facebook linkedin twitter

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

While the public wasn’t all-in on a lot of the criticism Facebook had faced over the past several years, they have had their fair share of problems. Regardless, Facebook CEO Mark Zuckerberg promised early last year that he was going to fix Facebook. A month later, on February 2nd, 2018, Wired published a thorough investigation of the company over 2016 and 2017. This report would be just the start to a terrible year for the social media giant. Today, we will take a look at some of the many controversies that have found Facebook over the past year.

Political Violence
For those that don’t know their geography, Myanmar is a country in southeast Asia located on the Indian Ocean. For decades, several factions within the country have been fighting what is essentially a civil war with massive amounts of systemic murders. While investigating this genocide, the United Nations began pointing the finger at Facebook for essentially spreading hate speech throughout a country where access to the Internet is so limited that Facebook is thought to be the Internet by large portions of the population. Investigations about this matter revealed that Facebook was indeed helping disseminate hateful rhetoric, inflaming ethnic tensions thought the culturally divided country.

Germany has been dealing with a far-right anti-refugee issue for the better part of a decade. Facebook was thrown into the fire in 2018 as a report was published that linked the use of the social media site to a series of violent attacks against Muslim refugees.

Other reports from reputable sources, including the New York Times, suggests that Facebook is a major factor in the political-fueled violence found in both Libya and the Philippines in 2017-18.

Granted, Facebook itself isn’t building the harmful content, but factions are using the platform to spread propaganda and maligned content on Facebook.

Cambridge Analytica
On March 17, 2018, The British periodical, The Observer, published the first report about Cambridge Analytica. The data analytics firm that had once worked with now-American-President Donald Trump’s election team, as well as the Brexit campaign harvested millions of Facebook profiles of U.S. voters. What is to date the largest data breach in Facebook’s history resulted in immediate and furious scrutiny of the social network.

Cambridge Analytica, a company that was owned by billionaire Robert Mercer and headed up by Trump’s key advisor, Steve Bannon, used millions of people’s personal information that was taken without authorization in early 2014 to build a system that profiled U.S. voters and targeted them with personalized advertisements. In doing so many pundits have claimed that it affected the outcome of the 2016 Presidential election.

What’s worse is that Facebook had found out about the breach in 2015, but didn’t bother to alert the users affected by it. It also took limited action in attempts to recover the stolen data of nearly 90 million individuals. Additionally, Facebook CTO Mike Schroepfer admits that nearly every user on Facebook has had his/her data accessed.

On December 19, 2018, the U.S. Government announced that it will be seeking to take legal action against Facebook for its role in the Cambridge Analytica scandal. This revelation is horrible news for the company, and the company’s stock dropped in value by 7 percent as a result.

Android Integration
Amid the other controversies, Facebook then begins to be ridiculed for collecting SMS and call data from Android users, without notifying any of the users. Facebook responded that users had consented to that data being collected by the company, a claim that millions of angry users denied.

General Data Protection Regulation
On May 25, 2018, the European Union’s General Data Protection Regulation (GDPR)went into effect and almost immediately privacy advocates filed formal complaints against Facebook and its subsidiaries Instagram and WhatsApp. The company said in a statement that it took a year and a half to become GDPR-compliant, but rumbles maintain about Facebook’s practices and how they fit under the new, Europe-wide data privacy mandate.

Smartphones
The New York Times exposed how Facebook worked backroom deals with smartphone manufacturers to give them access to significant amounts of users’ data. Deals with some of the biggest tech companies in the world include pacts with Apple, Amazon, Samsung, and Microsoft. Even recently, headlines have been popping up stating that Facebook’s app can’t be removed from new Samsung devices.

Mishandling Data
As one of the most utilized Internet-based websites in the world, one would expect that there would be attempts to steal data from Facebook. Therefore, it is Facebook’s responsibility to ensure that their users’ data is protected. But at least three times in 2018 Facebook dealt with breaches that exposed millions of users’ sensitive data.

Additionally, a New York Times report published on December 18, 2018 outlines how the company gave preferential treatment to certain companies, and provided access to much more user data than it publicly admitted to, and sometimes without the user’s consent.

Smear Campaign
Like any major multinational company, when people begin to criticize your company, the stock price tends to fall. To keep people from doing that, they often resort to underhanded practices. Facebook is no different, as the company’s COO Sheryl Sandberg was at the head of a smear campaign designed to deflect the near-constant stream of criticism the mounting number of scandals brought on the company.

Regardless of all these scandals, Facebook remains one of the most popular services on the Internet. The company will have to prove to the people that they can right the ship, change its business practices, and be more accountable than it was in 2018 if it wants to continue to be a major player on the world social scene. People, businesses, and groups use Facebook every day to connect, collaborate, and share with one another. Is it worth the risk?

What do you think about Facebook’s 2018? Don’t hesitate to leave your thoughts in the comments section below.

Technology Basics: SSID
How to Turn a Security Risk into a Security Soluti...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Hackers Business Computing Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Network Security Saving Money Malware Email Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Quick Tips Smartphones User Tips Mobile Devices Gadgets Innovation Business Continuity Disaster Recovery Android Social Media Microsoft Office Mobile Office Virtualization Network VoIP Data Backup Server Mobile Device Management Collaboration Communication Smartphone Productivity Miscellaneous Data Recovery Ransomware Upgrade Windows 10 Tech Term Unified Threat Management Windows IT Support Facebook Operating System Holiday Remote Monitoring communications Passwords Apps BYOD Remote Computing Managed IT services Mobile Computing Cybersecurity Vendor Management Users WiFi Phishing BDR Marketing Mobile Device Analytics Automation The Internet of Things Firewall History Outsourced IT Apple Managed IT Services Internet of Things Browser Save Money Alert Artificial Intelligence Data Management App Encryption Big data IT Consultant Antivirus Bandwidth Maintenance Office Printer Content Filtering Going Green Health Spam Bring Your Own Device Gmail Business Technology Hard Drives Search Outlook Cloud Computing Windows 8 Cybercrime Saving Time Managed IT Windows 10 Tech Support Cost Management Virus Best Practice Information Technology Lithium-ion Battery Office 365 Budget Help Desk Two-factor Authentication Hiring/Firing Wireless Technology Blockchain Recovery Computers Employer-Employee Relationship VPN Travel Hacking Update Training IBM Phone System Access Control Money Document Management SaaS Administration Proactive IT Government Running Cable Website Law Enforcement Intranet Humor Compliance Twitter Information Education Data storage Healthcare Risk Management Networking Legal Save Time Regulations Hard Drive Applications Customer Service Managed Service Mobility It Management Company Culture DDoS Disaster Social Engineering Computing Hosted Solution Patch Management End of Support Computer Repair Fax Server Robot Data Loss Social Networking Securty Scam Word Avoiding Downtime Data Breach Solid State Drive Password Cortana iPhone Value Black Market Project Management Flexibility Digital Machine Learning Telephone Systems Hacker Cryptocurrency Websites Laptop Excel Business Growth Customer Relationship Management Business Intelligence File Sharing Digital Payment User Augmented Reality Current Events PowerPoint Router Downtime Social Google Maps Paperless Office Wireless Sports Data Security Comparison Tablet Entertainment Emails Conferencing Trending Heating/Cooling Automobile Chromebook Mouse Storage Hack Lifestyle Computing Infrastructure Programming Monitoring Statistics IT service How To Redundancy Download Inbound Marketing Private Cloud Network Congestion Retail eWaste Telephony Management Bluetooth Evernote Microchip Taxes Pain Points Streaming Media Distributed Denial of Service Vulnerabilities Processors Google Docs Start Menu Tech Terms Experience Net Neutrality USB Vendor Mobile Technology Public Cloud Chrome Monitors Presentation Cleaning Software as a Service Office Tips Uninterrupted Power Supply Identity Theft Specifications Safety Virtual Desktop Gaming Console Bitcoin Computer Accessories User Error YouTube Co-managed IT Documents Data Protection Webcam Politics Unified Communications Settings Virtual Reality Text Messaging GDPR Drones External Harddrive Telephone System LinkedIn Teamwork cache Television Mobile Security Motion Sickness Multi-Factor Security Cost WannaCry Downloads Scalability Software License Trends Tech Ebay Devices Archive PDF Corporate Profile Messenger Thin CLient Tracking Fraud Tactics Skype Fileless Malware Permissions Language Time Management Freedom of Information 3D Modem Smart Phones Rental Service Meetings Best Available Proxy Server Keyboard Assessment SharePoint UTM Content Term Domains Music Tip of the week Web Server Legislation Error Best Practives Electronic Medical Records switches Writing Google Calendar Cabling IT Plan Enterprise Resource Planning Point of Contact Wi-Fi Adminstration Administrator Pirating Information Accountants A.I. Upgrades VoIP Books Leadership Workers email scam Addiction Directions Public Speaking Touchscreen News Microserver SSID Knowledge Supercomputer Dark Web Shortcut LiFi Consultation Multi-factor Authentication Troubleshooting Processing Virtual Assistant Wireless Headphones Telephone Recycling Health IT Entrepreneur Technology Tips Worker Migration Connected Devices Analytic Equifax Fleet Tracking Get More Done Environment Deep Learning Audit Reading Samsung Network Management Product Reviews HIPAA Managed IT Service Work/Life Balance Fake News Device security MSP Read Electronic Payment Turn Key Employer Employee Relationship Printer Server Bookmark Competition Visible Light Communication Memory Data Warehousing G Suite Business Owner Google Play Emergency Hard Drive Disposal Hacks Physical Security Nanotechnology Social Network Trojan IT consulting Access Upselling Licensing Desktop Finance Microsoft Excel Banking Botnet Video Surveillance Startup Asset Tracking Device Management Computer Care Relocation Tablets Business Cards Service Level Agreement Organize Processor IP Address Username Content Management Human Resources CIO Saving ZTime Unified Threat Management Backup and Disaster Recovery Business Managemenet Browsers Application Advertising Flash Google Drive Windows Server 2008 Sync Security Cameras Staffing Google Wallet Vulnerability Notifications CCTV Screen Reader Customer Resource management User Tip Windows XP Spyware Mobile Payment Gamification Business Metrics Computer Malfunction Debate Smart Tech Distribution online Currency Displays Electricity Printing Harddrive Reliable Computing Piracy Upload Navigation Society HTML Micrsooft Fiber-Optic Database Digital Signature Webinar Data Analysis Windows 7 GPS In Internet of Things Printers Managing Stress Regulation CrashOverride Capital Cooperation 3D Printing Productuvuty Medical IT

toner1