Facebook's Internal Content Rules Revealed

A secretly leaked Facebook document has revealed how users are allowed to call for the death of public figures and can praise mass murders, based on company's own vague definitions of what constitutes a crime. This 300-page Facebook document explains what sentences and phrases are ethically unacceptable to publish on Facebook’s 2.8 billion monthly users’ site.

The guidelines seen by the Guardian show how the company controls its mainly outsourced moderators’ work down to the smallest detail, defining its rules so precisely that contractors are told which emojis constitute “praise” and which count as “condemnation”.

A particular area of contention surrounds what are defined as dangerous individuals and organisations. In the leaked documents dating from December 2020, moderators for Facebook and Instagram are instructed how to define “support” for terrorist groups and other “dangerous individuals”, whether to distinguish between “explaining” and “justifying” the actions of terrorists, and even in what contexts it is acceptable to call for the use of “gas chambers”.

While Facebook’s community guidelines which have in a short report been publicly available since 2018 but these newly leaked 300 page documents are different. 

These much more detailed guidelines explain what the published rules mean in practice. Facebook has long argued that to publish the full documents would be counterproductive since it would let malicious users avoid a ban for deliberately borderline behaviour.

According to the internal guidelines, Facebook bans users from “expressing a belief in the stated goals, methods, etc of an organisation or individual.” According to the company they do protect the public figures in some ways. Any posts which seems to have an extremely severe attack is removed while posts containing threats in which the directed person is tagged is also removed. However, for the private citizens this security goes a lot deeper and further and they are protected in several other ways with greater measures. 

Facebook, which also owns Instagram, has changed its policies in response to the criticism, introducing new rules to cover abuse sent through direct messages and committing to cooperate with law enforcement over hate speech.

These new guidelines say public figures can be targeted in ways that the company bans for those classed as private individuals, although they cannot be tagged in the content and its policy protects them from direct threats of severe physical harmIt comes as social networks face renewed criticism over abuse on their platforms from people in the public eye, including  the Duke and Duchess of Sussex and black sports stars like soccer player Marcus Rashford. 

In response to the Guardian, a Facebook spokesperson said: “We think it’s important to allow critical discussion of politicians and other people in the public eye. But that doesn’t mean we allow people to abuse or harass them on our apps.

“We remove hate speech and threats of serious harm no matter who the target is, and we’re exploring more ways to protect public figures from harassment.... We regularly consult with safety experts, human rights defenders, journalists and activists to get feedback on our policies and make sure they’re in the right place.”

Facebook:    Guardian:      ITV:      Daly Mail:     MacObserver:    Digital Information World:     Image: Unsplash

You Might Also Read: 

Facebook To Pay $650m For Facial Recognition Lawsuit:

 

« Avoiding Arrest: Cyber Criminals Share Dark Web Secrets
Investigating Fake News With Google, YouTube & Facebook »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.

Improsec

Improsec

Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

National Academy of Cyber Security (NACS)

National Academy of Cyber Security (NACS)

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

Opus Security

Opus Security

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.