression, verbal attack, verbal violence, verbal assault, psychic aggression, or psychic violence) is a type of Psychological abuse, psychological/mental abuse that involves the use of Oral language, oral or w ...
. Restriction of hate speech and harassment on social media is the subject of debate. For example, two perspectives include that
online hate speech Online hate speech is a type of speech that takes place online with the purpose of attacking a person or a group based on their race, religion, ethnic origin, sexual orientation, disability, and/or gender. Online hate speech is not easily defin ...
should be removed because it causes serious intimidation and harm, and that it should not be removed because it is "better to know that there are bigots among us" than to have an inaccurate picture of the world.


Outside the US

US corporations including
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
,
Yahoo! Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, and its a ...
,
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
, and
MySpace Myspace (formerly stylized as MySpace, currently myspace; and sometimes my␣, with an elongated Whitespace character#Substitute images, open box symbol) is a social networking service based in the United States. Launched on August 1, 2003, it w ...
practice greater levels of self-censorship in some international versions of their online services to comply with local laws/regulations. This is most notably the case in these corporations' dealings in
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
. In October 2011 US-based
Blue Coat Systems __FORCETOC__ Blue Coat Systems, Inc., was a company that provided hardware, software, and services designed for cybersecurity and network management. In 2016 it was acquired by and folded into Symantec and in 2019 as part of Symantec’s Enterpri ...
of
Sunnyvale, California Sunnyvale () is a city located in the Santa Clara Valley in northwestern Santa Clara County, California, United States. Sunnyvale lies along the historic El Camino Real (California), El Camino Real and U.S. Route 101 in California, Highway 1 ...
acknowledged that Syria was using its devices to censor Web activity, a possible violation of US trade embargoes.


Intellectual property

A January 4, 2007
restraining order A restraining order or protective order is an order used by a court to protect a person in a situation often involving alleged domestic violence, child abuse and neglect, assault, harassment, stalking, or sexual assault. Restraining and perso ...
issued by US District Court Judge Jack B. Weinstein forbade activists in the
psychiatric survivors movement The psychiatric survivors movement (more broadly consumer/survivor/ex-patient movement) is a diverse association of individuals who either currently access mental health services (known as consumers or service users), or who have experienced inter ...
from posting links to ostensibly leaked documents that purportedly show that
Eli Lilly and Company Eli Lilly and Company, Trade name, doing business as Lilly, is an American multinational Medication, pharmaceutical company headquartered in Indianapolis, Indiana, with offices in 18 countries. Its products are sold in approximately 125 count ...
intentionally withheld information as to the lethal side-effects of Zyprexa. The
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
appealed this as
prior restraint Prior restraint (also referred to as prior censorship or pre-publication censorship) is censorship imposed, usually by a government or institution, on expression, that prohibits particular instances of expression. It is in contrast to censorship ...
, saying that citizen-journalists should have the same First Amendment rights as major media outlets. It was later held that the judgment was unenforceable, though First Amendment claims were rejected. In May 2011 and January 2012 the US seized the domains of the non-US websites of the non-US citizens Richard O'Dwyer and
Kim Dotcom Kim Dotcom (né Schmitz; born 21 January 1974), also known as Kimble and Kim Tim Jim Vestor, is a Finnish-German Internet entrepreneur and political activist who lives in Glenorchy, New Zealand. He rose to fame in Germany in the 1990s as a ha ...
, and sought to extradite them to the US, accusing them of copyright infringement. In January 2015 details from the Sony Pictures Entertainment hack revealed the
Motion Picture Association of America The Motion Picture Association (MPA) is an American trade association representing the Major film studios, five major film studios of the Cinema of the United States, United States, the Major film studios#Mini-majors, mini-major Amazon MGM Stud ...
's lobbying of the
United States International Trade Commission The United States International Trade Commission (USITC or I.T.C.) is an agency of the United States federal government that advises the legislative and executive branches on matters of trade. It was created by Congress in 1916 as the U.S. Tari ...
to mandate that US ISPs, either at the
internet transit Internet transit is the service of allowing network traffic to cross or "transit" a computer network, usually used to connect a smaller Internet service provider (ISP) to the larger Internet. Technically, it consists of two bundled services: * Th ...
or internet service provider level, implement IP address blocking of unauthorized file sharing as well as linking websites.


Bay Area Rapid Transit (BART) phone service suspension

On July 3, 2011, two officers of the
Bay Area Rapid Transit Bay Area Rapid Transit (BART) is a rapid transit system serving the San Francisco Bay Area in California. BART serves 50 stations along six routes and of track, including eBART, a spur line running to Antioch, and Oakland Airport Connecto ...
(BART) Police shot and killed Charles Hill at Civic Center Station in San Francisco. On August 12, 2011, BART shut down phone services, including
mobile Internet The mobile web comprises mobile browser-based World Wide Web services accessed from handheld mobile devices, such as smartphones or feature phones, through a mobile or other wireless network. History and development Traditionally, the World ...
access, for three hours in an effort to limit possible protests against the shooting and to limit communications from protesters at the station. The shutdown drew the attention of international media, along with comparisons to former Egyptian president
Hosni Mubarak Muhammad Hosni El Sayed Mubarak (; 4 May 1928 – 25 February 2020) was an Egyptian politician and military officer who served as the fourth president of Egypt from 1981 to 2011 and the 41st Prime Minister of Egypt, prime minister from 1981 to ...
. On August 29, 2011, a coalition of nine public interest groups led by
Public Knowledge Public Knowledge is an American non-profit organization, non-profit advocacy, public interest group based in Washington, D.C. Founded in 2001 by David Bollier, Gigi Sohn, and Laurie Racine, Public Knowledge is primarily involved in the fields of ...
filed an Emergency Petition asking the US
Federal Communications Commission The Federal Communications Commission (FCC) is an independent agency of the United States government that regulates communications by radio, television, wire, internet, wi-fi, satellite, and cable across the United States. The FCC maintains j ...
(FCC) to declare these actions illegal. In December 2011 BART adopted a new "Cell Service Interruption Policy" that allows shutdowns of phone services within BART facilities only "in the most extraordinary circumstances that threaten the safety of District passengers, employees and other members of public, the destruction of District property, or the substantial disruption of public transit service". According to a spokesperson, under the new policy the phone system would not be disable under circumstances similar to those in August 2011. Instead police officers would arrest individuals who break the law.


Interruption of communication services

In 2014 the FCC issued an Enforcement Advisory warning the public that "it is illegal to use a cell phone jammer or any other type of device that blocks, jams or interferes with authorized communications" and that "this prohibition extends to every entity that does not hold a federal authorization, including state and local law enforcement agencies". In 2016 the
California Law Revision Commission The California Law Revision Commission (CLRC) is an independent California state agency responsible for recommending reforms of state law. The agency was created in 1953 and advises both the Governor and state legislators on reforming state laws. ...
issued a recommendation on "Government Interruption of Communication Service". The Commission concluded that government action to interrupt communications can be constitutional if the government acts pursuant to procedures that are designed to protect constitutional free expression and due process rights. To be constitutional the action usually needs to be approved by a judicial officer who has found: (i) probable cause that the communication service is or will be used for an unlawful purpose, (ii) that immediate action is required to protect public health, safety, or welfare, and (iii) the affected customer must have a prompt opportunity for adjudication of the government's contentions. For a general interruption of communication service that affects a large number of people or a large geographic area, judicial approval also requires that the action (iv) is necessary to avoid a serious threat of violence that is both imminent and likely to occur or (v) that the effect on expression is incidental to some other valid government purpose, and (vi) is reasonable, (vii) is content-neutral, (viii) would impair no more speech than is necessary, and (ix) leaves open other ample means of communication. Prior judicial approval is not required in extreme emergencies involving immediate danger of death or great bodily injury where there is insufficient time to obtain a court order. Beyond constitutional law, a state or local government's ability to effect a general interruption of wireless communications is also subject to the federal "Emergency Wireless Protocol (EWP)" or "Standard Operating Procedure 303" which established a process for interrupting and restoring wireless communication service during times of national emergency. The effect of this protocol is that state and local government officials can initiate an interruption of communication service, but cannot directly order wireless communication service providers to take action. Such orders to private providers must come from the National Coordinating Center for Communications (NCC) within the Department of Homeland Security (DHS), as designated by the EWP. If an order authorizing an interruption does not fall within the EWP, it is served directly on the relevant communication service provider.


See also

*
Block (internet) On the Internet, a block is a technical measure intended to restrict access to information or resources. Blocking and its inverse, unblocking, may be implemented by the owners of computers using software. Blocking may also refer to denying ac ...
*
Internet censorship and surveillance by country This list of Internet censorship and surveillance by country provides information on the types and levels of Internet censorship and surveillance that is occurring in countries around the world. Classifications Detailed country by country infor ...
* Communications Assistance for Law Enforcement Act (CALEA) *
Mass surveillance in the United States The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveill ...


References

''This article incorporate
licensed material
from th
Regional Overviews
and other sections of the
OpenNet Initiative The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. Started in 2002, the project employed a number of technical means, as well as an international netwo ...
web site''. , see the lower right corner of pages at the


External links


Global Integrity: Internet Censorship, A Comparative Study
puts US online censorship in cross-country context. {{Social issues in the United States
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...