Deeplinks Blog posts about Social Networks
WhatsApp’s plans to share user information—including phone numbers, contact lists, and usage data—with parent company Facebook threaten users’ privacy and control over their data. We describe details of this data sharing arrangement and the new privacy policy that makes it possible in a previous blog post.
WhatsApp is establishing data-sharing practices that signal a significant shift in its attitude toward privacy—though you wouldn’t know it from the privacy policy update that popped up on users’ screens last week. The new policy lays the groundwork for alarming data sharing between WhatsApp and its parent company Facebook. The update screen that users see, however, mentions only benign new features like WhatsApp calling, and requires a user to click a “Read more” link to see any mention of how the data sharing arrangement will work for users. Where WhatsApp could have offered users up-front information and choices, the UI as it stands buries critical details and options. If WhatsApp wants to merge user data with Facebook, it should give users opportunities to make choices about their privacy—starting with a clearer, more informative UI.
New Copyright Bot Raises Questions About Fair Use and Privacy
In general, Facebook has some pretty decent copyright policies. If you upload content to Facebook and it’s removed because of a bogus takedown request, you can file a counter-notice via a form on Facebook’s website. If the claimant doesn’t take action against you in a federal court in 14 days, your content is restored. That’s how it’s supposed to work, and Facebook usually does it right. Unlike some platforms, it also doesn’t ding users as “repeat offenders” based on multiple phony claims.
Twitter has released a new transparency report. The company—which scored five stars in our latest “Who Has Your Back?” report—blogged about the release, wrote that “[p]roviding this insight is simply the right thing to do, especially in an age of increasing concerns about government surveillance.” More than thirty Internet companies now publish transparency reports.
In the South Carolina prison system, accessing Facebook is an offense on par with murder, rape, rioting, escape and hostage-taking.
Pages
Subscribe to EFF Updates
Deeplinks Archives
Deeplinks Topics
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Artificial Intelligence & Machine Learning
- Biometrics
- Bloggers' Rights
- Border Searches
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Electronic Frontier Alliance
- Encrypting the Web
- Export Controls
- Fair Use and Intellectual Property: Defending the Balance
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- Free Speech
- FTAA
- Genetic Information Privacy
- Government Hacking and Subversion of Digital Security
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- Innovation
- International
- International Privacy Standards
- Internet Governance Forum
- Know Your Rights
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- Mobile devices
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Privacy
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- Reclaim Invention
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Security
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- State-Sponsored Malware
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trade Agreements and Digital Rights
- Trans-Pacific Partnership Agreement
- Transparency
- Travel Screening
- TRIPS
- Trusted Computing
- UK Investigatory Powers Bill
- Uncategorized
- Video Games
- Wikileaks
- WIPO