Why social networks should be more like Facebook Poke
Facebook Poke is a teen sexting app. But at least it gives users knowledge and control over posts.
Computerworld - The sister of Facebook CEO Mark Zuckerberg, who's name is Randi Zuckerberg, posted a private photo this week of some of her family members, including brother Mark, in a kitchen goofing around with Facebook's new Poke app.
A friend of another Zuckerberg sister saw that post on her Facebook News Feed, thought it was charming and re-posted it publicly on Twitter.
Randi Zuckerberg was upset by the re-share, so she lectured the world on Twitter about "digital etiquette." She Tweeted:
"Always ask permission before posting a friend's photo publicly. It's not about privacy settings, it's about human decency."
Randi Zuckerberg is totally wrong. It's all about the settings and it has nothing to do with "decency."
The problem: Nobody knew what was happening with the communication.
Randi Zuckerberg, a former senior executive at Facebook, believed her private Facebook post was viewable only to "friends," when in fact it was visible to friends of friends.
Randi Zuckerberg's other sister didn't know that by simply friending someone on Facebook she was making her sister's personal posts visible to those friends.
And the friend who shared the post on Twitter didn't know that Randi Zuckerberg's photo was meant to be private. She thought it was public.
Even Zuckerberg family and friends don't know what's happening with their own Facebook messages.
Why? Because of the settings, of course -- not because of "decency."
This is the situation for all Facebook users and all messages. Almost nobody knows who can see or share their posts on social networks.
Instead of lecturing the world, Randi Zuckerberg should instead try lecturing her little brother, Mark. (And while she's lecturing him, she should also give him the "decency" lecture -- about copying Snapchat in the creation of Poke. It's about decency.)
Why Facebook should be more like Poke
When Randi Zuckerberg posted her photo, it should have been clear to her exactly who would gain access to the message. And if she marked it as private and viewable only by a specific group of people, Facebook should have done a better job of both locking it down to some degree and providing obvious signals that it should not be shared.
Instead of requiring every single recipient of every single post to check the light-colored fine print that shows who the sender addressed it to, private posts on social networks should be unsharable on the network and the pictures should be undownloadable, just like Flickr photos are when the user selects certain rights options.
Of course, any recipient can take a screen shot. But when a screenshot is taken of a private photo, the sender of that photo should be notified of the fact.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts