MySpace, Facebook show off tools that can ward off child predators
At meeting of MySpace-formed task force, social networks show how kids are kept safe
Computerworld - MySpace is using technology to analyze whether potential users trying to sign up for the social network may be registered sex offenders, the company's chief security officer said today.
Hemanshu Nigam, who is also the CSO at Fox Interactive Media, described the new system and other measures taken by MySpace to protect children online during a meeting of the Internet Safety Technical Task Force on Wednesday at Harvard University. The task force was created by MySpace as part of a January agreement with a group of state attorneys general to beef up online safety at social networking sites.
The task force is charged with exploring and developing age and identity verification tools for social networking sites.
The task force was formed after a lengthy battle between 49 (minus Texas) of the 50 state attorneys general and MySpace over turning over the names of registered sex offenders who had accounts on MySpace. In July 2007, MySpace said it had identified more than 29,000 registered sex offenders among its users. Facebook Inc. subsequently joined the task force and agreed to work with the AGs on bolstering online safety.
Nigam said that the company's new Sentinel technology looks at various criteria -- like names and images of known sex offenders -- 24 hours a day to ensure they are not using the site.
"We have proactive, zero tolerance for sex offenders," he noted.
He said that this method of aiming to identify potential predators before they have a chance to make contact with any other MySpace user is part of its new proactive approach at online safety.
"[We] don't just do 'notice and take down,' but merge it and combine it with proactive measures," Nigam added. "That should be the ultimate goal -- take care of [potential problems] before you get an e-mail, a call or a complaint."
The company also reviews videos and photos uploaded to the site for nudity, pornography or overt violence, he added. MySpace is trying to deter users from adding such content to the site by telling those posting illicit videos or images that their IP address is logged and could be used in an investigation if the content is found to be illegal.
"We are looking for teachable moments," he added. "When you are uploading images or videos, we put up a warning to let you know that other people can see what you're putting up."
Chris Kelly, Facebook's chief privacy officer, said via a video presentation from the meeting that one of the company's biggest advantages in the quest for online safety is that unlike MySpace, it requires that users use their real name to identity themselves on the site.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts