Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

US Senate Panel OKs Online Child Protection Bill Amid Privacy Fears

A US Senate panel Thursday approved legislation aimed at combatting online child exploitation as civil liberties activists warned the measure could lead to an array of constitutional and privacy problems.

A US Senate panel Thursday approved legislation aimed at combatting online child exploitation as civil liberties activists warned the measure could lead to an array of constitutional and privacy problems.

The Judiciary Committee voted to approve a revised version of the Earn It Act which would eliminate “blanket liability protection” for online platforms which fail to protect against child sexual abuse material.

The bill, which needs approval by the full Senate and House of Representatives, is among the first to chip away at the liability shield for internet services — under a law known as Section 230 — which has come under renewed scrutiny in recent months.

Backers of the bill say it would provide incentives to crack down on online child abuse and exploitation, but critics say it could shut down constitutionally protected free speech and open up online firms to endless litigation.

“To all the victim groups and law enforcement entities urging Congress to do something about the scourge of child sexual abuse material and the exploitation of children on the internet, the committee heard you and acted decisively,” said Senator Lindsey Graham, who chairs the panel.

The panel made a last-minute revision taking out an earlier proposal which would have required online platforms to enable law enforcement access to encrypted materials or face losing any liability protection.

But civil liberties activists said the measure still imperils online safety by calling for a commission to set “best practices,” which could lead to a weakening of encryption used to secure internet communications.

The bill “sets the stage for judges across the country to apply scores of different legal standards to intermediaries’ content moderation and security practices,” said Emma Llanso of the Center for Democracy and Technology.

Advertisement. Scroll to continue reading.

“We know from decades of experience that threats of litigation lead website operators and other intermediaries to censor speech and shutter services.”

Matt Schruers, president of the Computer and Communications Industry Association, a trade group, said the measure is likely to be counterproductive.

“Exposing private companies to liability for their efforts to identify, remove, and turn over unlawful content to law enforcement works against the very goal of the legislation,” Schruers said in a statement.

Bertram Lee of the consumer group Public Knowledge said the bill “represents a major change to platform liability law,” and “would make it effectively impossible for platforms to offer general-purpose, end-to-end encryption to consumers.”

Related: Dating App Maker Match Group Backs US Bill Seen as Privacy Threat

Related: DoJ Again Asks for Encryption Backdoors After Hacking US Naval Base Shooter’s iPhones

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.