888.678.7282    Get SUPPORT

Strata Information Technology Blog

Taking a Look at Facebook’s Recent Controversies

Taking a Look at Facebook’s Recent Controversies

The past few years certainly haven’t been very good for Facebook. After going public in 2012, Facebook acquired several organizations and applications to make waves in the market. The company is now responsible for a considerable amount of data, which has led to several data breaches, exacerbating the media and creating skepticism toward the social media giant.

Even though Mark Zuckerberg, the CEO of Facebook, made promises to fix the platform, data leaks and other issues continued to pop up. Wired published a thorough investigation of the company through 2016 and 2017, but it was just the beginning. Data controversies are nothing new for Facebook, and last year was certainly no better than the prior.

Political Violence
Myanmar, a country in southeast Asia on the Indian Ocean, has suffered from political violence caused by several factions within the country--in other words, a civil war that has led to systemic murders. Facebook was accused by the United Nations of spreading hate speech throughout the country. Believe it or not, in some countries, Facebook is largely seen as the Internet by a significant portion of the population. These investigations by the UN found that Facebook was indeed making the issue of hateful rhetoric even worse, dividing the country and flaming ethnic tensions.

Germany has been struggling with a far-right anti-refugee issue for most of the decade. In 2018, Facebook was found as another link between violent attacks against Muslim refugees. Reputable sources also found that Facebook could have been a major factor in the political violence in both Libya and the Philippines in 2017-18.

Basically, Facebook isn’t building the dangerous content, but it’s being used as a platform for these groups to spread their propaganda and controversial statements.

Cambridge Analytica
On March 17, 2018, The Observer reported that Cambridge Analytica had worked with the current President of the United States, Donald Trump’s election team, as well as with the Brexit campaign to harvest information from millions of Facebook profiles for U.S. voters. This was the largest data breach in the history of Facebook to date. The information was taken by users without their permission in early 2014, and it was used to build a system that profiled U.S. voters and target them with personalized advertisements. Some believe that it influenced the outcome of the 2016 Presidential election. Even worse, the breach was discovered in 2015, and Facebook didn’t report it immediately; they also only took limited action to recover the stolen data of nearly 90 million individuals. According to Facebook CTO Mike Schroepfer, nearly every single user on Facebook had their data accessed.

On December 19th, 2018, the United States Government announced that legal action would be taken against Facebook for the role played in the Cambridge Analytica scandal, resulting in a stock drop of about seven percent.

Android Integration
Facebook was also accused of collecting SMS and call data from Android users without informing them. Facebook responded to these allegations by claiming that users consented to the data being collected by the company, which made the problem even worse.

General Data Protection Regulation
As of May 25, 2018, the European Union’s General Data Protection Regulation, or GDPR, has taken effect. Almost immediately, privacy advocates took jabs at Facebook and the software it has acquired, Instagram and WhatsApp. The company issued a statement that it took over a year and a half to become compliant with GDPR, but with its track record, some folks aren’t so sure about their practices still.

The New York Times has exposed that Facebook worked with smartphone manufacturers to provide access to user data. Some of these companies include Apple, Amazon, Samsung, and Microsoft. Some users have even found that Facebook’s app can’t be removed from new Samsung devices.

Mishandling Data
Facebook is one of the biggest websites out there, so it’s natural that there will be attempts to steal some of its data. While it’s supposed to be Facebook’s duty to protect this data, there were at least three instances in 2018 where Facebook suffered from major data breaches. The New York Times also found that Facebook gave preferential treatment to certain companies and provided them with more data than it has publicly admitted to.

Smear Campaign
Let’s face it, international companies don’t take criticism well, especially when stocks are involved. They go into damage control and will often resort to underhanded tactics. A smear campaign led by Facebook COO Sheryl Sandberg was designed to deflect the criticism from the company.

Even though Facebook took a couple hits over the past few years, it’s still a popular service for lots of users on both a personal and professional level. It’s up to users to hold these powerful companies accountable for the data breaches and breaches of trust they suffer from. What are your thoughts on this? Let us know in the comments.

Tip of the Week: NIST Password Guidelines
We are Seeing More IT Growth in Medicine


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 15 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Internet Malware Hackers Communications User Tips Cybersecurity Tech Term Ransomware Backup Software Productivity Smartphones Business Management Outsourced IT VoIP Efficiency Microsoft Passwords IT Support Business Hardware Email Data Alert Productivity Browser Network IT Services Innovation Data Backup Social Media Google Windows 10 Data Recovery Communication Small Business Microsoft Office Collaboration Mobile Device Smartphone Phishing Holiday Users Cloud Computing Save Money Hosted Solutions Access Control Miscellaneous Android Saving Money Internet of Things App Bandwidth Business Continuity Twitter Vulnerability Apps Data Breach Law Enforcement Workplace Tips Personal Information Excel Blockchain Office 365 Company Culture Compliance Politics Employer-Employee Relationship Remote Monitoring Scam Wireless Mobile Device Management Cybercrime Networking Government Mobile Devices Wi-Fi Applications Facebook Patch Management Computer Settings Workers BDR Managed IT Service Office Antivirus Remote Monitoring and Management Chrome BYOD Dark Web Virus Website Automation SaaS Word Education Virtual Assistant Computers Vendor Management Spam Windows How To Managing Stress Data Security Information Entertainment Medical IT Recovery Maintenance Password Connectivity Retail Marketing Data loss Managed Service Provider Cost Management Update Remote Control HP Gadgets Budget Computer Care Payment Managed IT Authorization Net Neutrality CrashOverride Processors Security Cameras Streaming Media Botnet VPN Storage Technology Tips Lead Generation Hybrid Cloud Hiring/Firing Employer Employee Relationship Wireless Internet Disaster Recovery Comparison Emergency Staff Telephony RAM Technology Efficiently Document Management Database Gaming Console instant Messaging Downloads Encryption Apple Battery Data Management Analytics Error Scalability Phone System News Backup and Disaster Recovery Cables Automobile Upgrade Help Desk Multi-Factor Security Specifications Vulnerabilities Google Maps Licensing Websites Voice over IP Microsoft Teams Outlook Email Management Paperless Office Tactics Synergy Regulation Video Games Artificial Intelligence Trends Troubleshooting Worker iPhone e-waste Yahoo IaaS Healthcare Touchscreen Credit Cards Telephone System SSD WannaCry Voice over Internet Protocol Television Certification Information Technology IT budget PowerPoint Reporting Staffing Travel Hard Drives Managed Service Smart Technology Digital Sales Internet Explorer Physical Security A.I. VoIPMyths Printer WiFi disposal DDoS Two-factor Authentication Plug-In HaaS Printer Server Microsoft Office 365 Gadget Inventory HIPAA Mobility Biometrics Router IT Management Content Filtering Sports Live Streaming Dongle Avoiding Downtime Profitability Business Intelligence Edge Tablet Threat Dark Data Files Movies VoIPSavings Telephone Systems Spyware Data Protection Value Tech Support Proactive IT Cleaning E-Commerce Printers Safety Authentication Current Events Shortcut Remote Support Hard Drive Amazon Cortana Leadership Training Access Tech Terms Gmail Unified Threat Management GDPR WhatsApp Wireless Charging Bring Your Own Device The Internet of Things Eliminating Downtime Knowledge IT Support Unified Communications File Sharing Competition Operating System Customer Relationship Management Network Attached Storage User Tip IP Address Big Data Paper Hosted Solution Spam Blocking User Security Fun Quick Tips Environment Customer Service Wearables Server Management Tip of the week Mobile Office Ink Domains Copy Business Technology Remote Computing Windows 10 Autocorrect VoIP Virtualization Conferencing Cryptocurrency eCommerce Public Speaking Paste Machine Learning Telecommuting Search Scheduling Presentation Lithium-ion battery Server Managed IT Services Online Shopping G Suite Augmented Reality Emoji Telecommute Millennials Instagram Wireless Technology 5G Money Mobile Security Samsung IBM Hacker Google Drive Laptop Printing

Newsletter Sign Up