Home Government Tech Policy EU gives Facebook, Google an hour to remove terrorist content

The European Union has tightened the screw on online companies, including Google, Facebook and Twitter, giving them an hour from notification to remove terrorist content which is posted on their platforms.

It said that because terrorist content was particularly harmful in the first hours of its appearance online, companies should, as a general rule, remove such content within one hour of its flagging by law enforcement authorities and Europol.

The EU outlined a series of steps for tackling illegal content online in September 2017; it said new operational measures, announced on 1 March, were meant to be followed in order to determine whether there was a need to go further and propose legislation.

The vice-president for the Digital Single Market, Andrus Ansip, said: "Online platforms are becoming people's main gateway to information, so they have a responsibility to provide a secure environment for their users. What is illegal offline is also illegal online.

"While several platforms have been removing more illegal content than ever before – showing that self-regulation can work – we still need to react faster against terrorist propaganda and other illegal content which is a serious threat to our citizens' security, safety and fundamental rights."

Google has been under pressure to remove objectionable material since March last year when videos of unsavoury content, including racist, sexist, terrorist and anti-Semitic material, were found to be attracting ads from reputable companies.

Web companies have struck deals with the EU in the past to take down material like Islamic State videos and information that incites hatred.

According to the new directives, companies and member states will have to submit reports on removal of terrorist content within three months and illegal content within six months.

Under the new measures companies operating in the EU will have to explicitly state in their terms of service that they will not host terrorist content.

They will need to put in place special mechanisms for submission of, and follow-up to, referrals from competent authorities – as well as Europol's Internet Referral Unit.

Fast-track procedures to remove content within one hour of referral will also be required. States have been told to ensure they have the capabilities and resources to detect, identify and notify terrorist content to Internet platforms.

The new measures require proactive steps, including automated detection, to remove or disable terrorist content and stop it from reappearing once it has been removed.

Companies have been told to share and optimise appropriate technological tools and put in place working arrangements for better co-operation with the relevant authorities, including Europol.


Our Mesh WiFi system MW3 is the first in Australia market with price below AUD$200 for a set of three.

· Best valued product
· Strong signal covering up to 300m2 for MW3 and 500m2 for MW6
· Aesthetically pleasing and light weigh (blend into any room deco)
· Wireline backhauls supported
· Product units are pre-paired and easy to setup
· Not requiring phone number or email address to set up
· Wall penetration (better than other similar brands)
· Seamless WiFi roaming
· User friendly app with controls to setup a guest network, parental controls for disabling groups of devices you allocate to individuals, QoS and more



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.


Popular News




Sponsored News