.The step opens a much deeper examination into whether the technology business owner neglected to resist the spread of prohibited web content on the application.