Skip to main content

Facebook Agrees to Pay $5 Billion Fine and Setup New Privacy Program for 20 Years

facebook privacy program mark zuckerberg
The Federal Trade Commission (FTC) today officially confirmed that Facebook has agreed to pay a record-breaking $5 billion fine over privacy violations surrounding the Cambridge Analytica scandal.

Besides the multibillion-dollar penalty, the company has also accepted a 20-year-long agreement that enforces it to implement a new organizational framework designed to strengthen its data privacy practices and policies.

The agreement requires Facebook to make some major structural changes, as explained below, that will hold the company accountable for the decisions it makes about its users' privacy and information it collects on them.

"The order requires Facebook to restructure its approach to privacy from the corporate board-level down, and establishes strong new mechanisms to ensure that Facebook executives are accountable for the decisions they make about privacy and that those decisions are subject to meaningful oversight," the FTC said in a press release.

According to the FTC, Facebook has repeatedly used deceptive disclosures and settings to undermine its users' privacy preferences in violation of its 2012 FTC order that required the social media to gain explicit consent from users to share their personal data.

The newly proposed organizational framework will also cover not just Facebook's massive social media network, but also the company-owned services, including WhatsApp and Instagram.

"We've agreed to pay a historic fine, but even more important, we're going to make some major structural changes to how we build products and run this company," Facebook CEO Mark Zuckerberg said in a statement.

"As part of this settlement, we're bringing our privacy controls more in line with our financial controls under the Sarbanes-Oxley legislation. Our executives, including me, will have to certify that all of the work we oversee meets our privacy commitments."

"The reason I support them is that I believe they will reduce the number of mistakes we make and help us deliver stronger privacy protections for everyone."

Facebook's New Privacy Program

facebook privacy program mark zuckerberg
Major changes will include:
1. Independent privacy committee — The company will be required to set-up an independent privacy committee of Facebook's board of directors who will be appointed by an independent nominating committee.

According to the FTC, this measure will create greater accountability at the board of directors level, removing unfettered control by Facebook's CEO Mark Zuckerberg over decisions affecting user privacy.

2. Compliance officers — The company will be required to appoint compliance officers who will work under the new independent privacy committee and whose job will be to monitor Facebook's entire privacy program. Facebook's CEO or its employees can not control, appoint, or remove the compliance officers.

It will be mandatory for compliance officers to submit compliance certificates every quarter as well as year to the FTC, ensuring that the company is running the privacy program as mandated by the order.
Compliance officers will also be required to generate a quarterly privacy review report, which they must share with the CEO and the independent assessor, as well as with the FTC.

FTC also warned that any false certification would subject compliance officers to individual civil and criminal penalties.

3. Strengthening external oversight of Facebook — The order also strengthen the role of independent third-party assessors who will conduct assessments of Facebook's privacy program every two years to identify gaps.


Comments

Popular posts from this blog

Site-to-site IPsec VPN with two FortiGates

In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using the VPN Wizard's   Site to Site - FortiGate   template. In this example, one office will be referred to as HQ and the other will be referred to as Branch. 1. Configuring the HQ IPsec VPN On the HQ FortiGate, go to  VPN > IPsec Wizard . Select the  Site to Site  template, and select  FortiGate . In the  Authentication  step, set  IP Address  to the IP of the Branch FortiGate (in the example,  172.20.120.135 ). After you enter the gateway, an available interface will be assigned as the  Outgoing Interface . If you wish to use a different interface, select it from the drop-down menu. Set a secure  Pre-shared Key . In the  Policy & Routing  step, set the  Loca...

Be fraud aware - What are phishing, smishing and vishing.

  You may have heard the terms phishing, smishing or vishing before, but what exactly do they mean? At their core, all three terms are a type of financial fraud which tricks unsuspecting victims into giving out sensitive personal information, handing over money or installing malware onto their device. The only difference between each term is the channel via which you can be targeted; phishing refers to scam emails, smishing refers to scam text or WhatsApp messages and vishing takes place over the phone. Phishing The most common phishing method encourages victims to visit a malicious website through a fake email message, which appears to be sent from a legitimate company or source (e.g. from a bank, HMRC, a delivery company or the NHS). For example, you might receive an email which appears to be from an organisation who you’re familiar with, asking you to click on a link. At this point you will be taken to a webpage on which you’re asked to submit sensitive data, such as passwords, ...

Cisco Releases Security Updates for Cisco ASA 5506-X, 5508-X, 5516-X and Firepower// Cisco Bug IDs: CSCvp36425

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note:  Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability. Cisco has...