About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

  • Register

Prosper Solutions Blog

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

While the public wasn’t all-in on a lot of the criticism Facebook had faced over the past several years, they have had their fair share of problems. Regardless, Facebook CEO Mark Zuckerberg promised early last year that he was going to fix Facebook. A month later, on February 2nd, 2018, Wired published a thorough investigation of the company over 2016 and 2017. This report would be just the start to a terrible year for the social media giant. Today, we will take a look at some of the many controversies that have found Facebook over the past year.

Political Violence
For those that don’t know their geography, Myanmar is a country in southeast Asia located on the Indian Ocean. For decades, several factions within the country have been fighting what is essentially a civil war with massive amounts of systemic murders. While investigating this genocide, the United Nations began pointing the finger at Facebook for essentially spreading hate speech throughout a country where access to the Internet is so limited that Facebook is thought to be the Internet by large portions of the population. Investigations about this matter revealed that Facebook was indeed helping disseminate hateful rhetoric, inflaming ethnic tensions thought the culturally divided country.

Germany has been dealing with a far-right anti-refugee issue for the better part of a decade. Facebook was thrown into the fire in 2018 as a report was published that linked the use of the social media site to a series of violent attacks against Muslim refugees.

Other reports from reputable sources, including the New York Times, suggests that Facebook is a major factor in the political-fueled violence found in both Libya and the Philippines in 2017-18.

Granted, Facebook itself isn’t building the harmful content, but factions are using the platform to spread propaganda and maligned content on Facebook.

Cambridge Analytica
On March 17, 2018, The British periodical, The Observer, published the first report about Cambridge Analytica. The data analytics firm that had once worked with now-American-President Donald Trump’s election team, as well as the Brexit campaign harvested millions of Facebook profiles of U.S. voters. What is to date the largest data breach in Facebook’s history resulted in immediate and furious scrutiny of the social network.

Cambridge Analytica, a company that was owned by billionaire Robert Mercer and headed up by Trump’s key advisor, Steve Bannon, used millions of people’s personal information that was taken without authorization in early 2014 to build a system that profiled U.S. voters and targeted them with personalized advertisements. In doing so many pundits have claimed that it affected the outcome of the 2016 Presidential election.

What’s worse is that Facebook had found out about the breach in 2015, but didn’t bother to alert the users affected by it. It also took limited action in attempts to recover the stolen data of nearly 90 million individuals. Additionally, Facebook CTO Mike Schroepfer admits that nearly every user on Facebook has had his/her data accessed.

On December 19, 2018, the U.S. Government announced that it will be seeking to take legal action against Facebook for its role in the Cambridge Analytica scandal. This revelation is horrible news for the company, and the company’s stock dropped in value by 7 percent as a result.

Android Integration
Amid the other controversies, Facebook then begins to be ridiculed for collecting SMS and call data from Android users, without notifying any of the users. Facebook responded that users had consented to that data being collected by the company, a claim that millions of angry users denied.

General Data Protection Regulation
On May 25, 2018, the European Union’s General Data Protection Regulation (GDPR)went into effect and almost immediately privacy advocates filed formal complaints against Facebook and its subsidiaries Instagram and WhatsApp. The company said in a statement that it took a year and a half to become GDPR-compliant, but rumbles maintain about Facebook’s practices and how they fit under the new, Europe-wide data privacy mandate.

The New York Times exposed how Facebook worked backroom deals with smartphone manufacturers to give them access to significant amounts of users’ data. Deals with some of the biggest tech companies in the world include pacts with Apple, Amazon, Samsung, and Microsoft. Even recently, headlines have been popping up stating that Facebook’s app can’t be removed from new Samsung devices.

Mishandling Data
As one of the most utilized Internet-based websites in the world, one would expect that there would be attempts to steal data from Facebook. Therefore, it is Facebook’s responsibility to ensure that their users’ data is protected. But at least three times in 2018 Facebook dealt with breaches that exposed millions of users’ sensitive data.

Additionally, a New York Times report published on December 18, 2018 outlines how the company gave preferential treatment to certain companies, and provided access to much more user data than it publicly admitted to, and sometimes without the user’s consent.

Smear Campaign
Like any major multinational company, when people begin to criticize your company, the stock price tends to fall. To keep people from doing that, they often resort to underhanded practices. Facebook is no different, as the company’s COO Sheryl Sandberg was at the head of a smear campaign designed to deflect the near-constant stream of criticism the mounting number of scandals brought on the company.

Regardless of all these scandals, Facebook remains one of the most popular services on the Internet. The company will have to prove to the people that they can right the ship, change its business practices, and be more accountable than it was in 2018 if it wants to continue to be a major player on the world social scene. People, businesses, and groups use Facebook every day to connect, collaborate, and share with one another. Is it worth the risk?

What do you think about Facebook’s 2018? Don’t hesitate to leave your thoughts in the comments section below.

Technology Basics: SSID
How to Turn a Security Risk into a Security Soluti...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Troubleshooting Startup WiFi Asset Tracking Download Hard Drive Social Networking Emergency hardware Business Metrics Patch Management Meetings Dark Web Document Management Net Neutrality Relocation Storage Passwords Time Management Virtual Desktop Application Hacks Marketing Corporate Profile Managed Service Provider Mobile Technology Legislation Evernote Work/Life Balance Artificial Intelligence Antivirus Migration Virus Proxy Server Google Docs IT SSID IT Support Software Machine Learning Tracking Google Drive Emails Congratulations Virtualization Law Enforcement Users Hosted Solutions Securty Apps Internet of Things Shortcut Directions Computer Administrator Ransomware Assessment Company Culture Drones Smartphone Disaster Recovery Google Play Workers Virtual Assistant Information Technology Administration Electronic Payment Touchscreen Windows 10 Blockchain Health IT Finance outsource cloud computing Information Memory Windows 8 Mobile Computing Productivity Word Gamification A.I. IT service Digital Payment Private Cloud Customer Service Remote Computing Webcam Telephone Systems Efficiency Data Protection Printer Current Events Equifax Black Market Mouse Applications Wireless Headphones Cybercrime IT Support the Internet of Things Best Available CCTV Saving Money Office 365 Licensing IBM Save Money Android App Windows 7 Hiring/Firing Bluetooth Miscellaneous Hard Drive Disposal Unified Threat Management Hacking Wireless Technology Deep Learning Data storage Knowledge Entrepreneur Upload Backup and Disaster Recovery Scam Staffing In Internet of Things IT Management cloud computing Disaster Digital Addiction Productivity Tech Support Statistics Taxes Holiday Excel Downtime Printers Alert LiFi YouTube Windows XP Flexibility Health Experience Data Loss Government VoIP Wi-Fi Navigation Two-factor Authentication Citrix Xenapp Data Management Skype email scam Bitcoin Laptop Mobile Security Environment Paperless Office Password Employer-Employee Relationship PDF How To Banking Automobile Unified Communications Content Filtering cyber security Windows10 Data Managing Stress Text Messaging Vulnerabilities Digital Signature Security Phone System Visible Light Communication Flash Vendor Office Devices Heating/Cooling Thank You Tech Term Firewall Cost Save Time Error Compliance Downloads Internet Language Chrome Telephone System Networking Reliable Computing Managed IT Service Travel communications Business Growth Website Legal Business Outlook Society Workplace Tips Tactics Pain Points Safety Proactive IT Device security Technology Tips Customer Resource management Distributed Denial of Service IT Consultant Access Control Smart Tech Messenger Documents VPN Network Congestion Multi-Factor Security Trends User Tip Phishing Bata Backup Google Calendar Business Continuity iPhone User Error clout services Browsers Security Cameras Business Management USB Business Owner Service Level Agreement Windows Product Reviews Term Spam Politics Employer Employee Relationship Running Cable Microsoft Notifications PowerPoint Hard Drives Uninterrupted Power Supply Encryption Identity Theft Small Business Public Cloud Settings Modem Vulnerability Microsoft Office Data Recovery Upgrade cloud storage Gaming Console Nanotechnology Business Cards Computers Money Cybersecurity Gadgets Specifications Screen Reader Keyboard Books Regulation Tech Terms CrashOverride Best Practice Tip of the week Education Inbound Marketing Username Processor Automation Intranet Malware Mobile Device Management Database Network Tip of the Week Multi-factor Authentication Accountants Hackers Social Network Recovery Writing Data Analysis IT Plan Risk Management Bandwidth Scalability File Sharing Social Media Monitoring Smartphones Chromebook Retail Advertising Piracy Hacker Mobile Payment WannaCry Redundancy outsource cloud storage Big data Vendor Management Rental Service Managed IT services Public Speaking Software as a Service Cortana cloud Hosted Solution Read Apple Computer Repair Technology Displays eWaste SaaS Update Social Cleaning Fileless Malware Microsoft Excel News CIO Access Unified Threat Management Privacy Management Network Management Electricity Music VoIP Saving Time Search Collaboration Programming Supercomputer SharePoint Telephony Tablet Worker Managed IT Services Vendor Mangement Spyware Physical Security UTM Software License Augmented Reality Value GDPR Consultation Botnet Business Computing Data Backup Computer Care MSP Monitors Communication Connected Devices Computing Infrastructure Permissions Wireless DDoS Hack Managed Service Training Windows Server 2008 BYOD Computer Malfunction Enterprise Resource Planning IP Address IT consulting Desktop Fiber-Optic Network Security Conferencing Domains Fraud Mobility Going Green BDR Business Technology Help Desk Telephone Regulations Business Intelligence Router Entertainment Google Wallet Fleet Tracking Server Sync Computer Accessories Social Engineering Quick Tips G Suite Streaming Media Customer Relationship Management Teamwork Browser Samsung Freedom of Information Avoiding Downtime Cost Management Start Menu Outsourced IT End of Support Analytic Office Tips Competition Capital User Tips Backup Websites Tech Windows 10 Productuvuty Sports Printing Processors Google Maps Cabling Co-Managed IT Web Server Tablets Content Data Breach Computing switches Microchip Data Warehousing Upgrades Cryptocurrency Budget User Bring Your Own Device Presentation uptime Lithium-ion battery Email Fake News Robot Managed IT Facebook Distribution Bookmark Patching Trending History Mobile Devices Gmail Human Resources Cache IT Services Virtual Reality Micrsooft Reading Solid State Drive Comparison Business Mangement Innovation Audit Data Security HTML Television Healthcare Mobile Device Remote Monitoring Twitter Processing Google Project Management Best Practices Electronic Medical Records Analytics Operating System Maintenance HIPAA Motion Sickness 3D Printing

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150