• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Congress passes the Take It Down Act that criminalizes deepfake videos and images, giving social media platforms 48 hours to remove such content when requested to

April 29, 2025 //  by Finnovate

The Take It Down Act, legislation that criminalizes the publication of nonconsensual sexually explicit deepfake videos and images, passed the House and is already on its way to President Trump’s desk. This overwhelming response now means that social media companies and other websites will have 48 hours to remove content when requested to by a member of the public or a public figure. This will include images or videos that have been created or enhanced by artificial intelligence.  “Once it passes the House, I look forward to signing that bill into law,” Trump added. Senate Commerce Chair Ted Cruz called it a “historic win in the fight to protect victims of revenge porn and deepfake abuse.” Cruz believes the act will spare “victims from repeated trauma” while “holding predators accountable.” The Electronic Frontier Foundation pointed out that the act could have a chilling effect. Smaller companies concerned over legal action may now introduce filters in their products, which could be flawed. The foundation is also concerned that end-to-end encrypted private messaging systems and cloud storage are not exempt, possibly resulting in a loss of privacy. At the same time, the law may encourage bad-faith takedown requests, hampering journalism and satire.

Read Article

Category: Members, Cybersecurity, Innovation Topics

Previous Post: « Palo Alto Networks platform automatically performs red-teaming, spots misconfigured access permissions, AI models that are susceptible to tempering and other risks before deploying a new AI workload to production
Next Post: “SuperCard X” mobile malware campaign uses a multi-stage approach comprising of social engineering via smishing and phone calls, PIN elicitation, malicious app installation and real-time NFC data interception to steal payment card data through POS systems »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.