Ireland Orders X, TikTok & Instagram To Cut Terrorist Content

Elon Musk’s X, TikTok and Meta’s Instagram have been ordered by Irish media regulators to take “necessary measures” to prevent terrorist content being allowed on their platforms in order to comply with sweeping new online safety legislation.

The organisation has issued the decision following the notification of removal orders to these platforms from EU authorities.

The companies must now take specific measures to prevent their services from being used for the dissemination of terrorist content and to report on the measures they have taken.The Irish media regulator, Coimisiún na Meán (CNAM), said it issued the ruling after its investigations determined that the social media networks were “exposed to terrorist content” due to weak processes.

The European Commission has opened a range of investigations into online platforms since the new Digital Services Act relating to online harms came into force but Ireland’s media regulator plays a particularly important role given the tech companies’ EU headquarters are all sited in Dublin. 

Such rulings come when a network is subjected to at least two removal orders from EU competent authorities, usually the police, but sometimes a regulator, in the preceding 12 months. Orders under the EU terrorist content online regulation usually require the removal of content within an hour of the order.

The Irish media commission gave the social media platforms 12 weeks to make “effective, targeted and proportionate” measures to stop terrorist content while at the same time respecting freedom of speech rights.

The regulator said that terrorist content was defined in EU law as material that:

  • Incites the commission of terrorist offences, such as by the glorification of terrorist acts.
  • Advocates the commission of terrorist offences.
  • Solicits a person or a group of people to commit or contribute to the commission of terrorist offences.
  • Incites, solicits, threatens or provides instruction on the commission of terrorist offences.
  • Solicits a person or a group of people to participate in the activities of a terrorist group.
  • Provides instruction on the making or use of explosives, firearms, or other weapons, or noxious or hazardous substances, or other specific methods or techniques for the purpose of committing or contributing to the commission of terrorist offences.
  • Constitutes a threat to commit a terrorist offence.

“TikTok, X and Meta (in respect of Instagram) will be obliged to take specific measures to protect their services from being used for the dissemination of terrorist content, and to report to CNAM on the specific measures taken within three months from the receipt of the decision,” it said in a statement.

Amongst the measures they must take are the inclusion in their terms and conditions of use provisions to address misuse of the platforms. If the Irish commission deems the measures are not sufficient it can impose fines of up to 4% of global revenue.

Concern about terrorist content across many social media platforms has been heightened after the Hamas attacks on Israel  and arrests in Germany relating to an alleged coup plot.

European Union   |   RTE   |    Irish Times   |    Guardian  |   Reddit   |    MSN   |   CNAM

Image:

You Might Also Read: 

European Union Has Rules On Illegal Online Content:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 







 

« The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape
Using AI In Classrooms Is A Test Of Public Trust »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

Brightside AI

Brightside AI

Brightside AI is a Swiss cybersecurity SaaS that helps teams combat AI-enabled phishing threats. Protect your team today.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.