opinion

Business Models Can Trigger Regulatory Compliance

Adult website operators are typically familiar with the obligations imposed by Title 18 U.S.C. § 2257 (Section 2257) which mandates the compilation and maintenance of certain records relating to the production of sexually explicit content.

Less well known, but equally if not more important, are the reporting obligations imposed on certain website operators under 18 U.S.C. § 2258A. This federal statute requires “electronic communication service providers” such as hosts, forums, dating sites, tube sites, and advertising networks, to report any apparent violations of child exploitation laws, to the CyberTipline — https://www.missingkids.org/cybertipline — operated by the National Center for Missing and Exploited Children (NCMEC).

Affected website operators are encouraged to educate themselves regarding the details of these requirements to avoid inadvertent violations and to foster a cooperative relationship with agencies investigating instances of child exploitation.

The following is a summary of those reporting obligations.

What Violations Must Be Reported?

Qualifying service providers must report “apparent” violations of federal laws relating to child exploitation or child pornography. No specific definition of what constitutes an apparent violation is included in the statute. However, as discussed below, there are benefits to erring on the side of submitting a report in questionable cases.

When Must the Report Be Made?

The report to the CyberTipline must be made as soon as reasonably possible after the website operator obtains actual knowledge of any facts or circumstances that a violation of the relevant laws has occurred in connection with the operation of the site or online service. While no specific time frame is included in the law, the statute contemplates prompt reporting of suspected violations.

What Must the Report Contain?

There are two types of reports that can be submitted: a public report, or a secure, private report by a registered service provider. The registration process requires that certain information about the service provider be voluntarily submitted. The secure report permits uploading of images, and provides a receipt confirming the submission. Service providers are encouraged by NCMEC to register and submit secure reports by submitting an email to its coordinator at espteam@ncmec.org.

The report must include certain categories of information:

  • Identifying information about the individual responsible for posting or transmitting the images, such as IP address, or email address (including any self-reported information submitted by the user).
  • Historical information about when and how the user posted the illegal content.
  • A description of how the violation was discovered by, or reported to, the service provider.
  • Geographic location information relating to the responsible user such as billing address, IP address or ZIP Code.
  • The suspected images themselves. Note, all “associated images” must be preserved by the service provider as well.
  • The complete communication relating to the suspected images, including any data, digital file or other information relating to the transmission of information.

What Other Obligations Apply?

In addition to reporting suspected violations, the service provider must preserve the NCMEC report for a period of 90 days, plus an additional 90 days if requested by NCMEC. The full contents of the NCMEC report must be preserved, along with any other images that are “comingled” or “interspersed” with the suspected images. Read broadly, this could include all images that appear on a given web page, or which are uploaded by a particular user into the user’s folder or directory. The website operator must also take steps to keep the preserved material in a secure location, and limit access to the material by its agents or employees. Finally, operators must permanently destroy any reported images upon the request of law enforcement.

Importantly, the statute does not impose an obligation to monitor any user or the content of any user. Moreover, there is no obligation to affirmatively seek out potential violations of the applicable laws. In other words, service providers are not required to become child exploitation investigators.

Why Should the Report Be Filed?

Affected website operators might ask themselves why they should get involved in submitting reports to law enforcement, relating to their users’ activities. The most obvious answer is because the law requires such involvement. Failure to report suspected violations is a criminal offense which can result in the imposition of substantial fines. Moreover, federal law provides a form of immunity from civil or criminal prosecution for the service provider, in connection with the submission of any reports to the CyberTipline. See, 18 U.S.C. §2258B(a). However, this legal protection can be lost if the service provider engages in any intentional misconduct, or if it acts (or fails to act) with actual malice, or reckless disregard for injury to others. §2258B(b).

Conclusion

Certain popular online business models trigger compliance obligations with a wide variety of federal statutes and regulations. Among them are the statutes imposing reporting obligations to the CyberTipline. Affected website operators are encouraged to educate themselves regarding the details of these requirements to avoid inadvertent violations and to foster a cooperative relationship with agencies investigating instances of child exploitation.

Lawrence G. Walters, Esq., heads up Walters Law Group and has represented website operators for over 25 years. Nothing contained in the foregoing article is intended as legal advice. Please consult individual legal counsel with any questions or concerns.

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Unpacking the Payment Card Industry's Latest Data Security Standard

The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements and guidelines that apply to all businesses that accept credit card payments, and is designed to ensure the security of those transactions.

Jonathan Corona ·
opinion

Compliance With State Age Verification Laws

During the past year, website operators have faced a slew of new state age verification laws entailing a variety of inconsistent compliance obligations.

Lawrence Walters ·
opinion

Merchants in Spotlight With Visa's VIRP

By now, most merchants know about the Visa Integrity Risk Program (VIRP) rolled out in spring 2023. The program is designed to ensure that acquirers and their designated agents — payment facilitators, independent sales organizations and wallets — maintain proper controls and oversight to prevent illegal transactions from entering the Visa payment system.

Cathy Beardsley ·
opinion

How to Know When Hosting Upgrades Are Really Needed

I was reminded about an annoyingly common experience that often frustrates website owners: upgrades. Sometimes, an upgrade of physical system resources like CPU, RAM or storage really is required to solve a problem or improve performance… but how do you know you’re not just being upsold?

Brad Mitchell ·
profile

WIA Profile: Natasha Inamorata

Natasha Inamorata was just a kid when she first picked up a disposable camera. She quickly became enamored with it and continued to shoot with whatever equipment she could afford. In her teens, she saved enough money to purchase a digital Canon ELPH, began taking portraits of her friends, shot an entire wedding on a point-and-shoot camera and edited the photos with Picnik.

Women in Adult ·
trends

Collab Nation: Top Creators Share Best Practices for Fruitful Co-Shoots

One of the fastest ways for creators to gain new subscribers and buyers, not to mention monetize their existing fan base, is to collaborate with other creators. The extra star power can multiply potential earnings, broaden brand reach and boost a creator’s reputation in the community.

Alejandro Freixes ·
opinion

Bridging Generational Divides in Payment Preferences

While Baby Boomers and Gen Xers tend to be most comfortable with the traditional payment methods to which they are accustomed, like cash and credit cards, the younger cohorts — Millennials and Gen Z — have veered sharply toward digital-first payment solutions.

Jonathan Corona ·
opinion

Legal and Business Safety for Creators at Trade Shows

As I write this, I am preparing to attend XBIZ Miami, which reminds me of attending my first trade show 20 years ago. Since then, I have met thousands of people from all over the world who were doing business — or seeking to do business — in the adult industry.

Corey D. Silverstein ·
opinion

Adding AI to Your Company's Tech Toolbox

Artificial intelligence is all the rage. Not only is AI all over the headlines, it is also top of mind for many company leadership teams, who find themselves asking, “How can this new tool help our company?”

Cathy Beardsley ·
opinion

The Ins and Outs of IP Addresses: What Website Owners Should Know

Think about your home address, the place you live. It is unique. That’s important because when you decide to invite someone over, they will need directions to find you. It’s even more important if you want a lot of visitors.

Brad Mitchell ·
Show More