cloud based social networking platforms:privacy and security consideration
These days, cloud computing is a crucial component of social networking sites. It's a concept that lets consumers use the Internet to access shared computer resources like servers, storage, apps, and services. Social networking sites have developed from straightforward text-based discussion boards to intricate networks that enable social gaming, real-time messaging, and multimedia content. Scalable and dependable computing resources have become more and more necessary as these platforms have become more complicated. This issue can now be resolved with cloud computing, which offers the processing capacity and storage space required to handle extensive social networking apps.
1. What information are you sharing when you use social networks?
The kinds of information that you may be sharing on a social network includes:
• Your online persona. Users can connect with other users in various ways and develop comprehensive online profiles on most social networks. Users may share personal information with one another in this way, including their gender, age, interests, family history, educational background, and place of employment.
• Your current situation. Posting status updates on most social networks enables users to easily communicate with other users. Despite the possibility of privacy settings limiting access to status updates, these networks are often built to disseminate information rapidly and widely.
• Where you are. A lot of social networks are made to share your current position in real time, either as a public feed or as an update that only contacts with permission may see. Users may be able to share their location with people in their network or "check in" to a nearby event or company using this feature.
• Content that is shared. Users are encouraged to post content on many social networks, including images, movies, music, and links to other websites.
All of this sharing reveals information about you, including contextual information you may not even be aware of. By sharing this information online you may be providing enough information to allow advertisers to track you or hackers to take advantage of your online identity. Therefore it is important to be aware of the information that you are providing and to be conscious of the choices you can make to protect your privacy.
2. How may your social networking information be used and shared?
Publicly available information. Every social network allows you to post some information that is completely publicly accessible. This can be anything from your username to individual posts, to your entire account. These kinds of “public” posts are not blocked behind any kind of access restriction. Anyone, including strangers, can view whatever is posted as “public.” However, there may be other data that you share publicly without realizing it, and there are less obvious ways that your information may be treated as public without your permission.
Advertising. Your own publicly posted content isn’t the only way that you can be tracked, and advertisers are very interested in the information that can be gathered by tracking your online activity. This may include:
- Tracking which websites a user has viewed
- Storing information associated with specific websites (such as items in a shopping cart)
- Analyzing aggregated data for marketing purposes
Behavioral advertising is the term used to describe the practice of tailoring advertisements to an individual’s personal interests. Social networks that provide their services without user fees make a profit by selling advertising. This is often done through behavioral advertising, also known as targeting. This practice is appealing to marketers because targeted advertisements are more likely to result in a purchase by a viewer than comparable non-targeted advertisements. They are valuable to social networks as they can be sold at a higher price than regular ads.
Third-party applications are programs that interact with a social network without actually being part of that social network. These applications take many forms, but some typical and popular forms include games that you may play with contacts, online polls or quizzes, or third-party interfaces with the social network. To make these applications useful, social networks may allow developers automatic access to public information of users, and may even access some private information, when a user grants the application permission. You may inadvertently grant an application access to your profile without realizing the extent of the permissions being granted. Some facts to keep in mind when considering using third-party applications:
- They may not be covered by the social network’s privacy policy. Most social networks do not take responsibility for the third-party applications that interact with their sites
- They may not be guaranteed to be secure.
- They may gain access to more information than is necessary to perform their functions.
- They may contain malware designed to attack the user’s device.
- Third-party developers may report users’ actions back to the social networking platform.
- A social network may have agreements with certain websites and applications that allow them access to public information of all users of the social network.
Government and law enforcement officials can monitor social networks for valuable information. Law enforcement agencies can and do monitor social networks for illegal activity. During an investigation, law enforcement will often turn to a suspect’s social network profiles to glean any information that they can. Though each social network has adopted its own procedures for dealing with requests from law enforcement agencies, it’s important to keep in mind that the degree to which these sites cooperate, or don’t cooperate, with law enforcement may not be fully explained in the privacy policy.
Employment. Potential employers are generally permitted to use whatever information they can gather about an applicant in making a hiring decision. Although there are legal risks, including possible violation of anti-discrimination laws, employers are increasingly turning to social media to inform their decisions. It’s important to know what information can be seen by non-contacts and to consider what kind of conclusions might be drawn from it.
Electronic Frontier Foundation sets limits on what information employers can get from background checks and how they can use that information. However, the FCRA only applies to employers using third-party screening companies. Information that an employer gathers independently, including from informal Internet searches, is not covered by the FCRA.
Employers frequently monitor what employees post on social networking sites. In fact, many companies have social media policies that limit what you can and cannot post on social networking sites about your employer and hire third-party companies to monitor online employee activity for them. Some states have laws that prohibit employers from disciplining an employee based on off-duty activity on social networking sites, unless the activity can be shown to damage the company in some way. In general, posts that are work-related have the potential to cause the company damage. Electronic Frontier
Foundation has issued a number of rulings and recommendations involving questions about employer social media policies. The NLRB has indicated that these cases are extremely fact specific. It has provided the following general guidance, however:
- Employer policies should not be so sweeping that they prohibit the kinds of activity protected by federal labor law, such as the discussion of wages or working conditions among employees.
- An employee’s comments on social media are generally not protected if they are mere gripes not made in relation to group activity among employees.
3. Privacy policies
Most people skip over the privacy policy when joining a social network. However, users can learn a lot of useful information by reviewing a privacy policy before signing up for service. A social network’s privacy policy will explain how the social network will collect and use information about people who visit the site.
When reviewing a privacy policy, remember:
Privacy policies can change – sometimes dramatically-- after a user creates an account.
Terms of service may have information just as important as the privacy policy, so always review those as well.
The privacy policy only covers the social network. It does not, for example, cover third-party applications that interact with the website.
4. Tips
There are many ways that information on social networks can be used for purposes other than what the user intended. Any time you choose to engage with social networking sites, you are taking certain risks. However, these practical tips may help you minimize the risks of social networks.
When registering an account:
- Use a strong password different from the passwords you use to access other sites. Ideally, use a password manager to generate and store your passwords.
- If you are asked to provide security questions, use information that others would not know about you, or, even better, don't use accurate information at all. If you are using a password manager, record the false questions and answers and refer to your password manager if you need to recover your account.
- Consider creating a new email address to use only with our social media profile(s).
- Provide the minimum amount of personal information necessary, or that you feel comfortable providing.
- Review the privacy policy and terms of service.
- During the registration process, social networks often solicit you to provide an email account password so that they can access your address book. If you consider using this feature, make sure to read all terms so that you understand what will be done with this information.
General privacy tips for using social networks.
- Become familiar with the privacy settings available on any social network you use, and review your privacy settings frequently. On Facebook, for example, you may want to make sure that your default privacy setting is "Friends Only."
- Alternatively, use the "Custom" setting and configure the setting to achieve maximum privacy.
- Be careful sharing your birthday, age, or place of birth. This information could be useful to identity thieves and to data mining companies. If you do consider posting your birthday, age or place of birth, restrict who has access to this information using the site’s privacy settings.
- Try to stay aware of changes to a social network’s terms of service and privacy policy. Consider subscribing to an RSS feed for (or following) Tosback, a project of the Electronic Frontier Foundation, to track changes in website policies (which covers some, but not all social networks).
- Use caution when using third-party applications. For the highest level of safety and privacy, avoid them completely. If you consider using one, review the privacy policy and terms of service for the application.
- If you receive a connection request from a stranger, the safest thing to do is to reject the request. If you decide to accept the request, use privacy settings to limit what information is viewable to the stranger and be cautious of posting personal information to your account, such as your current location as well as personally identifiable information.

0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home