{"id":109603,"date":"2025-04-02T08:55:11","date_gmt":"2025-04-02T12:55:11","guid":{"rendered":"https:\/\/www.justsecurity.org\/?p=109603"},"modified":"2025-05-14T09:20:55","modified_gmt":"2025-05-14T13:20:55","slug":"regulating-social-media-platforms-series","status":"publish","type":"post","link":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/","title":{"rendered":"Regulating Social Media Platforms: Government, Speech, and the Law"},"content":{"rendered":"<p><i><span style=\"font-weight: 400;\">Just Security<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">Tech Policy Press, <\/span><\/i><span style=\"font-weight: 400;\">and the NYU Stern Center for Business and Human Rights are pleased to present a new symposium, <em>Regulating Social Media Platforms: Government, Speech, and the Law<\/em><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This will be a pivotal year for technology regulation in the United States and around the world. With respect to social media companies in particular, the EU is already regulating platforms based on perceived harms they cause, most notably through its Digital Services Act, with other countries pursuing a range of regulatory approaches. In the United States, regulatory proposals at the federal level, such as renewed efforts to repeal or reform Section 230 of the Communications Decency Act, have been stalled in Congress while federal regulators at the Federal Trade Commission and Federal Communications Commission appear set to take aim at the content moderation practices of major platforms. Meanwhile, individual states such as Florida and Texas have tried to restrict content moderation and run into serious constitutional challenges. Other states, such as California and New York, have primarily aimed to force greater transparency on the part of social media companies; they, too, have encountered constitutional challenges.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Leading expert authors in this symposium evaluate current and prospective regulatory approaches to answer the following questions: is it lawful, feasible, and desirable for government actors to regulate social media platforms to reduce harmful effects on democracy and society? If so, how? What are the prospects for meaningful federal regulation, given the divisions in Congress and increasingly partisan leanings of regulators? And will the states be viable laboratories of experimentation? How will regulation in other parts of the globe impact content moderation practices for U.S.-based companies? What is the short-term future for government regulation of social media platforms, and how might the regulatory landscape evolve over the longer term? These and related questions will be considered in this ongoing symposium.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We encourage you to visit this page regularly, as it will be updated with new articles as they are published.<\/span><\/p>\n<ul>\n<li>Daphne Keller, <a href=\"https:\/\/www.justsecurity.org\/109744\/regulated-democracy-regulated-speech\/\">&#8220;Regulated Democracy and Regulated Speech&#8221;<\/a> (April 2, 2025)<\/li>\n<li>Susan Ness, <a href=\"https:\/\/www.justsecurity.org\/109853\/regulatory-landscape-big-tech\/\">&#8220;Truth and Consequences: The Post-Election Regulatory Landscape for Big Tech&#8221;<\/a> (April 4, 2025)<\/li>\n<li>Anna Lenhart, <a href=\"https:\/\/www.justsecurity.org\/110127\/international-standards-consumers-online\/\">&#8220;Leveraging International Standards to Protect U.S. Consumers Online, No Congress Required&#8221;<\/a> (April 9, 2025)<\/li>\n<li>Luke Hogg and Ren\u00e9e DiResta, <a href=\"https:\/\/www.justsecurity.org\/109974\/enabling-middleware-market\/\">&#8220;Enabling a Thriving Middleware Market&#8221;<\/a> (April 11, 2025)<\/li>\n<li>Olivier Sylvain, <a href=\"https:\/\/www.justsecurity.org\/110193\/states-social-media-policy-today\/\">&#8220;States in the Vanguard: Social Media Policy Today&#8221;<\/a> (April 15, 2025)<\/li>\n<li>Mariana Olaizola Rosenblat, <a href=\"https:\/\/www.justsecurity.org\/110916\/global-online-safety-regulations\/\">&#8220;Online Safety Regulations Around the World: The State of Play and The Way Forward&#8221;<\/a> (April 28, 2025)<\/li>\n<li>Mary Anne Franks, <a href=\"https:\/\/www.justsecurity.org\/110703\/platform-curation-right-responsibility-opportunity\/\">&#8220;Curating Cyberspace: Rights, Responsibilities, and Opportunities&#8221;<\/a> (May 14, 2025)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h6><em>IMAGE: (L) Abstract chat icons over a digital surface (via Getty Images); (M) Visualization of an online network (via Getty Images); (R) Popular social media apps on an Apple iPhone (via Getty Images).<br \/>\n<\/em><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>Launching a new series with leading experts on regulating the information environment, co-organized by NYU Stern Center for Business and Human Rights and Tech Policy Press.<\/p>\n","protected":false},"author":558,"featured_media":109605,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[43209,160,10,43211,43212,2763,2715,41390,29851,43217,43107,43210],"tags":[161,2658,2871,42256,1355,1789,22092,2400,1517,41899,2392,1481,131,1944,1945,27686,1365,41989,41704,43065,42255,1673,43320,1029,3110,1335,2729,4949],"coauthors":[2518,2698,42231],"class_list":["post-109603","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-emerging-technology","category-civil-liberties","category-congress","category-courts-litigation","category-democracy-rule-of-law","category-diplomacy","category-executive-branch","category-featured-new","category-human-rights","category-intelligence-surveillance","category-series","category-social-media-platforms","tag-first-amendment","tag-artificial-intelligence","tag-big-tech","tag-communications-decency-act-cda","tag-constitution","tag-content","tag-content-moderation","tag-courts","tag-democracy","tag-digital-service-act","tag-disinformation","tag-europe","tag-european-union","tag-federal-communications-commission","tag-federal-trade-commission","tag-freedom-of-speech","tag-google","tag-meta","tag-misinformation","tag-regulation","tag-section-230","tag-social-media-platforms","tag-symposium-on-regulating-social-media-platforms","tag-technology","tag-trade","tag-twitter","tag-united-states","tag-youtube"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Regulating Social Media Platforms: Government, Speech, and the Law<\/title>\n<meta name=\"description\" content=\"A new series on regulating the information environment, co-organized by NYU Stern Center for Business and Human Rights and Tech Policy Press.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Regulating Social Media Platforms: Government, Speech, and the Law\" \/>\n<meta property=\"og:description\" content=\"A new series on regulating the information environment, co-organized by NYU Stern Center for Business and Human Rights and Tech Policy Press.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/\" \/>\n<meta property=\"og:site_name\" content=\"Just Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/JSBlog\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-02T12:55:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-14T13:20:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-541.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"429\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tess Bridgeman, Justin Hendrix, Paul M. Barrett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"A new series on regulating the information environment, co-organized by NYU Stern Center for Business and Human Rights and Tech Policy Press.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-541.jpg?fit=1024%2C429&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@just_security\" \/>\n<meta name=\"twitter:site\" content=\"@just_security\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tess Bridgeman, Justin Hendrix, Paul M. Barrett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/\"},\"author\":{\"name\":\"Tess Bridgeman\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/0c712c17616c3c678d7f4756ce1c9843\"},\"headline\":\"Regulating Social Media Platforms: Government, Speech, and the Law\",\"datePublished\":\"2025-04-02T12:55:11+00:00\",\"dateModified\":\"2025-05-14T13:20:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/\"},\"wordCount\":458,\"publisher\":{\"@id\":\"https:\/\/www.justsecurity.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-54-scaled.jpg?fit=2560%2C1071&ssl=1\",\"keywords\":[\"1st Amendment\",\"Artificial Intelligence (AI)\",\"Big Tech\",\"Communications Decency Act (CDA)\",\"Constitution\",\"Content\",\"content moderation\",\"courts\",\"Democracy\",\"Digital Services Act\",\"Disinformation\",\"Europe\",\"European Union\",\"Federal Communications Commission (FCC)\",\"Federal Trade Commission (FTC)\",\"freedom of speech\",\"Google\",\"Meta\",\"Misinformation\",\"Regulation\",\"Section 230\",\"Social Media Platforms\",\"Symposium on Regulating Social Media Platforms\",\"Technology\",\"trade\",\"Twitter\",\"United States (US)\",\"YouTube\"],\"articleSection\":[\"AI &amp; Emerging Technology\",\"Civil Liberties\",\"Congress\",\"Courts &amp; Litigation\",\"Democracy &amp; Rule of Law\",\"Diplomacy\",\"Executive Branch\",\"Featured Articles\",\"Human Rights\",\"Intelligence &amp; Surveillance\",\"Series\",\"Social Media Platforms\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/\",\"url\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/\",\"name\":\"Regulating Social Media Platforms: Government, Speech, and the Law\",\"isPartOf\":{\"@id\":\"https:\/\/www.justsecurity.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-54-scaled.jpg?fit=2560%2C1071&ssl=1\",\"datePublished\":\"2025-04-02T12:55:11+00:00\",\"dateModified\":\"2025-05-14T13:20:55+00:00\",\"description\":\"A new series on regulating the information environment, co-organized by NYU Stern Center for Business and Human Rights and Tech Policy Press.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-54-scaled.jpg?fit=2560%2C1071&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-54-scaled.jpg?fit=2560%2C1071&ssl=1\",\"width\":2560,\"height\":1071,\"caption\":\"IMAGE: (L) Abstract chat icons over a digital surface (via Getty Images); (M) Visualization of an online network (via Getty Images); (R) Popular social media apps on an Apple iPhone (via Getty Images).\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.justsecurity.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Regulating Social Media Platforms: Government, Speech, and the Law\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.justsecurity.org\/#website\",\"url\":\"https:\/\/www.justsecurity.org\/\",\"name\":\"Just Security\",\"description\":\"A Forum on Law, Rights, and U.S. National Security\",\"publisher\":{\"@id\":\"https:\/\/www.justsecurity.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.justsecurity.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.justsecurity.org\/#organization\",\"name\":\"Just Security\",\"url\":\"https:\/\/www.justsecurity.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1\",\"width\":5371,\"height\":1757,\"caption\":\"Just Security\"},\"image\":{\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/JSBlog\/\",\"https:\/\/x.com\/just_security\",\"https:\/\/www.linkedin.com\/company\/just-security-linkedin\/\",\"https:\/\/www.instagram.com\/justsecurityforum\/\",\"https:\/\/www.youtube.com\/@JustSecurityForum\",\"https:\/\/bsky.app\/profile\/justsecurity.org\"],\"description\":\"Just Security is an editorially independent, non-partisan, daily digital law and policy journal that elevates the discourse on national security, democracy and the rule of law, and rights. We publish rigorous, expert analysis and informational resources on the issues that matter most. Our goals are to inform and empower decision-makers with high-quality analysis, foster informed dialogue on challenging issues, and remain accessible to our global audience. Just Security is an essential resource for those shaping a just and secure world. Just Security is based at the Reiss Center on Law and Security at New York University School of Law.\",\"email\":\"info@justsecurity.org\",\"legalName\":\"Just Security\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/0c712c17616c3c678d7f4756ce1c9843\",\"name\":\"Tess Bridgeman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.justsecurity.org\/#\/schema\/person\/image\/4100813d90fab3c15f70b6cc28054ee0\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/754c1036f6a629a6e602f7508bb94599bb40d0ae97b6e6196165b48ee1540d45?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/754c1036f6a629a6e602f7508bb94599bb40d0ae97b6e6196165b48ee1540d45?s=96&d=mm&r=g\",\"caption\":\"Tess Bridgeman\"},\"description\":\"Dr. Tess Bridgeman (Bluesky - LinkedIn) is Co-Editor-in-Chief of Just Security. She served in the White House as Special Assistant to the President, Associate Counsel to the President, and Deputy Legal Adviser to the National Security Council (NSC) during the Obama administration. She also served at the State Department in the Office of the Legal Adviser as Special Assistant to the Legal Adviser and, prior to that role, as an Attorney Adviser in the Office of Political-Military Affairs. Bridgeman is a Senior Fellow and Visiting Scholar at NYU Law School's Reiss Center on Law and Security, where she created the War Powers Resolution Reporting Project. She is an affiliate at Stanford University\u2019s Center for International Security and Cooperation (CISAC), lectures at Berkeley Law, and is a former chair of the American Society of International Law (ASIL)'s Strategic Initiatives Committee. Bridgeman has a D.Phil. in International Relations from Oxford University, where she studied as a Rhodes Scholar; a JD from NYU Law School, magna cum laude\u00a0and Order of the Coif, which she attended as a Root-Tilden-Kern and Institute for International Law and Justice Scholar; and a BA from Stanford University.\",\"url\":\"https:\/\/www.justsecurity.org\/author\/bridgemantess\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Regulating Social Media Platforms: Government, Speech, and the Law","description":"A new series on regulating the information environment, co-organized by NYU Stern Center for Business and Human Rights and Tech Policy Press.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/","og_locale":"en_US","og_type":"article","og_title":"Regulating Social Media Platforms: Government, Speech, and the Law","og_description":"A new series on regulating the information environment, co-organized by NYU Stern Center for Business and Human Rights and Tech Policy Press.","og_url":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/","og_site_name":"Just Security","article_publisher":"https:\/\/www.facebook.com\/JSBlog\/","article_published_time":"2025-04-02T12:55:11+00:00","article_modified_time":"2025-05-14T13:20:55+00:00","og_image":[{"width":1024,"height":429,"url":"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-541.jpg","type":"image\/jpeg"}],"author":"Tess Bridgeman, Justin Hendrix, Paul M. Barrett","twitter_card":"summary_large_image","twitter_description":"A new series on regulating the information environment, co-organized by NYU Stern Center for Business and Human Rights and Tech Policy Press.","twitter_image":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-541.jpg?fit=1024%2C429&ssl=1","twitter_creator":"@just_security","twitter_site":"@just_security","twitter_misc":{"Written by":"Tess Bridgeman, Justin Hendrix, Paul M. Barrett","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#article","isPartOf":{"@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/"},"author":{"name":"Tess Bridgeman","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/0c712c17616c3c678d7f4756ce1c9843"},"headline":"Regulating Social Media Platforms: Government, Speech, and the Law","datePublished":"2025-04-02T12:55:11+00:00","dateModified":"2025-05-14T13:20:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/"},"wordCount":458,"publisher":{"@id":"https:\/\/www.justsecurity.org\/#organization"},"image":{"@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-54-scaled.jpg?fit=2560%2C1071&ssl=1","keywords":["1st Amendment","Artificial Intelligence (AI)","Big Tech","Communications Decency Act (CDA)","Constitution","Content","content moderation","courts","Democracy","Digital Services Act","Disinformation","Europe","European Union","Federal Communications Commission (FCC)","Federal Trade Commission (FTC)","freedom of speech","Google","Meta","Misinformation","Regulation","Section 230","Social Media Platforms","Symposium on Regulating Social Media Platforms","Technology","trade","Twitter","United States (US)","YouTube"],"articleSection":["AI &amp; Emerging Technology","Civil Liberties","Congress","Courts &amp; Litigation","Democracy &amp; Rule of Law","Diplomacy","Executive Branch","Featured Articles","Human Rights","Intelligence &amp; Surveillance","Series","Social Media Platforms"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/","url":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/","name":"Regulating Social Media Platforms: Government, Speech, and the Law","isPartOf":{"@id":"https:\/\/www.justsecurity.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#primaryimage"},"image":{"@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-54-scaled.jpg?fit=2560%2C1071&ssl=1","datePublished":"2025-04-02T12:55:11+00:00","dateModified":"2025-05-14T13:20:55+00:00","description":"A new series on regulating the information environment, co-organized by NYU Stern Center for Business and Human Rights and Tech Policy Press.","breadcrumb":{"@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#primaryimage","url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-54-scaled.jpg?fit=2560%2C1071&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-54-scaled.jpg?fit=2560%2C1071&ssl=1","width":2560,"height":1071,"caption":"IMAGE: (L) Abstract chat icons over a digital surface (via Getty Images); (M) Visualization of an online network (via Getty Images); (R) Popular social media apps on an Apple iPhone (via Getty Images)."},{"@type":"BreadcrumbList","@id":"https:\/\/www.justsecurity.org\/109603\/regulating-social-media-platforms-series\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.justsecurity.org\/"},{"@type":"ListItem","position":2,"name":"Regulating Social Media Platforms: Government, Speech, and the Law"}]},{"@type":"WebSite","@id":"https:\/\/www.justsecurity.org\/#website","url":"https:\/\/www.justsecurity.org\/","name":"Just Security","description":"A Forum on Law, Rights, and U.S. National Security","publisher":{"@id":"https:\/\/www.justsecurity.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.justsecurity.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.justsecurity.org\/#organization","name":"Just Security","url":"https:\/\/www.justsecurity.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2024\/03\/just-security-logo-wordmark-font2.png?fit=5371%2C1757&ssl=1","width":5371,"height":1757,"caption":"Just Security"},"image":{"@id":"https:\/\/www.justsecurity.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/JSBlog\/","https:\/\/x.com\/just_security","https:\/\/www.linkedin.com\/company\/just-security-linkedin\/","https:\/\/www.instagram.com\/justsecurityforum\/","https:\/\/www.youtube.com\/@JustSecurityForum","https:\/\/bsky.app\/profile\/justsecurity.org"],"description":"Just Security is an editorially independent, non-partisan, daily digital law and policy journal that elevates the discourse on national security, democracy and the rule of law, and rights. We publish rigorous, expert analysis and informational resources on the issues that matter most. Our goals are to inform and empower decision-makers with high-quality analysis, foster informed dialogue on challenging issues, and remain accessible to our global audience. Just Security is an essential resource for those shaping a just and secure world. Just Security is based at the Reiss Center on Law and Security at New York University School of Law.","email":"info@justsecurity.org","legalName":"Just Security"},{"@type":"Person","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/0c712c17616c3c678d7f4756ce1c9843","name":"Tess Bridgeman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.justsecurity.org\/#\/schema\/person\/image\/4100813d90fab3c15f70b6cc28054ee0","url":"https:\/\/secure.gravatar.com\/avatar\/754c1036f6a629a6e602f7508bb94599bb40d0ae97b6e6196165b48ee1540d45?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/754c1036f6a629a6e602f7508bb94599bb40d0ae97b6e6196165b48ee1540d45?s=96&d=mm&r=g","caption":"Tess Bridgeman"},"description":"Dr. Tess Bridgeman (Bluesky - LinkedIn) is Co-Editor-in-Chief of Just Security. She served in the White House as Special Assistant to the President, Associate Counsel to the President, and Deputy Legal Adviser to the National Security Council (NSC) during the Obama administration. She also served at the State Department in the Office of the Legal Adviser as Special Assistant to the Legal Adviser and, prior to that role, as an Attorney Adviser in the Office of Political-Military Affairs. Bridgeman is a Senior Fellow and Visiting Scholar at NYU Law School's Reiss Center on Law and Security, where she created the War Powers Resolution Reporting Project. She is an affiliate at Stanford University\u2019s Center for International Security and Cooperation (CISAC), lectures at Berkeley Law, and is a former chair of the American Society of International Law (ASIL)'s Strategic Initiatives Committee. Bridgeman has a D.Phil. in International Relations from Oxford University, where she studied as a Rhodes Scholar; a JD from NYU Law School, magna cum laude\u00a0and Order of the Coif, which she attended as a Root-Tilden-Kern and Institute for International Law and Justice Scholar; and a BA from Stanford University.","url":"https:\/\/www.justsecurity.org\/author\/bridgemantess\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.justsecurity.org\/wp-content\/uploads\/2025\/03\/befunky_2025-2-3_13-17-54-scaled.jpg?fit=2560%2C1071&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p5gGh3-svN","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/109603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/users\/558"}],"replies":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/comments?post=109603"}],"version-history":[{"count":0,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/posts\/109603\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/media\/109605"}],"wp:attachment":[{"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/media?parent=109603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/categories?post=109603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/tags?post=109603"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.justsecurity.org\/wp-json\/wp\/v2\/coauthors?post=109603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}