Ireland Orders X, TikTok & Instagram To Cut Terrorist Content

Elon Musk’s X, TikTok and Meta’s Instagram have been ordered by Irish media regulators to take “necessary measures” to prevent terrorist content being allowed on their platforms in order to comply with sweeping new online safety legislation.

The organisation has issued the decision following the notification of removal orders to these platforms from EU authorities.

The companies must now take specific measures to prevent their services from being used for the dissemination of terrorist content and to report on the measures they have taken.The Irish media regulator, Coimisiún na Meán (CNAM), said it issued the ruling after its investigations determined that the social media networks were “exposed to terrorist content” due to weak processes.

The European Commission has opened a range of investigations into online platforms since the new Digital Services Act relating to online harms came into force but Ireland’s media regulator plays a particularly important role given the tech companies’ EU headquarters are all sited in Dublin. 

Such rulings come when a network is subjected to at least two removal orders from EU competent authorities, usually the police, but sometimes a regulator, in the preceding 12 months. Orders under the EU terrorist content online regulation usually require the removal of content within an hour of the order.

The Irish media commission gave the social media platforms 12 weeks to make “effective, targeted and proportionate” measures to stop terrorist content while at the same time respecting freedom of speech rights.

The regulator said that terrorist content was defined in EU law as material that:

  • Incites the commission of terrorist offences, such as by the glorification of terrorist acts.
  • Advocates the commission of terrorist offences.
  • Solicits a person or a group of people to commit or contribute to the commission of terrorist offences.
  • Incites, solicits, threatens or provides instruction on the commission of terrorist offences.
  • Solicits a person or a group of people to participate in the activities of a terrorist group.
  • Provides instruction on the making or use of explosives, firearms, or other weapons, or noxious or hazardous substances, or other specific methods or techniques for the purpose of committing or contributing to the commission of terrorist offences.
  • Constitutes a threat to commit a terrorist offence.

“TikTok, X and Meta (in respect of Instagram) will be obliged to take specific measures to protect their services from being used for the dissemination of terrorist content, and to report to CNAM on the specific measures taken within three months from the receipt of the decision,” it said in a statement.

Amongst the measures they must take are the inclusion in their terms and conditions of use provisions to address misuse of the platforms. If the Irish commission deems the measures are not sufficient it can impose fines of up to 4% of global revenue.

Concern about terrorist content across many social media platforms has been heightened after the Hamas attacks on Israel  and arrests in Germany relating to an alleged coup plot.

European Union   |   RTE   |    Irish Times   |    Guardian  |   Reddit   |    MSN   |   CNAM

Image:

You Might Also Read: 

European Union Has Rules On Illegal Online Content:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 







 

« The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape
Using AI In Classrooms Is A Test Of Public Trust »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

ThreatSpike Labs

ThreatSpike Labs

ThreatSpike Labs provides the first end-to-end fully managed security service for companies of all sizes.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.

Karthik Consulting (KC)

Karthik Consulting (KC)

Karthik Consulting is a technology service provider specializing in IT services for the U.S. federal government.

Graphiant

Graphiant

Graphiant’s Data Assurance service gives businesses end-to-end control and visibility into how data travels throughout the entire business network.