What You Need to Know About Facebook's New Privacy Settings
- 13 December, 2012 21:30
Facebook announced that it's rolling out a handful of changes to the social network at the end of the year. Looking to help you better manage its privacy and security settings (which have been time-consuming and confusing to use), Facebook is adding privacy shortcuts, a tool for managing multiple photos in which you're tagged and new navigation in the activity log.
Facebook Product Manager Samuel Lessin says these changes were made to give you more transparency and help you better understand who can see the things you share.
"We continue to strive toward three main goals: bringing controls in context where you share, helping you understand what appears where you use Facebook, and providing tools to help you act on content you don't like," he says.
While some of these changes--in particular the new privacy shortcut--are a step in the right direction, according to Naked Security blogger Lisa Vaas, some miss the mark.
Here's an in-depth look at Facebook's major changes and what it all means for you.
Facebook's New Privacy Shortcut
Facebook's privacy settings have never been easy to navigate. But a new privacy shortcut the social network is rolling out aims to easily direct you to answers to three common questions: Who can see my stuff? Who can contact me? How do I stop someone from bothering me?
By the end of the year, you'll see a new icon between your Home and Settings. Click the lock icon to view the drop-down menu, and select the option for the setting you want to change.
Facebook's new privacy shortcut is a positive change, Vaas says.
"Up until now, tweaking privacy and timeline controls required you to stop what you were doing and navigate through a separate set of pages. In the best of all possible worlds, the ease of access to Facebook privacy controls would increase their use," she says. "That's good. It's hard to imagine their use getting worse, at any rate."
Facebook's New App Permissions
Facebook is also tweaking the permissions you see when you install a new app. Traditionally, you were prompted to give permission to use your information to personalize your experience and to post to Facebook, all on the same screen.
Soon, these two permissions will appear in separate windows so you can better control what you share. For example, you can grant an app the capability to read your public profile and friends list to personalize your experience, but decline to allow it to post your activity on your behalf.
Facebook Removes Search Setting, Adds In-Context Notices
One privacy setting that Facebook is removing is the "Who can look up my timeline by name" setting, which has controlled whether you can be found by typing your name into the Facebook search bar.
"Because of the limited nature of the setting, we removed it for people who weren't using it," Facebook's Lessin says. This setting will be removed in the coming weeks for the "small percentage of people who still have it," he says.
Rather than remove this setting, Naked Security's Vaas says it should have been fixed. "If the original setting was limited in scope and failed to do what it purported [...] why not rework it so as to actually protect people's privacy and give them the right to not be found?" she says.
Facebook says in its place, the social network has built "new, contextual tools, along with education about how to use them."
These in-context notices will appear throughout Facebook to help you better understand certain actions you take.
This series of in-product messages will appear when you hide content from your timeline, for example, to inform you where, if at all, the information still appears.
Facebook's Updated Activity Log
Facebook is updating the Activity Log with a new navigation that lets you review your comments and likes, photos of you, and posts you've been tagged in. It will also let you sort your information so you can see public photos you're tagged in and have hidden from your timeline, but which still appear on Facebook.
Facebook's 'Request and Removal' Tool
Within Facebook's updated Activity Log is a "Request and Removal" tool that lets you take action on multiple photos you've been tagged in. For example, you can ask people who posted them to remove them.
You can find this tool--once it rolls out to you--by clicking on the "Photos of You" tab, selecting multiple photos and then choosing the option you prefer: untagging all the photos or requesting that the photos be removed. You also have the option to include a message to the person who posted the photos.
Naked Security's Vaas says this change, while a step in the right direction, misses the mark:
"Rather than having to slog through a continual process of requesting that people untag them in photos, and that they please leave off the habit entirely in the future, and rather than simply blocking tagged photos from appearing on their timelines, many Facebook users want to simply block anyone from tagging them without having received express prior permission to do so," she says. "Unfortunately, Facebook has failed to give us this blanket tag-blocking ability in these recent privacy changes."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
"How many of the Fortune 500 companies have access to PRISM? https://en.wikipedia.org/wiki/Industrial_espionage ..."Australia suspected to have PRISM data: Ludlam
Australia Post’s mail business to lose $200 million this year
Australia Post’s mail business to lose $200 million this year
Microsoft's ambivalence about Office on the Web gives Apple shot with iWork on iCloud
3 Lessons Learned From a Failed Customer Feedback Test
Mobile Load - Performance Testing for Mobile Applications
Key mobile trends and analysis on how performance testers must change their testing methodologies to ensure they are accounting for the changes caused by mobile usage. Download today.
Moving to a Private Cloud? Infrastructure Really Matters!
The Cloud isn’t about locality. It is about quality of service delivery, cost, and whether the services consumed satisfy our objectives. For the enterprise, you need to select the right QoS to mitigate the inherent risks or you face the problem of losing data and the ability to execute operationally. Read on.
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.