Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Online Speech Isn’t (Usually) a Free Speech Issue

Why Online Speech Isn’t (Usually) a Free Speech Issue

It is undeniable that technology has become ingrained into our workplaces, and perhaps even more so into our daily lives—particularly considering the events of the past few years. This is likely why it is so surprising when a large tech company bans a user for some activity on their platform.

With all that is happening today, this surprise has largely turned into outrage over whether or not these companies can really ban people over what they share on the platform. Let’s go over the situation to try and glean from it some answers.

Before we begin, we just want to establish that we are not offering any legal advice here, just a bit of perspective.

First, a History Lesson

Contrary to popular belief, the concept of freedom of speech is far from a recent invention. For one of the first examples on record, we must turn to the Greek city of Athens, where the philosopher Socrates spoke the following at his trial in 339 BC: “If you offered to let me off this time on condition I am not any longer to speak my mind… I should say to you, Men of Athens, I shall obey the Gods rather than you.”

Many other thinkers over the centuries also supported the ideals of freedom—particularly, freedom of speech.

  • In 1516, Erasmus wrote The Education of a Christian Prince, and included, “In a free state, tongues too should be free.”
  • In 1644, the poet John Milton wrote in support of the freedom of the press in his pamphlet Aeropagitica that, “He who destroys a good book, kills reason itself.”
  • In 1770, Voltaire: “Monsieur l'abbé, I detest what you write, but I would give my life to make it possible for you to continue to write.”
  • In 1789,  The Declaration of the Rights of Man was written amidst the French Revolution and contained reference to the freedom of speech.

In the years since, countless more examples have popped up—the First Amendment to the United States’ Bill of Rights in 1791, the 1859 essay On Liberty by John Stuart Mill, and the unanimously voted upon Universal Declaration of Human Rights passed in 1948 that promoted freedom of expression to member nations—all these and more have expounded upon the right to speak one’s mind throughout history.

However, it has not been nearly that long since we have been able to speak to the entire world, as Internet technology was not invented until the 1960s, and the network only got its name in 1995. As such, there has since been some confusion over what is and isn’t “allowed” on the Internet, as well as what can and cannot be said.

Your Digital Rights

Today, the Internet permeates our daily lives, more than many of us might initially realize. Cloud services, many telecom connections, and a sizable portion of everything else we do ties back to the Internet in some way. We conduct business, communicate with friends and relatives, and essentially network ourselves using this greater shared network.

Censorship on the Internet?

However, there has been some dissonance with many people, as posts they have shared have been removed from online platforms. Some people have even been blocked from some networks entirely because of the ideas and opinions they have shared.

Taking it one step further lately, there have been entire platforms taken down, due to the content that has been posted there.

Many users of these platforms have taken offense to this, with cries of censorship and the infringement upon their rights to have their free speech stifled. However, what these users don’t understand is that these networks and platforms are well within their rights to take such actions—even though this seems to run counter to the concept of free speech in general.

Why Are Platforms Allowed to Take Down Content?

To understand this concept, it may help to turn our attention to the most famous example of government-ensured free speech: the First Amendment to the United States Constitution.

This amendment states that: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speech, or of the press, or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”

While many might read this as “nobody can tell me not to say something I want to say,” the reality is that the government can’t tell somebody what to say… whether that’s in conversation, in print, or online.

However, most platforms like Facebook, Twitter, and the like, aren’t typically part of a governing body. They’re businesses, and as such can decide what they want to be associated with. This leaves these platforms and service providers in the clear to decide who they want to do business with. And, let’s be clear here: for many of these platforms, the users are the actual product.

Why You Should Read the Terms of Service

Think back to when you first signed up for a social media network—or any online service, for that matter. Part of the process was to click a little checkbox indicating that you agreed to their terms of service, or TOS.

The TOS is essentially that service’s code of conduct. By giving your consent to them, you agree that you are aware of the limitations that a given website has in terms of its user behavior while browsing it. The platforms that host these websites also have their own TOS that applies to the website as well.

The terms of service acts as a website’s rulebook, setting a precedent to what the website will and will not stand for. That way, the website can’t be seen as legally responsible for its users’ conduct and has the capability to cut off any users that breach their previously established terms. Those businesses that sustain these websites are also beholden to the platforms that allow them to host content. Amazon Web Services and other cloud vendors have demonstrated this as well by taking down entire websites that breach their TOS agreements. Once the data centers that these vendors provide don’t allow you to use their services, you will need to go somewhere else, or establish your own hosting environment. This is usually prohibitively expensive.

So, what is seen as a public service is (in reality) part of a regulated business. This means that the rights that many governments ensure simply don’t apply to websites and the web hosts that enable them.

Some Exceptions to the Such Rights and Rules

Admittedly, there are other issues at play throughout these discussions, making this less of a yes/no issue and more complicated. In the case of the First Amendment, many circumstances can also play out that can very well be restricted by the government. These include categories of speech like:

  • Obscenity
  • Fraud
  • Inciting speech
  • Intellectual property violation
  • Threats
  • Commercial advertising
  • Speech integral to illegal conduct or content

So, if a social media platform didn’t remove content that advertised something false, or was stolen from another source, or that infringed on someone else’s intellectual property, it could potentially be subject to fines and even government intervention… at least, so much is true in the United States.

What This Means to Businesses

Frankly, it means a lot. While the freedom of speech may be vast and wide-reaching, it isn’t by any means a get out of jail free card for organizations. This is why we see establishments refusing to work with or for certain people based on some as-of-yet unprotected status not seeing any governmental recourse, but suffering backlash from their audience.

Speech will have consequences, even if one has the right to say something. This is important to keep in mind.

So long as your speech or someone else’s isn’t infringing on the exceptions listed above (along with a few other circumstances that we recommend you take up with a lawyer) there is nothing that says you are protected from the judgement it brings.

As an IT provider, this was admittedly a little out of our wheelhouse, but it is important to understand that a platform or service provider is well within their rights to stifle or silence your or your business’ official opinions as you use them. Again, we recommend that any questions you have regarding this matter are directed toward a licensed legal professional.

Any questions about how to use your IT to better your business? Those we can handle. For this kind of assistance, reach out to our team at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips AI Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Artificial Intelligence Holiday Facebook Automation Gadgets Compliance Covid-19 Cloud Computing Training Outsourced IT Remote Work Server Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Government Data Management Virtualization Blockchain Bandwidth Windows 10 Wi-Fi Business Technology Two-factor Authentication Apps Data Security Vendor Mobile Office Managed Services Tip of the week Employer-Employee Relationship Chrome Networking Budget Apple BYOD Voice over Internet Protocol Mobile Device Management App Gmail WiFi Information Technology Office 365 Managed IT Services How To Hacker BDR HIPAA Avoiding Downtime Applications Marketing Physical Security Access Control Conferencing Computing Risk Management Big Data Retail Analytics Office Tips Augmented Reality Computers Storage Password Router Bring Your Own Device Website Healthcare Help Desk Virtual Private Network 2FA Operating System Health Microsoft 365 Telephone Social Document Management Solutions Cooperation Scam Data loss Customer Service Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers Windows 11 Firewall Monitoring Going Green Display Printer Free Resource Paperless Office Excel Infrastructure Project Management Cybercrime The Internet of Things Windows 7 Managed IT Service Multi-Factor Authentication Mobility Cryptocurrency Downloads Machine Learning Licensing Virtual Desktop Entertainment Data storage LiFi Employees Maintenance Antivirus Customer Relationship Management Integration Outlook Data Privacy Telephone System Money Hacking Humor Cost Management Holidays Presentation Data Storage Sports Wireless Technology Robot Mouse Video Conferencing Managed Services Provider Virtual Machines Professional Services User Tip Modem Administration Processor Mobile Security IT Management Word VPN Meetings iPhone Smart Technology Computer Repair Settings Supply Chain Wireless Vulnerabilities Printing Saving Time Content Filtering Safety YouTube Images 101 Organization Paperless Electronic Medical Records Download Alerts SharePoint Digital Security Cameras Co-managed IT 5G Smart Devices Memory Application Writing Browsers Google Docs Connectivity Unified Communications Technology Care Break Fix Experience Lenovo Remote Working Business Communications Data Breach Virtual Reality Google Play Upload Bitcoin Running Cable Google Wallet Videos Scams Multi-Factor Security Server Management Electronic Health Records IBM Private Cloud Social Network Identity Theft Wasting Time IoT Hybrid Work Dark Web Superfish Laptop Human Resources Trend Micro Twitter Security Cameras Trends Windows 8 Customer Resource management Drones Regulations Cables Google Calendar Software as a Service Error Managing Costs Social Engineering Data Analysis Star Wars Microsoft Excel Staff Halloween Google Apps eCommerce Competition Remote Computing SSID Gamification Social Networking IT Maintenance Legislation Surveillance Virtual Assistant Tablet Virtual Machine Fileless Malware Business Intelligence Wearable Technology Scary Stories Reviews Shortcuts Alert Medical IT Content Hacks Dark Data Health IT Motherboard Ransmoware Comparison Fun Managed IT Development File Sharing Transportation User Hypervisor How To Directions Assessment Deep Learning Vendors Permissions Shopping Be Proactive Optimization Notifications PowerPoint Education Workforce Specifications IP Address Travel Employer/Employee Relationships Google Maps Microchip Navigation Internet Exlporer Threats Fraud Techology PCI DSS Gig Economy Workplace Strategies Username Mobile Computing Recovery Meta Black Friday Search Internet Service Provider Unified Threat Management Teamwork Regulations Compliance Hard Drives Evernote Database Best Practice Amazon Unified Threat Management IT Technicians Buisness Memes Domains SQL Server Network Congestion Proxy Server Legal Cookies IT solutions Outsource IT Cyber Monday Net Neutrality Financial Data Media History Refrigeration Tactics Business Growth Environment Hotspot User Error Mirgation Smartwatch IT Public Speaking Azure Nanotechnology Small Businesses Cortana Procurement Lithium-ion battery Point of Sale Telework Cyber security Tech Entrepreneur Addiction Alt Codes Displays Language Chatbots Downtime CES Network Management Communitications Tech Support Management Monitors Screen Reader Hosted Solution Outsourcing Distributed Denial of Service Supply Chain Management FinTech Undo Term Service Level Agreement Typing Computing Infrastructure Identity Workplace IT Assessment Websites Value Bookmark Google Drive Smart Tech Hiring/Firing Knowledge Flexibility

Blog Archive