MySpace, Facebook show off tools that can ward off child predators
At meeting of MySpace-formed task force, social networks show how kids are kept safe
Computerworld - MySpace is using technology to analyze whether potential users trying to sign up for the social network may be registered sex offenders, the company's chief security officer said today.
Hemanshu Nigam, who is also the CSO at Fox Interactive Media, described the new system and other measures taken by MySpace to protect children online during a meeting of the Internet Safety Technical Task Force on Wednesday at Harvard University. The task force was created by MySpace as part of a January agreement with a group of state attorneys general to beef up online safety at social networking sites.
The task force is charged with exploring and developing age and identity verification tools for social networking sites.
The task force was formed after a lengthy battle between 49 (minus Texas) of the 50 state attorneys general and MySpace over turning over the names of registered sex offenders who had accounts on MySpace. In July 2007, MySpace said it had identified more than 29,000 registered sex offenders among its users. Facebook Inc. subsequently joined the task force and agreed to work with the AGs on bolstering online safety.
Nigam said that the company's new Sentinel technology looks at various criteria -- like names and images of known sex offenders -- 24 hours a day to ensure they are not using the site.
"We have proactive, zero tolerance for sex offenders," he noted.
He said that this method of aiming to identify potential predators before they have a chance to make contact with any other MySpace user is part of its new proactive approach at online safety.
"[We] don't just do 'notice and take down,' but merge it and combine it with proactive measures," Nigam added. "That should be the ultimate goal -- take care of [potential problems] before you get an e-mail, a call or a complaint."
The company also reviews videos and photos uploaded to the site for nudity, pornography or overt violence, he added. MySpace is trying to deter users from adding such content to the site by telling those posting illicit videos or images that their IP address is logged and could be used in an investigation if the content is found to be illegal.
"We are looking for teachable moments," he added. "When you are uploading images or videos, we put up a warning to let you know that other people can see what you're putting up."
Chris Kelly, Facebook's chief privacy officer, said via a video presentation from the meeting that one of the company's biggest advantages in the quest for online safety is that unlike MySpace, it requires that users use their real name to identity themselves on the site.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts