The public reaction to Nigam's appointment was swift and positive. With his legal background, technology smarts and reputation as a defender of children, all his experience seemed to lead him to this point.
"We were all optimistic about MySpace's hiring of [Nigam], because we felt that they would be able to implement effective measures," says Jay Chaudhuri, special counsel to North Carolina Attorney General Roy Cooper, the cochairman of a group of 32 attorneys general who have been trying to push MySpace to improve its safety and security practices.
But now, the honeymoon is over.
"In the last six months, MySpace has certainly made some changes," Chaudhuri says, "but are they sufficient to protect children online, and do a majority of attorneys general think MySpace is a safe 'place for friends,' as they like to call it? I think the answer is no."
Pushing for change
Within weeks of Nigam's start date of May 1, 2006, MySpace was proclaiming new measures to improve safety and security. First, the company would block members who list their age as over 18 from contacting members who are 14 or 15, unless the adult knows either the young member's full name or e-mail address. (MySpace says that members must be at least 14 years old but does not verify age, which is still a point of much contention.) Second, the company would allow members of any age, and not only 14- and 15-year-olds, to set their profiles to private, making their full information available only to people within their network of "friends." Third, the company would start targeting ads based on age, to ensure that members under 18 don't see ads for tobacco or dating services and that members under 21 don't see ads for alcohol. (This targeting of ads certainly fits into a larger strategy; Eric Openshaw, national managing director of the technology, media and telecommunications group at Deloitte Consulting, says that the amount of information members provide to MySpace makes it a "marketing data gold mine" that might allow News Corp. eventually to recoup its investment.)
Other, quieter changes were made. For instance, MySpace employees noticed that some young members were listing their age as 69 (shorthand for a sexual position). Older members were then running searches for, say, 69-year-olds under four feet tall, in hopes of finding young members interested in sex. Now, members can no longer browse for people over the age of 68.
From his third-floor office at the studiously hip new digs in Beverly Hills that News Corp. built for Fox Interactive Media, Nigam takes a pragmatic approach to these types of changes. He works with his team to create what he calls an issue list. "We look at, what are hackers doing, what are predators doing?" he says. "Then we go to our engineers and say, suppose you have no worries about resources -- what can we do to solve these issues? Is there a change we can make or feature we can add?" Once they have this list in hand, they try to figure out which five or 10 things they can do to hit 80 percent of the problem, and they build the priority list from there.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts