Facebook Collects Your Data Even If You Don’t Use Facebook

Ever since the Cambridge Analytica data breach scandal made headlines, there has been some new news or statement from Facebook. Now with Mark Zuckerberg’s testimony before Congress is going on, there are new revelations every day.

In the first hearing, Zuckerberg told the Congressmen that his own data was also compromised in the Cambridge Analytica Scandal. Now we here lot more interesting revelations.

The most revealing of them all is that Facebook collects user data even if a user doesn’t use Facebook or has ever signed up for the social media network.

When New Mexico’s representative Ben Ray Lujan asked Zuckerberg if Facebook maintains a detailed profile of people who never signed up for Facebook, Zuckerberg had no specific answer.

But from what he said, it was clear that Facebook does collect data of non-FB users. Zuckerberg replied that some data related to non-Facebook users is collected for security reasons and to prevent mass scrapping of user data on the platform.

While this was known in tech circles, Zuckerberg’s testimony puts all theories at rest. When Lujan asked Zuckerberg how many data points they have on Facebook and non-Facebook users. The CEO replied that he doesn’t know.

When asked that the term “shadow profiles” is used to refer profiles of non-Facebook users, Zuckerberg said he is not familiar with that.

When asked how a non-Facebook user opt-out of the data collection, Zuckerberg replied, “Congressman, anyone can turn off and opt out of any data collection for ads, whether they use our services or not.  But, in order to prevent people from scraping public information… We need to know when someone is trying to repeatedly access our services.”

If you are not a Facebook user Facebook does have a support page titled, “I don’t have a Facebook account and would like to request all personal data stored by Facebook.”

But the support page wants you to become an FB member first. If the user doesn’t want to register with Facebook, they are requested to send an email to: datarequests@support.facebook.com.

ThreatBrief:

You Might Also Read:

Snowden Says Social Media Is Surveillance 'Rebranded':

The Cambridge Analytica Row Shows Politics Are Moving In A Disturbing Direction:

 

« Leading Companies Pledge To Fight Cyber-Attacks
Blockchain And GDPR: A Rock And A Hard Place »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Onspring

Onspring

Onspring is the cloud-based platform of choice for governance, risk and compliance (GRC) teams and business operations experts across multiple industries.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.

CRYPTIQ

CRYPTIQ

CRYPTIQ empowers businesses to navigate the ever-evolving cybersecurity landscape with confidence and clarity.

Trustlink Technologies

Trustlink Technologies

Trustlink Technologies is an information technology company founded with a steadfast vision to fortify the digital landscapes of businesses through a foundation of trust.

Mimic

Mimic

Mimic’s SaaS platform provides enterprises with detection, deflection, and rapid recovery from ransomware attacks.