1. Home
  2. |Insights
  3. |Section 230: An Overview of the Legal and Policy Framework

Section 230: An Overview of the Legal and Policy Framework

Webinar | 01.26.23, 8:00 AM EST - 9:00 AM EST

47 USC  230 (“Section 230”) was enacted as part of the United States Communications Decency Act (CDA), providing immunity to interactive computer service providers for third-party content. Known as “the 26 words that created the internet,” this statute is responsible for the development of the modern internet as we know it. While Section 230 has allowed online platforms—like major social media platforms and search engines—to flourish, the broad legal protections that Section 230 provides have become controversial. To no success, various members of Congress, the Presidential Administration, and political candidates have called for Section 230 reforms, and for the first time, the way in which we use the internet may change depending how the U.S. Supreme Court rules in a highly-anticipated Section 230 case this term. 

It is important for potentially-impacted companies to understand what these legal and policy developments could mean for them and their business, and how to navigate the Section 230 landscape moving forward.

During this program on Section 230, our panel will cover:

  • Overview of the Text of the Statute
  • Section 230 in the Courts
  • Proposed Legislation and DOJ Recommendations
  • Key Considerations for Companies
  • We hope you will be able to join us for this timely discussion.

Continuing Legal Education — We will provide a certificate of attendance and other materials to use in seeking continuing education credits.

 

For more information, please visit these areas: Mass Tort, Product, and Consumer Litigation, Privacy and Cybersecurity

Insights

Webinar | 06.11.24

Consilio Symposium 2024

Ian Schuler will be speaking on the panel, "An Evolving Playbook: Privilege Protection and Logging.” The discussion will explore strategies for identifying privileged materials, including analytic tools and TAR, and approaches to logging privileged materials, including categorical logs and other types.