• last month
Social media companies could be allowed an exemption from the federal government's teen social media ban, if they can demonstrate they're safe for children to use. At the second day of the social media summit the head of ASIO has also issued a stark warning about the threat artificial intelligence poses to Australia.

Category

📺
TV
Transcript
00:00In step to try and tackle social media harm, Federal Ministers and two Premiers, together
00:08with the Commonwealth Government, making public for the first time details of its proposed
00:13ban on social media for teenagers.
00:16We see the onus as being on the platforms, not on users or their parents when it comes
00:23to safety online.
00:25The reforms are due to be brought into Parliament before the end of the year and will have a
00:2912 month implementation timeline.
00:32Michelle Rowland concedes exemptions could be given to some companies.
00:37To accommodate access for social media services that demonstrate a low risk of harm to children.
00:43It's a move Meta has already started to make with Instagram teen accounts, laws which could
00:48have helped Denzel James, who was the target of homophobic bullying through social media
00:53at just 11 years old.
00:55Being forced to come out as bisexual, especially growing up, I would generally be called terminologies
01:01I can't use.
01:02I wouldn't have the courage to go speak to a psychiatrist, I wouldn't even tell my parents
01:06about it.
01:07The nation's spy boss using his address at the second day of the social media summit
01:11to deliver a frank assessment of AI's potential impact.
01:15Artificial intelligence will allow a step change in our security environment.
01:20AI is likely to make radicalisation easier and faster.
01:24Mike Burgess says while AI is an opportunity for society, it comes with risks.
01:29The internet is the world's greatest incubator of extremism and social media is the world's
01:34greatest accelerator.
01:35AI will augment the incubation and accelerate the acceleration.
01:40Another challenge in an already complex security environment.

Recommended