Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

A Look at Facebook’s Ongoing Data Troubles

A Look at Facebook’s Ongoing Data Troubles

Facebook has had a lot of pressure on it over the past few years. After taking the company public in 2012, the world’s most popular social network went on to make several high-profile acquisitions (Oculus, Instagram, etc.) to solidify their position in the market. As a result the company has a lot of responsibility to protect the immense amount of data that it takes in. This has opened up the tech giant to be heavily maligned in the media over the past year.

While the public wasn’t all-in on a lot of the criticism Facebook had faced over the past several years, they have had their fair share of problems. Regardless, Facebook CEO Mark Zuckerberg promised early last year that he was going to fix Facebook. A month later, on February 2nd, 2018, Wired published a thorough investigation of the company over 2016 and 2017. This report would be just the start to a terrible year for the social media giant. Today, we will take a look at some of the many controversies that have found Facebook over the past year.

Political Violence
For those that don’t know their geography, Myanmar is a country in southeast Asia located on the Indian Ocean. For decades, several factions within the country have been fighting what is essentially a civil war with massive amounts of systemic murders. While investigating this genocide, the United Nations began pointing the finger at Facebook for essentially spreading hate speech throughout a country where access to the Internet is so limited that Facebook is thought to be the Internet by large portions of the population. Investigations about this matter revealed that Facebook was indeed helping disseminate hateful rhetoric, inflaming ethnic tensions thought the culturally divided country.

Germany has been dealing with a far-right anti-refugee issue for the better part of a decade. Facebook was thrown into the fire in 2018 as a report was published that linked the use of the social media site to a series of violent attacks against Muslim refugees.

Other reports from reputable sources, including the New York Times, suggests that Facebook is a major factor in the political-fueled violence found in both Libya and the Philippines in 2017-18.

Granted, Facebook itself isn’t building the harmful content, but factions are using the platform to spread propaganda and maligned content on Facebook.

Cambridge Analytica
On March 17, 2018, The British periodical, The Observer, published the first report about Cambridge Analytica. The data analytics firm that had once worked with now-American-President Donald Trump’s election team, as well as the Brexit campaign harvested millions of Facebook profiles of U.S. voters. What is to date the largest data breach in Facebook’s history resulted in immediate and furious scrutiny of the social network.

Cambridge Analytica, a company that was owned by billionaire Robert Mercer and headed up by Trump’s key advisor, Steve Bannon, used millions of people’s personal information that was taken without authorization in early 2014 to build a system that profiled U.S. voters and targeted them with personalized advertisements. In doing so many pundits have claimed that it affected the outcome of the 2016 Presidential election.

What’s worse is that Facebook had found out about the breach in 2015, but didn’t bother to alert the users affected by it. It also took limited action in attempts to recover the stolen data of nearly 90 million individuals. Additionally, Facebook CTO Mike Schroepfer admits that nearly every user on Facebook has had his/her data accessed.

On December 19, 2018, the U.S. Government announced that it will be seeking to take legal action against Facebook for its role in the Cambridge Analytica scandal. This revelation is horrible news for the company, and the company’s stock dropped in value by 7 percent as a result.

Android Integration
Amid the other controversies, Facebook then begins to be ridiculed for collecting SMS and call data from Android users, without notifying any of the users. Facebook responded that users had consented to that data being collected by the company, a claim that millions of angry users denied.

General Data Protection Regulation
On May 25, 2018, the European Union’s General Data Protection Regulation (GDPR)went into effect and almost immediately privacy advocates filed formal complaints against Facebook and its subsidiaries Instagram and WhatsApp. The company said in a statement that it took a year and a half to become GDPR-compliant, but rumbles maintain about Facebook’s practices and how they fit under the new, Europe-wide data privacy mandate.

Smartphones
The New York Times exposed how Facebook worked backroom deals with smartphone manufacturers to give them access to significant amounts of users’ data. Deals with some of the biggest tech companies in the world include pacts with Apple, Amazon, Samsung, and Microsoft. Even recently, headlines have been popping up stating that Facebook’s app can’t be removed from new Samsung devices.

Mishandling Data
As one of the most utilized Internet-based websites in the world, one would expect that there would be attempts to steal data from Facebook. Therefore, it is Facebook’s responsibility to ensure that their users’ data is protected. But at least three times in 2018 Facebook dealt with breaches that exposed millions of users’ sensitive data.

Additionally, a New York Times report published on December 18, 2018 outlines how the company gave preferential treatment to certain companies, and provided access to much more user data than it publicly admitted to, and sometimes without the user’s consent.

Smear Campaign
Like any major multinational company, when people begin to criticize your company, the stock price tends to fall. To keep people from doing that, they often resort to underhanded practices. Facebook is no different, as the company’s COO Sheryl Sandberg was at the head of a smear campaign designed to deflect the near-constant stream of criticism the mounting number of scandals brought on the company.

Regardless of all these scandals, Facebook remains one of the most popular services on the Internet. The company will have to prove to the people that they can right the ship, change its business practices, and be more accountable than it was in 2018 if it wants to continue to be a major player on the world social scene. People, businesses, and groups use Facebook every day to connect, collaborate, and share with one another. Is it worth the risk?

What do you think about Facebook’s 2018? Don’t hesitate to leave your thoughts in the comments section below.

Technology Basics: SSID
How to Turn a Security Risk into a Security Soluti...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Communication Tracking Wi-Fi Tech Support Download Redundancy cloud computing Social Networking Spam IBM Small Business Innovation Tip of the Week Cost cloud storage Vendor Uninterrupted Power Supply Google Play Managed IT Service Mouse Fileless Malware Experience Fake News Business Owner Vulnerabilities Passwords 3D Printing Operating System Solid State Drive IT Plan Fiber-Optic Network Congestion Distributed Denial of Service Training Vendor Management Drones Flash Browser Telephone Systems Healthcare Medical IT In Internet of Things Securty Samsung Service Level Agreement Network Management Cabling Going Green Reading Tactics Tablets BYOD Travel Value PDF Marketing Public Cloud VoIP Teamwork Avoiding Downtime Evernote communications Telephony Productuvuty Downloads Hosted Solution Business Management Privacy Compliance Mobile Payment Mobile Technology Modem Directions Staffing Health IT Data Backup Business Computing Virus Spyware Web Server Access Vendor Mangement Backup and Disaster Recovery Notifications Equifax Management Security Cameras Network Disaster Recovery Tech Terms Writing Twitter Fleet Tracking Thank You Cybersecurity Conferencing Antivirus Streaming Media Data Warehousing Maintenance App Retail Wireless Administrator USB Webcam Monitors Windows 8 Electricity Worker Inbound Marketing Content Assessment Knowledge Router Hack Professional Services Meetings Tip of the week outsource cloud computing Office Phishing Mobile Devices IT Management Customer Relationship Management Permissions Cleaning Regulations Distribution Black Market Downtime Piracy Multi-factor Authentication Wireless Headphones Username Micrsooft WannaCry Social Media Encryption SharePoint Human Resources IT Services Risk Management Freedom of Information Virtual Reality Upgrade Messenger Asset Tracking Connected Devices outsource cloud storage Visible Light Communication Big data Networking Television Business Mangement Remote Computing Artificial Intelligence Sync Windows Server 2008 CCTV Enterprise Resource Planning SSID Hard Drive Printing Government Gaming Console Hackers Machine Learning Finance Windows Public Speaking Augmented Reality Productivity Competition Screen Reader Books Current Events Patching Tech Term Nanotechnology Windows 10 Holiday Applications Monitoring Data Security Company Culture Content Filtering Hard Drive Disposal Supercomputer Chromebook Flexibility Mobility Congratulations Trends WiFi UTM Google Wallet Managed Service Electronic Medical Records Customer Service Google Windows 10 Managing Stress Proxy Server Processing Read Language End of Support BDR Software as a Service Miscellaneous Bitcoin Password Keyboard Scalability Voice over Internet Protocol Shortcut User the Internet of Things History Cortana HTML Relocation Intranet Bata Backup Computer Care Bluetooth Work/Life Balance Users Security Unified Communications Computing Emergency Processor IT Support Server Society Addiction Start Menu Microsoft 365 Cost Management Automation Social Network IT service GDPR Outlook Trending Gadgets LiFi Multi-Factor Security IP Address Migration Domains Alert Citrix Xenapp Upload Proactive IT Managed IT Data Protection Integration Employer Employee Relationship Data Recovery Business Technology Rapid City Office Tips Virtual Assistant Internet of Things Recovery Information Malware Private Cloud Legislation hardware Software License Documents Tech Database Excel Legal Advertising Windows XP Politics Taxes Digital Payment Music Banking A.I. Hacking Unified Threat Management Microchip Digital Signature Workers Product Reviews Devices MSP Analytics Windows 7 Data Loss Device security iPhone cloud Gamification Automobile Managed Service Provider Cooperation Internet Data Management Time Management Smartphones Motion Sickness Google Calendar Rental Service Business Intelligence Desktop Project Management Hacker User Tip Information Technology Saving Time Windows10 Botnet Settings Business Cards Facebook Emails Workplace Tips Data Analysis Memory Help Desk YouTube Best Practice User Error Patch Management Programming Paperless Office Virtual Desktop CIO Hacks Cache G Suite IT Support Virtualization uptime Entertainment Net Neutrality Save Time Website Vulnerability IT consulting Consultation VPN Update Business Wireless Technology Business Continuity Technology Environment Computer Repair Identity Theft Reliable Computing Apple Entrepreneur Error Application Word Google Maps Text Messaging Data storage Term Business Metrics Ransomware Search eWaste Law Enforcement Safety Managed IT Services Mobile Computing cyber security User Tips Printer Software Licensing Sports Health Printers switches Accountants Hard Drives Managed IT services Computer Accessories Robot Dark Web Lithium-ion battery Access Control Websites Browsers Smartphone Firewall Google Docs clout services Corporate Profile Email Chrome Technology Tips Mobile Device How To Employer-Employee Relationship Gmail CrashOverride Bring Your Own Device Data Capital email scam Pain Points Hosted Solutions Microsoft Navigation Upgrades Bookmark Saving Money Analytic Cybercrime Mobile Security Business Growth IT Administration Fraud Storage Outsourced IT Scam IT Consultant Heating/Cooling Microsoft Office PowerPoint Collaboration Quick Tips Touchscreen Best Available Skype SaaS Remote Monitoring Customer Resource management Two-factor Authentication Troubleshooting Physical Security Best Practices Computer Co-Managed IT Disaster Cryptocurrency DDoS Education HIPAA Telephone Network Security Computer Malfunction Laptop Efficiency Unified Threat Management Mobile Device Management Telephone System Presentation Bandwidth Startup Social Specifications Social Engineering Computing Infrastructure Blockchain Running Cable Electronic Payment Microsoft Excel News Budget File Sharing Statistics VoIP Digital Solutions Deep Learning Backup Google Drive Phone System Money Smart Tech Apps Computers Productivity Regulation Document Management Chamber Android Displays Hiring/Firing Office 365 Tablet Comparison Data Breach Logistics Processors Audit Save Money

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150